Patil et al., 2023 - Google Patents
A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS AuthenticationPatil et al., 2023
View PDF- Document ID
- 5780395944490366006
- Author
- Patil P
- Sonkar M
- Patil P
- Deshmukh P
- Patil T
- Publication year
- Publication venue
- International Journal of Soft Computing and Engineering (IJSCE)
External Links
Snippet
E-commerce has transformed global trade, enabling businesses to reach audiences worldwide since the World Wide Web's inception in 1990. Companies like Amazon demonstrate this growth, evolving from a small online bookstore to a retail giant …
- 238000000034 method 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Use of an alias or a single-use code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
- G06Q30/0253—During e-commerce, i.e. online transactions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hille et al. | Consumer fear of online identity theft: Scale development and validation | |
Gupta et al. | An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: A scenario-based experiment | |
Akhilomen | Data mining application for cyber credit-card fraud detection system | |
Rodrigues et al. | Fraud detection and prevention in e-commerce: A systematic literature review | |
Abdulgani et al. | Exploring factors that influence Muslim intention to purchase online | |
Ghazali et al. | Cloud-based global online marketplaces review on trust and security | |
Najafi | The role of e-commerce awareness on increasing electronic trust | |
Jung et al. | Dynamics of dark web financial marketplaces: An exploratory study of underground fraud and scam business | |
Szigeti et al. | Trust factors in the social figuration of online drug trafficking: A qualitative content analysis on a darknet market | |
Kumain et al. | E-commerce security issues and role of AI: A review | |
Ahn et al. | Reptor: A model for deriving trust and reputation on blockchain-based electronic payment system | |
Manek et al. | Detection of fraudulent and malicious websites by analysing user reviews for online shopping websites | |
Verma et al. | Impact of Blockchain Technology on E-Commerce | |
Shareef et al. | Prevent/control identity theft: Impact on trust and consumers’ purchase intention in B2C EC | |
Patil et al. | A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication | |
Tajpour et al. | E-commerce and identity theft issues | |
Tubishat | Electronic Commerce and Consumer Protection in Jordan: The Emerging Trend | |
Nimesh et al. | A survey on opinion mining and sentiment analysis | |
Nandy et al. | The Evaluation of Cryptocurrency: Overview, Opportunities, and Future Directions | |
Akazue et al. | Customer's Protection in Ecommerce Transaction Through Identifying Fake Online Stores | |
Almehaimeed | Strengths, Opportunities and areas of Improvements for Maroof Platform in Saudi Arabia | |
Vinnyk | Composition of E-Commerce Relationships in the Context of Consumer Rights Protection | |
Arnold et al. | Semi-automatic identification of counterfeit offers in online shopping platforms | |
Lee | Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point | |
Rahlagane et al. | A Review of Counterfeit Product Identification Models |