وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
00:00
00:00

Introduction to Payment Dispute Resolution

سرفصل های دوره

The basics of dispute resolution in payments, in both theory and practice


1 - Introduction
  • 1 - 01-Course-Introduction.pdf
  • 1 - Introduction
  • 2 - 02.Dispute-Considerations.pdf
  • 2 - Dispute Considerations

  • 2 - ADR Approaches
  • 3 - 03.ADR-Approaches-01.Introduction.pdf
  • 3 - Module Intro
  • 4 - 03.ADR-Approaches-02.Negotiation.pdf
  • 4 - Negotiation
  • 5 - 03.ADR-Approaches-03.Mediation.pdf
  • 5 - Mediation
  • 6 - 03.ADR-Approaches-04.Arbitration.pdf
  • 6 - Arbitration
  • 7 - 03.ADR-Approaches-05.Module-Outro.pdf
  • 7 - Module Outro

  • 3 - ODR Online Dispute Resolution
  • 8 - 04.ODR-01.Introduction.pdf
  • 8 - Module Intro
  • 9 - 04.ODR-02.Context-and-Principles.pdf
  • 9 - Context and Principles
  • 10 - 04.ODR-03.Steps-and-Categories.pdf
  • 10 - Steps and Categories
  • 11 - 04.ODR-04.Implementations-and-Case-Studies.pdf
  • 11 - Implementation and Case Studies
  • 12 - 04.ODR-05.Outro.pdf
  • 12 - Module Outro

  • 4 - In Merchant Banking
  • 13 - 05.In-Merchant-Banking-01.Introduction.pdf
  • 13 - Module Intro
  • 14 - 05.In-Merchant-Banking-02.General-Guidelines.pdf
  • 14 - General Guidelines
  • 15 - 05.In-Merchant-Banking-03.Disputes-By-Payment-System.pdf
  • 15 - Disputes by Payment System
  • 16 - 05.In-Merchant-Banking-04.Dispute-Lifecycle.pdf
  • 16 - Dispute Lifecycle
  • 17 - 05.In-Merchant-Banking-05.Scheme-Involvement.pdf
  • 17 - Scheme Involvement
  • 18 - 05.In-Merchant-Banking-06.Outro.pdf
  • 18 - Module Outro

  • 5 - Chargeback Reason Codes
  • 19 - 07.Chargeback-Reason-Codes-01-Introduction.pdf
  • 19 - Module Intro
  • 20 - 07.Chargeback-Reason-Codes-02-Fraud-01.Introduction.pdf
  • 20 - Fraud Introduction
  • 21 - 07.Chargeback-Reason-Codes-02-Fraud-02-Not-Authorized-Recognised.pdf
  • 21 - Fraud Not AuthorisedRecognised
  • 22 - 07.Chargeback-Reason-Codes-02-Fraud-04-Fraudulent-Processing.pdf
  • 22 - Fraud Fraudulent Processing
  • 23 - 07.Chargeback-Reason-Codes-02-Fraud-04-Fraudulent-Processing.pdf
  • 23 - Fraud Monitored Merchant or Card
  • 24 - 07.Chargeback-Reason-Codes-02-Fraud-05-EMV-Liability-Shift.pdf
  • 24 - Fraud EMV Liability Shift
  • 25 - 07.Chargeback-Reason-Codes-03-Authorization-01.Introduction.pdf
  • 25 - Authorization Introduction
  • 26 - 07.Chargeback-Reason-Codes-03-Authorization-02.Missing-Declined-Authorization.pdf
  • 26 - Authorization MissingDeclined Authorization
  • 27 - 07.Chargeback-Reason-Codes-03-Authorization-03.Card-in-Recovery-Lost-Stolen.pdf
  • 27 - Authorization Card in RecoveryLostStolen
  • 28 - 07.Chargeback-Reason-Codes-03-Authorization-04.Invalid-Information.pdf
  • 28 - Authorization Invalid Information
  • 29 - 07.Chargeback-Reason-Codes-04-Processing-Errors-01.Introduction.pdf
  • 29 - Processing Errors Introduction
  • 30 - 07.Chargeback-Reason-Codes-04-Processing-Errors-02.Invalid-Code-or-Data.pdf
  • 30 - Processing Errors Invalid Code or Data
  • 31 - 07.Chargeback-Reason-Codes-04-Processing-Errors-03.Invalid-Amount-Account.pdf
  • 31 - Processing Errors Invalid AmountAccount
  • 32 - 07.Chargeback-Reason-Codes-04-Processing-Errors-04.Duplicate-Other-Payment.pdf
  • 32 - Processing Errors DuplicateOther Payment
  • 33 - 07.Chargeback-Reason-Codes-04-Processing-Errors-05.Currency-Mismatches.pdf
  • 33 - Processing Errors Currency Mismatches
  • 34 - 07.Chargeback-Reason-Codes-04-Processing-Errors-06.Late-Presentment.pdf
  • 34 - Processing Errors Late Presentment
  • 35 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-01.Introduction.pdf
  • 35 - Consumer Disputes Introduction
  • 36 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-02.Mismatch-of-Goods.pdf
  • 36 - Consumer Disputes Mismatch of Goods
  • 37 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-03.Canceled-Not-Completed-Transaction.pdf
  • 37 - Consumer Disputes CancelledNot Completed Transaction
  • 38 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-04.Credit-Not-Processed.pdf
  • 38 - Consumer Disputes Credit Not Processed
  • 39 - 07.Chargeback-Reason-Codes-06-Outro.pdf
  • 39 - Module Outro

