SlideShare a Scribd company logo
1 of 40
Payment Systems
for Electronic
Commerce
CHAPTER 11
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
.
Learning Objectives
In this chapter, you will learn:
• What the most common online payment systems are
and how they function
• How payment cards are used in online retail
transactions
• What stored-value cards are and how they are used
in electronic commerce
• What challenges and opportunities are presented by
the use of digital cash
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 22
Learning Objectives
• How digital wallets facilitate online transactions
through computers and mobile devices
• How the banking industry uses Internet technologies
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 33
Introduction
• Financial technology (fintech) is the use of powerful
Internet-connected computers that use tools to
improve quality and reduce cost of services
– Existing and entirely new financial products
– Includes online payment system not operated by banks
• Facilitates purchases and other money transfers
• Convenient and becoming widely adopted
– Has also revolutionized lending
• Online loan services takes banks out of value chain at a
reduced cost
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
4
Common Online Payment Methods
• Cash, checks, credit cards, debit cards are the most
common world methods used to pay for purchases
– More than 90% of all US consumer payments
• Electronic transfer is a small percentage
– Mostly automated payments from checking accounts
• Credit and debit cards used for more than 60% of
online payments with alternative systems such as
PayPal used for the remainder
– Convenient for customers and cost effective for
businesses and provides a significant environmental
impact
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 5
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 6
FIGURE 11-1 Forms of payment for U.S. online transactions, estimates for 2018
Electronic Bill Presentment and Payment
Systems
• Designed to deliver bills and accept payments
– Success depends on ease of use and time required
• Consumers choosing this option is increasing
– 70% of bills paid by check are now paid electronically
which is a huge savings in paper, postage and time
• Biller-direct systems are used by large companies
who want to manage the systems themselves
• Consolidator systems aggregate all a customer’s
bills on one system mostly via banks
– Not as attractive to billers because it requires a fee
and delays receipt of funds
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 7
Micropayments and Small Payments
• Micropayments are Internet payments for items
costing few cents to a dollar
– Barrier is people prefer to buy small value items in
fixed price chunks rather than small payments in
varying amounts
– Many companies have developed micropayment
systems but none gained broad acceptance
• Small payments are payments of less than $10
– Offered through mobile telephone carrier but held
back by substantial charges for providing service
• One of the largest markets is music downloads
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 8
Payment Cards
• Payment cards are plastic cards used for purchases
– Categories: credit cards, debit cards, charge cards,
prepaid cards, and gift cards
• Credit cards (Visa, MasterCard) have a spending limit
based on user’s credit history
– Pay off entire credit card balance or minimum amount
with interest charged on unpaid balances
– Widely accepted and provides consumer protection: 30-
day dispute period
– Card not present transactions include an extra degree
of risk for merchant and bank
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
9
Payment Cards (cont’d.)
• Debit card (electronic funds transfer at point of sale
(EFTPOS) cards) removes funds from cardholder’s
bank account and transfers it to seller’s account
– Issued by bank with major credit card issuer's name
• Charge card (American Express) has no spending
limit with entire amount due at end of billing period
• Retailers may offer their own store charge cards
• Prepaid cards are called gift cards
• Single-use cards had disposable numbers, valid for
one transaction, but not adopted by consumers
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 10
Advantages and Disadvantages of Payment
Cards
• Advantage for merchants include fraud protection
– Can authenticate and authorize purchases using a
payment card processing network
• Interchange network is a set of connections between
banks and associations owning credit cards
• Advantage for U.S. consumers is limited fraud
liability of $50 which is often waived if card is stolen
• Merchants view the per-transaction and monthly
processing fees as a cost of doing business
• Consumers pay a slightly higher cost for goods due
to these cards and some charge an annual fee
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 11
Payment Acceptance and Processing
• US online and mail order stores must ship
merchandise within 30 days of charging payment
– Significant violation penalties so most stores charge
account when order shipped
• Processing payment card transactions online is a
two step process
– Payment acceptance is establishing card validity and
verifying card’s limit not exceeded by transaction
– Clearing the transaction includes all steps to move
funds from card holder’s bank account into the
merchant’s bank account
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 12
Open and Closed Loop Systems
• With a closed loop system the card issuer pays
merchant directly without a bank or clearinghouse
– American Express, Discover Card
– Issue cards directly to consumers
• Open loop systems add additional payment
processing intermediaries to the closed loop system
– Visa, MasterCard issued by local bank
– Visa and MasterCard are credit card associations
operated by customer issuing banks who evaluate
credit standing, establish credit limits and absorb non-
payment losses
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
13
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 14
FIGURE 11-2 Closed loop payment card system
©CengageLearning2017
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 15
FIGURE 11-3 Open loop payment card system
©CengageLearning2017
Merchant Accounts
• Acquiring bank does business with sellers that want
to accept payment cards
– Business must set up a merchant account with
acquiring bank to process Internet transactions
• One type similar to a checking account with bank
collecting accounts net of processing fees
• Commonly account acts like a credit line where the
acquiring bank makes a non-interest bearing loan in the
amount of daily net receipts, reduced by collections
• Obtaining account requires merchant to provide
business information and the bank to assess risk
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 16
Merchant Accounts (cont’d.)
• Chargeback occurs when cardholder successfully
contests charge
– Acquiring bank must retrieve money from merchant
account which may have funds on deposit
• Acquirer fees are charges for providing payment
card processing service
– Per month and transaction, set by the acquiring bank
• Interchange fees are charged at rates that depend
on the merchant’s industry
– Set by card association, charged to acquiring bank
and usually passed along to merchant
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 17
18
Merchant Accounts (cont’d.)
• Level of fraud is higher online
– Under 15% of all credit card transactions responsible
for 64% percent of total dollar amount of credit card
fraud (declining since 2008)
• Antifraud measures include
– Scoring services that provide risk ratings for individual
transactions in real time
– Shipping only to card billing address and requiring
card card verification numbers (CVNs) for card not
present transactions
• Three- or four-digit number printed on the credit card
but not encoded on the card’s magnetic strip
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 18
Payment Card Transaction Processing
• Most online merchants accept both closed loop and
open loop system cards and some accept direct
deductions from customers’ checking accounts
– Automated Clearing House (ACH) is a network of
banks involved in direct deduction transactions
• Processing depends on size of business
– Large build and manage their own systems
– Mid-size use purchased software with skilled staff to
manage system
– Small rely on service payment processing service
providers
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 19
Payment Card Transaction Processing
(cont’d.)
• Front-end processor (payment gateway) obtains and
stores transaction authorization
• Back-end processor takes front-end processor
transactions and coordinates information flows
– Handles chargebacks, other reconciliation items
through the interchange network and acquiring and
issuing banks, including ACH transfers
• Some processors handle all elements of payment
processing and others specialize in one element or
a particular industry
– Known company provides level of comfort to buyers
