Theft prevention ATM model using dormant monitoring for transactions
ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a th...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1159 |
---|---|
container_issue | |
container_start_page | 1156 |
container_title | |
container_volume | |
creator | Jog, Vivek V. Arora, Rohan Jain, Darshan Bhat, Badal |
description | ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon. |
doi_str_mv | 10.1109/CICT.2013.6558274 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6558274</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6558274</ieee_id><sourcerecordid>6558274</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-95bcacb7014498971ad4530dc8b48f0bafd7d16cbfd3ab685b4edbd05805bba53</originalsourceid><addsrcrecordid>eNpVj8tKAzEYhSMiKHUeQNzkBTomk_y5LMt4K1TcjOuSTBKNdDIliYJvb4vduDqcD74DB6EbSlpKib7r1_3QdoSyVgCoTvIz1GipKBeSgQQlzv91zS5RU8onIeSgi06xK3Q_fPhQ8T77b59qnBNeDS94mp3f4a8S0zt2c55MqgeWYp3zEYU545pNKmY8KuUaXQSzK7455QK9PT4M_fNy8_q07lebZaQS6lKDHc1oJaGca6UlNY4DI25UlqtArAlOOipGGxwzViiw3DvrCCgC1hpgC3T7txu999t9jpPJP9vTd_YLWV9OGQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Theft prevention ATM model using dormant monitoring for transactions</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jog, Vivek V. ; Arora, Rohan ; Jain, Darshan ; Bhat, Badal</creator><creatorcontrib>Jog, Vivek V. ; Arora, Rohan ; Jain, Darshan ; Bhat, Badal</creatorcontrib><description>ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon.</description><identifier>ISBN: 9781467357593</identifier><identifier>ISBN: 1467357596</identifier><identifier>EISBN: 9781467357586</identifier><identifier>EISBN: 146735757X</identifier><identifier>EISBN: 1467357588</identifier><identifier>EISBN: 9781467357579</identifier><identifier>DOI: 10.1109/CICT.2013.6558274</identifier><language>eng</language><publisher>IEEE</publisher><subject>ATM ; Cellular phones ; Computers ; Conferences ; Fraudulent ; Identity theft ; Monitoring ; Online banking ; Transactions ; Withdrawal</subject><ispartof>2013 IEEE Conference on Information & Communication Technologies, 2013, p.1156-1159</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6558274$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6558274$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jog, Vivek V.</creatorcontrib><creatorcontrib>Arora, Rohan</creatorcontrib><creatorcontrib>Jain, Darshan</creatorcontrib><creatorcontrib>Bhat, Badal</creatorcontrib><title>Theft prevention ATM model using dormant monitoring for transactions</title><title>2013 IEEE Conference on Information & Communication Technologies</title><addtitle>CICT</addtitle><description>ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon.</description><subject>ATM</subject><subject>Cellular phones</subject><subject>Computers</subject><subject>Conferences</subject><subject>Fraudulent</subject><subject>Identity theft</subject><subject>Monitoring</subject><subject>Online banking</subject><subject>Transactions</subject><subject>Withdrawal</subject><isbn>9781467357593</isbn><isbn>1467357596</isbn><isbn>9781467357586</isbn><isbn>146735757X</isbn><isbn>1467357588</isbn><isbn>9781467357579</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVj8tKAzEYhSMiKHUeQNzkBTomk_y5LMt4K1TcjOuSTBKNdDIliYJvb4vduDqcD74DB6EbSlpKib7r1_3QdoSyVgCoTvIz1GipKBeSgQQlzv91zS5RU8onIeSgi06xK3Q_fPhQ8T77b59qnBNeDS94mp3f4a8S0zt2c55MqgeWYp3zEYU545pNKmY8KuUaXQSzK7455QK9PT4M_fNy8_q07lebZaQS6lKDHc1oJaGca6UlNY4DI25UlqtArAlOOipGGxwzViiw3DvrCCgC1hpgC3T7txu999t9jpPJP9vTd_YLWV9OGQ</recordid><startdate>201304</startdate><enddate>201304</enddate><creator>Jog, Vivek V.</creator><creator>Arora, Rohan</creator><creator>Jain, Darshan</creator><creator>Bhat, Badal</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201304</creationdate><title>Theft prevention ATM model using dormant monitoring for transactions</title><author>Jog, Vivek V. ; Arora, Rohan ; Jain, Darshan ; Bhat, Badal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-95bcacb7014498971ad4530dc8b48f0bafd7d16cbfd3ab685b4edbd05805bba53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>ATM</topic><topic>Cellular phones</topic><topic>Computers</topic><topic>Conferences</topic><topic>Fraudulent</topic><topic>Identity theft</topic><topic>Monitoring</topic><topic>Online banking</topic><topic>Transactions</topic><topic>Withdrawal</topic><toplevel>online_resources</toplevel><creatorcontrib>Jog, Vivek V.</creatorcontrib><creatorcontrib>Arora, Rohan</creatorcontrib><creatorcontrib>Jain, Darshan</creatorcontrib><creatorcontrib>Bhat, Badal</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jog, Vivek V.</au><au>Arora, Rohan</au><au>Jain, Darshan</au><au>Bhat, Badal</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Theft prevention ATM model using dormant monitoring for transactions</atitle><btitle>2013 IEEE Conference on Information & Communication Technologies</btitle><stitle>CICT</stitle><date>2013-04</date><risdate>2013</risdate><spage>1156</spage><epage>1159</epage><pages>1156-1159</pages><isbn>9781467357593</isbn><isbn>1467357596</isbn><eisbn>9781467357586</eisbn><eisbn>146735757X</eisbn><eisbn>1467357588</eisbn><eisbn>9781467357579</eisbn><abstract>ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the initiation, to the end of the respective transaction. With the help of these factors, we would declare the status of the transaction before proceeding with cash withdrawal. Such monitoring would assist the transaction with a secure approach to bank upon.</abstract><pub>IEEE</pub><doi>10.1109/CICT.2013.6558274</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781467357593 |
ispartof | 2013 IEEE Conference on Information & Communication Technologies, 2013, p.1156-1159 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6558274 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | ATM Cellular phones Computers Conferences Fraudulent Identity theft Monitoring Online banking Transactions Withdrawal |
title | Theft prevention ATM model using dormant monitoring for transactions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T15%3A08%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Theft%20prevention%20ATM%20model%20using%20dormant%20monitoring%20for%20transactions&rft.btitle=2013%20IEEE%20Conference%20on%20Information%20&%20Communication%20Technologies&rft.au=Jog,%20Vivek%20V.&rft.date=2013-04&rft.spage=1156&rft.epage=1159&rft.pages=1156-1159&rft.isbn=9781467357593&rft.isbn_list=1467357596&rft_id=info:doi/10.1109/CICT.2013.6558274&rft_dat=%3Cieee_6IE%3E6558274%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467357586&rft.eisbn_list=146735757X&rft.eisbn_list=1467357588&rft.eisbn_list=9781467357579&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6558274&rfr_iscdi=true |