Payments and Fraud Glossary of Terms
Learning the Language of Payments and Fraud
To help you keep up with the trends, we’ve compiled a list of payments and fraud-related terms and definitions that are worth knowing. We continually update this glossary as new trends and terms emerge, and we invite you to occasionally browse through the listed terms to stay up-to-date.
A person who owns the account attached to a credit or debit card.
Address Verification System (AVS)
A payment processing system comparison of the numerical portions of billing and shipping addresses with the addresses on file at the credit card-issuing bank.
Artificial Intelligence (AI)
Computer systems used to perform complex tasks in a way that is similar to how humans solve problems.
A debit or credit card transaction for which a merchant receives authorization from the bank that issued the card. Also called card authorization, preauthorization, or preauth.
See “Account holder”
Card Not Present (CNP)
A type of transaction in which neither the cardholder nor the credit card is physically present. It’s most common for remote orders taken over the phone, by internet, or mail. These make up the bulk of eCommerce orders.
Card Verification Values (CVVs)
The three- to four-digit security number found on the back of credit cards that can help reduce the risk of credit card fraud. These numbers are printed on the card, rather than embossed or stored in the magnetic strip.
Credit card chargebacks occur when a customer disputes a transaction and asks the credit card issuer to reverse the charge.
The number of chargebacks compared to the overall transactions for a given month. As the number of chargebacks against a retailer rises, so does the ratio.
Credit Card Fraud
A form of identity theft that involves an unauthorized taking of another's credit card information for the purpose of charging purchases to the account or removing funds from it.
A part of the World Wide Web not accessed by traditional search engines like Google. Dark websites use a layered network structure to encrypt web traffic.
An incident in which sensitive, protected or confidential data (including financial information, health data, passwords, or credit card information) is accessed through unauthorized means.
A type of machine learning technique that uses a multilayered approach to learning that lets human analysts feed data and a learning algorithm to a computer to allow the computer to teach itself to make decisions about that data.
Smartphone-based payment tools like PayPal, Google Wallet, Amazon Wallet, and Apple Pay that make it easier and faster for customers to make purchases online and at brick-and-mortar locations. Digital wallets use advanced encryption technology and passwords to protect against fraudulent use.
Established through The Fair Credit Billing Act of 1975, a dispute is the act of a customer formally questioning and contesting transactions on their statements.
Electronic commerce transactions that occur through an electronic medium between businesses and consumers.
See “Friendly fraud”
Wrongful or criminal deception intended to result in financial or personal gain.
When a cardholder disputes a transaction for reasons not intended to be deceitful, like forgetting they made the purchase, not recognizing the merchant's name on their statement, or not knowing another family member authorized a purchase.
The implementation of a strategy to detect fraudulent transactions and prevent these actions from causing financial and reputational damage to a merchant or customer.
Normally measured by chargebacks, fraud rate is a combination of gross chargebacks that the merchant receives, while net chargeback is everything the merchant receives minus every chargeback they dispute.
When fraudsters use personal data such as an individual’s name, driver’s license number, date of birth and address, to pose as that person to open new accounts and make purchases.
Machine Learning (ML)
A subfield of artificial intelligence, ML is the capability of a machine to imitate intelligent human behavior. ML is frequently used with fraud software and human analysts to find fraud patterns in purchase data, make predictions, flag fraud, and make fast transactional decisions while minimizing risk exposure.
A type of business bank account that allows a business to accept and process electronic payment card transactions.
Payment Authorization Rate
How many people are being approved when they attempt to purchase your product, and how many are being rejected. This metric is directly linked to revenue coming into a merchant’s business.
Payment Card Industry (PCI)
PCI compliance is the set of technical and operational standards that businesses follow to secure and protect credit card data provided by cardholders and transmitted through card processing transactions.
A form of social engineering and identity theft in which an e-mail user is tricked into revealing personal or confidential information which the scammer can use illicitly. Phishers may also install malicious software on computers, infect computers with viruses or even steal personal information off computers.
The PCI Security Standards Council established P2PE standards to improve the security of credit card transactions. During a P2PE process, transactional data is securely encrypted from point-of-sale entry to the final credit card processing point.
Malware used by cyber attackers to encrypt information and deny a user access to files on their own device until a ransom is paid for a decryption key to regain access to their files.
The process of identifying, assessing, and controlling threats to an organization's capital and earnings. Risks stem from a variety of sources including financial uncertainties, fraudulent behavior, legal liabilities, technology breaches, accidents, and natural disasters.
How many times is a merchant’s risk service rejecting a customer because they suspect they are a fraudster. It is important to know if rejections are people committing fraud or if they are false positives (good customers being blocked), and how to measure and balance between the two.
The act of using hidden electronic devices or card readers at point-of-sale systems to capture and copy electronically transmitted account information from a valid credit or debit card
To improve the performance of the synchronization point processing between transaction branches on the client side and the server side.
A malicious act in which a customer’s identity or card is stolen and used for a purchase without their knowledge.