WEIS 2016 Paper 43-1

WEIS 2016 Paper 43-1

Delft University of Technology Risk Management for Third Party Payment Networks van Driel, Willem; Hernandez Ganan, Carlos; Lobbezoo, M; van Eeten, Michel Publication date 2016 Document Version Final published version Published in Proceedings of Workshop of Economics of Information Security 2016 Citation (APA) van Driel, W., Hernandez Ganan, C., Lobbezoo, M., & van Eeten, M. (2016). Risk Management for Third Party Payment Networks. In Proceedings of Workshop of Economics of Information Security 2016 (pp. 1-10) Important note To cite this publication, please use the final published version (if applicable). Please check the document version above. Copyright Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons. Takedown policy Please contact us and provide details if you believe this document breaches copyrights. We will remove access to the work immediately and investigate your claim. This work is downloaded from Delft University of Technology. For technical reasons the number of authors shown on this cover page is limited to a maximum of 10. Risk Management for Third Party Payment Networks Willem van Driel Carlos Gan˜an´ Maikel Lobbezoo Michel van Eeten Adyen Delft University of Technology Adyen Delft University of Technology 1011 DJ Amsterdam 2628 BX Delft 1011 DJ Amsterdam 2628 BX Delft The Netherlands The Netherlands The Netherlands The Netherlands [email protected] [email protected] [email protected] [email protected] Abstract—The payment industry has been characterized such as provided by PayPal, Apple Pay and Android by a small number of players that operate the schemes for Pay make use of credit and debit card schemes for their the facilitation of credit and debit card payments. Over payment processes. the years, various initiatives have been taken in order to Over the years, various initiatives have been taken in increase competition and hence cost efficiency within the order to provide an alternative to the card network: the industry. One of the latest efforts is the introduction of Payment Service Directive II (PSDII) within the European part of the payment industry that makes direct or indirect Union. PSDII requires banks to open up their services to use of the card schemes. Alternatives are believed to Third Party Payment (TPP) networks. TPP networks make enhance competition and lead to more efficiency within use of banks’ payment initiation services for e-commerce the payment industry. Some believe that blockchain transactions, creating an alternative next to credit and technology will provide this alternative [2]. Others be- debit card payments. However, just like in the card lieve that the way forward is making use of real time networks, payment fraud is not absent in TPP networks. bank transfers, as already mentioned by Anderson in Fraud manifests itself in non-payments: authorized pay- 2012 [3]. In order to stimulate the latter development ments that do not get settled. In this paper we first analyze in the European Union, the European Parliament has the ecosystem dynamics of the TPP network by examining the role of each actor involved. By leveraging one year of adopted Payment Serviced Directive II (PSDII) on the transaction data from the TPP network, we estimate the 8th of October 2015 [4]. PSDII requires banks to open up prevalence of non-payments. Finally, we evaluate a pre- by providing third parties access to account information ventive and reactive risk management strategy. The latter (XS2A) and payment initiation services (PIS). In practice strategy comprises of a non-payment recovery process — this implies that, with the consent of the consumer, a sending the consumer a reminder of the due amount — and third party can access the consumer’s bank account to proves to be surprisingly effective. Additionally, we have obtain account information (e.g. transaction history) and evidence that combining both strategies into a continuous initiate bank transfers on the consumer’s behalf. risk management process can yield even better results. In this paper we focus on third parties making As non-payment in the TPP network has similarities with chargebacks in the card network, we believe that our use of PIS. PSDII refers to this new ecosystem as approach can also enhance risk management in the card the Third Party Payment (TPP) network. The TPP network. network provides the payment industry the opportunity to develop payment methods that circumvent the I. INTRODUCTION card schemes. The introduction of PSDII has led to Although the e-commerce payment process may look some early entrants into this potential growth market, simple from the consumer’s perspective, a lot of com- such as Swedish Trustly [5] and German Sofort [6]. plexity is hidden behind the scenes. Over the past Outside of the European Union TPP networks are decades an entire financial sector has emerged to deal also on the rise, such as Walmart’s CurrentC [7] with this complexity: the payment industry. The industry in the United States and Australian Post’s POLi is currently characterized by a small number of players, Payments [8] in Australia. In this paper we focus on the like MasterCard and Visa, that operate the schemes for European Union’s TPP network, however our results the facilitation of credit and debit card payments [1]. are believed to be indicative of TPP networks in general. This dominant position is not solely the result of the direct usage of credit and debit cards for e-commerce One of the main risks for merchants in the card payments, but also because many other payment methods network is the presence of chargebacks. After a card payment has been made, the consumer holds the right to The remainder of the paper is structured according to reverse his payment for a limited period of time — e.g. the three contributions of our research. In section II we when the goods or services are not satisfactory [9]. This present how the TPP network is organized and elaborate creates a financial risk for the merchant, as the goods on the similarities and differences between chargebacks and services are often already delivered at the moment in the card network and non-payments in the TPP the chargeback is issued. Chargebacks that are issued network. In section III we describe the characteristics for non-legitimate reasons are associated with fraud. For of one year of transaction data from the TPP network many merchants losses due to fraud have a significant and analyze patterns for the occurrence non-payments. In impact, sometimes threatening their complete business section IV, we propose two risk management strategies model [10]. Over the past decades, an extensive amount to mitigate the impact of occurrence of non-payments of research has been dedicated to risk management for and apply them in practice. Finally, we discuss the results card networks, which has resulted in a decreased relative of our research in section V and conclude upon its main chargeback exposure for the industry [11]. findings in section VI. Although payments in the TPP network should not be subject to chargebacks, practice has shown that payments II. THIRD PARTY PAYMENT NETWORK can be reversed. Research into risk management for A. The Network TPP networks however, is practically non-existent. A TPP network consists of “any agreement or ar- This paper aims at filling this gap, by examining risk rangement that involves the establishment of accounts management strategies from the merchant’s perspective with a central organization by a substantial number of — as it is typically the merchant who ends up absorbing providers of goods or services who are unrelated to the financial loss of reversed payments. From this point the organization and who have agreed to settle trans- we will refer to reversed payments in the card network actions for the provision of the goods or services to as chargebacks and reversed payments in the TPP purchasers according to the terms of the agreement or network as non-payments. We use this differentiation arrangement” [12]. According to the US Code of Federal because although reversals in both networks share Regulations, payment is guaranteed in the settlement of characteristics, they do not occur for the exact same such transactions. In practice, however, this settlement reasons — as will be elaborated on in Section II. does not always occur. The contribution of this paper is three-fold. (1) First, we analyze the functioning of the TPP network. Schemes 13 SEPA credit 12 This enables us to differentiate non-payments from transfer chargebacks. (2) Second, we present a detailed analysis of the non-payment characteristics using one year of Acquirer Issuer 7 Merchant's 14 Consumer's transaction data from the TPP network. The results bank 6 bank indicate that non-payments tend to concentrate during PSP 8 TPP 3 the weekend, during the night, at specific types of 11 merchants and specific types of issuing banks. (3) 15 5 Merchant 9 Consumer 4 Finally, we design strategies to manage the risk of 2 non-payments and empirically apply and evaluate 10 their effectiveness. The results indicate that whereas 1 Authorization process preventive risk management strategies are cost effective Settlement process for the card network, the TPP network might be served better with reactive strategies — i.e., accepting to a Figure 1. TPP network and its payment process certain extent that non-payments occur and mitigate their impact afterwards. We see opportunities for The TPP network, as visualized in Figure 1, has its future research into optimizing the strategies, designing similarities with the card network.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us