{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:04Z","timestamp":1750307884199,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,28]],"date-time":"2007-09-28T00:00:00Z","timestamp":1190937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,28]]},"DOI":"10.1145\/1409908.1409928","type":"proceedings-article","created":{"date-parts":[[2008,9,30]],"date-time":"2008-09-30T13:03:19Z","timestamp":1222779799000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Credit card transaction security"],"prefix":"10.1145","author":[{"given":"Jonathan M.","family":"Graefe","sequence":"first","affiliation":[{"name":"ARINC, Annapolis, MD"}]},{"given":"Laurel","family":"Lashley","sequence":"additional","affiliation":[{"name":"US Patent and Trademark Office, Hyattsville, MD"}]},{"given":"Mario A. M.","family":"Guimaraes","sequence":"additional","affiliation":[{"name":"Kennesaw State University, Kennesaw, GA"}]},{"given":"Eghosa","family":"Guodabia","sequence":"additional","affiliation":[{"name":"Philadelphia VA Medical Center, Philadelphia, PA"}]},{"given":"Amol K.","family":"Gupta","sequence":"additional","affiliation":[{"name":"UMUC, Adelphia, MD"}]},{"given":"David","family":"Henry","sequence":"additional","affiliation":[{"name":"UMUC, Adelphi, MD"}]},{"given":"Richard","family":"Austin","sequence":"additional","affiliation":[{"name":"Kennesaw State U., Marietta, GA"}]}],"member":"320","published-online":{"date-parts":[[2007,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"About APACS. (n.d.). Retrieved April 21 2007 from http:\/\/www.apacs.org.uk\/about\/index.html  About APACS. (n.d.). Retrieved April 21 2007 from http:\/\/www.apacs.org.uk\/about\/index.html"},{"volume-title":"ARS Technica. Retrieved","year":"2007","author":"Anderson N.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Bednarz A. (2005). Online businesses face credit card security deadline {Electronic version}. NetworkWorld. Retrieved April 9 2007 from http:\/\/www.networkworld.com\/news\/2005\/061305-pci.html  Bednarz A. (2005). Online businesses face credit card security deadline {Electronic version}. NetworkWorld. Retrieved April 9 2007 from http:\/\/www.networkworld.com\/news\/2005\/061305-pci.html"},{"volume-title":"Boston Globe. Retrieved","year":"2006","author":"Bray H.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Card Security Code. (n.d.). Retrieved April 8 2007 from http:\/\/en.wikipedia.org\/wiki\/Card_Security_Code  Card Security Code. (n.d.). Retrieved April 8 2007 from http:\/\/en.wikipedia.org\/wiki\/Card_Security_Code"},{"key":"e_1_3_2_1_6_1","unstructured":"Cardholder information security program. (n.d.). Retrieved April 8 2007 from http:\/\/www.usa.visa.com\/merchants\/risk_management\/cisp_overview.html?it=c|\/merchants\/risk_management\/cisp.html|CISP%20Basics&it=c|\/merchants\/risk_management\/cisp.html|CISP%20Basics  Cardholder information security program. (n.d.). Retrieved April 8 2007 from http:\/\/www.usa.visa.com\/merchants\/risk_management\/cisp_overview.html?it=c|\/merchants\/risk_management\/cisp.html|CISP%20Basics&it=c|\/merchants\/risk_management\/cisp.html|CISP%20Basics"},{"key":"e_1_3_2_1_7_1","unstructured":"Chip and PIN. (n.d.). Retrieved April 14 2007 from http:\/\/www.accesskeyboards.co.uk\/emv%20overview.htm  Chip and PIN. (n.d.). Retrieved April 14 2007 from http:\/\/www.accesskeyboards.co.uk\/emv%20overview.htm"},{"key":"e_1_3_2_1_8_1","unstructured":"Cohen B. (2007 March 30). The world's biggest credit card fraud? Channel 4 News. Retrieved April 8 2007 from http:\/\/www.channel4.com\/news\/articles\/business_money\/the+worlds+biggest+credit+card+fraud\/365762  Cohen B. (2007 March 30). The world's biggest credit card fraud? Channel 4 News. Retrieved April 8 