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 20
Stored-Value Cards
• Plastic card with embedded microchip that can store
information and perform calculations
– Most incorporate near field communication (NFC)
technology which allows for contactless data
transmissions over short distances
• Allows interacts with readers and other devices
• Can hold much more data than a magnetic card
– Safer because data can be encrypted
• Used in Europe and Asia but less successful in U.S.
– U.S. use has increased in recent years but still not
widespread
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 21
Digital Cash
• Also called electronic cash or e-cash
• Describes any value storage and exchange system
created by private (nongovernmental) entity
– Does not use paper documents or coins
– Can serve as substitute for government-issued
physical currency
– No common standard adopted so far
– None adopted so far
• Can be held in online storage or offline storage
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 22
Digital Cash (cont’d.)
• With online cash storage consumer has no personal
possession of digital cash
– Trusted third party (online bank) involved in all
transfers, holds consumers’ cash accounts
– Merchant contacts consumer’s bank for payment
– Helps prevent fraud (confirm valid cash)
• Fills a need in developing countries that rely on cash
as they conduct B2C electronic commerce
– Need does not exist here because U.S. consumers
already have payment cards
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 23
Digital Cash (cont’d.)
• Bitcoin is the most well-known provider today
– Online ledger book that tracks balances while
participants remain anonymous
– Public-key cryptography is used (cryptocurrency)
– Large percentage of uses involve illegal purchases and
currency speculation
• Concerns include privacy and security, independence,
portability, convenience
– Must be impossible to spend more than once, easy to
use and not traceable to the person who spent it
• Anonymous digital cash
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 24
The Double-Spending Issue
• Spending electronic cash twice by submitting the
same electronic currency to two different vendors
– Not enough time to prevent fraudulent act
– Main deterrent is threat of detection and prosecution
so system must provide traceability back to origin
• Two-part lock provides anonymous security and
signals an attempt to double-spend cash
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 25
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 26
FIGURE 11-4 Detecting double spending of electronic cash
©CengageLearning2017
Advantages and Disadvantages of Digital
Cash
• Can be more efficient (less costly) than traditional
payment methods
– Less than processing credit card transactions or
conventional money exchange systems
– Does not require authorization
• No audit trail (similar to physical cash) makes it non-
traceable which can lead to money laundering
– Convert illegally-obtained money into money
spendable without being linked to illegal activity
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 27
Digital Wallets and Software-Based Digital
Wallets
• Allows customer to store name, address, credit card
information on an electronic device or software
– Benefit is customer enters information just once
• Server-side digital wallet stores information on remote
server of merchant or wallet publisher
– Security breach can reveal thousands of users’
personal information to unauthorized parties
• Google Wallet, Microsoft Windows Live ID, Yahoo! Wallet
• Client-side digital wallet stores information on
consumers computers
– Must download wallet software onto every computer
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 28
Hardware-Based Digital Wallets
• Implemented using smart phones or tablets
• Store owner’s identity credentials (driver’s license,
medical insurance card, store loyalty cards, etc.)
• Transmit portions of information using Bluetooth or
wireless transmission to nearby terminal
• Near field communication (NFC) technology can be
used if equipped with NFC chip
• Google Wallet, Android Pay and Apple Pay
• Security and privacy are major concerns
– Must prevent unauthorized access
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 29
Internet Technologies and the Banking
Industry
• Paper checks still the largest dollar volume of
payments in the word today
– Processed through world’s banking system
• Other major payment forms also involve banks
• Internet technologies are providing new tools and
creating new threats for the banking industry
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 30
Check Processing
• Old method of physical check processing
– Person wrote check which was deposited by retailer
and sent to clearinghouse to manage funds transfer
– Paper check transported to consumer’s bank and
cancelled check sent to consumer
– Disadvantages include transportation cost and float
• Delay between time check is written and clears
• Check Clearing for the 21st Century Act (Check 21)
permits bank to eliminate movement of physical
checks and use image scanning technology
– Instant check clearing eliminates float
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 31
32
Mobile Banking
• Banks exploring mobile commerce potential
• Most banks offer apps for mobile devices
– Check and transfer balances between accounts
– View statements
– Find an ATM
• Some bank apps allow checks to be deposited by
taking a picture
• Vendors such as GoPayment and Square offer a
tiny credit card reader that can be attached to a
mobile device to take payments
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 32
33
Payment System Threats: Phishing and
Identity Theft
• Online payment systems offer attractive arena for
criminals and criminal enterprises
• Phishing attacks are techniques for committing fraud
against online businesses customers
– Particular concern to financial institutions
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 33
Phishing Attacks
• Attacker sends e-mail message to accounts with
potential for an account at targeted Web site
– E-mail message tells recipient account compromised
and recipient must log in to correct problem
• Includes link that appears to be Web site login page
• Actually leads to perpetrator’s site so that victim’s log in
information can be captured and used
• Spear phishing is a carefully designed phishing
attack targeting a particular person or organization
– Requires considerable research which increases
change of e-mail being opened
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 34
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 35
FIGURE 11-5
Phishing e-mail
message
©CengageLearning2017
Phishing Attacks (cont’d.)
• Example: 2008 government stimulus checks
– Phishing e-mails that seemed to be from the IRS
appeared within one week of passage
• E-mail link disguise the real URL by using “@” which
causes the Web site to ignore characters before it
– https://www.paypal.com@218.36.41.188/fl/login.html
– Phony site invisible due to JavaScript code
• Pop-up windows look exactly like browser address
bar including Web site graphics to make it even
more convincing
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 36
Using Phishing Attacks for Identity Theft
• Organized crime (racketeering) is unlawful activities
conducted by highly organized, disciplined
association for profit
– Differentiated from less-organized groups
– Internet providing new criminal activity opportunities
• Generates spam, phishing, identity theft
• Identity theft is a criminal act where perpetrator
gathers victim’s personal information
– Goal is to obtain credit
– Perpetrator runs up account charges and disappears
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 37
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 38
FIGURE 11-6 Types of personal information most useful to identity thieves
©CengageLearning2017
Using Phishing Attacks for Identity Theft
(cont’d.)
• Large criminal organizations can be highly efficient
perpetrators of identity theft
• Zombie farm is a large number of computers
implanted with zombie programs
– Pharming attack is the use of a zombie farm, often by
organized crime, to launch a massive phishing attack
• Phishing needs both collectors and cashers (users)
of information which requires different skills
– Crime organizations increase efficiency and volume
by facilitating and participating in these transactions
– Over a million victims and $1.5 billion lost annually
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 39
Phishing Attack Countermeasures
• Spam is a key element of phishing attacks
– Any protocol changes that improve e-mail recipients’
ability to identify message source reduces phishing
• Educate Web site users
• Contract with consulting firms specializing in
anti-phishing work
– Monitor online chat rooms used by criminals
• Incidence of phishing has grown rapidly over the
past two years and experts expect it will continue
– Extremely profitable criminal activity
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
40

