Unit 2 Ecommerce Notes
Unit 2 Ecommerce Notes
1.
Increased either Volume or Value of Transaction: As people are becoming more conscious
regarding their financial matter, numbers as well as value of the transactions are increasing.
This phenomenon is attributed to the rapid growth in financial market activity around the world
and the payment generated by such activity.
2.
Technological Enhancement: From last two decades there is an incredible technological
improvement in banking and financial sector. It is due to the advancement of Information and
Communication Technology and massive growth of Internet. As a result, financial institutions
and consumers both have the ability and the resource to move funds much faster through the
system, at a lower cost.
3.
Effect of Globalization: With the effect of globalization more and more businesses have
started to overcome geographical boundaries. As a result more financial transactions are
flowing across the countries. The company that has the capability to streamline its payment
mechanism is able to trim costs and thus achieve competitive advantage. This can be
possible only in cross-nation payment.
Globalization and financial revolution have changed specially the developing countries in many
aspects.[1] Opportunity of trade and investments have increased, consumers taste and
preferences have changed, demands for foreign products and services have increased.
Technological advancements make the world more and more borderless. Advancements in
communication and information technology bundled with Internet have produced unprecedented
opportunities in the global economy, where Internet connects digitally all countries and regions.
Electronic money, which is an electronic replacement for cash, is a product of such digital
convergence. It is storable, transferable and perhaps unforgettable. The purpose of this chapter
is to provide a comprehensive idea of Electronic money and Electronic Payment System and its
acceptance in India.
the card is an ISO 7810 card like a credit card; however, its functionality is
more similar to writing a cheque as the funds are withdrawn directly from
merchant, the customer may swipe or insert their card into the terminal, or
they may hand it to the merchant who will do so. The transaction is
authorized and processed and the customer verifies the transaction either
In some countries the debit card is multipurpose, acting as the ATM card
for withdrawing cash and as a check guarantee card. Merchants can also
The use of debit cards has become wide-spread in many countries and has
Like credit cards, debit cards are used widely for telephone and Internet
purchases.
shown enlarged in the inset. The gold contact pads on the card enable
1. Magnetic stripe
2. Signature strip
3. Card Security Code
Although many debit cards are of the Visa or MasterCard brand, there are
many other types of debit card, each accepted only within a particular
country or region, for example Switch (now: Maestro) and Solo in the
New Zealand. The need for cross-border compatibility and the advent of the
part of the MasterCard brand. Some debit cards are dual branded with the
Germany, Laser cards in Ireland, Switch and Solo in the UK, Pinpas cards in
and theme parks. The use of a debit card system allows operators to
International.
or “debit”)
the debits are reflected in the user’s account immediately. The transaction
machine (ATM) cards. One difficulty in using online debit cards is the
Overall, the online debit card is generally viewed as superior to the offline
debit card because of its more secure authentication system and live
may have been forgotten or not authorized by the owner of the card. Banks
in some countries, such as Canada and Brazil, only issue online debit cards.
Offline debit cards have the logos of major credit cards (e.g. Visa or
MasterCard) or major debit cards (e.g. Maestro in the United Kingdom and
other countries, but not the United States) and are used at point of sale like
a credit card. This type of debit card may be subject to a daily limit, as well
the United States and some other countries are not compatible with the PIN
system, in which case they can be used with a forged signature, since users
account balances.
A credit card is a system of payment named after the small plastic card
issued to users of the system. A credit card is different from a debit card in
that it does not remove money from the user’s account after every
transaction. In the case of credit cards, the issuer lends money to the
consumer (or the user) to be paid to the merchant. It is also different from
describe credit cards), which requires the balance to be paid in full each
month.
100% and 200% of the total amount of credit desired. Thus if the
cardholder puts down Rs. 1000, he or she will be given credit in the range of
Rs. 500–Rs. 1000. In some cases, credit card issuers will offer incentives
even on their secured card portfolios. In these cases, the deposit required
may be significantly less than the required credit limit, and can be as low as
10% of the desired credit limit. This deposit is held in a special savings
account.
Credit card issuers offer this as they have noticed that delinquencies were
he doesn’t repay his balance. The cardholder of a secured credit card is still
expected to make regular payments, as he or she would with a regular
credit card, but should he or she default on a payment, the card issuer has
the option of recovering the cost of the purchases paid to the merchants
out of the deposit. The advantage of the secured card for an individual with
major credit bureaus. This allows for building of positive credit history.
