The exact phenomenon observed is as indicated in Appendix A.
Mechanism
The mechanism involved in the protection of the card details by means of the EMV technology is discussed by various scholars and organizations. SPA (2010, 1) clearly explains that the need for authenticating data in the various EMV systems is to ensure that the cars being used is genuine. This is made possible via a system referred to as the Card Authentication Methods that is dependent on the capabilities of the chip itself.
How the EMV system protects payment cards
EMV Implementation Challenges
Extant literature has been dedicated towards the study of the various challenges that face the implementation of the EMV technology. Gareth Ellis Solution Consultants (2007,1) clearly point out that despite the since the phenomenal implementation of the technology in 2005, the use of EMV cards has always lacked the much needed sophistication in all the over 145,000,000 cards that were issued since the adoption of the standard. They pointed out that most EMV card issuers only implemented simple functionalities such as the use of EMV in the process of data preparation or as an upgrade of their in-house card assurance systems.
Steven et al. (2010) also illustrates the protocol flaw in the use of EMV technology. They demonstrate in their paper how criminals can make of use of the flaw in the EMV protocol to launch an attack through the use of a genuine card in making of payments using EMV cards without the need of a PIN. This happens undetected despite the fact that the merchant could be having a direct connection to the banking network. Their paper further considers the mechanism used by fraudsters such as man-in -- the -- middle attacks and the source of the flaw.
The challenges that affect the implementation of EMV technology are numerous .In this paper we present a holistic approach to the problem of EMV migration and implementation.
The problems that are associated with the implementation of the EMV technology is best understood after an analysis of various case studies involving the technology's implementation.
More challenges to the adoption of EMV technology
Extant literature suggests that there is insufficient guidance in the process of implementing the various EMV technologies in various countries. This...
The implementation process must be regulated by the various card associations, government legislations as well as network mandates (Spidle,2010). A thorough and comprehensive analysis of the Operational Impact of EMV implementation In order to mitigate the various threats faced by the Iranian banks while implementing the EMV standards, it is necessary to conduct a thorough and comprehensive analysis of the impact that such a move would have on the general operation
They need to estimate the cost of production, personalization as well as the milling of the new chip cards. Terminals The budget should include the cost associated with the updating of terminals, Point of Sale (POS) devices and ATMs, in all types of environments. These must however be considered as new ongoing expenses and should include installation and maintenance of compliant terminals. However, the costs of infrastructures elements are not as
This is largely due to time and logistical issues involved in conducting the face-to-face interviews. However, this still represents 50% of the entire sample population. Therefore, it is expected that the opinions expressed in the interviews will be a good representation of Iranian banks. 3.5 Data Collection The primary aim of the study is to identify the challenges that Iranian banks face in the implementation of EMV. This research is divided
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now