International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Case Studies | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014


Cybercrime in Credit Card Systems: Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza | Robert T. R. Shoniwa [2] | V. M. Shenbagaraman


Abstract: As technology is advancing Credit card systems have become the corner stone of E-commerce-related payments. People have become dependent on online payment systems. The increase in its importance causes a lot of privacy and security concerns. The researchers performed a business case analysis on the 2014 internal attack on the Korean Credit Bureaus databases focusing on the stolen credit card details of customers. A study on literature review was conducted to identify the possible threats, formulate solutions and develop a framework as a countermeasure from future attacks.


Keywords: privacy, security, threats, ecommerce, framework


Edition: Volume 3 Issue 3, March 2014,


Pages: 530 - 534


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman, "Cybercrime in Credit Card Systems: Case Study on the 2014 Korean Credit Bureau Data Leak", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 530-534, https://www.ijsr.net/get_abstract.php?paper_id=20131201

Similar Articles with Keyword 'privacy'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article
Top