Research Article

Combating E-Fraud on Electronic Payment System

by  K. A. Akintoye, O. I. Araoye
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Issue 8
Published: July 2011
Authors: K. A. Akintoye, O. I. Araoye
10.5120/3048-4144
PDF

K. A. Akintoye, O. I. Araoye . Combating E-Fraud on Electronic Payment System. International Journal of Computer Applications. 25, 8 (July 2011), 48-53. DOI=10.5120/3048-4144

                        @article{ 10.5120/3048-4144,
                        author  = { K. A. Akintoye,O. I. Araoye },
                        title   = { Combating E-Fraud on Electronic Payment System },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 25 },
                        number  = { 8 },
                        pages   = { 48-53 },
                        doi     = { 10.5120/3048-4144 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A K. A. Akintoye
                        %A O. I. Araoye
                        %T Combating E-Fraud on Electronic Payment System%T 
                        %J International Journal of Computer Applications
                        %V 25
                        %N 8
                        %P 48-53
                        %R 10.5120/3048-4144
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Network (WSN) has gained worldwide attention in recent years. The design of a WSN depends significantly on the application. In sensor network design, physical and logical topology plays a major role. Transfer information in real time means, to provide a required result in a bounded time. Large-scale sensor networks will not be able to simply send all the raw sensed sample data to a sink. This paper presents an approach of simulation of various sampling techniques (logical topology) of industrial stacks emission and also defines a network with rough node deployment. The simulation of the sampling techniques is carried out using Castalia simulator based on OMNET++ language.

References
  • Manning, R. (1998); “Electronic Commerce on the Internet” in Olumide, S. A and Falaki, S. O (2001): Electronic Commerce – Promises, Treats, Trust and payment Systems. Conference Proceedings, Computer Association of Nigeria (COAN)
  • Wortington, T. (2000); “Internet Payments for Government Agencies Commonwealth of Australia, http://about.Business.gov.au/ipp/ipga.html
  • Adeola F.O and Falaki S.O (1998); “An encryption/decryption software package based on enhanced vigenere cipher scheme”, proceedings of the 14th National Conference of Computer Association of Nigeria – vol. 9 pp 57
  • Rivest R. L, Shamir A. and Alderman L. (1978); “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Comm.ACM, vol. 21 pp 294-299 Schnorr, C.
  • Kalokata, R. and Whinston, A. (1997), “ Electronic Payment System”, Addison Wesley, Reading, Mass
  • Graham, T (2002), ‘Dispute resolution: E-Fraud and Jurisdiction’, viewed 4 February 2002, http://www.tjguk.com/topical/litigation/efraud_and_jurisdiction_winter2001.html
  • DOJ (2001a), ‘Former Cisco Systems, Inc. Accountants Sentenced for Unauthorized Access to Computer Systems to Illegally Issue Almost $8 Million in Cisco Stock to Themselves’, United States Department of Justice (DOJ), viewed 4 February 2003, http://www.cybercrime.gov/Osowski_TangSent.htm
  • Malakedsuwan & Stevens A Model of E-Fraud 7th Pacific Asia Conference on Information Systems, 10-13 July 2003, Adelaide, South Australia
  • AusCert (2002), ‘2002 Australian Computer Crime and Security Survey’, AusCert, Deloitte Touche Tohmatsu, NSW Police, viewed 31 January 2003, http://www.AusCert.org.au/Information/AusCert_info/2002cs.pdf
  • Alexander, M (1996), ‘The Underground Guide to Computer Security’, Addison-Wesley Publishing Company, Reading, USA.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Electronic fraud Electronic business Electronic crime Fraud Identity fraud

Powered by PhDFocusTM