  • 6 - Conclusion
  • 40 - 08.Course-Outro.pdf
  • 40 - All-Slides-Intro-to-Dispute-Resolution.pdf
  • 40 - Outro

  • 7 - Additional Module Security Controls
  • 41 - Intro
  • 42 - Acquisition Strategy
  • 42 - Security-Controls-Acquisition-Strategy.pdf
  • 43 - Code Analysis
  • 43 - Security-Controls-Code-Analysis.pdf
  • 44 - Code Signing
  • 44 - Security-Controls-Code-Signing.pdf
  • 45 - Controls by Data Classification
  • 45 - Security-Controls-Controls-By-Data-Classification.pdf
  • 46 - Criticality Analysis
  • 46 - Security-Controls-Criticality-Analysis.pdf
  • 47 - Cyber Threat Hunting
  • 48 - Cryptographic Protection
  • 48 - Security-Controls-Cryptographic-Protection.pdf
  • 49 - Data DeIdentification and Anonymisation
  • 49 - Security-Controls-Data-De-Identification-Anonymisation.pdf
  • 50 - Data Governance Structures
  • 50 - Security-Controls-Data-Governance-Structures.pdf
  • 51 - Data Purpose and Authority
  • 51 - Security-Controls-Data-Usage-Purpose-Authority.pdf
  • 52 - Data Retention and Disposal
  • 52 - Security-Controls-Data-Retention-Disposal.pdf
  • 53 - DefenseInDepth
  • 53 - Security-Controls-Defense-In-Depth-DID.pdf
  • 54 - Information Tainting
  • 54 - Security-Controls-Information-Tainting.pdf
  • 55 - Locked RoomsDevicesPorts
  • 55 - Security-Controls-Locked-Rooms-Devices-Ports.pdf
  • 56 - Media DowngradingRedacting
  • 56 - Security-Controls-Media-Downgrading-Redacting.pdf
  • 57 - Physical Media Protection
  • 57 - Security-Controls-Physical-Media-Protection.pdf
  • 58 - Provider Assessment and Monitoring
  • 58 - Security-Controls-Provider-Assessment-Monitoring.pdf
  • 59 - SecurityPrivacy Architectures
  • 59 - Security-Controls-Security-Privacy-Architectures.pdf
  • 60 - Security-Controls-System-Safe-Modes.pdf
  • 60 - System Safe Modes
  • 61 - Security-Controls-Thin-Diskless-Devices.pdf
  • 61 - ThinDiskless Devices
  • 62 - Security-Controls-Usage-Agreements.pdf
  • 62 - Usage Agreements
  • 63 - Security-Controls-Visitor-Controls.pdf
  • 63 - Visitor Controls
  • 64 - Outro

