Loading...
Please wait, while we are loading the content...
Similar Documents
The History of Access Devices
| Content Provider | Scilit |
|---|---|
| Author | Iannacci, Jerry |
| Copyright Year | 2020 |
| Description | People use credit cards and other such devices to manage money and avoid carrying large sums of cash. The access device, or credit card, has evolved tremendously since after World War II. These devices are nothing more than a convenient vehicle to transact business, maintain data, or even make a phone call. The technology is not limited to payment devices, as it is also used with security access cards, which are used to gain secure or controlled access to a building or hotel. Initially, when cards of this nature were designed, they were very basic and bore minimum standards of protection against unauthorized or illegal use. Today, the access device or credit card has evolved to be a champion of technology. It not only reflects the specific product or customer its serves, but it also has the ability to store and maintain several levels of data and security. These levels include specialized encryption, biometrics, and the latest technology utilizing integrated circuits, also known as IC or Smart Cards. Yes, the technology age has taken this rather simple device and given it the capabilities to foil many a thief or counterfeiter. We no longer are using a device that simply reflects a retailer's name, a card number, or merchant bank. Book Name: Access Device Fraud and Related Financial Crimes |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2006-0-03769-0&isbn=9780429272639&doi=10.1201/9781420048803-6&format=pdf |
| Ending Page | 19 |
| Page Count | 5 |
| Starting Page | 15 |
| DOI | 10.1201/9781420048803-6 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2020-03-05 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Access Device Fraud and Related Financial Crimes Information Systems Technology Cards Building Access Device Credit Card Security Access Carrying Large Devices People |
| Content Type | Text |
| Resource Type | Chapter |