CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Combating E-Fraud on Electronic Payment System

by K. A. Akintoye, O. I. Araoye
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 8
Year of Publication: 2011
Authors: K. A. Akintoye, O. I. Araoye
10.5120/3048-4144

K. A. Akintoye, O. I. Araoye . Combating E-Fraud on Electronic Payment System. International Journal of Computer Applications. 25, 8 ( July 2011), 48-53. DOI=10.5120/3048-4144

@article{ 10.5120/3048-4144,
author = { K. A. Akintoye, O. I. Araoye },
title = { Combating E-Fraud on Electronic Payment System },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 8 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 48-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number8/3048-4144/ },
doi = { 10.5120/3048-4144 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:25.714233+05:30
%A K. A. Akintoye
%A O. I. Araoye
%T Combating E-Fraud on Electronic Payment System
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 8
%P 48-53
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Network (WSN) has gained worldwide attention in recent years. The design of a WSN depends significantly on the application. In sensor network design, physical and logical topology plays a major role. Transfer information in real time means, to provide a required result in a bounded time. Large-scale sensor networks will not be able to simply send all the raw sensed sample data to a sink. This paper presents an approach of simulation of various sampling techniques (logical topology) of industrial stacks emission and also defines a network with rough node deployment. The simulation of the sampling techniques is carried out using Castalia simulator based on OMNET++ language.

References
  1. Manning, R. (1998); “Electronic Commerce on the Internet” in Olumide, S. A and Falaki, S. O (2001): Electronic Commerce – Promises, Treats, Trust and payment Systems. Conference Proceedings, Computer Association of Nigeria (COAN)
  2. Wortington, T. (2000); “Internet Payments for Government Agencies Commonwealth of Australia, http://about.Business.gov.au/ipp/ipga.html
  3. Adeola F.O and Falaki S.O (1998); “An encryption/decryption software package based on enhanced vigenere cipher scheme”, proceedings of the 14th National Conference of Computer Association of Nigeria – vol. 9 pp 57
  4. Rivest R. L, Shamir A. and Alderman L. (1978); “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Comm.ACM, vol. 21 pp 294-299 Schnorr, C.
  5. Kalokata, R. and Whinston, A. (1997), “ Electronic Payment System”, Addison Wesley, Reading, Mass
  6. Graham, T (2002), ‘Dispute resolution: E-Fraud and Jurisdiction’, viewed 4 February 2002, http://www.tjguk.com/topical/litigation/efraud_and_jurisdiction_winter2001.html
  7. DOJ (2001a), ‘Former Cisco Systems, Inc. Accountants Sentenced for Unauthorized Access to Computer Systems to Illegally Issue Almost $8 Million in Cisco Stock to Themselves’, United States Department of Justice (DOJ), viewed 4 February 2003, http://www.cybercrime.gov/Osowski_TangSent.htm
  8. Malakedsuwan & Stevens A Model of E-Fraud 7th Pacific Asia Conference on Information Systems, 10-13 July 2003, Adelaide, South Australia
  9. AusCert (2002), ‘2002 Australian Computer Crime and Security Survey’, AusCert, Deloitte Touche Tohmatsu, NSW Police, viewed 31 January 2003, http://www.AusCert.org.au/Information/AusCert_info/2002cs.pdf
  10. Alexander, M (1996), ‘The Underground Guide to Computer Security’, Addison-Wesley Publishing Company, Reading, USA.
Index Terms

Computer Science
Information Sciences

Keywords

Electronic fraud Electronic business Electronic crime Fraud Identity fraud