دانلود رایگان ترجمه مقاله نظرسنجی مدل های پیشگیری از تقلب در تجارت الکترونیک – ۲۰۱۵
دانلود رایگان مقاله انگلیسی + خرید ترجمه فارسی | |
عنوان فارسی مقاله: |
بررسی مدل های پیش گیری از تقلب در معاملات تجارت الکترونیک |
عنوان انگلیسی مقاله: |
A Survey of Ecommerce Transaction Fraud Prevention Models |
|
مشخصات مقاله انگلیسی (PDF) | |
سال انتشار | ۲۰۱۵ |
تعداد صفحات مقاله انگلیسی | ۷ صفحه با فرمت pdf |
رشته های مرتبط با این مقاله | مهندسی فناوری اطلاعات |
گرایش های مرتبط با این مقاله | تجارت الکترونیک و اینترنت و شبکه های گسترده |
چاپ شده در مجله (ژورنال) | مقالات کنفرانس بین المللی پردازش اطلاعات دیجیتال، داده کاوی، و ارتباطات بی سیم |
کلمات کلیدی | پیش گیری از تقلب، سیستم بازیابی ثبت فروشنده مرکزی، سیستم ثبت فروشنده محلی، اجزا، تجارت الکترونیکی |
ارائه شده از دانشگاه | ریاضیات و علوم کامپیوتر، نیجریه |
رفرنس | دارد ✓ |
کد محصول | F992 |
مشخصات و وضعیت ترجمه فارسی این مقاله (Word) | |
وضعیت ترجمه | انجام شده و آماده دانلود |
تعداد صفحات ترجمه تایپ شده با فرمت ورد با قابلیت ویرایش | ۱۰ صفحه با فونت ۱۴ B Nazanin |
ترجمه عناوین تصاویر و جداول | ترجمه شده است ✓ |
ترجمه متون داخل تصاویر | ترجمه شده است ✓ |
ترجمه متون داخل جداول | ترجمه شده است ✓ |
درج تصاویر در فایل ترجمه | درج شده است ✓ |
درج جداول در فایل ترجمه | درج شده است ✓ |
منابع داخل متن | به صورت عدد درج شده است ✓ |
کیفیت ترجمه | کیفیت ترجمه این مقاله متوسط میباشد |
توضیحات | ترجمه این مقاله به صورت خلاصه انجام شده است. |
فهرست مطالب |
چکیده
۱- مقدمه
۲-کار های مربوطه
۲-۱ فنون پیش گیری از تقلب
۲-۳ تهدیدات آسیب پذیری تجارت الکترونیک
۳-بیان مسئله
۴-چارچوب تحقیق
۴-۱ تحلیل سیستم موجود
۴-۲ تحلیل مدل MAE پیشنهادی
۴-۳ ارزیابی قابل قبول بودن مدل MAE پیشنهادی
۴-۴ اهمیت های مولفه CMMR پیشنهادی
۶- بحث
۷- نتیجه گیری
|
بخشی از ترجمه |
چکیده ۱- مقدمه |
بخشی از مقاله انگلیسی |
ABSTRACT Over the years, there has been an increasing interest in research efforts to develop customer-merchant trust models. Several types of these designed ecommerce fraud prevention models protects merchants, merchant stores and credit cards while defrauded customers uses established laws and policies to fight their cases. A survey of existing fraud prevention models was analyzed and component that checks merchant integrity within the transaction system was not present in the ecommerce models. The proposed system incorporates rule-based techniques and defined checks against fake virtual stores. Questionnaire was distributed to online customers about the acceptability of the new model. The analysis showed that the proposed Multi Authentication Ecommerce (MAE) Model is acceptable by online customers. In future, the efficiency of the ecommerce proposed model will be demonstrated by developing and implementing MAE fraud prevention model. The quality of the proposed model will be measured using the data generated. ۱ INTRODUCTION Electronic commerce, otherwise known as ecommerce, is the act of doing business transactions over the Internet or similar communications technology [1]. In other words, e-commerce involves the buying, selling or exchange of goods, services, and information through electronic networks. The initial widespread uptake of the Internet showed high expectations of Internet potential for e-commerce but, the lack of appropriate online payment mechanisms, consumer confidence in electronic payments and issues with the perceived security of payment mechanisms, explained the weak uptake of online shopping [2]. In other words, paymentrelated difficulties, products not appropriate, sellers are unknown, delivery is uncertain, were key explanation for consumers disinterest in ecommerce [3, 4]. Thus, this paper evaluated the existing merchant fraud prevention techniques with a view to exposing their flaws and proposed a Multi Authentication E-commerce (MAE) Model. ۲ RELATED WORKS ۲٫۱ Fraud Prevention Techniques There are many types of merchant fraud such as merchant collusion fraud or triangulation fraud, Site/page cloning, and false merchant sites [5, 6, 7]. [6] proposed a proactive rule-based Fraud Management System (FMS) that uses layers of fraud protection to check credit card. The result showed that Chip and Pin is a better alternative than magnetic stripe. [8] proposed a risk scoring system that is based on statistical models which use derived patterns from cardholder historical transactions as well as the current transaction attributes to identified suspicious account activity. The scope was on checking Customer. [9] proposed the use of intelligent agents in financial monitoring systems to effectively monitor financial transactions and detect and report any abnormal transactions. Their scope could not prevent abnormal transactions. [5] elicited the security features used by the banks to protect transactions from fraudsters. Their work elicited four major processes that banks can mitigate the problems in credit card transactions. In their work, emphasis was on credit card. [10] proposed an e-payment system that detects fraudulent transactions of Card-NotPresent (CNP) based on data mining techniques. They dealt with credit card [11] proposed an authentication model for MCommerce that reduce the requirement of computational resources for mobile terminals and provides security authentication, credit standing and session key for both the buyer and the seller to prevent large scale of identity theft. Their work was on identity theft. [12] proposed an architecture that uses a Trusted Email mechanism to identify and authenticate the online customer, prevent unauthorized credit card transactions, and effectively resolve e-commerce dispute. Their work covered credit card fraud on soft-products [13] proposed an e-fraud model of electronic fraud that allows the mechanics and context of e-fraud to be more fully understood. It took into account the various dimensions of e-fraud that is useful for practitioners in creating a comprehensive organizational view of the efraud phenomena. The scope was to understand the nature and extent of e-fraud, and identify the controls and mechanism. [14] proposed a system which consisted of “predefined checks” that observes the attributes of fraudulent and non-fraudulent transactions and data was transmitted by using a pair of symmetric keys. It detected both fraudulent and non-fraudulent transactions when tested on a data set. Their scope of work was on Card Not Present scenarios [15] proposed the use of distribution tracing within web content to identify counterfeiting source. It identified the activities of counterfeiting of popular transactional Web sites such as financial portals, stock‐trading platforms and online retail sites. Scope was on Counterfeit websites. [16] examined the security of business applications in a full electronic commerce environment It reduced risks and vulnerabilities that affect the overall operation of computer systems in e-commerce environment scope was on e-commerce environment |