SlideShare a Scribd company logo
1 of 3
Download to read offline
Mims 1
" Credit Cards and Swiping Information"
" You may not realize it, but the American credit system is in a time of change. The
fact is, change cannot come soon enough. Credit security breaches have proven over
and over that we need a better system than the terrible, primitive one we have now."
" Let me refresh your memory on how our system works now with an explanation
by Casey Liss on Accidental Tech Podcast:"
If you're at a restaurant, the general way things work is, you ask for a check,
they bring you the check, you give the server your credit card, they run away to
some terminal that could be in the back of the restaurant well out of your line of
sight, swipe your card, hopefully not skim your card, bring it back, and then you
are to add the tip that you want to add, sign the paper, and leave it and just hope
that (A) they didn't skim your card, and (B) they actually put the amount you
want them to put into the point of sale system in order to charge you…we are so
backwards anything will be an improvement. (Arment)."
" As you can imagine, plenty of security breaches have come from this. The
biggest one in the recent past happened in late November to early December 2013,
when data from around 40 million credit and debit cards was stolen from Target
Corporation. ("Target security breach affects up to 40M cards"). In all of 2013, $6 billion
was lost to credit card fraud in the U.S., up from around $4.5 billion in 2011. ("Seventy
Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015")."
Cody Mims"
Mrs. Mann"
DC English III"
11-20-14
Mims 2
" By October 1, 2015, credit card transactions in the United States are going to
require a chip built into the card. (Rosenblatt). This is a much safer system that 19 other
countries have already adopted. In the United Kingdom, counterfeit credit card fraud
plummeted to $67 million in 2013 from $151 million in 2004 after it started using chipped
cards. However, what we are doing in the U.S. is still a feeble half measure that involves
the customer giving a signature instead of entering a PIN. Signing is a pointless ritual
that gives a false sense of security, and without a PIN, stolen cards can be used for
online shopping just as easily as ones with a magnetic stripe."
" A wonderful effect of this change is that now is a great time for completely new
payment methods to arrive. NFC payments such as Google Wallet and Apple Pay offer
humongous security benefits over credit cards. Here is how it works: instead of using
your actual credit and debit card numbers when you add your card to your phone, your
phone stores an encrypted, unique Device Account Number. When you make a
purchase, you enter a PIN, or, in the case of Apple Pay, scan your fingerprint, and the
Device Account Number, along with a transaction-specific dynamic security code, is
used to process your payment. Your actual credit or debit card numbers are never
shared with merchants or transmitted with payment."
" Mobile payments are a great alternative to credit cards that could create a world
where you don't have to remember to grab your wallet along with your phone and keys
when you leave your house in the morning, and are much more secure, although
considering what we have now, chip and PIN alone would be a drastic improvement.
American credit companies need to think about how long they really want to wait before
doing away with signatures and implementing PINs.

Mims 3
Works Cited!
" Arment, Marco, Casey Liss, and John Siracusa. Entering the iTouch Phase of My
Life. 2014. MP3."
" Rosenblatt, Seth. "Chips promise more security for credit cards, but signature still
required." CNET. CBS Interactive Inc., 17 Nov. 2014. Web. 18 Nov. 2014."
" "Seventy Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015."
Aite. Aite Group LLC, 10 Jun. 2014. Web. 18 Nov. 2014"
" "Target security breach affects up to 40M cards". Associated Press via
Milwaukee Journal Sentinel. 19 Dec. 2013. Web. 21 Dec. 2013.

More Related Content

What's hot

Why Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyWhy Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyProtegrity
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityVladislav Solodkiy
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2editKehinde Adelusi
 
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...Steven Rhyner
 
Dorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry ReviewDorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry ReviewDorado Industries
 
Venmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copyVenmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copytlc44
 
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/32/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3Alessio Bonetti
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017Dorado Industries
 
Mba solved assignmnets call us at - 08263069601
Mba solved assignmnets   call us at - 08263069601Mba solved assignmnets   call us at - 08263069601
Mba solved assignmnets call us at - 08263069601smumbahelp
 
The case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterThe case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterJosu San Martin
 
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldAdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldNigel Mark Dias
 
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry SynopsisDorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry SynopsisDorado Industries
 
The Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual CurrencyThe Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual CurrencyAranca
 
Adscash presentation
Adscash presentationAdscash presentation
Adscash presentationbitaminb
 

What's hot (20)

Dorado trend watch q2 2013
Dorado trend watch q2 2013Dorado trend watch q2 2013
Dorado trend watch q2 2013
 
Why Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyWhy Hacking into Your Company is so Easy
Why Hacking into Your Company is so Easy
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO community
 
Presentation joys en (1)
Presentation joys en (1)Presentation joys en (1)
Presentation joys en (1)
 
payments-interview
payments-interviewpayments-interview
payments-interview
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2edit
 
