Abstract of Cybercrime in Credit Card Systems: Case Study on t
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 109

Case Studies | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014

Cybercrime in Credit Card Systems: Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

As technology is advancing Credit card systems have become the corner stone of E-commerce-related payments. People have become dependent on online payment systems. The increase in its importance causes a lot of privacy and security concerns. The researchers performed a business case analysis on the 2014 internal attack on the Korean Credit Bureaus databases focusing on the stolen credit card details of customers. A study on literature review was conducted to identify the possible threats, formulate solutions and develop a framework as a countermeasure from future attacks.

Keywords: privacy, security, threats, ecommerce, framework

Edition: Volume 3 Issue 3, March 2014

Pages: 530 - 534

Share this Article

How to Cite this Article?

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman, "Cybercrime in Credit Card Systems: Case Study on the 2014 Korean Credit Bureau Data Leak", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131201, Volume 3 Issue 3, March 2014, 530 - 534

Enter Your Email Address


Similar Articles with Keyword 'privacy'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'threats'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Similar Articles with Keyword 'ecommerce'

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 495 - 500

Web Service Application to Access Climate Data from Cloud using Spring Framework

Vijayshree, Dr. Rekha Patil

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1391 - 1395

A Review on Automatic News Classification using the Probabilistic Classification Algorithms

Mandeep Kaur, Pravneet Kaur

Share this Article

Similar Articles with Keyword 'framework'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article
Top