• DocumentCode
    11397
  • Title

    Turn on, log in, checkout

  • Author

    Bodhani, Aasha

  • Volume
    8
  • Issue
    3
  • fYear
    2013
  • fDate
    Apr-13
  • Firstpage
    60
  • Lastpage
    63
  • Abstract
    As point-of-sale systems embrace mainstream software, it have to deal with the security threats that come with it. Connected point-of-sale (POS) systems - that´s the checkout to you and me - are the most recent targets of the cybercriminal. Checkout technology has been getting steadily more intelligent over the last decade, and if checkout systems are starting to look more like standard personal computers than electronic cash registers, it´s because they are increasingly adopting much of the same technology.
  • Keywords
    computer crime; industrial property; retail data processing; checkout technology; connected POS systems; cybercriminal; mainstream software; personal computers; point-of-sale systems; security threats;
  • fLanguage
    English
  • Journal_Title
    Engineering & Technology
  • Publisher
    iet
  • ISSN
    1750-9637
  • Type

    jour

  • DOI
    10.1049/et.2013.0308
  • Filename
    6495442