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
 
Dorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry ReviewDorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry Review
 
Venmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copyVenmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copy
 
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/32/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017
 
The Future of Banking
The Future of BankingThe Future of Banking
The Future of Banking
 
Mba solved assignmnets call us at - 08263069601
Mba solved assignmnets   call us at - 08263069601Mba solved assignmnets   call us at - 08263069601
Mba solved assignmnets call us at - 08263069601
 
Currency And Paperless Money
Currency And Paperless MoneyCurrency And Paperless Money
Currency And Paperless Money
 
The case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterThe case for Electronic Cash - Coincenter
The case for Electronic Cash - Coincenter
 
Payment Industry Trends for 2016
Payment Industry Trends for 2016Payment Industry Trends for 2016
Payment Industry Trends for 2016
 
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldAdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
 
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry SynopsisDorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
 
The Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual CurrencyThe Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual Currency
 
Adscash presentation
Adscash presentationAdscash presentation
Adscash presentation
 

Viewers also liked

D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...ichitaso Satou
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 

Viewers also liked (11)

D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Safer Payment Methods

White_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASWhite_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASJean-Ann Langert
 
Money2020 2015 Day One Highlights
Money2020 2015 Day One HighlightsMoney2020 2015 Day One Highlights
Money2020 2015 Day One HighlightsSam Maule
 
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...- Mark - Fullbright
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTesth9gfhypx97
 
How contactless payment can boost your business
How contactless payment can boost your businessHow contactless payment can boost your business
How contactless payment can boost your businessGraeme McGilliard
 
Retail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and PinRetail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and PinMike Smith
 
Re-Inventing Finance
Re-Inventing FinanceRe-Inventing Finance
Re-Inventing FinanceTom Carlson
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniquesijsrd.com
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxvrickens
 
Virtual credit card in India
Virtual credit card in IndiaVirtual credit card in India
Virtual credit card in IndiaMorCryp
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicInApp
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
EMV Chip Cards
EMV Chip CardsEMV Chip Cards
EMV Chip Cardstxheaven
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 

Similar to Safer Payment Methods (20)

Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Data Breach Article
Data Breach ArticleData Breach Article
Data Breach Article
 
White_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASWhite_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LAS
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
 
Atm theft
Atm theftAtm theft
Atm theft
 
credit card theft
credit card theftcredit card theft
credit card theft
 
Money2020 2015 Day One Highlights
Money2020 2015 Day One HighlightsMoney2020 2015 Day One Highlights
Money2020 2015 Day One Highlights
 
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
How contactless payment can boost your business
How contactless payment can boost your businessHow contactless payment can boost your business
How contactless payment can boost your business
 
Retail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and PinRetail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and Pin
 
Re-Inventing Finance
Re-Inventing FinanceRe-Inventing Finance
Re-Inventing Finance
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docx
 
Virtual credit card in India
Virtual credit card in IndiaVirtual credit card in India
Virtual credit card in India
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
EMV Chip Cards
EMV Chip CardsEMV Chip Cards
EMV Chip Cards
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 

More from Cody Mims

Rotational motion
Rotational motionRotational motion
Rotational motionCody Mims
 
Bandwagon billboard
Bandwagon billboardBandwagon billboard
Bandwagon billboardCody Mims
 
Story of an Hour mythological analysis
Story of an Hour mythological analysisStory of an Hour mythological analysis
Story of an Hour mythological analysisCody Mims
 
Psychology review
Psychology reviewPsychology review
Psychology reviewCody Mims
 
Merger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheetMerger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheetCody Mims
 
Abnormal psychology
Abnormal psychologyAbnormal psychology
Abnormal psychologyCody Mims
 
Stages of psychosexual development
Stages of psychosexual developmentStages of psychosexual development
Stages of psychosexual developmentCody Mims
 
Sophienburg history scholarship
Sophienburg history scholarshipSophienburg history scholarship
Sophienburg history scholarshipCody Mims
 
States of consciousness
States of consciousnessStates of consciousness
States of consciousnessCody Mims
 
Sensory perceptory
Sensory perceptorySensory perceptory
Sensory perceptoryCody Mims
 
Developmental psychology
Developmental psychologyDevelopmental psychology
Developmental psychologyCody Mims
 
Angular Motion notes
Angular Motion notesAngular Motion notes
Angular Motion notesCody Mims
 
Introspection
IntrospectionIntrospection
IntrospectionCody Mims
 
Executive branch review
Executive branch reviewExecutive branch review
Executive branch reviewCody Mims
 
Executive branch worksheet
Executive branch worksheetExecutive branch worksheet
Executive branch worksheetCody Mims
 

More from Cody Mims (20)

