Page 354 - Introduction to Electronic Commerce and Social Commerce
P. 354

11.2  Using Payment Cards Online                                                                341

                                                              to manage fraud. Over the years, the CyberSource surveys
                2.  Use a point-of-sale (POS) system operated by a   (CyberSource is a subsidiary of Visa) also have monitored
                card acquirer. Merchants can redirect cardholders   the steps taken by merchants to combat fraud. Today, virtu-
                to a POS system run by an acquirer. The POS han-  ally  every  merchant  has  instituted  automated  processes
                dles the complete payment process and directs the   backed by manual review to detect fraudulent transactions.
                cardholder back to the merchant’s site once pay-  The exact automated procedures vary from one merchant to
                ment is complete. In this case, the merchant’s sys-  the next. However there are some tools that are used by a
                tem deals only with order information. In this   majority. The key tools used in combating fraud are:
                configuration, it is important to find an acquirer that
                handles multiple cards and payment instruments. If
                not, the merchant will need to connect with a multi-
                tude of acquirers.                              •  Card verification number (CVN). More than
                3.  Use a POS system operated by a payment ser-   86%  of  all  merchants  use  the  card  verification
                vice provider. Merchants can rely on payment      number (CVN) method, which detects fraud by
                service  providers  (PSPs),  which  are  third-party   matching the three-digit verification number
                companies that provide services to merchants so   printed on the signature strip on the back of the
                they can accept all kinds of electronic payments.   credit card (or the four-digit number on the front of
                The PSPs connect all participants in the electronic   the card, such as American Express cards) to the
                transactions. See an example at usa.visa.com/con-  number stored by the cardholder’s issuing bank.
                tent/dam/VCOM/download/merchants/bulletin-        However, if a fraudster possesses a stolen card, the
                mobile- best-practices.pdf.                       number is in plain view and verification becomes
                                                                  difficult. Attempts are made to check the habits of
                                                                  the card user (e.g., to check unusually large pur-
              Option number 1 is simply the base method that is shown   chases or purchases made overseas). In such cases,
           in Figure 11.2. With option 2 the merchant steps to the side   a cardholder may get a telephone call from the card
           and lets the acquirer deal with the customer’s payment. In   issuer or the credit card company, asking for verifi-
           option 3, the merchant simply deals with a third-party pro-  cation of identity. In such a case, the verification
           cessor that handles not only card payments but other types of   may be done by intelligent software agents
           payments as well. These third-party companies can also alle-  automatically.
           viate the need for merchants to establish relations with   •  Address verification. A vast majority of merchants
           acquiring banks.                                       (better than 86%) use the  Address Verification
                                                                  System (AVS), which detects fraud by comparing
                                                                  the address provided by the buyer at checkout with
             Fraudulent Card Transactions                         the card address on file. Unfortunately, this method
                                                                  may result in a number of false positives, meaning
           Although the processes used for authorizing and settling   that the merchant may reject a valid order.
           card payments off-line and online are very similar, there is   Cardholders may have a new address or simply
           one substantial difference between the two. In e-commerce,   make mistakes in inputting numeric street addresses
           the merchants usually are liable for fraudulent transactions.   or zip codes. AVS is available only in the United
           In addition to the cost of lost merchandise and shipping   States and Canada.
           charges, merchants who accept fraudulent or unauthorized   •  Customer order history. The purchases made with
           cards for payments may have to pay penalties to the credit   a particular card (and card holder) tend to follow
           card companies. However, these are not the only costs.  regular patterns with respect to place, amounts,
              There also are the costs associated with combating fraud-  types, and velocity. Order data from the cards used
           ulent transactions. These include the costs of tools and sys-  can be mathematically and statistically mined to
           tems to review orders, the costs of manually reviewing   discern these patterns. Current card purchases can
           orders, and the revenue that is lost from erroneously reject-  be matched against these patterns to detect anoma-
           ing valid orders.  According to CyberSource’s sixteenth   lies in real time in order to flag them as potential
           annual survey (CyberSource 2016) of online fraud manage-  fraud. Close to 78% of merchants employ this
           ment, fraudulent online card transactions still result in sub-  process.
           stantial losses although the rate of e-commerce revenue loss   •  Negative lists. Close to 70% of the merchants use
           has remained steady (at .9%) for the past 5 years. The stabil-  negative lists. A negative list is a database of card
           ity is a function of the measures that merchants have adopted
   349   350   351   352   353   354   355   356   357   358   359