More Related Content

What's hot

BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8Janice Robinson
 
BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10Janice Robinson
 
BSAD 372 SPRING 2017 CH 5
BSAD 372 SPRING 2017 CH 5BSAD 372 SPRING 2017 CH 5
BSAD 372 SPRING 2017 CH 5Janice Robinson
 
Webinar: Software Adoption Crash Course for Customer Education Leaders
Webinar: Software Adoption Crash Course for Customer Education LeadersWebinar: Software Adoption Crash Course for Customer Education Leaders
Webinar: Software Adoption Crash Course for Customer Education LeadersServiceRocket
 
BC Open Textbook Project
BC Open Textbook ProjectBC Open Textbook Project
BC Open Textbook ProjectAmanda Coolidge
 
Massively Mobile Online Skill Training Platform
Massively Mobile Online Skill Training PlatformMassively Mobile Online Skill Training Platform
Massively Mobile Online Skill Training PlatformRajib Chowdhury
 
Successful eLearning Implementation
Successful eLearning ImplementationSuccessful eLearning Implementation
Successful eLearning ImplementationLearningSO
 
Education Tech market & trends
Education Tech market & trendsEducation Tech market & trends
Education Tech market & trendsZhongjie Wu
 
The Death Of Traditional Training
The Death Of Traditional TrainingThe Death Of Traditional Training
The Death Of Traditional TrainingMarkEdge
 
Using Social Software to Make Blended Learning a Success
Using Social Software to Make Blended Learning a Success Using Social Software to Make Blended Learning a Success
Using Social Software to Make Blended Learning a Success Brandon Williams
 
ManagedHosting_HiRes
ManagedHosting_HiResManagedHosting_HiRes
ManagedHosting_HiResHarry Choi
 
UC12 Thursday Keynote
UC12 Thursday KeynoteUC12 Thursday Keynote
UC12 Thursday KeynoteWhippleHill
 
