IDEAS home Printed from https://ideas.repec.org/a/fip/fedker/00018.html
   My bibliography  Save this article

Controlling security risk and fraud in payment systems

Author

Listed:
  • Richard J. Sullivan

Abstract

In late 2013, a security breach at a major retailer exposed information on 40 million payment cards. The number of data breaches has increased in recent years, and the targeted use of exposed data suggests a decentralized \\"virtual fraud factory\\" driving payment fraud. The direct costs of third-party fraud are high for consumers, banks, and merchants, but the indirect costs could be even higher if these incidences undermine the public's confidence in non-cash payments. Sullivan examines trends in payment fraud, prevention, and data protection to evaluate recent security performance. He then highlights several options to improve security and prevent fraud, including coordinated changes to the control structure over payment risk. Policymakers will need a broad perspective to judge weaknesses in this structure and its ability to adapt as new fraud methods arrive.

Suggested Citation

  • Richard J. Sullivan, 2014. "Controlling security risk and fraud in payment systems," Economic Review, Federal Reserve Bank of Kansas City, issue Q III, pages 5-36.
  • Handle: RePEc:fip:fedker:00018
    as

    Download full text from publisher

    File URL: https://www.kansascityfed.org/documents/1091/2014-Controlling%20Security%20Risk%20and%20Fraud%20in%20Payment%20Systems.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
    2. Jack Hirshleifer, 1983. "From weakest-link to best-shot: The voluntary provision of public goods," Public Choice, Springer, vol. 41(3), pages 371-386, January.
    3. Michele Braun & James J. McAndrews & William Roberds & Richard J. Sullivan, 2008. "Understanding risk management in emerging retail payments," Economic Policy Review, Federal Reserve Bank of New York, vol. 14(Sep), pages 137-159.
    4. Geoffrey R. Gerdes, 2008. "Recent payment trends in the United States," Federal Reserve Bulletin, Board of Governors of the Federal Reserve System (U.S.), vol. 94(Oct), October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jesse Leigh Maniff & Richard J. Sullivan, 2016. "Data Breach Notification Laws," Economic Review, Federal Reserve Bank of Kansas City, issue Q I, pages 65-85.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Richard J. Sullivan, 2010. "The changing nature of U.S. card payment fraud: industry and public policy options," Economic Review, Federal Reserve Bank of Kansas City, vol. 95(Q II), pages 101-133.
    2. William Roberds & Stacey L. Schreft, 2009. "Data security, privacy, and identity theft: The economics behind the policy debates," Economic Perspectives, Federal Reserve Bank of Chicago, vol. 33(Q I), pages 22-30.
    3. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    4. Luca Dall’Asta & Paolo Pin & Abolfazl Ramezanpour, 2011. "Optimal Equilibria of the Best Shot Game," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 13(6), pages 885-901, December.
    5. Conybeare, John A C & Murdoch, James C & Sandler, Todd, 1994. "Alternative Collective-Goods Models of Military Alliances: Theory and Empirics," Economic Inquiry, Western Economic Association International, vol. 32(4), pages 525-542, October.
    6. Kamijo, Yoshio, 2016. "Rewards versus punishments in additive, weakest-link, and best-shot contests," Journal of Economic Behavior & Organization, Elsevier, vol. 122(C), pages 17-30.
    7. Louis Rouanet, 2024. "On the tendency of revolutions to devour their own children," Public Choice, Springer, vol. 200(3), pages 603-626, September.
    8. Henrik Orzen, 2005. "Fundraising through Competition: Evidence from the Lab," Discussion Papers 2005-04, The Centre for Decision Research and Experimental Economics, School of Economics, University of Nottingham.
    9. Todd Sandler, 2009. "Intergenerational Public Goods: Transnational Considerations," Scottish Journal of Political Economy, Scottish Economic Society, vol. 56(3), pages 353-370, July.
    10. Nikolai Kukushkin, 2015. "The single crossing conditions for incomplete preferences," International Journal of Game Theory, Springer;Game Theory Society, vol. 44(1), pages 225-251, February.
    11. Stefanie Gerke & Gregory Gutin & Sung-Ha Hwang & Philip Neary, 2019. "Public goods in networks with constraints on sharing," Papers 1905.01693, arXiv.org, revised Jun 2023.
    12. Corazzini, Luca & Cotton, Christopher S. & Longo, Enrico & Reggiani, Tommaso, 2024. "Coordinated selection of collective action: Wealthy-interest bias and inequality," Journal of Public Economics, Elsevier, vol. 238(C).
    13. Alós-Ferrer, Carlos & Weidenholzer, Simon, 2014. "Imitation and the role of information in overcoming coordination failures," Games and Economic Behavior, Elsevier, vol. 87(C), pages 397-411.
    14. Wockenfuß, Christof, 2009. "Demokratie durch Entwicklungskonkurrenz," Discussion Papers 2009-17, Martin Luther University of Halle-Wittenberg, Chair of Economic Ethics.
    15. Burnett, Kimberly M., 2006. "Introductions of Invasive Species: Failure of the Weaker Link," Agricultural and Resource Economics Review, Cambridge University Press, vol. 35(1), pages 21-28, April.
    16. Karakostas, Alexandros & Kocher, Martin G. & Matzat, Dominik & Rau, Holger A. & Riewe, Gerhard, 2023. "The team allocator game: Allocation power in public goods games," Games and Economic Behavior, Elsevier, vol. 140(C), pages 73-87.
    17. TOSHIHIRO IHORI & MARTIN C. McGUIRE, 2007. "Collective Risk Control and Group Security: The Unexpected Consequences of Differential Risk Aversion," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(2), pages 231-263, April.
    18. Subhasish M. Chowdhury & Iryna Topolyan, 2016. "Best-shot versus weakest-link in political lobbying: an application of group all-pay auction," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 47(4), pages 959-971, December.
    19. Grégoire Rota Graziosi, 2009. "On the Strategic Use of Representative Democracy in International Agreements," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 11(2), pages 281-296, April.
    20. Arno Riedl & Ingrid M. T. Rohde & Martin Strobel, 2016. "Efficient Coordination in Weakest-Link Games," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 83(2), pages 737-767.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:fip:fedker:00018. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Zach Kastens (email available below). General contact details of provider: https://edirc.repec.org/data/frbkcus.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.