Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from dissertation:
The rates of reduction of these cases were noted to be about 20% per year as from 2004 when the standards were introduced (UK Payments Administration LTD 2009). The exact phenomenon observed is as indicated in Appendix A.
The mechanism involved in the protection of the card details by means of the EMV technology is discussed by various scholars and organizations. SPA (2010, 1) clearly explains that the need for authenticating data in the various EMV systems is to ensure that the cars being used is genuine. This is made possible via a system referred to as the Card Authentication Methods that is dependent on the capabilities of the chip itself.
How the EMV system protects payment cards
EMV Implementation Challenges
Extant literature has been dedicated towards the study of the various challenges that face the implementation of the EMV technology. Gareth Ellis Solution Consultants (2007,1) clearly point out that despite the since the phenomenal implementation of the technology in 2005, the use of EMV cards has always lacked the much needed sophistication in all the over 145,000,000 cards that were issued since the adoption of the standard. They pointed out that most EMV card issuers only implemented simple functionalities such as the use of EMV in the process of data preparation or as an upgrade of their in-house card assurance systems.
Steven et al. (2010) also illustrates the protocol flaw in the use of EMV technology. They demonstrate in their paper how criminals can make of use of the flaw in the EMV protocol to launch an attack through the use of a genuine card in making of payments using EMV cards without the need of a PIN. This happens undetected despite the fact that the merchant could be having a direct connection to the banking network. Their paper further considers the mechanism used by fraudsters such as man-in -- the -- middle attacks and the source of the flaw.
The challenges that affect the implementation of EMV technology are numerous .In this paper we present a holistic approach to the problem of EMV migration and implementation.
The problems that are associated with the implementation of the EMV technology is best understood after an analysis of various case studies involving the technology's implementation.
More challenges to the adoption of EMV technology
Extant literature suggests that there is insufficient guidance in the process of implementing the various EMV technologies in various countries. This is despite the fact that there is a reported reduction in the rate of card frauds by a record 25%.the reported compliance rate of the technology must be pointed out to be about 94% in Europe (ATM Media, 2010).There is also an eminent rise in the operation cost of various businesses as well as the ability to reduce the level of operational risk managements. Iranian banks fall under the category of countries that are in the process of migrating to EMV standards of management. It has been shown by various studies that failure to comply to the EMV standards usually results in an increase in various risjks such as chargeback by the various banks (ATM Media,2010).
ATM Media,(2010).Challenges to migrating to EMV.
APACS (2007) Fraud -- The Facts 2007
Alsaid, A., Mitchell, C.J.(2006): Preventing Phishing Attacks Using Trusted Computing
Technology. In: Proceedings of the 6th International Network Conference (INC
2006), Plymouth, UK, pp. 221 -- 228
Balfe, S and Paterson, K (2008). Augmenting Internet-Based Card Not Present
Transactions with Trusted Computing. G. Tsudik (Ed.): FC 2008, LNCS 5143, pp. 171 -- 175,
Jackson, C., Boneh, D., Mitchell, J. (2007): Transaction Generators: Rootkits for the Web. In: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security
(HotSec 2007). The Advanced Computing Systems Association, Boston, MA, USA,
O'Flynn, M (2009).Electronic payment is booming in the Middle East. pg2
Smart Payment Association (2010).Strengthening card Authentication: A migration to DDA. White Paper
Russell, M.(2010).Your Independent guide to Credit Cards
VISA (2002). 3-D Secure Protocol Specification: Core Functions,
Ward, M.(2006).EMV card payments -- An update. Information security technical report 1.p 89-92
Success rate of the EMV…[continue]
"EMV Standard Implementation In Iranian" (2010, July 12) Retrieved October 28, 2016, from http://www.paperdue.com/essay/emv-tandard-implementation-in-iranian-9676
"EMV Standard Implementation In Iranian" 12 July 2010. Web.28 October. 2016. <http://www.paperdue.com/essay/emv-tandard-implementation-in-iranian-9676>
"EMV Standard Implementation In Iranian", 12 July 2010, Accessed.28 October. 2016, http://www.paperdue.com/essay/emv-tandard-implementation-in-iranian-9676
The implementation process must be regulated by the various card associations, government legislations as well as network mandates (Spidle,2010). A thorough and comprehensive analysis of the Operational Impact of EMV implementation In order to mitigate the various threats faced by the Iranian banks while implementing the EMV standards, it is necessary to conduct a thorough and comprehensive analysis of the impact that such a move would have on the general operation
They need to estimate the cost of production, personalization as well as the milling of the new chip cards. Terminals The budget should include the cost associated with the updating of terminals, Point of Sale (POS) devices and ATMs, in all types of environments. These must however be considered as new ongoing expenses and should include installation and maintenance of compliant terminals. However, the costs of infrastructures elements are not as
This is largely due to time and logistical issues involved in conducting the face-to-face interviews. However, this still represents 50% of the entire sample population. Therefore, it is expected that the opinions expressed in the interviews will be a good representation of Iranian banks. 3.5 Data Collection The primary aim of the study is to identify the challenges that Iranian banks face in the implementation of EMV. This research is divided