The Economics of Retail Payments Security

In recent years, weaknesses in payment security have become increasingly evident through a constant stream of news reports on data breaches, phishing attacks, spoofed websites, payment card skimming, fraudulent ATM withdrawals and online purchases, computer malware and infiltration of retail point-of-sale systems. Although these events seem not to significantly affect current end-users’ payment method choices, they may hinder adoption of new technologies, such as mobile and faster payments (Schuh and Stavins). Were the public to lose confidence in the payments system, however, payment behaviors could drastically change, potentially undermining commerce and overall economic activities.

[1]  Scott D. Schuh,et al.  How Do Speed and Security Influence Consumers' Payment Behavior? , 2015 .

[2]  Richard J. Sullivan Controlling security risk and fraud in payment systems , 2014 .

[3]  Steven J. Murdoch,et al.  EMV: why payment systems fail , 2014, CACM.

[4]  Terri Bradford,et al.  Mobile Payments: Merchants' Perspectives , 2014 .

[5]  Tyler Moore,et al.  Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk , 2013, Financial Cryptography.

[6]  Fumiko Hayashi Mobile Payments: What's in It for Consumers? , 2012 .

[7]  Adam J. Levitin Private Disordering: Payment Card Fraud Liability Rules , 2011 .

[8]  Marc Rysman,et al.  Mobile Payments at the Retail Point of Sale in the United States: Prospects for Adoption , 2010 .

[9]  Tyler Moore,et al.  The economics of cybersecurity: Principles and policy options , 2010, Int. J. Crit. Infrastructure Prot..

[10]  Thomas C. Schelling,et al.  GAME THEORY: A PRACTITIONER'S APPROACH , 2010, Economics and Philosophy.

[11]  Steven J. Murdoch,et al.  Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication , 2010, Financial Cryptography.

[12]  Tyler Moore,et al.  The iterated weakest link , 2010, IEEE Security & Privacy.

[13]  R. Myerson Learning from Schelling s Strategy of Conflict , 2009 .

[14]  Richard H. McAdams,et al.  Beyond the Prisoners' Dilemma: Coordination, Game Theory, and Law , 2008 .

[15]  Richard J. Sullivan,et al.  Understanding Risk Management in Emerging Retail Payments , 2008 .

[16]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[17]  Gary A. Richardson Categories and causes of bank distress during the great depression, 1929-1933: The illiquidity versus insolvency debate revisited , 2007 .

[18]  George A. Akerlof,et al.  The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .

[19]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[20]  P. David,et al.  The Economics Of Compatibility Standards: An Introduction To Recent Research 1 , 1990 .

[21]  Shane Greenstein,et al.  The Economics of Compatibility of Standards , 1990 .