Carlsbad USD’s Chromebook Journey
Carlsbad USD’s Chromebook JourneyCarlsbad USD’s Chromebook Journey
Carlsbad USD’s Chromebook JourneyJulie Evans
 
The Joy of Learning Transformation
The Joy of Learning TransformationThe Joy of Learning Transformation
The Joy of Learning TransformationBrightwave Group
 

What's hot (20)

BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8
 
BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10
 
BSAD 372 SPRING 2017 CH 5
BSAD 372 SPRING 2017 CH 5BSAD 372 SPRING 2017 CH 5
BSAD 372 SPRING 2017 CH 5
 
Ebecm17
Ebecm17Ebecm17
Ebecm17
 
UltraLearn
UltraLearnUltraLearn
UltraLearn
 
Webinar: Software Adoption Crash Course for Customer Education Leaders
Webinar: Software Adoption Crash Course for Customer Education LeadersWebinar: Software Adoption Crash Course for Customer Education Leaders
Webinar: Software Adoption Crash Course for Customer Education Leaders
 
Presentation to TRU-OL
Presentation to TRU-OLPresentation to TRU-OL
Presentation to TRU-OL
 
BC Open Textbook Project
BC Open Textbook ProjectBC Open Textbook Project
BC Open Textbook Project
 
Massively Mobile Online Skill Training Platform
Massively Mobile Online Skill Training PlatformMassively Mobile Online Skill Training Platform
Massively Mobile Online Skill Training Platform
 
Successful eLearning Implementation
Successful eLearning ImplementationSuccessful eLearning Implementation
Successful eLearning Implementation
 
Internet Marketing Plan
Internet Marketing PlanInternet Marketing Plan
Internet Marketing Plan
 
Education Tech market & trends
Education Tech market & trendsEducation Tech market & trends
Education Tech market & trends
 
The Death Of Traditional Training
The Death Of Traditional TrainingThe Death Of Traditional Training
The Death Of Traditional Training
 
Using Social Software to Make Blended Learning a Success
Using Social Software to Make Blended Learning a Success Using Social Software to Make Blended Learning a Success
Using Social Software to Make Blended Learning a Success
 
Techfour company profile
Techfour company profileTechfour company profile
Techfour company profile
 
ManagedHosting_HiRes
ManagedHosting_HiResManagedHosting_HiRes
ManagedHosting_HiRes
 
Latest trend in education content publishing
Latest trend in education content publishingLatest trend in education content publishing
Latest trend in education content publishing
 
UC12 Thursday Keynote
UC12 Thursday KeynoteUC12 Thursday Keynote
UC12 Thursday Keynote
 
Carlsbad USD’s Chromebook Journey
Carlsbad USD’s Chromebook JourneyCarlsbad USD’s Chromebook Journey
Carlsbad USD’s Chromebook Journey
 
The Joy of Learning Transformation
The Joy of Learning TransformationThe Joy of Learning Transformation
The Joy of Learning Transformation
 

Similar to BSAD 372 SPRING 2017 CH 11

Premium Ch 1 Ten Principles of Economics (1).pptx
Premium Ch 1 Ten Principles of Economics (1).pptxPremium Ch 1 Ten Principles of Economics (1).pptx
Premium Ch 1 Ten Principles of Economics (1).pptxAlokKumar77494
 
Premium Ch 1 Ten Principles of Economics.pptx
Premium Ch 1 Ten Principles of Economics.pptxPremium Ch 1 Ten Principles of Economics.pptx
Premium Ch 1 Ten Principles of Economics.pptxRicardoCortez74
 
Interactive Ch 16 The Monetary System 9e(1).pptx
Interactive Ch 16 The Monetary System 9e(1).pptxInteractive Ch 16 The Monetary System 9e(1).pptx
Interactive Ch 16 The Monetary System 9e(1).pptxMayaAwar1
 
Chapter 2 Ten Principles of Economics.pdf
Chapter 2  Ten Principles of Economics.pdfChapter 2  Ten Principles of Economics.pdf
Chapter 2 Ten Principles of Economics.pdfNazmulBhuiyan10
 
0Chapter 3Customer Relationship Management Strategies for Bu
0Chapter 3Customer Relationship Management Strategies for Bu0Chapter 3Customer Relationship Management Strategies for Bu
0Chapter 3Customer Relationship Management Strategies for BuVannaJoy20
 
Blackboard Transact Capabilities Brochure
Blackboard Transact Capabilities BrochureBlackboard Transact Capabilities Brochure
Blackboard Transact Capabilities Brochurekarenpasacreta
 
Ma ch 14 banking and the money supply (1)
Ma ch 14 banking and the money supply (1)Ma ch 14 banking and the money supply (1)
Ma ch 14 banking and the money supply (1)Uconn Stamford
 
Ma ch 14 banking and the money supply
Ma ch 14 banking and the money supplyMa ch 14 banking and the money supply
Ma ch 14 banking and the money supplyUconn Stamford
 
Lecture%206.pptx
Lecture%206.pptxLecture%206.pptx
Lecture%206.pptxTeyKaiyun
 
Review on Microeconomics - Part 1.pptx
Review on Microeconomics - Part 1.pptxReview on Microeconomics - Part 1.pptx
Review on Microeconomics - Part 1.pptxPhmNguynThyDung
 
Electronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docx
Electronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docxElectronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docx
Electronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docxgidmanmary
 
Credit card surcharging- who is going to do it and what are the stipulations ...
Credit card surcharging- who is going to do it and what are the stipulations ...Credit card surcharging- who is going to do it and what are the stipulations ...
Credit card surcharging- who is going to do it and what are the stipulations ...OnlineCompliance Panel
 
E market and sme strategy rashid
E market and sme strategy rashidE market and sme strategy rashid
E market and sme strategy rashidMd Rashid
 
Single View of the Customer - Digital Insurance in India
Single View of the Customer - Digital Insurance in IndiaSingle View of the Customer - Digital Insurance in India
Single View of the Customer - Digital Insurance in IndiaThe Digital Insurer
 
Bond pricing
Bond pricingBond pricing
Bond pricingTrustcore
 
0 chapter 2organizational buying behavior© 20
0 chapter 2organizational buying behavior© 200 chapter 2organizational buying behavior© 20
0 chapter 2organizational buying behavior© 20ssuserfa5723
 
Sheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docx
Sheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docxSheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docx
Sheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docxedgar6wallace88877
 
Paycard Comparison Vs Bank Paycards Flyer Mr
Paycard Comparison Vs Bank Paycards Flyer MrPaycard Comparison Vs Bank Paycards Flyer Mr
Paycard Comparison Vs Bank Paycards Flyer Mrmicreilly15
 
Investment Planning
Investment PlanningInvestment Planning
Investment PlanningTrustcore
 

Similar to BSAD 372 SPRING 2017 CH 11 (20)

Premium Ch 1 Ten Principles of Economics (1).pptx
Premium Ch 1 Ten Principles of Economics (1).pptxPremium Ch 1 Ten Principles of Economics (1).pptx
Premium Ch 1 Ten Principles of Economics (1).pptx
 
Premium Ch 1 Ten Principles of Economics.pptx
Premium Ch 1 Ten Principles of Economics.pptxPremium Ch 1 Ten Principles of Economics.pptx
Premium Ch 1 Ten Principles of Economics.pptx
 
Interactive Ch 16 The Monetary System 9e(1).pptx
Interactive Ch 16 The Monetary System 9e(1).pptxInteractive Ch 16 The Monetary System 9e(1).pptx
Interactive Ch 16 The Monetary System 9e(1).pptx
 
Chapter 2 Ten Principles of Economics.pdf
Chapter 2  Ten Principles of Economics.pdfChapter 2  Ten Principles of Economics.pdf
Chapter 2 Ten Principles of Economics.pdf
 
0Chapter 3Customer Relationship Management Strategies for Bu
0Chapter 3Customer Relationship Management Strategies for Bu0Chapter 3Customer Relationship Management Strategies for Bu
0Chapter 3Customer Relationship Management Strategies for Bu
 
Blackboard Transact Capabilities Brochure
Blackboard Transact Capabilities BrochureBlackboard Transact Capabilities Brochure
Blackboard Transact Capabilities Brochure
 
Ma ch 14 banking and the money supply (1)
Ma ch 14 banking and the money supply (1)Ma ch 14 banking and the money supply (1)
Ma ch 14 banking and the money supply (1)
 
Ma ch 14 banking and the money supply
Ma ch 14 banking and the money supplyMa ch 14 banking and the money supply
Ma ch 14 banking and the money supply
 
Lecture%206.pptx
Lecture%206.pptxLecture%206.pptx
Lecture%206.pptx
 
Review on Microeconomics - Part 1.pptx
Review on Microeconomics - Part 1.pptxReview on Microeconomics - Part 1.pptx
Review on Microeconomics - Part 1.pptx
 
Electronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docx
Electronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docxElectronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docx
Electronic CommerceSoftwareCHAPTER 9© 2017 Cengage Learnin.docx
 
Credit card surcharging- who is going to do it and what are the stipulations ...
Credit card surcharging- who is going to do it and what are the stipulations ...Credit card surcharging- who is going to do it and what are the stipulations ...
Credit card surcharging- who is going to do it and what are the stipulations ...
 
E market and sme strategy rashid
E market and sme strategy rashidE market and sme strategy rashid
E market and sme strategy rashid
 
Single View of the Customer - Digital Insurance in India
Single View of the Customer - Digital Insurance in IndiaSingle View of the Customer - Digital Insurance in India
Single View of the Customer - Digital Insurance in India
 
ITEC 1010
ITEC 1010ITEC 1010
ITEC 1010
 
Bond pricing
Bond pricingBond pricing
Bond pricing
 
0 chapter 2organizational buying behavior© 20
0 chapter 2organizational buying behavior© 200 chapter 2organizational buying behavior© 20
0 chapter 2organizational buying behavior© 20
 
Sheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docx
Sheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docxSheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docx
Sheet1ElementsElement NameGroup NameElement SymbolAtomic NumberAto.docx
 
Paycard Comparison Vs Bank Paycards Flyer Mr
Paycard Comparison Vs Bank Paycards Flyer MrPaycard Comparison Vs Bank Paycards Flyer Mr
Paycard Comparison Vs Bank Paycards Flyer Mr
 
Investment Planning
Investment PlanningInvestment Planning
Investment Planning
 

More from Janice Robinson (20)