Although the deposit is in the hands of the credit card issuer as security in
the event of default by the consumer, the deposit will not be debited simply
for missing one or two payments. Usually the deposit is only used as an
offset when the account is closed, either at the request of the customer or
due to severe delinquency (150 to 180 days). This means that an account
which is less than 150 days delinquent will continue to accrue interest and
fees, and could result in a balance which is much higher than the actual
credit limit on the card. In these cases the total debt may far exceed the
original deposit and the cardholder not only forfeits their deposit but is left
opened.
Secured credit cards are an option to allow a person with a poor credit
history or no credit history to have a credit card which might not otherwise
Secured credit cards are available with both Visa and MasterCard logos on
them. Fees and service charges for secured credit cards often exceed
those charged for ordinary non-secured credit cards, however, for people in
certain situations, (for example, after charging off on other credit cards, or
secured cards can often be less expensive in total cost than unsecured
Security Overview
Credit card security is based on privacy of the actual credit card number.
This means that whenever a person other than the card owner reads the
the time when a transaction is made, security is low. However, a user with
access to just the number can only make certain types of transactions.
Merchants will often accept credit card numbers without extra verification
for mail order, but then the delivery address will be recorded, so the thief
must make sure he can have the goods delivered to an anonymous address
(i.e. not his own) and collect them without being detected.
purchases,where upon access to the number allows easy fraud, but many
require the card itself to be present, and require a signature. Thus, a stolen
card can be cancelled, and if this is done quickly, no fraud can take place in
this way. For internet purchases, there is sometimes the same level of
security as for mail order (number only) hence requiring only that the
fraudster take care about collecting the goods, but often there are
additional measures. The main one is to require a security PIN with the
card, which requires that the thief have access to the card.
digits at the beginning of the number that determine the bank to which a
credit card number belongs. This is the first six digits for MasterCard and
Visa cards. The next nine digits are the individual account number, and the
final digit is a validity check code. In addition to the main credit card
number, credit cards also carry issue and expiration dates (given to the
nearest month), as well as extra codes such as issue numbers and security
codes. Not all credit cards have the same sets of extra codes nor do they
Many credit cards can also be used in an ATM to withdraw money against
the credit limit extended to the card but many card issuers charge interest
rather than the monthly billing date. Many card issuers levy a commission
for cash withdrawals, even if the ATM belongs to the same bank as the
card issuer. Merchants do not offer cash back on credit card transactions
uneconomical.
Many credit card companies will also, when applying payments to a card,
before cash advances. For this reason, many consumers have large cash
balances, which have no grace period and incur interest at a rate that is
(usually) higher than the purchase rate, and will carry those balances for
years, even if they pay off their statement balance each month.
We can break credit card payment on on-line networks into three basic
categories:
1. Payments using plain credit card details.
The easiest method of payment is the exchange of unencrypted credit
cards over a public network such as telephone lines or the Internet. The
low level of security inherent in the design of the Internet makes this
method problematic (any snooper can read a credit card number, and
programs can be created to scan the Internet traffic for credit card
no way to do this.
them out, but even then there are certain factors to consider. One would
be the cost of a credit card transaction itself. Such cost would prohibit
a third party: a company that collects and approves payments from one
browser or other electronic commerce device and sent securely over the
make a credit card transaction truly secure and non-refutable, the following
sequence of steps must occur before actual goods, services, or funds flow:
its public key server. The secret key is re-encrypted with a password, and
the unencrypted version is erased. To steal a credit card, a thief would have
The credit card company sends the consumer a credit card number and a
credit limit. To buy something from vendor X, the consumer sends vendor X
the message, ‘It is now time T. I am paying Y dollars to X for item Z,” then
the consumer uses his or her password to sign the message with the public
key.
The vendor will then sign the message with its own secret key and send it
to the credit card company, which will bill the consumer for Y dollars and
give the same amount (less a fee) to X. Nobody can cheat this system. The
signed it (as in everyday life). The vendor can’t invent fake charges,
the same charge twice, because the consumer included the precise time in
the message. To become useful, credit Card systems will have to develop
Support for Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP)
encryption has been built into several browsers. Both of these schemes
snooping attacks. Now any vendor can create a secure system that
Consumers use credit cards by presenting them for payment and then
paying an aggregate bill once a month. Consumers pay either by flat fee or
individual transaction charges for this service. Merchants get paid for the
credit card drafts that they submit to the credit card company. Businesses
Credit cards have advantages over checks in that the credit card
company assumes a larger share of financial risk for both buyer
and seller in a transaction. Buyers can sometimes dispute a charge
retroactively and have the credit card company act on their behalf.
