2016
DOI: 10.1016/j.im.2016.07.002
|View full text |Cite
|
Sign up to set email alerts
|

Developing business analytic capabilities for combating e-commerce identity fraud: A study of Trustev’s digital verification solution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
36
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(40 citation statements)
references
References 43 publications
1
36
0
1
Order By: Relevance
“…Although it is a good practice in fraud detection these studies are focused on banking and technological contexts and have not been tested in e-tail. Cheng, et al (2015) and Tan, et al (2016) have also investigated the role of device recognition system in locating the customers' position to get help in identity fraud detection. Although, these studies present a good deal of practices but focus on the fraud detection only.…”
Section: Insert Table V Herementioning
confidence: 99%
See 1 more Smart Citation
“…Although it is a good practice in fraud detection these studies are focused on banking and technological contexts and have not been tested in e-tail. Cheng, et al (2015) and Tan, et al (2016) have also investigated the role of device recognition system in locating the customers' position to get help in identity fraud detection. Although, these studies present a good deal of practices but focus on the fraud detection only.…”
Section: Insert Table V Herementioning
confidence: 99%
“…Furthermore, the studies by Cross and Blackshaw (2014) and Lewis et al (2014) have signified the importance of information sharing in mitigation. Dyer (2013) argues that business process has a significant impact on fraud risk mitigation and suggests that changes in mitigation process should be aligned with policy, procedures and IT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 Tan et al (2016) suggest two critical practices, calling the customer for verification through asking identity related questions and checking the customer IP address to verify their location through a phone call. Another development in the verification of customer identities is documentary evidence.…”
Section: Insert Table VI Herementioning
confidence: 99%
“…It has been widely used in organisational and Information Systems (IS) research. In IS research, the RGT technique has been used to elicit the qualities of excellent system analysts (Hunter, 1997), explore the cognitive thinking processes of business and IS executives (Tan & Gallupe, 2006), examine the skills of successful IT project managers (Napier, Keil, & Tan, 2009), understand website usability (Tung, Xu, & Tan, 2009), and the most recent study of exploring analytical capabilities for combating e-commerce fraud identify (Tan, Guo, Cahalane, & Cheng, 2016). Within the study of technology in learning, RGT has been used to identify students' motivations for using information and communication technologies in learning (Guo et al, 2011;Guo, Tan, & Cheung, 2010).…”
Section: Data Collection Method-rgtmentioning
confidence: 99%
“…However, two-factor authentication is not always a secure method as cyber-criminals can violate this [22]. To make the authentication system more effective, biometric authentication systems may be used, for example, voice recognition, facial recognition and fingerprint scanning [23]. Therefore, Company A may consider biometric authentication systems to prevent unauthorised access.…”
Section: (A) Access Control and Authenticationmentioning
confidence: 99%