Ch 2
Ch 2Ch 2
Ch 2
 
Ch 3
Ch 3Ch 3
Ch 3
 
Ch 4
Ch 4Ch 4
Ch 4
 
Ch 1
Ch 1Ch 1
Ch 1
 
Ch 5
Ch 5Ch 5
Ch 5
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 7
Ch 7Ch 7
Ch 7
 
Ch 8
Ch 8Ch 8
Ch 8
 
Grammarly Registration & Use Instructions
Grammarly Registration & Use InstructionsGrammarly Registration & Use Instructions
Grammarly Registration & Use Instructions
 
BSAD 372 - CH 10
BSAD 372 - CH 10BSAD 372 - CH 10
BSAD 372 - CH 10
 
BSAD 372 - CH 9
BSAD 372 - CH 9BSAD 372 - CH 9
BSAD 372 - CH 9
 
BSAD 372 - CH 8
BSAD 372 - CH 8BSAD 372 - CH 8
BSAD 372 - CH 8
 
BSAD 372 - CH 7
BSAD 372 - CH 7BSAD 372 - CH 7
BSAD 372 - CH 7
 
BSAD 372 - CH 6
BSAD 372 - CH 6BSAD 372 - CH 6
BSAD 372 - CH 6
 
BSAD 372 - CH 5
BSAD 372 - CH 5BSAD 372 - CH 5
BSAD 372 - CH 5
 
BSAD 372 - CH 4
BSAD 372 - CH 4BSAD 372 - CH 4
BSAD 372 - CH 4
 
BSAD 372 - CH 3
BSAD 372 - CH 3BSAD 372 - CH 3
BSAD 372 - CH 3
 
BSAD 372 - CH 2
BSAD 372 -  CH 2BSAD 372 -  CH 2
BSAD 372 - CH 2
 
BSAD 372 - CH 1
BSAD 372 -  CH 1BSAD 372 -  CH 1
BSAD 372 - CH 1
 
CH 2 BSAD 310 Fall 2019
CH 2 BSAD 310 Fall 2019CH 2 BSAD 310 Fall 2019
CH 2 BSAD 310 Fall 2019
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 