Sellers are ensured that they will be paid for all their sales—they
needn’t worry about fraud.
One disadvantage to credit cards is that their transactions are not
anonymous, and credit card companies do in fact compile valuable
data about spending habits.
Record keeping with credit cards is one of the features consumers
value most because of disputes and mistakes in billing. Disputes
may arise because different services may have different policies.
For example, an information provider might charge for partial
delivery of a file (the user may have abandoned the session after
reading part of the file), and a movie distributor might charge
depending on how much of the video had been downloaded. The
cause of interrupted delivery needs to be considered in resolving
disputes (e.g., intentional customer action versus a problem in the
network or provider’s equipment). In general, implementing
payment policies will be simpler when payment is made by credit
rather than with cash.
The complexity of credit card processing takes place in the
verification phase, a potential bottleneck. If there is a lapse in time
between the charging and the delivery of goods or services (for
example, when an airline ticket is purchased well in advance of the
date of travel), the customer verification process is simple because
it does not have to be done in real time. In fact, all the relaying and
authorizations can occur after the customer-merchant transaction
is completed, unless the authorization request is denied. If the
customer wants a report (or even a digital airline ticket), which
would be downloaded into a PC or other information appliance
immediately at the time of purchase, however, many message
relays and authorizations take place in real time while the customer
waits. Such exchanges may require many sequence-specific
operations such as staged encryption and decrying and exchanges
of cryptographic keys.
Encryption and transaction speed must be balanced, however, as
research has show that on-line users get very impatient and
typically wait for 20 seconds before pursuing other actions. Hence,
on-line credit card users must find the process to be accessible,
simple, and fast. Speed will have design and cost implications, as it
is a function of network capabilities, computing power, available at
every server, and the specific form of the transaction. The
infrastructure supporting the exchange must be reliable. The user
must feel confident that the supporting payment infrastructure will
be available on demand and that the system will operate
reasonably well regardless of component failures or system load
conditions.The builders and providers of this infrastructure are
aware of customer requirements and are in fierce competition to
fulfill those needs.
Infrastructure for On-Line Credit Card Processing
Competition among these players is based on service quality, price,
organizations .
allying with banks to sell home banking. Eventually, the goal would be to
offer everything from mutual funds to brokerage services over the network.
lose customers. The traditional roles are most definitely being reshuffled,
clearly stand to lose business. Why banks are on the defensive is obvious if
we look at banking in the last ten years. A decade ago, banks processed 90
percent of all bank card transactions, such as VISA and MasterCard. Today,
electronic toll-takers, banks could become mere homes for deposits, not
banks could lose the all-important direct link to be the customer’s primary
provider of financial services that lets them hawk profitable services. The
total confusion. To be fair, things are happening so fast in this area that it’s
no problem for electronic systems. Credit and debit cards have them and
even the paper-based check creates an automatic record. Once information
might even cost more to throw it away than to keep it). For example, in
purged and old transaction histories can be kept forever on magnetic tape.
and banking technology might be: No data need ever be discarded. The
1. permanent storage;
2. accessibility and traceability;
3. a payment system database; and
4. data transfer to payment maker, bank, or monetary authorities.
The need for record keeping for purposes of risk management conflicts
with the transaction anonymity of cash. One can say that anonymity exists
today only because cash is a very old concept, invented long before the
anonymity, many believe that anonymity runs counter to the public welfare
instance, the Mondex electronic purse touts equivalence with cash, but its
electronic wallets are designed to hold automatic records of the card’s last
transactions and they probably ultimately will. With these records, the
balance on any smart card could be reconstructed after the fact, thus
This would certainly add some value versus cash. In sum, anonymity is an
will be difficult for bankers and governments to accept. Were the regulation
resolve. However, customers might feel that all this record keeping is an
payment systems. The next risk involved is the privacy of the customer
making a purchase.
effect a single dossier. This dossier would reflect what items were bought
and where and when. This violates one the unspoken laws of doing
stored.
This collection of data tells much about the person and as such can
conflict with the individual’s right to privacy. Users must be assured that
The users must be assured that they cannot be easily duped, swindled, or
purchased and delivered. This implies that, for many types of transactions,
trusted third-party agents will be needed to vouch for the authenticity and
because a bank’s failure to settle its net position could lead to a chain
deal with this possibility. Various alternatives exist, each with advantages
removes the insolvency test from the system because banks will more
readily assume credit risks from other banks. Without such guarantees the
be impeded.
bank does not guarantee settlement, it must define, at least internally, the
settlement. Despite cost and efficiency gains, many hurdles remain to the