Advertisement

On a New Intangible Reward for Card-Linked Loyalty Programs

  • Albert SitekEmail author
  • Zbigniew Kotulski
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 889)

Abstract

Card-Linked Loyalty is an emerging trend observed in the market to use payment card as a unique identifier for Loyalty Programs. This approach allows to redeem goods and collect bonus points directly during a payment transaction. In this paper, we proposed additional, intangible reward, that can be used in such solutions: shorter transaction processing time. We presented a complete solution for it: Contextual Risk Management System, that can make a dynamic decision whether Cardholder Verification is necessary for the current transaction, or not. It is also able to maintain an acceptable level of risk approved by the Merchant. Additionally, we simulated the proposed solution with real-life transaction traces from payment terminals and showed what kind of information can be determined from it.

Keywords

Card-Linked Loyalty Context Risk Management Transaction security Payment card 

References

  1. 1.
    Kang, J., Brashear, T., Groza, M.: Customer-company identification and the effectiveness of loyalty programs. J. Bus. Res. 68, 464–471 (2015)CrossRefGoogle Scholar
  2. 2.
    Leenheer, J., van Heerde, H.J., Bijmolt, T.H., Smidts, A.: Do loyalty programs really enhance behavioral loyalty? An empirical analysis accounting for self-selecting members. Int. J. Res. Mark. 24(1), 31–47 (2007)CrossRefGoogle Scholar
  3. 3.
    Bond. Brand Loyalty, Visa: The Loyalty Report 2017 (2017)Google Scholar
  4. 4.
    Theng So, J., Danaher, T., Gupta, S.: What do customers get and give in return for loyalty program membership? Aust. Mark. J. (AMJ) 23, 196–206 (2015)CrossRefGoogle Scholar
  5. 5.
    Meyer-Waarden, L.: Effects of loyalty program rewards on store loyalty. J. Retail. Consum. Serv. 24, 22–32 (2015)CrossRefGoogle Scholar
  6. 6.
    Capizzi, M.T., Ferguson, R.: Loyalty trends for the twenty-first century. J. Consum. Market. 22(2), 72–80 (2005)CrossRefGoogle Scholar
  7. 7.
    Marquardt, P., Dagon, D., Traynor, P.: Impeding individual user profiling in shopper loyalty programs. In: Danezis, G. (ed.) Financial Cryptography and Data Security, pp. 93–101. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  8. 8.
    Everything you need to know about customer loyalty [statistics], January 2018. https://revelsystems.com/blog/2018/01/27/customer-loyalty-statistics/. Accessed 12 Mar 2018
  9. 9.
    How does card-linking loyalty work? vPromos, May 2016. https://cardlinx.org/wordpress_8-2015/wp-content/uploads/2016/05/4-vPromos-Pres.pptx..pdf. Accessed 12 Mar 2018
  10. 10.
    Sitek, A., Kotulski, Z.: Cardholder’s reputation system for contextual risk management in payment transactions. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, 28–30 August 2017, Proceedings, pp. 158–170. Springer (2017)Google Scholar
  11. 11.
    Sitek, A., Kotulski, Z.: POS-originated transactions traces as a source of contextual information for Risk Management Systems in EFT transactions. EURASIP J. Inf. Secur. 1, 5 (2018).  https://doi.org/10.1186/s13635-018-0076-9CrossRefGoogle Scholar
  12. 12.
    EMVCo: EMV Specifications. http://www.emvco.com/specifications.aspx. Accessed 24 Mar 2018
  13. 13.
    Press Information About HCE Development on the Market. http://www.bankier.pl/wiadomosc/Eksperci-Platnosci-HCE-to-rynkowy-przelom-3323308.html. Accessed 24 Mar 2018
  14. 14.
    Samsung Pay Homepage. http://www.samsung.com/us/samsung-pay/. Accessed 24 Mar 2018
  15. 15.
    Apple Pay Homepage. https://www.apple.com/apple-pay/. Accessed 25 May 2018
  16. 16.
    Google Pay Homepage. https://pay.google.com/intl/pl_pl/about/. Accessed 24 Mar 2018
  17. 17.
    Near Field Communication. http://nfc-forum.org/what-is-nfc/. Accessed 24 Mar 2018
  18. 18.
    Host Card Emulation. https://en.wikipedia.org/wiki/Host_card_emulation. Accessed 24 Mar 2018
  19. 19.
    EMV Transaction Steps. https://www.level2kernel.com/flow-chart.html. Accessed 24 Mar 2018
  20. 20.
    Sitek, A.: One-time code cardholder verification method in electronic funds transfer transactions. In: Annales UMCS ser. Informatica, vol. 14, no. 2, pp. 46–59. Universitatis Mariae Curie-Skłodowska, Lublin (2014)Google Scholar
  21. 21.
    Sitek, A., Kotulski, Z.: Contextual management of off-line authorisation in contact EMV transactions. Telecommun. Rev. Telecommun. News 88(84), 8–9, 953–959 (2015). (in polish)Google Scholar
  22. 22.
    European Central Bank, Germany: Fourth report on card fraud (2015)Google Scholar
  23. 23.
    Department of Payment System, National Bank of Poland, Warsaw, Poland: An assessment of the functioning of Polish payment system in 1st quarter 2017 (2017). (in Polish)Google Scholar
  24. 24.
    Numpy Homepage. http://www.numpy.org/. Accessed 24 Mar 2018
  25. 25.
    Pandas Homepage. http://pandas.pydata.org/. Accessed 24 Mar 2018
  26. 26.
    Matplotlib Homepage. https://matplotlib.org/. Accessed 24 Mar 2018
  27. 27.
    Pérez, F., Granger, B.E.: IPython: a system for interactive scientific computing. Comput. Sci. Eng. 9(3), 21–29 (2007). http://ipython.org
  28. 28.
    Jupyter IDE Homepage. http://jupyter.org/. Accessed 24 Mar 2018

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Institute of Telecommunications of WUTWarsawPoland

Personalised recommendations