Recently uploaded (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 

BSAD 372 SPRING 2017 CH 11

  • 1. Payment Systems for Electronic Commerce CHAPTER 11 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. .
  • 2. Learning Objectives In this chapter, you will learn: • What the most common online payment systems are and how they function • How payment cards are used in online retail transactions • What stored-value cards are and how they are used in electronic commerce • What challenges and opportunities are presented by the use of digital cash © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 22
  • 3. Learning Objectives • How digital wallets facilitate online transactions through computers and mobile devices • How the banking industry uses Internet technologies © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 33
  • 4. Introduction • Financial technology (fintech) is the use of powerful Internet-connected computers that use tools to improve quality and reduce cost of services – Existing and entirely new financial products – Includes online payment system not operated by banks • Facilitates purchases and other money transfers • Convenient and becoming widely adopted – Has also revolutionized lending • Online loan services takes banks out of value chain at a reduced cost © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 4
  • 5. Common Online Payment Methods • Cash, checks, credit cards, debit cards are the most common world methods used to pay for purchases – More than 90% of all US consumer payments • Electronic transfer is a small percentage – Mostly automated payments from checking accounts • Credit and debit cards used for more than 60% of online payments with alternative systems such as PayPal used for the remainder – Convenient for customers and cost effective for businesses and provides a significant environmental impact © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 5
  • 6. © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 6 FIGURE 11-1 Forms of payment for U.S. online transactions, estimates for 2018
  • 7. Electronic Bill Presentment and Payment Systems • Designed to deliver bills and accept payments – Success depends on ease of use and time required • Consumers choosing this option is increasing – 70% of bills paid by check are now paid electronically which is a huge savings in paper, postage and time • Biller-direct systems are used by large companies who want to manage the systems themselves • Consolidator systems aggregate all a customer’s bills on one system mostly via banks – Not as attractive to billers because it requires a fee and delays receipt of funds © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 7
  • 8. Micropayments and Small Payments • Micropayments are Internet payments for items costing few cents to a dollar – Barrier is people prefer to buy small value items in fixed price chunks rather than small payments in varying amounts – Many companies have developed micropayment systems but none gained broad acceptance • Small payments are payments of less than $10 – Offered through mobile telephone carrier but held back by substantial charges for providing service • One of the largest markets is music downloads © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 8
  • 9. Payment Cards • Payment cards are plastic cards used for purchases – Categories: credit cards, debit cards, charge cards, prepaid cards, and gift cards • Credit cards (Visa, MasterCard) have a spending limit based on user’s credit history – Pay off entire credit card balance or minimum amount with interest charged on unpaid balances – Widely accepted and provides consumer protection: 30- day dispute period – Card not present transactions include an extra degree of risk for merchant and bank © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 9
  • 10. Payment Cards (cont’d.) • Debit card (electronic funds transfer at point of sale (EFTPOS) cards) removes funds from cardholder’s bank account and transfers it to seller’s account – Issued by bank with major credit card issuer's name • Charge card (American Express) has no spending limit with entire amount due at end of billing period • Retailers may offer their own store charge cards • Prepaid cards are called gift cards • Single-use cards had disposable numbers, valid for one transaction, but not adopted by consumers © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 10
  • 11. Advantages and Disadvantages of Payment Cards • Advantage for merchants include fraud protection – Can authenticate and authorize purchases using a payment card processing network • Interchange network is a set of connections between banks and associations owning credit cards • Advantage for U.S. consumers is limited fraud liability of $50 which is often waived if card is stolen • Merchants view the per-transaction and monthly processing fees as a cost of doing business • Consumers pay a slightly higher cost for goods due to these cards and some charge an annual fee © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 11
  • 12. Payment Acceptance and Processing • US online and mail order stores must ship merchandise within 30 days of charging payment – Significant violation penalties so most stores charge account when order shipped • Processing payment card transactions online is a two step process – Payment acceptance is establishing card validity and verifying card’s limit not exceeded by transaction – Clearing the transaction includes all steps to move funds from card holder’s bank account into the merchant’s bank account © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 12
  • 13. Open and Closed Loop Systems • With a closed loop system the card issuer pays merchant directly without a bank or clearinghouse – American Express, Discover Card – Issue cards directly to consumers • Open loop systems add additional payment processing intermediaries to the closed loop system – Visa, MasterCard issued by local bank – Visa and MasterCard are credit card associations operated by customer issuing banks who evaluate credit standing, establish credit limits and absorb non- payment losses © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 13
  • 14. © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 14 FIGURE 11-2 Closed loop payment card system ©CengageLearning2017
  • 15. © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 15 FIGURE 11-3 Open loop payment card system ©CengageLearning2017
  • 16. Merchant Accounts • Acquiring bank does business with sellers that want to accept payment cards – Business must set up a merchant account with acquiring bank to process Internet transactions • One type similar to a checking account with bank collecting accounts net of processing fees • Commonly account acts like a credit line where the acquiring bank makes a non-interest bearing loan in the amount of daily net receipts, reduced by collections • Obtaining account requires merchant to provide business information and the bank to assess risk © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 16
  • 17. Merchant Accounts (cont’d.) • Chargeback occurs when cardholder successfully contests charge – Acquiring bank must retrieve money from merchant account which may have funds on deposit • Acquirer fees are charges for providing payment card processing service – Per month and transaction, set by the acquiring bank • Interchange fees are charged at rates that depend on the merchant’s industry – Set by card association, charged to acquiring bank and usually passed along to merchant © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 17
  • 18. 18 Merchant Accounts (cont’d.) • Level of fraud is higher online – Under 15% of all credit card transactions responsible for 64% percent of total dollar amount of credit card fraud (declining since 2008) • Antifraud measures include – Scoring services that provide risk ratings for individual transactions in real time – Shipping only to card billing address and requiring card card verification numbers (CVNs) for card not present transactions • Three- or four-digit number printed on the credit card but not encoded on the card’s magnetic strip © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 18
  • 19. Payment Card Transaction Processing • Most online merchants accept both closed loop and open loop system cards and some accept direct deductions from customers’ checking accounts – Automated Clearing House (ACH) is a network of banks involved in direct deduction transactions • Processing depends on size of business – Large build and manage their own systems – Mid-size use purchased software with skilled staff to manage system – Small rely on service payment processing service providers © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 19
  • 20. Payment Card Transaction Processing (cont’d.) • Front-end processor (payment gateway) obtains and stores transaction authorization • Back-end processor takes front-end processor transactions and coordinates information flows – Handles chargebacks, other reconciliation items through the interchange network and acquiring and issuing banks, including ACH transfers • Some processors handle all elements of payment processing and others specialize in one element or a particular industry – Known company provides level of comfort to buyers © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 20
  • 21. Stored-Value Cards • Plastic card with embedded microchip that can store information and perform calculations – Most incorporate near field communication (NFC) technology which allows for contactless data transmissions over short distances • Allows interacts with readers and other devices • Can hold much more data than a magnetic card – Safer because data can be encrypted • Used in Europe and Asia but less successful in U.S. – U.S. use has increased in recent years but still not widespread © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 21
  • 22. Digital Cash • Also called electronic cash or e-cash • Describes any value storage and exchange system created by private (nongovernmental) entity – Does not use paper documents or coins – Can serve as substitute for government-issued physical currency – No common standard adopted so far – None adopted so far • Can be held in online storage or offline storage © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 22
  • 23. Digital Cash (cont’d.) • With online cash storage consumer has no personal possession of digital cash – Trusted third party (online bank) involved in all transfers, holds consumers’ cash accounts – Merchant contacts consumer’s bank for payment – Helps prevent fraud (confirm valid cash) • Fills a need in developing countries that rely on cash as they conduct B2C electronic commerce – Need does not exist here because U.S. consumers already have payment cards © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 23
  • 24. Digital Cash (cont’d.) • Bitcoin is the most well-known provider today – Online ledger book that tracks balances while participants remain anonymous – Public-key cryptography is used (cryptocurrency) – Large percentage of uses involve illegal purchases and currency speculation • Concerns include privacy and security, independence, portability, convenience – Must be impossible to spend more than once, easy to use and not traceable to the person who spent it • Anonymous digital cash © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 24
  • 25. The Double-Spending Issue • Spending electronic cash twice by submitting the same electronic currency to two different vendors – Not enough time to prevent fraudulent act – Main deterrent is threat of detection and prosecution so system must provide traceability back to origin • Two-part lock provides anonymous security and signals an attempt to double-spend cash © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 25
  • 26. © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 26 FIGURE 11-4 Detecting double spending of electronic cash ©CengageLearning2017
  • 27. Advantages and Disadvantages of Digital Cash • Can be more efficient (less costly) than traditional payment methods – Less than processing credit card transactions or conventional money exchange systems – Does not require authorization • No audit trail (similar to physical cash) makes it non- traceable which can lead to money laundering – Convert illegally-obtained money into money spendable without being linked to illegal activity © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 27
  • 28. Digital Wallets and Software-Based Digital Wallets • Allows customer to store name, address, credit card information on an electronic device or software – Benefit is customer enters information just once • Server-side digital wallet stores information on remote server of merchant or wallet publisher – Security breach can reveal thousands of users’ personal information to unauthorized parties • Google Wallet, Microsoft Windows Live ID, Yahoo! Wallet • Client-side digital wallet stores information on consumers computers – Must download wallet software onto every computer © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 28
  • 29. Hardware-Based Digital Wallets • Implemented using smart phones or tablets • Store owner’s identity credentials (driver’s license, medical insurance card, store loyalty cards, etc.) • Transmit portions of information using Bluetooth or wireless transmission to nearby terminal • Near field communication (NFC) technology can be used if equipped with NFC chip • Google Wallet, Android Pay and Apple Pay • Security and privacy are major concerns – Must prevent unauthorized access © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 29
  • 30. Internet Technologies and the Banking Industry • Paper checks still the largest dollar volume of payments in the word today – Processed through world’s banking system • Other major payment forms also involve banks • Internet technologies are providing new tools and creating new threats for the banking industry © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 30
  • 31. Check Processing • Old method of physical check processing – Person wrote check which was deposited by retailer and sent to clearinghouse to manage funds transfer – Paper check transported to consumer’s bank and cancelled check sent to consumer – Disadvantages include transportation cost and float • Delay between time check is written and clears • Check Clearing for the 21st Century Act (Check 21) permits bank to eliminate movement of physical checks and use image scanning technology – Instant check clearing eliminates float © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 31
  • 32. 32 Mobile Banking • Banks exploring mobile commerce potential • Most banks offer apps for mobile devices – Check and transfer balances between accounts – View statements – Find an ATM • Some bank apps allow checks to be deposited by taking a picture • Vendors such as GoPayment and Square offer a tiny credit card reader that can be attached to a mobile device to take payments © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 32
  • 33. 33 Payment System Threats: Phishing and Identity Theft • Online payment systems offer attractive arena for criminals and criminal enterprises • Phishing attacks are techniques for committing fraud against online businesses customers – Particular concern to financial institutions © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 33
  • 34. Phishing Attacks • Attacker sends e-mail message to accounts with potential for an account at targeted Web site – E-mail message tells recipient account compromised and recipient must log in to correct problem • Includes link that appears to be Web site login page • Actually leads to perpetrator’s site so that victim’s log in information can be captured and used • Spear phishing is a carefully designed phishing attack targeting a particular person or organization – Requires considerable research which increases change of e-mail being opened © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 34
  • 35. © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 35 FIGURE 11-5 Phishing e-mail message ©CengageLearning2017
  • 36. Phishing Attacks (cont’d.) • Example: 2008 government stimulus checks – Phishing e-mails that seemed to be from the IRS appeared within one week of passage • E-mail link disguise the real URL by using “@” which causes the Web site to ignore characters before it – https://www.paypal.com@218.36.41.188/fl/login.html – Phony site invisible due to JavaScript code • Pop-up windows look exactly like browser address bar including Web site graphics to make it even more convincing © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 36
  • 37. Using Phishing Attacks for Identity Theft • Organized crime (racketeering) is unlawful activities conducted by highly organized, disciplined association for profit – Differentiated from less-organized groups – Internet providing new criminal activity opportunities • Generates spam, phishing, identity theft • Identity theft is a criminal act where perpetrator gathers victim’s personal information – Goal is to obtain credit – Perpetrator runs up account charges and disappears © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 37
  • 38. © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 38 FIGURE 11-6 Types of personal information most useful to identity thieves ©CengageLearning2017
  • 39. Using Phishing Attacks for Identity Theft (cont’d.) • Large criminal organizations can be highly efficient perpetrators of identity theft • Zombie farm is a large number of computers implanted with zombie programs – Pharming attack is the use of a zombie farm, often by organized crime, to launch a massive phishing attack • Phishing needs both collectors and cashers (users) of information which requires different skills – Crime organizations increase efficiency and volume by facilitating and participating in these transactions – Over a million victims and $1.5 billion lost annually © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 39
  • 40. Phishing Attack Countermeasures • Spam is a key element of phishing attacks – Any protocol changes that improve e-mail recipients’ ability to identify message source reduces phishing • Educate Web site users • Contract with consulting firms specializing in anti-phishing work – Monitor online chat rooms used by criminals • Incidence of phishing has grown rapidly over the past two years and experts expect it will continue – Extremely profitable criminal activity © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 40

Editor's Notes

  1. 1
  2. 2
  3. 3