  • 8 - Additional Module Pitching Technical Projects
  • 65 - 01-Module-Intro.pdf
  • 65 - Introduction
  • 66 - 02-Assembling-01-Intro.pdf
  • 66 - Assembling Introduction
  • 67 - 02-Assembling-02-Actions-and-Implementation.pdf
  • 67 - Assembling Actions and Implementations
  • 68 - 02-Assembling-03-Roles-and-Responsibilities.pdf
  • 68 - Assembling Roles and Responsibilities
  • 69 - 02-Assembling-04-Scope-Framework-Roadmap.pdf
  • 69 - Assembling Scope Framework Roadmap
  • 70 - 02-Assembling-05-Governance-Structures.pdf
  • 70 - Assembling Governance Structures
  • 71 - 02-Assembling-06-Trackable-Metrics.pdf
  • 71 - Assembling Trackable Metrics
  • 72 - 03-Presenting-01-Intro.pdf
  • 72 - Presenting Introduction
  • 73 - 03-Presenting-02-Recency-and-Primacy.pdf
  • 73 - Presenting Recency and Primacy
  • 74 - 03-Presenting-03-Leveraging-Specifics.pdf
  • 74 - Presenting Leveraging Specifics
  • 75 - 03-Presenting-04-Displayed-Authority.pdf
  • 75 - Presenting Displayed Authority
  • 76 - 03-Presenting-05-The-Heros-Journey.pdf
  • 76 - Presenting The Heros Journey
  • 77 - 03-Presenting-06-Tiredness-and-Distraction.pdf
  • 77 - Presenting Tiredness and Distraction
  • 78 - 04-Dealing-with-Objections-01-Intro.pdf
  • 78 - Dealing with Objections Introduction
  • 79 - 04-Dealing-with-Objections-02-Flipping-and-Diagnosing.pdf
  • 79 - Dealing with Objections Flipping and Diagnosing
  • 80 - 04-Dealing-with-Objections-03-UP-Answers.pdf
  • 80 - Dealing with Objections UP Answers
  • 81 - 04-Dealing-with-Objections-04-Progress-and-Loss.pdf
  • 81 - Dealing with Objections Progress and Loss
  • 82 - 04-Dealing-with-Objections-05-Political-Capital.pdf
  • 82 - Dealing with Objections Political Capital
  • 83 - 05-Securing-Buy-In-01-Intro.pdf
  • 83 - Securing BuyIn Introduction
  • 84 - 05-Securing-Buy-In-02-Implementation-and-Opinions.pdf
  • 84 - Securing BuyIn Implementation and Opinions
  • 85 - 05-Securing-Buy-In-03-Tailored-Benefits.pdf
  • 85 - Securing BuyIn Tailored Benefits
  • 86 - 05-Securing-Buy-In-04-Effort-Shaping.pdf
  • 86 - Securing BuyIn Effort Shaping
  • 87 - 05-Securing-Buy-In-05-Future-Lock-In.pdf
  • 87 - Securing BuyIn Future LockIn
  • 88 - 06-Full-Run-Throughs-01-Intro.pdf
  • 88 - Full Runthroughs Introduction
  • 89 - 06-Full-Run-Throughs-02-Pitching-PCI-DSS.pdf
  • 89 - Full Runthroughs Pitching PCIDSS
  • 90 - 06-Full-Run-Throughs-03-Pitching-Vendor-Assessments.pdf
  • 90 - Full Runthroughs Pitching Vendor Assessments
  • 91 - 06-Full-Run-Throughs-05-Pitching-Data-Governance.pdf
  • 91 - Full Runthroughs Pitching Data Governance
  • 92 - 06-Full-Run-Throughs-04-Pitching-Data-Management.pdf
  • 92 - Full Runthroughs Pitching Data Management
  • 93 - 07-Module-Outro.pdf
  • 93 - Outro

  • 9 - Bonus Lecture
  • 94 - Bonus Lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 170
    حجم: 4995 مگابایت
    مدت زمان: 538 دقیقه
    تاریخ انتشار: ۲۲ دی ۱۴۰۱
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید