Chapter 11 Online Payment Systems

Get Started. It's Free
or sign up with your email address
Chapter 11 Online Payment Systems by Mind Map: Chapter 11 Online Payment Systems

1. Online Payments Methods

1.1. Four ways to purchase items

1.2. Electronic transfer

1.3. Credit and debit cards

1.4. Online payments systems

1.5. Costs per bill

1.6. Significant environmental impact

1.7. Online business payments requirements

1.8. Determine which choices best for company and customers

1.9. Each payment technology

2. Payment Cards

2.1. Payment card

2.2. Credit card

2.3. Debit card

2.4. Charge card

2.5. Prepaid cards

2.6. Single-use cards

3. Advantages and Disadvantages of Payments Cards

3.1. Advantage for merchants

3.2. Advantage for U.S. consumers

3.3. Provide built-in security for merchants

3.4. Cards transaction steps transparent to consumers

3.5. Entities involved in payment card proceses

4. Electronic Cash

4.1. Electronic cash

4.2. Potential market

5. Holding Electronic Cash

5.1. Online cash storage

5.2. Online systems payment

5.3. Offline cash storage

5.4. Main deterrent to double-spending

5.5. Systems must provide tamperproof electronic cash traceable back to origins

5.6. Electronic cash used correctly

6. Digital Wallets

6.1. Consumer concern when shopping online

6.2. Solution

6.3. Digital wallet

7. Hardware-Based Digital Wallets

7.1. Implemented using smart phones

7.2. Status

8. Magnetic Strip Cards

8.1. Holds rechargeable value

8.2. Passive magnetic strip cards cannot

8.3. Processing done in device into which card inserted

9. Internet Technologies and the Banking Industry

9.1. Paper checks

9.2. Other major payments forms

9.3. Banking industry Internet technologies

10. Mobile Banking

10.1. Banks exploring mobile commerce potential

10.2. Future plans

11. Phishing Attacks

11.1. Basic structure

11.2. Recipients enters login name, password

11.3. Spear phishing

11.4. E-mail link disguises and tricks

12. Phishing Attack Countermeasures

12.1. Change protocol

12.2. Education Web site users

12.3. Monitor online chat rooms used by criminals

13. Online Payments Basics

13.1. Online payments

14. Micropayments and Small Payments

14.1. Micropayments

14.2. Micropayments barries

14.3. Companies that have developed micropayment systems

14.4. Small Payments

15. Payments Acceptance and Processing

15.1. Internet payment card process made easier

15.2. United States online stores, mail order stores

15.3. Processing Payments card transaction online

15.4. Open and closed loop systems

15.5. Merchant accounts

15.6. Processing payment card transactions

16. Privacy and Security of Electronic Cash

16.1. Electronic payment method concerns

16.2. Important characteristics of electronic cash

17. Advantages and Disadvantages of Electronic Cash

17.1. Traditional brick-and-mortar billing methods

17.2. Online stores have the same payments collection inefficiencies

17.3. Most online customers use credit cards to pay for purchases

17.4. Electronic cash system

17.5. Advantages of electronic cash transactions

17.6. Disadvantages of electronic cash transactions

17.7. Electronic cash

17.8. KDD Communications ( KCOM )

17.9. Interoperable software

18. Software-Only Digital Wallets

18.1. Server-side digital wallet

18.2. Client-side digital wallet

18.3. Serve-side digital wallet examples

19. Stored-Value Cards

19.1. Microchips smart card or magnetic strip plastic card

20. Smart Cards

20.1. Smart cards

20.2. Credit, debit, charge cards store limited informationon magnetic strip

20.3. Information storage

20.4. Holds private user data

20.5. Safer than conventional credit cards

20.6. Popular in Europe, parts of Asia

20.7. Beginning to appear in United States

20.8. Smarts Card Alliance

21. Check Processing

21.1. Old method of physical check processing

21.2. Banks now provide PDF images of processed checks

21.3. Disadvantage of paper checks

21.4. Technologies helping banks reduce float

21.5. Checks 21-comliant world

22. Criminal Activity and Payment Systems

22.1. Online payments systems

23. Using Phishing Attacks for Identify Theft

23.1. Organized crime

23.2. Identify theft

23.3. Large criminal organiztions

23.4. Two elements in phishing

23.5. Each year

24. Summary

24.1. Online stores: payment forms

24.2. Banks process most monetary transactions

24.3. Concern