CFP last date
20 January 2025
Reseach Article

Combating E-Fraud on Electronic Payment System

by K. A. Akintoye, O. I. Araoye
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 8
Year of Publication: 2011
Authors: K. A. Akintoye, O. I. Araoye
10.5120/3048-4144

K. A. Akintoye, O. I. Araoye . Combating E-Fraud on Electronic Payment System. International Journal of Computer Applications. 25, 8 ( July 2011), 48-53. DOI=10.5120/3048-4144

@article{ 10.5120/3048-4144,
author = { K. A. Akintoye, O. I. Araoye },
title = { Combating E-Fraud on Electronic Payment System },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 8 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 48-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number8/3048-4144/ },
doi = { 10.5120/3048-4144 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:25.714233+05:30
%A K. A. Akintoye
%A O. I. Araoye
%T Combating E-Fraud on Electronic Payment System
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 8
%P 48-53
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Network (WSN) has gained worldwide attention in recent years. The design of a WSN depends significantly on the application. In sensor network design, physical and logical topology plays a major role. Transfer information in real time means, to provide a required result in a bounded time. Large-scale sensor networks will not be able to simply send all the raw sensed sample data to a sink. This paper presents an approach of simulation of various sampling techniques (logical topology) of industrial stacks emission and also defines a network with rough node deployment. The simulation of the sampling techniques is carried out using Castalia simulator based on OMNET++ language.

References
  1. Manning, R. (1998); “Electronic Commerce on the Internet” in Olumide, S. A and Falaki, S. O (2001): Electronic Commerce – Promises, Treats, Trust and payment Systems. Conference Proceedings, Computer Association of Nigeria (COAN)
  2. Wortington, T. (2000); “Internet Payments for Government Agencies Commonwealth of Australia, http://about.Business.gov.au/ipp/ipga.html
  3. Adeola F.O and Falaki S.O (1998); “An encryption/decryption software package based on enhanced vigenere cipher scheme”, proceedings of the 14th National Conference of Computer Association of Nigeria – vol. 9 pp 57
  4. Rivest R. L, Shamir A. and Alderman L. (1978); “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Comm.ACM, vol. 21 pp 294-299 Schnorr, C.
  5. Kalokata, R. and Whinston, A. (1997), “ Electronic Payment System”, Addison Wesley, Reading, Mass
  6. Graham, T (2002), ‘Dispute resolution: E-Fraud and Jurisdiction’, viewed 4 February 2002, http://www.tjguk.com/topical/litigation/efraud_and_jurisdiction_winter2001.html
  7. DOJ (2001a), ‘Former Cisco Systems, Inc. Accountants Sentenced for Unauthorized Access to Computer Systems to Illegally Issue Almost $8 Million in Cisco Stock to Themselves’, United States Department of Justice (DOJ), viewed 4 February 2003, http://www.cybercrime.gov/Osowski_TangSent.htm
  8. Malakedsuwan & Stevens A Model of E-Fraud 7th Pacific Asia Conference on Information Systems, 10-13 July 2003, Adelaide, South Australia
  9. AusCert (2002), ‘2002 Australian Computer Crime and Security Survey’, AusCert, Deloitte Touche Tohmatsu, NSW Police, viewed 31 January 2003, http://www.AusCert.org.au/Information/AusCert_info/2002cs.pdf
  10. Alexander, M (1996), ‘The Underground Guide to Computer Security’, Addison-Wesley Publishing Company, Reading, USA.
Index Terms

Computer Science
Information Sciences

Keywords

Electronic fraud Electronic business Electronic crime Fraud Identity fraud