{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:23:30Z","timestamp":1770290610884,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6284315","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T20:57:57Z","timestamp":1346360277000},"page":"227-234","source":"Crossref","is-referenced-by-count":19,"title":["Payment card fraud: Challenges and solutions"],"prefix":"10.1109","author":[{"given":"Irina","family":"Sakharova","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"2010 Identity Fraud Survey Report Consumer Version"},{"key":"35","article-title":"Credit card fraud and detection techniques: A review","volume":"4","author":"delamaire","year":"2009","journal-title":"Banks and bank Systems"},{"key":"17","author":"phucas","year":"2011","journal-title":"Bulgarians Accused of ATM Skimming Remain in Jail"},{"key":"18","author":"huppert","year":"2010","journal-title":"Suspect Linked to Restaurant Worker Accused of Stealing Credit Card Data"},{"key":"33","year":"0"},{"key":"15","article-title":"Hacker Sentenced to 20 Years in Massive Data Theft","year":"2010","journal-title":"Wall Street Journal"},{"key":"34","year":"2009","journal-title":"U S Retailers Face $191 Billion in Fraud Losses Each Year"},{"key":"16","author":"keitel","year":"2008","journal-title":"Legislative Responses to Data Breaches and Information Security Failures"},{"key":"13","year":"2007","journal-title":"J Maxx Data Theft Worse Than First Reported"},{"key":"14","year":"2008","journal-title":"Credit Card Data Breach Could Affect 650 000"},{"key":"11","year":"0"},{"key":"12","year":"2007","journal-title":"Is This the Future for Fraud Risk Management Across the Payments Industry"},{"key":"21","year":"0"},{"key":"20","author":"kristof","year":"2011","journal-title":"Biggest Security Threat Facebook and You"},{"key":"22","author":"gorman","year":"2009","journal-title":"Hackers Indicated in Widespread ATM Heist"},{"key":"23","volume":"14","year":"2009","journal-title":"Symantec global internet security threat report"},{"key":"24","author":"sparks","year":"2010","journal-title":"One of 'World's Most Wanted Cyber Criminals' Caught on French Riviera"},{"key":"25","year":"2008","journal-title":"Terrorist Financing"},{"key":"26","author":"simon","year":"2008","journal-title":"The Credit Card-terrorism Connection How Terrorists Use Cards for Everyday Needs and to Fund Operations"},{"key":"27","author":"gunaratna","year":"0","journal-title":"Inside Al Qaeda Global Network of Terror"},{"key":"28","year":"2003","journal-title":"Two Al-Qaeda Terrorists Jailed for 11 Years"},{"key":"29","article-title":"Fraudsters' bugs transmit credit card details to Pakistan","author":"leppard","year":"2008","journal-title":"Sunday Times"},{"key":"3","year":"0","journal-title":"Statistical Abstract of the United States 2011"},{"key":"2","year":"2009"},{"key":"1","year":"2010","journal-title":"2010 Federal Reserve Payments Study"},{"key":"10","year":"0","journal-title":"Identity Theft Dumpster Diving"},{"key":"7","year":"0","journal-title":"2011 Identity Fraud Survey Report Consumer Version"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1355\/CS25-2A"},{"key":"6","year":"2009"},{"key":"5","year":"0","journal-title":"Visa Annual 10K 2010"},{"key":"32","author":"lormel","year":"2007","journal-title":"Terrorism and Credit Card Information Theft Connecting the Dots"},{"key":"4","year":"0","journal-title":"Aite Group Report"},{"key":"31","article-title":"Skimming fraud funding terrorists","author":"crawford","year":"2011","journal-title":"The Sun-Herald"},{"key":"9","author":"bradford","year":"2006","journal-title":"Payments Fraud Consumer Considerations"},{"key":"8","year":"2008","journal-title":"Maintaining A Safe Environment for Payment Cards Examining Evolving Threats Posed by Fraud"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","location":"Washington, DC, USA","start":{"date-parts":[[2012,6,11]]},"end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06284315.pdf?arnumber=6284315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:57:47Z","timestamp":1490133467000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6284315","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}