{"id":"https://openalex.org/W2149402740","doi":"https://doi.org/10.1109/icdim.2008.4746843","title":"The management of online credit card data using the Payment Card Industry Data Security Standard","display_name":"The management of online credit card data using the Payment Card Industry Data Security Standard","publication_year":2008,"publication_date":"2008-11-01","ids":{"openalex":"https://openalex.org/W2149402740","doi":"https://doi.org/10.1109/icdim.2008.4746843","mag":"2149402740"},"language":"en","primary_location":{"id":"doi:10.1109/icdim.2008.4746843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007134269","display_name":"Clive Blackwell","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Clive Blackwell","raw_affiliation_strings":["Information Security Group Royal Holloway, University of London, Egham, Surrey, UK"],"affiliations":[{"raw_affiliation_string":"Information Security Group Royal Holloway, University of London, Egham, Surrey, UK","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5007134269"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":null,"apc_paid":null,"fwci":0.7024,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75617982,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"838","last_page":"843"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/card-security-code","display_name":"Card security code","score":0.9105111360549927},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.8502781391143799},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6617356538772583},{"id":"https://openalex.org/keywords/multos","display_name":"MULTOS","score":0.632522702217102},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.60471510887146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5767996907234192},{"id":"https://openalex.org/keywords/payment-card","display_name":"Payment card","score":0.500908374786377},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4918105900287628},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4619574546813965},{"id":"https://openalex.org/keywords/atm-card","display_name":"ATM card","score":0.45845097303390503},{"id":"https://openalex.org/keywords/credit-card-interest","display_name":"Credit card interest","score":0.4493739902973175},{"id":"https://openalex.org/keywords/chargeback","display_name":"Chargeback","score":0.4370356798171997},{"id":"https://openalex.org/keywords/credit-card-fraud","display_name":"Credit card fraud","score":0.42079973220825195},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.42040857672691345},{"id":"https://openalex.org/keywords/openpgp-card","display_name":"OpenPGP card","score":0.4136277139186859},{"id":"https://openalex.org/keywords/smart-card-application-protocol-data-unit","display_name":"Smart card application protocol data unit","score":0.272164523601532},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21858695149421692}],"concepts":[{"id":"https://openalex.org/C149071572","wikidata":"https://www.wikidata.org/wiki/Q1035664","display_name":"Card security code","level":4,"score":0.9105111360549927},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.8502781391143799},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6617356538772583},{"id":"https://openalex.org/C4239916","wikidata":"https://www.wikidata.org/wiki/Q2337892","display_name":"MULTOS","level":5,"score":0.632522702217102},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.60471510887146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5767996907234192},{"id":"https://openalex.org/C21021354","wikidata":"https://www.wikidata.org/wiki/Q1207171","display_name":"Payment card","level":3,"score":0.500908374786377},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4918105900287628},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4619574546813965},{"id":"https://openalex.org/C108087509","wikidata":"https://www.wikidata.org/wiki/Q1207171","display_name":"ATM card","level":3,"score":0.45845097303390503},{"id":"https://openalex.org/C174957148","wikidata":"https://www.wikidata.org/wiki/Q5183765","display_name":"Credit card interest","level":4,"score":0.4493739902973175},{"id":"https://openalex.org/C81749938","wikidata":"https://www.wikidata.org/wiki/Q3307525","display_name":"Chargeback","level":5,"score":0.4370356798171997},{"id":"https://openalex.org/C2780747020","wikidata":"https://www.wikidata.org/wiki/Q83873","display_name":"Credit card fraud","level":4,"score":0.42079973220825195},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.42040857672691345},{"id":"https://openalex.org/C22847425","wikidata":"https://www.wikidata.org/wiki/Q7095843","display_name":"OpenPGP card","level":4,"score":0.4136277139186859},{"id":"https://openalex.org/C151340760","wikidata":"https://www.wikidata.org/wiki/Q602456","display_name":"Smart card application protocol data unit","level":3,"score":0.272164523601532},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21858695149421692}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdim.2008.4746843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W54942354","https://openalex.org/W1660562555","https://openalex.org/W2040031398","https://openalex.org/W2796585648","https://openalex.org/W4238304100","https://openalex.org/W6602159364","https://openalex.org/W6636975353","https://openalex.org/W6821265586"],"related_works":["https://openalex.org/W2951843555","https://openalex.org/W1518062554","https://openalex.org/W2971487911","https://openalex.org/W1501697284","https://openalex.org/W2591829981","https://openalex.org/W3121095493","https://openalex.org/W2985452763","https://openalex.org/W2333339884","https://openalex.org/W2408733025","https://openalex.org/W1985230688"],"abstract_inverted_index":{"Credit":[0],"card":[1,40,53],"fraud":[2],"on":[3,72],"the":[4,32,35,62,82],"Internet":[5],"is":[6],"a":[7,45],"serious":[8],"and":[9,64],"growing":[10],"issue.":[11],"Many":[12],"criminals":[13],"have":[14,42],"hacked":[15],"into":[16],"merchant":[17],"databases":[18],"to":[19,25,30,50],"obtain":[20],"cardholder":[21],"details":[22,33,54],"enabling":[23],"them":[24],"conduct":[26],"fake":[27],"transactions":[28],"or":[29],"sell":[31],"in":[34,69],"digital":[36],"underground":[37],"economy.":[38],"The":[39],"brands":[41],"set":[43],"up":[44],"standard":[46,63],"called":[47],"PCI":[48],"DSS":[49],"secure":[51,83],"credit":[52],"when":[55],"they":[56],"are":[57],"stored":[58],"online.":[59],"We":[60],"investigate":[61],"find":[65],"significant":[66],"flaws":[67],"especially":[68],"its":[70],"requirements":[71],"small":[73],"businesses.":[74],"Finally,":[75],"we":[76],"propose":[77],"some":[78],"general":[79],"rules":[80],"for":[81],"management":[84],"of":[85],"online":[86],"data.":[87]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