Rotational motion
Rotational motionRotational motion
Rotational motion
 
Bandwagon billboard
Bandwagon billboardBandwagon billboard
Bandwagon billboard
 
Story of an Hour mythological analysis
Story of an Hour mythological analysisStory of an Hour mythological analysis
Story of an Hour mythological analysis
 
Psychology review
Psychology reviewPsychology review
Psychology review
 
Merger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheetMerger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheet
 
Abnormal psychology
Abnormal psychologyAbnormal psychology
Abnormal psychology
 
Stages of psychosexual development
Stages of psychosexual developmentStages of psychosexual development
Stages of psychosexual development
 
Motivation
MotivationMotivation
Motivation
 
Cognition
CognitionCognition
Cognition
 
Sophienburg history scholarship
Sophienburg history scholarshipSophienburg history scholarship
Sophienburg history scholarship
 
Sleep
SleepSleep
Sleep
 
States of consciousness
States of consciousnessStates of consciousness
States of consciousness
 
Sensory perceptory
Sensory perceptorySensory perceptory
Sensory perceptory
 
Developmental psychology
Developmental psychologyDevelopmental psychology
Developmental psychology
 
Angular Motion notes
Angular Motion notesAngular Motion notes
Angular Motion notes
 
Introspection
IntrospectionIntrospection
Introspection
 
Psychology
PsychologyPsychology
Psychology
 
Temperance
TemperanceTemperance
Temperance
 
Executive branch review
Executive branch reviewExecutive branch review
Executive branch review
 
Executive branch worksheet
Executive branch worksheetExecutive branch worksheet
Executive branch worksheet
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Safer Payment Methods

  • 1. Mims 1 " Credit Cards and Swiping Information" " You may not realize it, but the American credit system is in a time of change. The fact is, change cannot come soon enough. Credit security breaches have proven over and over that we need a better system than the terrible, primitive one we have now." " Let me refresh your memory on how our system works now with an explanation by Casey Liss on Accidental Tech Podcast:" If you're at a restaurant, the general way things work is, you ask for a check, they bring you the check, you give the server your credit card, they run away to some terminal that could be in the back of the restaurant well out of your line of sight, swipe your card, hopefully not skim your card, bring it back, and then you are to add the tip that you want to add, sign the paper, and leave it and just hope that (A) they didn't skim your card, and (B) they actually put the amount you want them to put into the point of sale system in order to charge you…we are so backwards anything will be an improvement. (Arment)." " As you can imagine, plenty of security breaches have come from this. The biggest one in the recent past happened in late November to early December 2013, when data from around 40 million credit and debit cards was stolen from Target Corporation. ("Target security breach affects up to 40M cards"). In all of 2013, $6 billion was lost to credit card fraud in the U.S., up from around $4.5 billion in 2011. ("Seventy Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015")." Cody Mims" Mrs. Mann" DC English III" 11-20-14
  • 2. Mims 2 " By October 1, 2015, credit card transactions in the United States are going to require a chip built into the card. (Rosenblatt). This is a much safer system that 19 other countries have already adopted. In the United Kingdom, counterfeit credit card fraud plummeted to $67 million in 2013 from $151 million in 2004 after it started using chipped cards. However, what we are doing in the U.S. is still a feeble half measure that involves the customer giving a signature instead of entering a PIN. Signing is a pointless ritual that gives a false sense of security, and without a PIN, stolen cards can be used for online shopping just as easily as ones with a magnetic stripe." " A wonderful effect of this change is that now is a great time for completely new payment methods to arrive. NFC payments such as Google Wallet and Apple Pay offer humongous security benefits over credit cards. Here is how it works: instead of using your actual credit and debit card numbers when you add your card to your phone, your phone stores an encrypted, unique Device Account Number. When you make a purchase, you enter a PIN, or, in the case of Apple Pay, scan your fingerprint, and the Device Account Number, along with a transaction-specific dynamic security code, is used to process your payment. Your actual credit or debit card numbers are never shared with merchants or transmitted with payment." " Mobile payments are a great alternative to credit cards that could create a world where you don't have to remember to grab your wallet along with your phone and keys when you leave your house in the morning, and are much more secure, although considering what we have now, chip and PIN alone would be a drastic improvement. American credit companies need to think about how long they really want to wait before doing away with signatures and implementing PINs.

  • 3. Mims 3 Works Cited! " Arment, Marco, Casey Liss, and John Siracusa. Entering the iTouch Phase of My Life. 2014. MP3." " Rosenblatt, Seth. "Chips promise more security for credit cards, but signature still required." CNET. CBS Interactive Inc., 17 Nov. 2014. Web. 18 Nov. 2014." " "Seventy Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015." Aite. Aite Group LLC, 10 Jun. 2014. Web. 18 Nov. 2014" " "Target security breach affects up to 40M cards". Associated Press via Milwaukee Journal Sentinel. 19 Dec. 2013. Web. 21 Dec. 2013.