2007 from http:\/\/www.channel4.com\/news\/articles\/business_money\/the+worlds+biggest+credit+card+fraud\/365762"},{"volume-title":"Retrieved","year":"2007","author":"Citibank","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Credit card. (n.d.). Retrieved April 8 2007 from http:\/\/en.wikipedia.org\/wiki\/Credit_card\/  Credit card. (n.d.). Retrieved April 8 2007 from http:\/\/en.wikipedia.org\/wiki\/Credit_card\/"},{"volume-title":"Retrieved","year":"2007","author":"Credit","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Diners Club history overview and timeline. (n.d.). Retrieved April 8 2007 from http:\/\/www.dinersclubnewsroom.com\/anniversary.cfm  Diners Club history overview and timeline. (n.d.). Retrieved April 8 2007 from http:\/\/www.dinersclubnewsroom.com\/anniversary.cfm"},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"47","article-title":"from http:\/\/www.online-commerce.com\/tutorial.html G. M. (2007). Evolving credit","volume":"270","author":"Ecommerce","year":"2007","journal-title":"Popular Science"},{"key":"e_1_3_2_1_14_1","first-page":"32","article-title":"The hacker economy","volume":"1125","author":"Greenemeier L.","year":"2007","journal-title":"InformationWeek"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769801"},{"volume-title":"Retrieved","year":"2006","author":"Heydt-Benjamin T.","key":"e_1_3_2_1_16_1"},{"volume-title":"IOL Technology. Retrieved","year":"2007","author":"Hill J.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Keeping up with credit card fraud (n.d.) Retrieved April 22 2007 from http:\/\/www.morebusiness.com\/running_your_business\/management\/d912805442.brc  Keeping up with credit card fraud (n.d.) Retrieved April 22 2007 from http:\/\/www.morebusiness.com\/running_your_business\/management\/d912805442.brc"},{"key":"e_1_3_2_1_19_1","unstructured":"Kerber R. (2007 March 1). Firms prodded to try smarter credit cards. Boston Globe. Retrieved April 8 2007 from http:\/\/www.boston.com  Kerber R. (2007 March 1). Firms prodded to try smarter credit cards. Boston Globe. Retrieved April 8 2007 from http:\/\/www.boston.com"},{"key":"e_1_3_2_1_20_1","unstructured":"Kharif O. (2005). May I see your voice please? {Electronic version}. BusinessWeek Online. Retrieved April 9 2007 from http:\/\/www.biometricgroup.com\/in_the_news\/04_20_05.html  Kharif O. (2005). May I see your voice please? {Electronic version}. BusinessWeek Online. Retrieved April 9 2007 from http:\/\/www.biometricgroup.com\/in_the_news\/04_20_05.html"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.79401"},{"volume-title":"The Register. Retrieved","year":"2005","author":"Leyden J.","key":"e_1_3_2_1_22_1"},{"volume-title":"The Register. Retrieved","year":"2007","author":"Leyden J.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Mone G. &amp; Svoboda E. (2007). The future of personal security {Electronic version}. Popular Science. Retrieved April 8 2007 from http:\/\/www.popsci.com\/popsci\/technology\/5863e31a4d630110vgnvcm1000004eecbccdrcrd\/3.html  Mone G. &amp; Svoboda E. (2007). The future of personal security {Electronic version}. Popular Science. Retrieved April 8 2007 from http:\/\/www.popsci.com\/popsci\/technology\/5863e31a4d630110vgnvcm1000004eecbccdrcrd\/3.html"},{"key":"e_1_3_2_1_25_1","unstructured":"Murthy P. S. (2005). Which is the world's first credit card? India Abroad. Retrieved April 8 2007 from http:\/\/ia.rediff.com\/index.html  Murthy P. S. (2005). Which is the world's first credit card? India Abroad. Retrieved April 8 2007 from http:\/\/ia.rediff.com\/index.html"},{"volume-title":"Retrieved","year":"2007","author":"News","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"NCX Group (2006). Security Compliance -- Payment