{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T21:51:47Z","timestamp":1766181107029,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11948-018-0049-x","type":"journal-article","created":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T10:50:34Z","timestamp":1525171834000},"page":"1311-1320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["ATM Card Cloning and Ethical Considerations"],"prefix":"10.1007","volume":"25","author":[{"given":"Paramjit","family":"Kaur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5321-0958","authenticated-orcid":false,"given":"Kewal","family":"Krishan","sequence":"additional","affiliation":[]},{"given":"Suresh K.","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Tanuj","family":"Kanchan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,1]]},"reference":[{"key":"49_CR1","unstructured":"Ali, I. (2018). 4 Chinese nationals arrested in another ATM skimming incident in Karachi. \n                    https:\/\/www.dawn.com\/news\/1382925\n                    \n                  . Accessed 25 February 2018."},{"key":"49_CR2","unstructured":"Automated Teller Machines (ATMs), History.com. \n                    http:\/\/www.history.com\/topics\/inventions\/automated-teller-machines\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR3","unstructured":"Batiz-Lazo, B. (2015a). As cash becomes quaint, are ATMs on path to obsolescence? \n                    https:\/\/theconversation.com\/as-cash-becomes-quaint-are-atms-on-path-to-obsolescence-38930\n                    \n                  . Accessed 26 February 2018."},{"key":"49_CR4","unstructured":"Batiz-Lazo, B. (2015b). A brief history of the ATM. \n                    https:\/\/www.theatlantic.com\/technology\/archive\/2015\/03\/a-brief-history-of-the-atm\/388547\/\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR5","unstructured":"Bhatla, T. P., Prabhu, V., & Dua, A. (2003). Understanding credit card frauds. Tata Consultancy Services.\n                           \n                    http:\/\/www.popcenter.org\/problems\/credit_card_fraud\/PDFs\/Bhatla.pdf\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR6","unstructured":"Cespedes, B. (2013). ATM technology and their legal, ethical, and social issues regarding the security of their technological advances. \n                    https:\/\/bcespede.wordpress.com\/\n                    \n                  . Accessed 24 February 2018."},{"key":"49_CR7","unstructured":"Chronicle. (2017). ATM card cloning: Bank card criminals invade Byo. \n                    http:\/\/www.chronicle.co.zw\/atm-card-cloning-bank-card-criminals-invade-byo\/\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR8","unstructured":"Coventry, L., Angeli, A. D., & Johnson, G. (2003). Usability and biometric verification at the ATM interface. In: CHI 2003 (ACM conference on human factors in computing systems), 5\u201310 April 2003, Fort Lauderdale, Florida, \n                    http:\/\/nrl.northumbria.ac.uk\/2153\/\n                    \n                  ."},{"key":"49_CR9","unstructured":"De Luca, A., Langheinrich, M., & Hussmann, H. (2010). Towards understanding ATM security: A field study of real world ATM use. In Proceedings of the symposium on usable privacy and security (SOUPS) 2010, July 14\u201316, 2010, Redmond, WA, USA. \n                    http:\/\/cups.cs.cmu.edu\/soups\/2010\/proceedings\/a16_deluca.pdf\n                    \n                  . Accessed 2 January 2018."},{"key":"49_CR10","unstructured":"Electromag. (2015). Electro magnetic components, INC. \n                    http:\/\/www.atmparts.net\/atm-parts\/\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR11","unstructured":"FBI. (2011). The Federal Bureau of investigation: Taking a trip to the ATM? Beware of \u2018skimmers\u2019. \n                    https:\/\/www.fbi.gov\/news\/stories\/atm-skimming\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR12","unstructured":"Fenlon, W. (2010). How does ATM skimming work? \n                    https:\/\/money.howstuffworks.com\/atm-skimming.htm\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR13","unstructured":"Hannah, F. (2016). Card cloning and skimming, how to stay safe. \n                    https:\/\/www.lovemoney.com\/news\/15992\/credit-card-cloning-fraudsters-spent-2000-on-my-husbands-credit-card-without-stealing-it\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR14","unstructured":"Hayashi, F., Sullivan, R., & Weiner, S. E. (2003). A guide to the ATM and debit card industry. Federal Reserve Bank of Kansas City."},{"key":"49_CR15","unstructured":"Hindustan Times. (2017). Card cloning racket: Mumbai gang steals debit, credit card data from 1,000 customers of 96 banks. Hindustan Times: Indian English-language daily newspaper. \n                    http:\/\/www.hindustantimes.com\/mumbai-news\/card-cloning-racket-mumbai-gang-steals-debit-credit-card-data-from-1-000-customers-of-96-banks\/story-iknLu93iHpvL6RGhCYkHIO.html\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR16","unstructured":"ICICIBANK. (2016). Evolution of monetary transactions. \n                    https:\/\/www.icicibank.com\/blogs\/banking-innovation\/evolution-monetary-transactions.page\n                    \n                  . Accessed 26 February 2018."