Visualization of ATM usage patterns to detect counterfeit cards usage

Ben Reardon*, Kara Nance, Stephen McCombie

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

6 Citations (Scopus)

Abstract

People relish the flexibility of being able access their monetary assets when and where they need them. The abundance of cards able to withdraw funds from Automatic Teller Machines (ATMs) has not gone unnoticed by the cybercriminal element. Means for skimming and cloning cards exist and the market continues to grow. While the methods for obtaining access to another's funds vary greatly, there are cases in which visualization of a class of card-present fraud can combine the visualization with the powerful abductive reasoning capabilities of the human mind to help identify the threat. As part of a defense-in-depth strategy, this can contribute to the evolution and refinement of rule sets that facilitate the detection of the crime prior to the cash-out phase of the illegal operation. This paper discusses cardpresent fraud and provides an example of how visualization techniques, coupled with human abductive reasoning, can be used to guide the evolution of analytical tools to help protect our digital assets.

Original languageEnglish
Title of host publicationProceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45
EditorsRalph H. Sprague
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages3081-3088
Number of pages8
ISBN (Print)9780769545257
DOIs
Publication statusPublished - 2011
Event2012 45th Hawaii International Conference on System Sciences, HICSS 2012 - Maui, HI, United States
Duration: 4 Jan 20127 Jan 2012

Other

Other2012 45th Hawaii International Conference on System Sciences, HICSS 2012
CountryUnited States
CityMaui, HI
Period4/01/127/01/12

Fingerprint Dive into the research topics of 'Visualization of ATM usage patterns to detect counterfeit cards usage'. Together they form a unique fingerprint.

Cite this