Card Industry (PCI) Data Security Standard. Retrieved April 9 2007 from the 'PCI Data Security Standard' link on http:\/\/www.ncxgroup.com\/pci.htm  NCX Group (2006). Security Compliance -- Payment Card Industry (PCI) Data Security Standard. Retrieved April 9 2007 from the 'PCI Data Security Standard' link on http:\/\/www.ncxgroup.com\/pci.htm"},{"volume-title":"Retrieved","year":"2007","author":"PCI","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Pitt S. Lambert M. (2007). Aligning PCI Data Security Standards with Pre-Existing Privacy and Security Mandates. Parasoft.com. Retrieved April 9 2007 from http:\/\/www.xtalks.com\/pcidata.ashx  Pitt S. Lambert M. (2007). Aligning PCI Data Security Standards with Pre-Existing Privacy and Security Mandates. Parasoft.com. Retrieved April 9 2007 from http:\/\/www.xtalks.com\/pcidata.ashx"},{"volume-title":"MSN Money. Retrieved","year":"2006","author":"Plowright M.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"Preventing credit card fraud: Learn how to protect yourself. (n.d.). Retrieved April 8 2007 from http:\/\/www.consumeraction.org\/archives\/English\/library\/credit_cards\/2000_PreventingCreditFraud\/index.php?English\/library\/credit_cards\/2000_PreventingCreditFraud\/index.php  Preventing credit card fraud: Learn how to protect yourself. (n.d.). Retrieved April 8 2007 from http:\/\/www.consumeraction.org\/archives\/English\/library\/credit_cards\/2000_PreventingCreditFraud\/index.php?English\/library\/credit_cards\/2000_PreventingCreditFraud\/index.php"},{"key":"e_1_3_2_1_32_1","article-title":"August 2). Avoiding credit card fraud","author":"Quittner J.","year":"2004","journal-title":"ABC News. Retrieved"},{"key":"e_1_3_2_1_33_1","unstructured":"Securing your future with two-factor authentication. (n.d.). Retrieved April 8 2007 from http:\/\/www.rsa.com\/node.aspx?id=1156  Securing your future with two-factor authentication. (n.d.). Retrieved April 8 2007 from http:\/\/www.rsa.com\/node.aspx?id=1156"},{"key":"e_1_3_2_1_34_1","unstructured":"Smithers R. &amp; Johnson B. (2007). Inquiry launched after biggest ever credit card heist {Electronic version}. The Guardian.  Smithers R. &amp; Johnson B. (2007). Inquiry launched after biggest ever credit card heist {Electronic version}. The Guardian."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/280449.280458"},{"volume-title":"Retrieved","year":"2007","author":"United States Secret Service. (n.d.).","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"Vijayan J. (2007). GratisCard offers a credit card for the anonymous {Electronic version}. ComputerWorld.  Vijayan J. (2007). GratisCard offers a credit card for the anonymous {Electronic version}. ComputerWorld."},{"issue":"48","key":"e_1_3_2_1_38_1","first-page":"1","article-title":"Visa security idea: Mag stripe with 'dynamic' code","volume":"172","author":"Wolfe D.","year":"2007","journal-title":"American Banker"}],"event":{"name":"InfoSecCD07: 2007 Information Security Curriculum Development Conference","acronym":"InfoSecCD07","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 4th annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409908.1409928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1409908.1409928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:09Z","timestamp":1750258029000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409908.1409928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,28]]},"references-count":38,"alternative-id":["10.1145\/1409908.1409928","10.1145\/1409908"],"URL":"https:\/\/doi.org\/10.1145\/1409908.1409928","relation":{},"subject":[],"published":{"date-parts":[[2007,9,28]]},"assertion":[{"value":"2007-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}