Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Skimming

Handbook of Research on Recent Perspectives on Management, International Trade, and Logistics
An attack where an adversary wirelessly reads data from an RFID tag that enables forgery or cloning.
Published in Chapter:
Applications of Radio Frequency Identification Technology and Security Issues in Supply Chain Management
Kamalendu Pal (City University of London, UK)
DOI: 10.4018/978-1-7998-5886-7.ch013
Abstract
Supply chain management (SCM) systems provide the ability of information sharing and interpretation of contextual information to businesses and help their day-to-day operations. This chapter presents an introduction to radio frequency identification (RFID) technology and its applications in SCM. The chapter also describes the technical basics of RFID systems and examines several industry-specific applications of this technology to SCM to provide crucial implementation reviews. Next, the chapter emphasizes many inherent vulnerabilities of this pervasive computing technology in the context of security and privacy. This chapter presents a classification mechanism for risks that RFID networks come across by describing a categorization of RFID attacks, describing their main characteristics, and discussing possible countermeasures. The chapter aims to classify the existing weakness of RFID communication so that an appropriate understanding of RFID attacks can be realised, and subsequently, more effective procedures can be deployed to combat these attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Evaluation of the Relevance of Forensic Accounting on Fraud Detection in the Nigerian Public Sector: A Case Study of Bayelsa State, Nigeria
The removal of physical cash belonging to another party before it is recorded. For example, if an employee sells an item for $100 but only record $80 and keep $20 then they have committed skimming.
Full Text Chapter Download: US $37.50 Add to Cart
Radio Frequency Identification Systems Security Challenges in Supply Chain Management
An attack where an adversary wirelessly reads data from a RFID tag that enables forgery or cloning.
Full Text Chapter Download: US $37.50 Add to Cart
Radio Frequency Identification Technology and Its Security Concerns in the Manufacturing Industry
An attack where an adversary wirelessly reads data from a RFID tag that enables forgery or cloning.
Full Text Chapter Download: US $37.50 Add to Cart
On-Line Credit and Debit Card Processing and Fraud Prevention for E-Business
This is a type of fraud wherein the numbers on a credit card are recorded and transferred to a duplicate card.
Full Text Chapter Download: US $37.50 Add to Cart
On-Line Credit Card Payment Processing and Fraud Prevention for e-Business
This is a type of fraud wherein the numbers on a credit card are recorded and transferred to a duplicate card.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR