E-Commerce 08


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

E-Commerce 08

  1. 1. Chapter 8 Electronic Payment Systems 1
  2. 2. LensDoc: Credit Card Dilemma LensDoc—online retailer of: Contact lenses Sun and magnifying glasses Dental care and personal care products Customers pay by credit card (90% of all online purchases in the U.S.) Easy to purchase Easy to purchase fraudulently Contact lenses cannot be returned once used, but unsatisfied customers want their money back 2
  3. 3. LensDoc: Credit Card Dilemma (cont.) Solutions: Process credit card purchases by hand Require: Home address Shipping address Investigating alternative methods of payment Cash cards Special card-swiping peripherals Credit card processing services Currently disadvantages outweigh advantages of any of these alternatives 3
  4. 4. Electronic Payments: An Overview E-payment methods Credit cards Electronic funds transfer (EFT) E-payments Smart cards Digital cash and script Digital checks E-billing All have the ability to transfer payment from one person or party to another 4
  5. 5. Electronic Payments: An Overview (cont.) Four parts involved in epayments Issuer Customer/payer/buyer Merchant/payee/seller Regulator Key issue of trust must be addressed Privacy Authentication and authorization Integrity Nonrepudiation 5
  6. 6. Electronic Payments: An Overview (cont.) Crucial factors in determining which method of e-payment achieves widespread acceptance Independence Interoperability and portability Security Anonymity Divisibility Ease of use Transaction fees 6
  7. 7. Security for E-Payments Public key infrastructure Plaintext Ciphertext Encryption algorithm Key Types of encryption systems Symmetric (private key) Used to encrypt and decrypt plain text Shared by sender and receiver of text Asymmetric (public key) Uses a pair of keys Public key to encrypt the message Private key to decrypt the message 7
  8. 8. Figure 8-2 Private Key Encryption 8
  9. 9. Public Key Encryption Size of key RSA algorithm Speed of Key Rijndael algorithm 9
  10. 10. Security for E-Payments (cont.) Digital Signatures: authenticity and nondenial Analogous to handwritten signature Based on public keys Used to: Authenticate the identity of the sender of a message or document Ensure the original content of the electronic message or document is unchanged Benefits: Portable Cannot be easily repudiated or imitated Can be time stamped 10
  11. 11. Figure 8-3 Digital Signatures 11
  12. 12. Security for E-Payments (cont.) Digital certificates Identifying the holder of a public key (Key-Exchange) Issued by a trusted certificate authority (CA) Name : “Richard” key-Exchange Key : Signature Key : Serial # : 29483756 Other Data : 10236283025273 Expires : 6/18/04 Signed : CA’s Signature 12
  13. 13. Security for E-Payments (cont.) Secure socket layer/transport layer security Secure socket layer (SLL)—handle on Web browser, utilizing CAs and data encryption Encryption Digital certificates Digital signatures In 1996 SSL was standardized and named transport layer security (TSL) Operates at TCP/IP layer (base layer for Internet) IPSec—secure version of IP protocol 13
  14. 14. SET Vs. SSL Secure Socket Layer (SSL) Secure Electronic Transaction (SET) Complex SET—tailored to credit card payment to merchants SET protocol hides customer’s credit card information from merchants and order information to banks, to protect privacy (dual signature) Simple SSL—protocol for general-purpose secure message exchanges (encryption) SSL protocol may use a certificate, but there is no payment gateway. Merchants need to receive ordering information and credit card information (capturing process initiated by merchants) 14
  15. 15. E-Cards Three common types of payment cards Credit cards—provides holder with credit to make purchases up to a limit fixed by the card issuer Charge cards—balance on a charge card is supposed to be paid in full upon receipt of monthly statement Debit card—cost of a purchase drawn directly from holder’s checking account (demanddeposit account) 15
  16. 16. E-Cards (cont.) The Players Cardholder Merchant (seller) Issuer (your bank) Acquirer (merchant’s financial institution, acquires the sales slips) Card association (VISA, MasterCard) Third-party processors (outsourcers performing same duties formerly provided by issuers, etc.) 16
  17. 17. Figure 8-4 Online Credit Card Processing Source: The E-Commerce Book: Building the E-Empire by S. Korper and J. Ellis, copyright © 2000 by Academic Press, reproduced by permission of the publisher. 17
  18. 18. E-Cards (cont.) E-wallets One-click shopping—saving your order information on retailer’s Web server Name Shipping address Billing address Credit card information E-wallet—software downloaded to cardholder’s desktop that stores same information and allows one-click-like shopping 18
  19. 19. E-Cards (cont.) Other security risks with credit cards Stolen cards Reneging by the customer—authorizes a payment and later denies it Theft of card details stored on merchant’s computer—isolate computer storing information so it cannot be accessed directly from the Web Overcoming risks with virtual credit cards 19
  20. 20. E-Cards (cont.) Purchase cards Instrument of choice for B2B purchasing Special-purpose, non-revolving payment cards issued to employees solely for purchasing and paying for nonstrategic materials and services 20
  21. 21. E-Cards (cont.) Purchase cards—operate like other credit cards Cardholder of corporation places an order for goods or services Supplier processes transaction with authorization of card issuer Issuer verifies purchase authorization All cardholders’ transactions processed centrally—one payment for all purchases Each cardholder reviews monthly statement Card issuer analyzes transactions—standard and ad hoc reports are made Card issuer creates electronic file to upload to corporation’s ledger system 21
