DocumentCode
11397
Title
Turn on, log in, checkout
Author
Bodhani, Aasha
Volume
8
Issue
3
fYear
2013
fDate
Apr-13
Firstpage
60
Lastpage
63
Abstract
As point-of-sale systems embrace mainstream software, it have to deal with the security threats that come with it. Connected point-of-sale (POS) systems - that´s the checkout to you and me - are the most recent targets of the cybercriminal. Checkout technology has been getting steadily more intelligent over the last decade, and if checkout systems are starting to look more like standard personal computers than electronic cash registers, it´s because they are increasingly adopting much of the same technology.
Keywords
computer crime; industrial property; retail data processing; checkout technology; connected POS systems; cybercriminal; mainstream software; personal computers; point-of-sale systems; security threats;
fLanguage
English
Journal_Title
Engineering & Technology
Publisher
iet
ISSN
1750-9637
Type
jour
DOI
10.1049/et.2013.0308
Filename
6495442
Link To Document