DocumentCode :
11397
Title :
Turn on, log in, checkout
Author :
Bodhani, Aasha
Volume :
8
Issue :
3
fYear :
2013
fDate :
Apr-13
Firstpage :
60
Lastpage :
63
Abstract :
As point-of-sale systems embrace mainstream software, it have to deal with the security threats that come with it. Connected point-of-sale (POS) systems - that´s the checkout to you and me - are the most recent targets of the cybercriminal. Checkout technology has been getting steadily more intelligent over the last decade, and if checkout systems are starting to look more like standard personal computers than electronic cash registers, it´s because they are increasingly adopting much of the same technology.
Keywords :
computer crime; industrial property; retail data processing; checkout technology; connected POS systems; cybercriminal; mainstream software; personal computers; point-of-sale systems; security threats;
fLanguage :
English
Journal_Title :
Engineering & Technology
Publisher :
iet
ISSN :
1750-9637
Type :
jour
DOI :
10.1049/et.2013.0308
Filename :
6495442
Link To Document :
بازگشت