  22. 22. E-Cards (cont.) Benefits of purchasing cards Cost savings Productivity gains Bill consolidation Payment reconciliation Preferred pricing Management reports 22
  23. 23. E-Cards (cont.) Smart Cards Integrated circuit (IC) microprocessor cards— includes IC chips with programmable functions that make cards “smart” Integrated circuit (IC) memory cards—no processor Suitable for uses where card performs fixed operation Disposable, prepaid (phone cards) 23
  24. 24. E-Cards (cont.) Optical memory cards Stores 4MB of data; once written, data cannot be changed or removed Ideal for keeping records (medical files) Require expensive card readers Categorize smart cards by how they store data Contact card—insert in smart card reader Contactless card—embedded antenna read by another antenna (mass-transit applications) 24
  25. 25. Contactless IC Cards Proximity Card Used to access buildings and pay for buses and other transportation systems Bus, subway and toll card in many cities Amplified Remote Sensing Card Good for a range of up to 100 feet, and can be used for tolling moving vehicles at gates Pay toll without stopping (e.g. Highway 91 in California) 25
  26. 26. Figure 8-5 Smart Card Image Embedded chip Source: Visa. 26
  27. 27. E-Cards (cont.) Important applications of smart card use: Loyalty Financial Information technology Health and social welfare Transportation Identification 27
  28. 28. E-Cash and Payment Card Alternatives E-cash and credit card alternatives (for micropayments—under $10) E-cash (eCoin.net) Identity of user hidden from merchant Easier to use than earlier e-cash systems Requires specialized software Qpass (Qpass.com) Set up Qpass account User name and password What credit card to charge 28
  29. 29. E-Cash and Payment Card Alternatives (cont.) PrivateBuy User establishes account User assigned 16-digit user number (anonymous address) Hides user name and card number from merchant site Relies on credit card system already in place 29
  30. 30. E-Cash and Payment Card Alternatives (cont.) Echarge enables users to: Establish accounts Receive user ID and password Use instead of credit card numbers Purchases billed to user’s credit card Merchants must establish payment option 30
  31. 31. E-Cash and Payment Card Alternatives (cont.) Stores cash downloaded from bank or credit card account Common uses Disposable vs. reloadable cards Sample cards Visa cash Mondex Electronic purses Lack of interoperable equipment and standards Common Electronic Purse Specification 31
  32. 32. E-Cash and Payment Card Alternatives (cont.) E-loyalty and rewards programs Loyalty programs online Beenz.com Consumer earns beenz by visiting, registering, or purchasing at 300 participating sites Beenz are stored and used for later purchases Partnered with MasterCard to offer rewardzcard—stored-value card used in U.S. and Canada for purchases where MasterCard is accepted Transfer beenz into money to spend on Web, by phone, mail order, physical stores 32
  33. 33. E-Cash and Payment Card Alternatives (cont.) MyPoints-CyberGold Customers earn cash Cash used for later purchases or applied to credit card account RocketCash Combines online cash account with rewards program User opens account and adds funds Used to make purchases at participating merchants 33
  34. 34. E-Cash and Payment Card Alternatives (cont.) Person-to-person (P2P) payments and gifts Enable transfer of funds between two individuals Repaying money borrowed Paying for an item purchased at online auction Sending money to students at college Sending a gift to a family member 34
  35. 35. Figure 8-7 Sending money with PayPal Source: paypal.com. 35
  36. 36. E-Checking Electronic checkbook Counterpart of electronic wallet To be integrated with the accounting information system of business buyers and with the payment server of sellers To save the electronic invoice and receipt of payment in the buyers and sellers computers for future retrieval Example : SafeCheck Used mainly in B2B 36
  37. 37. E-Checking (cont.) Current checking system Role of clearinghouses in the check-clearing process Magnetic ink characters (MICR) Costs of the current system Electronic version of paper check Leverage check payment systems Fit within current business practices, eliminate need for process reengineering Work like paper check with fewer manual steps 37
  38. 38. E-Checking (cont.) Designed to meet needs of businesses and consumers (state of the art security systems) Used by all bank customers with checking accounts Enhance existing bank accounts with new EC features Benefits of e-checking for industry-wide savings Online check collection process Online notices of check returns Truncating paper checks at bank of first deposit Creating new cash management product opportunities 38
  39. 39. E-Checking (cont.) Truncating paper checks at bank of first deposit Creating new cash management product opportunities Checkfree (checkfree.com) leading third-party e-billing vendor 39
  40. 40. E-Checking (cont.) Treasury Department expects e-checks to: Enhance security through use of public key cryptography “Push” a payment to the payee and not “pull” funds from general account of the U.S. Leverage Internet for its strength as ubiquitous communication vehicle Increase payment choices for U.S. Treasury payees 40
  41. 41. E-Billing Customers are either individuals or companies Two common models of e-billing Biller direct—customer receives bill from a single merchant Third-party consolidators—presents bills from multiple merchants 41
  42. 42. Managerial Issues In the B2C world, understand your customers and products In the B2B world, keep an open mind about online alternatives In-house or outsource Security continues to be a major issue 42