{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T03:38:09Z","timestamp":1725421089052},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335055","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["An investigation into credit card information disclosure through Point of Sale purchases"],"prefix":"10.1109","author":[{"given":"S.","family":"von Solms","sequence":"first","affiliation":[]}],"member":"263","reference":[{"article-title":"Chasing the e-tail a costly investment","year":"0","author":"holmes","key":"ref10"},{"journal-title":"Visa","article-title":"Verified by Visa","year":"0","key":"ref11"},{"journal-title":"Mastercard","article-title":"MasterCard SecureCode - Enhanced Security For Online Shopping","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2013.6567226"},{"journal-title":"South African Government News Agency","article-title":"Sharp increase in bank card fraud","year":"0","key":"ref14"},{"journal-title":"Staff Writer","article-title":"How criminals steal your credit card info","year":"0","key":"ref15"},{"key":"ref16","article-title":"What are those numbers on my credit card?","author":"simon","year":"0","journal-title":"creditcards com"},{"key":"ref17","article-title":"Anatomy of a credit card number and the utility of the BIN","author":"addison","year":"0","journal-title":"The Dirigo Blog"},{"journal-title":"Investopedia","article-title":"Bank Identification Number - BIN","year":"0","key":"ref18"},{"article-title":"How the &#x2018;Luhn formula&#x2019; validates credit card numbers","year":"0","author":"macdonald","key":"ref19"},{"journal-title":"StaySafeOnline org","article-title":"Online Shopping","year":"0","key":"ref28"},{"journal-title":"Standard Bank","article-title":"Safety Tips","year":"0","key":"ref4"},{"journal-title":"Shopsite","article-title":"How does E-Commerce Work?","year":"0","key":"ref27"},{"journal-title":"Absa","article-title":"Credit Cards","year":"0","key":"ref3"},{"journal-title":"Nedbank","article-title":"Card fraud","year":"0","key":"ref6"},{"article-title":"9 things you should know about your credit card receipt","year":"0","author":"wamick","key":"ref29"},{"journal-title":"FNB","article-title":"Security Centre","year":"0","key":"ref5"},{"key":"ref8","article-title":"Why your flea market stand needs to accept credit & debit cards","author":"howard","year":"0","journal-title":"The Official Groovv Blog"},{"article-title":"How to Process Credit Cards from a Booth or Flea Market","year":"0","author":"byrne","key":"ref7"},{"journal-title":"how stuffworks","article-title":"How Credit Cards Work","year":"0","key":"ref2"},{"key":"ref9","article-title":"Internet Matters: The Quiet Engine of the South African Economy","author":"goldstuck","year":"2012","journal-title":"World Wide Worx"},{"article-title":"Card payments overtake cash in South Africa","year":"0","author":"da silva","key":"ref1"},{"journal-title":"CVVnumber com","article-title":"CVV Number location and information","year":"0","key":"ref20"},{"journal-title":"Mastercard","article-title":"Transaction Processing Rules","year":"2014","key":"ref22"},{"journal-title":"First Data","article-title":"Payments 101: Credit and Debit Card Payments","year":"2010","key":"ref21"},{"journal-title":"Visa","article-title":"Card Acceptance Guidelines for Visa Merchants","year":"2014","key":"ref24"},{"journal-title":"Mastercard","article-title":"Security Rules and Procedures - Merchant Edition","year":"2015","key":"ref23"},{"journal-title":"Networking Solutions","article-title":"What is Ecommerce?","year":"0","key":"ref26"},{"journal-title":"Visa","article-title":"Charaeback Management Guidelines For Visa Merchants","year":"2014","key":"ref25"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335055.pdf?arnumber=7335055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T05:03:09Z","timestamp":1490418189000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335055","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}