M-Payment Solutions and M-Commerce Fraud Management

Mobile security and payment are central to m-commerce. The shift from physical to virtual payments has brought enormous benefits to consumers and merchants. For consumers it means ease of use. For mobile operators, mobile payment presents a unique opportunity to consolidate their central role in the m-commerce value chain. Financial organizations view mobile payment and mobile banking as a way of providing added convenience to their customers along with an opportunity to reduce their operating costs. The chapter starts by giving a general introduction to m-payment by providing an overview of the m-payment value chain, lifecycle and characteristics. In the second section, we will review competing mobile payment solutions that are found in the marketplace. The third section will review different types of mobile frauds in the mcommerce environment and solutions to prevent such frauds. This chapter appears in the book, Advances in Security and Payment Methods for Mobile Commerce, edited by Wen-Chen Hu, Chung-wei Lee and Weidong Kou. Copyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited. 701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.idea-group.com IDEA GROUP PUBLISHING M-Payment Solutions and M-Commerce Fraud Management 193 Copyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited. Introduction Mobile commerce (m-commerce) grows dramatically. The global m-commerce market is expected to be worth a staggering US$200 billion by 2004 (Durlacher Research, n.d.; More Magic Software, 2000). M-commerce can be defined as any electronic transaction or information interaction conducted using a mobile device and mobile networks, for example, wireless or switched public network, which leads to transfer of real or perceived value in exchange for information, services or goods (MobileInfo.com). M-commerce involves m-payment, which is defined as the process of two parties exchanging financial value using a mobile device in return for goods or services. A mobile device is a wireless communication tool, including mobile phones, PDAs, wireless tablets, and mobile computers (Mobile Payment Forum, 2002). Due to the widespread use of mobile phones today, a number of payment schemes have emerged which allow the payment of services/goods from these mobile devices. In the following sections an overall view of the m-payment value chain, the m-payment life cycle and the m-payment characteristics is given. Also the operational issues are analyzed, which are critical to the adoption level of a payment system. The operational issues or characteristics will help in the unambiguous identification of the payment solutions. M-Payment Value Chain Many different actors can be involved in mobile payment process (McKitterick & Dowling, n.d.; Mobile Payment Forum, 2002). For example, there is a consumer who owns the mobile device and is willing to pay for a service or product. The consumer initializes the mobile purchase, registers with the payment provider and authorizes the payment. A content provider or merchant sells product to the customer. In the mobile payment context, content can range from news to directory services, shopping and ticketing services, entertainment services, and financial services. The provider or merchant forwards the purchase requests to a payment service provider, relays authorization requests back to the customer and is responsible for the delivery of the content. Another actor in the payment procedure is the payment service provider, who is responsible for controlling the flow of transaction between mobile consumers, content providers and trusted third party (TTP) as well as for enabling and routing the payment message initiated from the mobile device to be cleared by the TTP. Payment service provider could be a mobile operator, a bank, a credit card company or an independent payment vendor. Another group of stakeholders is the trusted third party, which might involve network operators, banks and credit card companies. The main role of the TTP is to perform the authentication and the authorization of transaction parties and the payment settlement. Finally there are mobile operators who are more concerned with the standardization and interoperability issues. They may also operate mobile payment procedure themselves and provide payment services for customers and merchants. One thing that needs to be considered is who receives the customer data. Customers rarely wish to divulge any information, whereas the same customer information might be important for merchants or content providers for their business. Payment procedures need to ensure that none 20 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/chapter/payment-solutions-commercefraud-management/4891?camid=4v1 This title is available in InfoSci-Books, InfoSci-Business Technologies, Business, Administration, and Management, InfoSci-Business and Management, InfoSci-Security and Forensics, Science, Engineering, and Information Technology, InfoSci-Select, InfoSci-Select. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=1

[1]  M. Hauswirth,et al.  Towards a Generalized Payment Model for Internet Services ? , 2002 .

[2]  S. Patel Location, identity and wireless fraud detection , 1997, 1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338).

[3]  Katherine M. Shelfer,et al.  Smart card evolution , 2002, CACM.

[4]  Jim Dowling,et al.  State of the Art Review of Mobile Payment Technology , 2003 .

[5]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[6]  LeeWenke,et al.  Intrusion detection techniques for mobile wireless networks , 2003 .

[7]  Michael Peirce,et al.  Multi-Party Electronic Payments for Mobile Communications , 2000 .

[8]  Jian Tang,et al.  Distributed PIN Verification Scheme for Improving Security of Mobile Devices , 2003, Mob. Networks Appl..

[9]  B. Miller,et al.  Vital signs of identity [biometrics] , 1994, IEEE Spectrum.

[10]  Jianying Zhou,et al.  Undeniable billing in mobile communication , 1998, MobiCom '98.

[11]  Randy H. Katz,et al.  Trace-based mobile network emulation , 1997, SIGCOMM '97.

[12]  Gerald W. Neufeld,et al.  Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication , 1997, SIGCOMM 1998.

[13]  M. Krueger,et al.  Institute for Prospective Technological Studies the Future of M-payments – Business Options and Policy Issues – Background Paper No. 2 Electronic Payment Systems Observatory (epso) , 2022 .

[14]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[15]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[16]  Zakaria Maamar,et al.  Software agents and wireless E-commerce , 2001, SECO.

[17]  E. Heindl,et al.  Mobile Payment , 2021, Fintech Regulation in China.

[18]  Neil J. Boucher,et al.  The Cellular Radio Handbook: A Reference for Cellular System Operation , 1992 .

[19]  Bernard Rous,et al.  The ACM digital library , 2001, CACM.

[20]  Diane Lambert,et al.  Detecting fraud in the real world , 2002 .