},{"key":"49_CR17","unstructured":"Krebs, B. (2010). ATM skimmers part II. \n                    https:\/\/krebsonsecurity.com\/2010\/02\/atm-skimmers-part-ii\/\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR18","doi-asserted-by":"publisher","first-page":"S16","DOI":"10.1016\/j.diin.2007.06.018","volume":"4S","author":"G Masters","year":"2007","unstructured":"Masters, G., & Turner, P. (2007). Forensic data recovery and examination of magnetic swipe card cloning devices. Digital Investigation,\n                           4S, S16\u2013S22.","journal-title":"Digital Investigation"},{"key":"49_CR19","unstructured":"Mathew, J. (2016). Safeguard against money fraud. \n                    https:\/\/www.businesstoday.in\/magazine\/money-today\/cover-story\/safeguard-against-money-fraud\/story\/233723.html\n                    \n                  . Accessed 26 February 2018."},{"key":"49_CR20","unstructured":"McAfee. (2011). Security threat concerns ATM industry. \n                    https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/security-threat-concerns-atm-industry\/\n                    \n                  . Accessed 2 January 2018."},{"key":"49_CR21","unstructured":"Roland, M., & Langer, J. (2013). Cloning credit cards: A combined pre-play and downgrade attack on EMV contactless. In Proceedings of the 7th USENIX conference on offensive technologies.\n                           \n                    https:\/\/www.usenix.org\/system\/files\/conference\/woot13\/woot13-roland.pdf\n                    \n                  ."},{"key":"49_CR22","unstructured":"Siciliano, R. (2017). Learn about ATM skimming and how to protect yourself. \n                    https:\/\/www.thebalance.com\/what-is-atm-skimming-1947475\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR23","unstructured":"Singh, D., Kushwaha, P., Choubey, P., Vaish, A., & Goel, U. (2011). A proposed framework to prevent financial fraud through ATM card cloning. In Proceedings of the world congress on engineering, 1, July 6\u20138, London, UK. \n                    http:\/\/www.iaeng.org\/publication\/WCE2011\/WCE2011_pp491-494.pdf\n                    \n                  ."},{"key":"49_CR24","unstructured":"Sorrel, C. (2016). What happens when we become: A cashless society? \n                    https:\/\/www.fastcompany.com\/3056736\/what-happens-when-we-become-a-cashless-society\n                    \n                  . Accessed 26 February 2018."},{"key":"49_CR25","unstructured":"The Freeman. (2017). Account withdrawals puzzle government workers. \n                    http:\/\/www.philstar.com\/cebu-news\/2017\/03\/15\/1681321\/account-withdrawals-puzzle-government-workers\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR26","unstructured":"The Tribune. (2017). ATM fraud, card cloning cases on the rise in city. The Tribune: Indian English-language daily newspaper. \n                    http:\/\/www.tribuneindia.com\/news\/chandigarh\/atm-fraud-card-cloning-cases-on-the-rise-in-city\/512488.html\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR27","unstructured":"Walters, C. (2009). Here\u2019s what a card skimmer looks like on an ATM. \n                    https:\/\/consumerist.com\/2009\/04\/19\/heres-what-a-card-skimmer-looks-like-on-an-atm\/\n                    \n                  . Accessed 31 December 2017."},{"key":"49_CR28","unstructured":"Weismann, S. (2017). Skimming: It\u2019s worse than you think. \n                    https:\/\/www.bentley.edu\/impact\/articles\/skimming-its-worse-you-think\n                    \n                  . Accessed 2 January 2018."},{"key":"49_CR29","unstructured":"Wikipedia. (2017). \n                    https:\/\/en.wikipedia.org\/wiki\/Automated_teller_machine#Hardware\n                    \n                  . Accessed 31 December 2017."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-0049-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-018-0049-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-0049-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T12:05:36Z","timestamp":1571832336000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-018-0049-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,1]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["49"],"URL":"https:\/\/doi.org\/10.1007\/s11948-018-0049-x","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"type":"print","value":"1353-3452"},{"type":"electronic","value":"1471-5546"}],"subject":[],"published":{"date-parts":[[2018,5,1]]},"assertion":[{"value":"28 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"All authors declares that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}