Visualization of ATM usage patterns to detect counterfeit cards usage

Ben Reardon*, Kara Nance, Stephen McCombie

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    8 Citations (Scopus)

    Abstract

    People relish the flexibility of being able access their monetary assets when and where they need them. The abundance of cards able to withdraw funds from Automatic Teller Machines (ATMs) has not gone unnoticed by the cybercriminal element. Means for skimming and cloning cards exist and the market continues to grow. While the methods for obtaining access to another's funds vary greatly, there are cases in which visualization of a class of card-present fraud can combine the visualization with the powerful abductive reasoning capabilities of the human mind to help identify the threat. As part of a defense-in-depth strategy, this can contribute to the evolution and refinement of rule sets that facilitate the detection of the crime prior to the cash-out phase of the illegal operation. This paper discusses cardpresent fraud and provides an example of how visualization techniques, coupled with human abductive reasoning, can be used to guide the evolution of analytical tools to help protect our digital assets.

    Original languageEnglish
    Title of host publicationProceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45
    EditorsRalph H. Sprague
    Place of PublicationPiscataway, NJ
    PublisherInstitute of Electrical and Electronics Engineers (IEEE)
    Pages3081-3088
    Number of pages8
    ISBN (Print)9780769545257
    DOIs
    Publication statusPublished - 2011
    Event2012 45th Hawaii International Conference on System Sciences, HICSS 2012 - Maui, HI, United States
    Duration: 4 Jan 20127 Jan 2012

    Other

    Other2012 45th Hawaii International Conference on System Sciences, HICSS 2012
    Country/TerritoryUnited States
    CityMaui, HI
    Period4/01/127/01/12

    Fingerprint

    Dive into the research topics of 'Visualization of ATM usage patterns to detect counterfeit cards usage'. Together they form a unique fingerprint.

    Cite this