Feeds

Half of credit card problems are Web related

19 July 1999

  • alert
  • submit to reddit

Bridging the IT gap between rising business demands and ageing tools

It was five years ago today... Statistics, eh? The recent rumpus with the MPAA's findings on illegal Internet movie downloads got us thinking whether there had ever been a happier, simpler age where the facts were presented straight, and without obfuscation. The answer was no:

Half of credit card problems are Web related

By Lucy Sherriff

Published Monday 19th July 1999 16:20 GMT

This week, the Investors Chronicle (IC) reports that problems are being reported with 50 per cent of Internet credit card transactions. Obviously interested, this Register reporter went digging for more details.

A phone call or two later, it transpired that not only had the IC got the wrong end of the statistic - Visa actually found that 47 per cent of all problems being reported were Internet related, which is kinda different - but the financial reference mag was quoting data from a nine month old survey. Still, the figures are interesting. Although it only accounts for one per cent of all sales, the Internet is causing more than its fair share of problems for Visa customers.

Of the 47 per cent of Internet related problems, 22 per cent were fraudulent transactions, the remaining 78 per cent could be anything from late delivery to the wrong goods turning up. But there is no way of distinguishing the cases of stolen credit cards from Internet security failures, so the figures don't really give a clear indication of the state of play for ecommerce - whether that’s today or nine months ago when the survey took place.

The Investors Chronicle article left the impression that the Internet is somehow sparking a new type of credit card fraud, but it ain't necessarily so. Consumers are probably as safe sending confidential data across the net as they are using the phone to make a credit card booking.


Of course, those who want to see how stats are really generated should mosey on down to our own Mother of all Polls, appositely entitled "Who conducts the crappiest polls?"

As for the small matter of the Internet sparking a new type of credit card fraud, 97 per cent of all phishers we contacted said that the assertion was utter nonsense. ®

Application security programs and practises

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.