Khater, 2024 - Google Patents
Criminalization of Forgery of Electronic Payment Cards in Jordanian Legislation.Khater, 2024
View PDF- Document ID
- 10538391174227491253
- Author
- Khater M
- Publication year
- Publication venue
- Pakistan Journal of Criminology
External Links
Snippet
The article analyses the penal protection of electronic payment cards from forgery through a linguistic and virtual description of the notion of electronic payment cards. In addition to identifying the types of these cards, such as the credit card, the ATM card, and the debit card …
- 238000000034 method 0 abstract description 21
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Camp et al. | Token and notational money in electronic commerce | |
Al Jabouri et al. | Flying instruments and their impact on the national economy and the extent of their control (CTS guidelines model) | |
Khater | Criminalization of Forgery of Electronic Payment Cards in Jordanian Legislation. | |
Atiyah et al. | Legal status of cryptocurrency circulation in Iraq: lessons from the United Arab Emirates and the United States | |
Rafalskyi | Offences in the sphere of virtual assets turnover and analysis of their qualification | |
Hyman | Bitcoin atm: A criminal's laundromat for cleaning money | |
Linn | Regulating the cross‐border movement of prepaid cards | |
Arthur Williams | Credit card fraud in Trinidad and Tobago | |
Edelbacher | Fraud and Corruption: A European Perspective | |
Fisher | The UK's faster payment project: avoiding a bonanza for cybercrime fraudsters | |
Stamevski et al. | The concept of" white-collar" crime | |
Budhram | Examining the unique security features of a credit card with the aim of identifying possible fraudulent use | |
Alsharu | Law and Humanities Quarterly Reviews | |
Rotaru | The Check in the Light of the Provisions of the Criminal Law | |
Denis | Liability and the Digital Age: Comparative Analysis of the Australian, South African and CIS States Legislative Approaches | |
Smith | Plastic card fraud | |
Sinaga | A JURIDICAL OF BANK EMPLOYEES PERMITTING THE CRIME EMBEDDING IN POSITION ACCORDING TO LAW NUMBER 10 OF 1998 CONCERNING BANKING | |
Moise | Types of Bank Cards Related Frauds | |
Tubishat et al. | The Credit Card and the Crimes Associated with It | |
Рафальський | Offences in the sphere of virtual assets turnover and analysis of their qualification. Правопорушення у сфері обігу віртуальних активів та аналіз їх кваліфікації | |
Derrar | The intelligent and digital payment system between the advantages granted to the customer and the surrounded risks | |
Kaid | Financial brokerage contract as a model for electronic commercial trading on the Algerian Stock Exchange | |
Preiss | The consequences of anonymous access to the financial payments system | |
Paturochman | Crime Analysis of Payment Transactions Using Checks and Giro Bilyets | |
Rizal | Blank Cheques Commercial Law Perspective |