نتایج جستجو برای: e credit

تعداد نتایج: 1044679  

2011
Farid Javani Shahriar Mohammadi

Along with rapid growth in usage of credit card in ecommerce, rough and robust security measure and technologies should be developed. One old problem about the credit card transaction -that also exists in widely used payment system like 3D-SecureTMis the possibility of disclosure of sensitive data which is being stored by merchants during the transaction. A solution to this problem is using pro...

1997
Edwin M. Knorr Raymond T. Ng

This paper deals with nding outliers (exceptions) in large datasets. The identiication of outliers can often lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional athletes. One contribution of this paper is to show how our proposed, intuitive notion of outliers can unify or gen...

2002
Richard J. Bolton

Fraud is increasing dramatically with the expansion of modern technology and the global superhighways of communication, resulting in the loss of billions of dollars worldwide each year. Although prevention technologies are the best way of reducing fraud, fraudsters are adaptive and, given time, will usually find ways to circumvent such measures. Methodologies for the detection of fraud are esse...

1997
Avi Rubin

In the past two years, we have witnessed a proliferation of electronic commerce protocols. Whether we like it or not, these protocols are being implemented all over the place. SET [2] has emerged as the Internet standard for credit card transactions, and has been endorsed by such companies as VISA, Mastercard, IBM, HP, and many more. SSL [3] servers are ubiquitous as the web's answer to secure ...

2012
Florim IDRIZI Ilia NINKA

Secure communications are an important precondition of e-commerce transactions and are required for confidential electronic communications. Every e-commerce system relies on encryption to secure data transmission by controlling data access and protect information on the internet and ultimately boost consumer confidence. By implementing encryption, integrity is maintained while digital authentic...

2003
T. C. Lam Jyh-Charn Liu

In this paper we propose an accountability management framework for resource sharing in peer-to-peer (P2P) distributed computing systems. On the basis of a generalized e-coin paradigm, we developed the management framework based on the distribution of resource credit/policy, exchange of service and service evidences, and accountability management. A tree topology is assumed for the distribution...

Journal: Money and Economy 2014

The purpose of this study is to find the relationship between lending to Small and Medium-size Exporter Enterprises (E-SMEs) and the use of Basel II Capital Accord for the first time in the banking system of Iran. Results showed that 96.69 percent of small firms were in the very low risk category of credit portfolio. This proof explains a consistent and balanced relationship between risk- weigh...

2001
Frank Schlottmann Detlef Seese

This paper proposes a new combination of quantitative models and Genetic Algorithms for the task of optimising credit portfolios. Currently, quantitative portfolio credit risk models are used to calculate portfolio risk figures, e. g. expected losses, unexpected losses and risk contributions. Usually, this information is used for optimising the risk-return profile of the portfolio. We show that...

2001
Frank Schlottmann Detlef Seese

This paper proposes a new combination of quantitative models and Genetic Algorithms for the task of optimising credit portfolios. Currently, quantitative portfolio credit risk models are used to calculate portfolio risk figures, e. g. expected losses, unexpected losses and risk contributions. Usually, this information is used for optimising the risk-return profile of the portfolio. We show that...

2008
Guibin Zhang Russell Smyth

This paper examines the development of a credit reporting system in China. We first outline the rationale for having a credit reporting system through reviewing the literature on asymmetric information. We then proceed to discuss how the credit reporting system works in China. First we present a case study of a private credit reporting agency in Chengdu that was established in 2000. This was th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید