Cardholder’s Reputation System for Contextual Risk Management in Payment Transactions

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10446)

Abstract

Electronic card payments gained huge popularity mainly because of their simplicity, convenience and processing time. Unfortunately transaction processing rules are constant for every transaction, for example each transaction above some hard limit (50 PLN in Poland) must be authorized with PIN verification. One can notice that such an approach is simple, but is not optimal: that is why Contextual Risk Management systems for payment transactions started to be created. This paper presents a new Cardholder’s Reputation System that can be used in Contextual Risk Management Systems. It is flexible thanks to a few parameters and allows to cover all possible transaction processes.

Keywords

Reputation systems EMV CVM Payment systems 

References

  1. 1.
    Department of Payment System, National Bank of Poland: Information about payment cards 2nd quarter 2016 (2016). (in Polish)Google Scholar
  2. 2.
    EMVCo: EMV Specifications. http://www.emvco.com/specifications.aspx
  3. 3.
  4. 4.
  5. 5.
  6. 6.
  7. 7.
  8. 8.
  9. 9.
    Near Field Communication. http://nfc-forum.org/what-is-nfc/
  10. 10.
  11. 11.
    Sitek, A.: One-time code cardholder verification method in electronic funds transfer transactions. Annales UMCS ser. Informatica, AI 14(2), 46–59 (2014)Google Scholar
  12. 12.
    Sitek, A., Kotulski, Z.: Contextual management of off-line authorisation in contact EMV transactions. Telecommun. Rev. Telecommun. News 88(84), 8-9, 953–959 (2015). (in Polish)Google Scholar
  13. 13.
    Cambridge Dictionary, definition of “Reputation”. http://dictionary.cambridge.org/dictionary/english/reputation
  14. 14.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for on-line service provision. Decis. Support Syst. 43(2), 618–644 (2007)CrossRefGoogle Scholar
  15. 15.
    Vavilis, S., Petrovic, M., Zannoe, N.: A reference model for reputation systems. Decis. Support Syst. 61, 147–154 (2014)CrossRefGoogle Scholar
  16. 16.
    Jøsang, A.: Trust and Reputation Systems. Foundations of Security Analysis and Design IV, FOSAD (2007)Google Scholar
  17. 17.
    Ciszkowski, T., Mazurczyk, W., Kotulski, Z., Hoßfeld, T., Fiedler, M., Collange, D.: Towards quality of experience-based reputation models for future web service provisioning. Telecommun. Syst. 51(4), 283–295 (2012)CrossRefGoogle Scholar
  18. 18.
    Damiani, E., Capitani, D., di Vimercati, S., Paraboschi, S., Pesenti, M., Samarati, P., Zara, S.: Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems. In: Proceedings of the Third International Conference in Fuzzy Logic and Technology, Zittau, Germany (2003)Google Scholar
  19. 19.
    Koutrouli, E., Tsalgatidou, A.: Reputation systems evolution survey. ACM Comput. Surv. 48, 3 (2015). Article 35CrossRefGoogle Scholar
  20. 20.
    Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of ebay’s reputation system. In: The Economics of the Internet and E-Commerce, vol. 11 of Advances in Applied Microeconomics. Elsevier Science (2002)Google Scholar
  21. 21.
    Costagliola, G., Fuccella, V., Pascuccio, F.A.: Towards a trust, reputation and recommendation meta model. J. Vis. Lang. Comput. 25, 850–857 (2014)CrossRefGoogle Scholar
  22. 22.
    Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: NOSSDAV 2003, 1–3 June 2003, USA (2003)Google Scholar
  23. 23.
    Buchegger, S., Le Boudec, J.-Y.: A robust reputation system for P2P and mobile ad-hoc networks. In: Workshop on Economics of Peer-to-Peer Systems (2004)Google Scholar
  24. 24.
    Sen, J.: A distributed trust and reputation framework for mobile ad hoc networks. In: Third International Conference (CNSA 2010), Chennai, India, 23–25 July 2010 (2010)Google Scholar
  25. 25.
    Srinivasan, A., Teitelbaum, J., Liang, H.: Reputation and trust-based systems for ad-hoc and sensor networks. In: Boukerche, A. (ed.) On Trust Establishment in Mobile Ad-Hoc Networks. Wiley, New York (2007)Google Scholar
  26. 26.
    Roman, R., Fernandez-Gago, M.C., Lopez, J.: Trust and reputation systems for wireless sensor networks. In: Security and Privacy in Mobile and Wireless Networking, pp. 105–128 (2009)Google Scholar
  27. 27.
    Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 475–482 (2002)Google Scholar
  28. 28.
    Pujol, J.M., Sanguesa, R., Delgado, J.: Extracting reputation in multi agent systems by means of social network topology. In: The First International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS 2002), 15–19 July (2002)Google Scholar
  29. 29.
    Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRefGoogle Scholar
  30. 30.
    Noorian, Z., Ulieru, M.: The state of the art in trust and reputation systems: a framework for comparison. J. Theor. Appl. Electron. Commer. Res. 5(2), 97–117 (2010). doi: 10.4067/S0718-18762010000200007. Talca agoCrossRefGoogle Scholar
  31. 31.
    Robinson, S.: Simulation: The Practice of Model Development and Use. Palgrave Macmillan, London (2014)CrossRefGoogle Scholar
  32. 32.
    Kotulski, Z., Szczepinski, W.: Error Analysis with Application in Engineering. Springer, Dordrecht (2010)CrossRefMATHGoogle Scholar
  33. 33.
    Seila, A.F.: Spreadsheet simulation. In: Winter Simulation Conference, California, USA (2006)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Institute of Telecommunications of WUTWarsawPoland

Personalised recommendations