Verified Document

Legacy Payment Methods Why People Term Paper

They are especially true when they are used in a networked environment particularly in the Internet. Issues, Disadvantages, and Solutions in Legacy Payment Methods in a Networked Environment

One of the most critical issues that exist in the use of legacy payment methods in a networked environment, such as the credit card, is how secured are the financial and personal information of the credit card users. Especially when used online, where information is oftentimes vulnerable to threats and unauthorized access, there is a high possibility that credit card information may not be secured. This thus is causing great concerns for consumers.

One of the processes when using credit cards in an online trading activity is the transmission of credit card numbers. If the server or web site that handles the information exchange between the consumer and the receiver is susceptible to unauthorized access, there is a chance that the credit card information may be stolen and used by another person for his own personal transactions.

In general, because information security in today's technology hasn't been totally provided with solution, wherein there are still a lot of information viruses that travel between networks and where unauthorized access to information is still a big problem, we can conclude that legacy payment methods in a networked environment is similarly not secured. However, despite of this, there are several solutions that have been developed to protect information from payments made in a networked environment.

One of the most common and basic solution that was developed to protect sensitive data is encryption in which information are sent in random forms of code. This was made more secured with SET (Secure Electronic Transaction) technology. In SET, the credit card number is not totally disclosed to the merchant....

Instead, it is sent in encrypted form and can only be decrypted by the user with the use of digital signature that is known only by the user (Claessens, 2002). However, because of the complex process involved in SET, such as the requirement of a software, called "wallet," in the user's machine, this method is not commonly used.
Another recent development in the legacy payment methods in a networked environment is the emergence of software and card readers for the users that allow them to swipe their cards themselves without the need to disclose the credit card number online. Claessens suggests that Real-life electronic payment means, such as electronic purses (e.g., Proton [78]), and debit cards, are also starting to be deployed on the WWW. Software and card readers are now available (e.g., Banxafe [7]) that provide the necessary hooks to browsers and Web servers to connect these real-life electronic payment systems to the WWW.Finally, with the common existence of mobile phones to many individuals, legacy payment methods in a networked environment can be done via mobile phone's SMS capabilities. Authentications are done with the use of random codes that are sent to mobile users that are in turn used to complete a payment transaction.

Bibliography

Orr, Bill. The Great Card Question: Will it be Smart or Debit?

ABA Banking Journal, Vol. 90, Issue 9, pp 54-57.

Credit Cards.

2005. The BeeHive Online. 2005. http://www.thebeehive.org/money/credit-cards-benefits.asp

Advantages to Accepting Credit Cards Online.

R&R Web Design Online. 2005. http://r-rwebdesign.com/accepting_credit_cards.html

Claessens, Joris, et. al. A Tangled World Wide Web of Security Issues.

First Monday Online. http://www.firstmonday.org/issues/issue7_3/claessens/#c7

Sources used in this document:
Bibliography

Orr, Bill. The Great Card Question: Will it be Smart or Debit?

ABA Banking Journal, Vol. 90, Issue 9, pp 54-57.

Credit Cards.

2005. The BeeHive Online. 2005. http://www.thebeehive.org/money/credit-cards-benefits.asp
R&R Web Design Online. 2005. http://r-rwebdesign.com/accepting_credit_cards.html
First Monday Online. http://www.firstmonday.org/issues/issue7_3/claessens/#c7
Cite this Document:
Copy Bibliography Citation

Related Documents

Business Scenario Type the Document
Words: 17664 Length: 45 Document Type: Dissertation

This means that you must continually monitor and communicate about possible changes, pertaining to the overall scope of the threat. Once this occurs, is when an entity will have an effective security procedure that will adapt to the various changes that are taking place. This is significant, because this information can be used to corroborate the overall nature of security threats that could be faced by the SME. Where, this

Chad Guinea Promises Superior Transparency
Words: 6550 Length: 20 Document Type: Research Paper

S., France and publicity, Chad was able to renegotiate more favorable contracts with the Bank, expropriate over $450 million in taxes from the private Consortium firms which they claim they had already paid, under the threat of replacement with Chinese firms. Global oil prices spiked, and Chad cleared over $1 billion in revenues in the last year of the Bank's project in 2008. Much of this increased income coincided at

Data Warehouse a Strategic Weapon of an Organization
Words: 19027 Length: 50 Document Type: Term Paper

Growth Aided by Data Warehousing Adaptability of data warehousing to changes Using existing data effectively can lead to growth Uses of data warehouses for Public Service Getting investment through data warehouse Using Data Warehouse for Business Information Ongoing changes in Data Warehousing The Origin of Data Warehousing and its current importance Relationship between new operating system and data warehousing Developing Organizations through Data Warehousing Telephone and Data Warehousing Choose your own partner Data Warehousing for Societal Causes Updating inaccessible data Data warehousing for investors Usefulness

Financial Planning Charting the Course:
Words: 15430 Length: 56 Document Type: Term Paper

Goal setting works well for simple jobs -- clerks, typists, loggers, and technicians -- but not for complete jobs. Goal setting with jobs in which goals are not easily measured (e.g., teaching, nursing, engineering, accounting) has posed some problems. Goal setting encourages game playing. Setting low goals to look good later is one game played by subordinates who do not want to be caught short. Managers play the game of setting

Information Systems and Technology Issues in Developing Countries
Words: 9969 Length: 30 Document Type: Term Paper

Information Systems (IS) and Technology Issues in Developing Countries Technology has changed society in a manner much like the Industrial Revolution of the 17th century. The technology revolution started in the U.S. And the countries of Western Europe, in a manner similar to the industrial revolutions. The benefits of this revolution were immediately obvious in the improvement of productivity and the quality of life in the countries. Realizing the benefits that

Phoenix Program Lessons to Iraq
Words: 19225 Length: 75 Document Type: Term Paper

(MACV Dir 381-41) This document is one of the first confidential memorandums associated with the Phoenix Program, which details in 1967 the mostly U.S. involvement in counterinsurgency intelligence and activities and discusses the future training and development of South Vietnam forces to serve the same function, that had been supported by the U.S. In civilian (mostly CIA) and military roles. The document stresses that the U.S. role is to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now