Verified Document

Legacy Payment Methods Why People Term Paper

They are especially true when they are used in a networked environment particularly in the Internet. Issues, Disadvantages, and Solutions in Legacy Payment Methods in a Networked Environment

One of the most critical issues that exist in the use of legacy payment methods in a networked environment, such as the credit card, is how secured are the financial and personal information of the credit card users. Especially when used online, where information is oftentimes vulnerable to threats and unauthorized access, there is a high possibility that credit card information may not be secured. This thus is causing great concerns for consumers.

One of the processes when using credit cards in an online trading activity is the transmission of credit card numbers. If the server or web site that handles the information exchange between the consumer and the receiver is susceptible to unauthorized access, there is a chance that the credit card information may be stolen and used by another person for his own personal transactions.

In general, because information security in today's technology hasn't been totally provided with solution, wherein there are still a lot of information viruses that travel between networks and where unauthorized access to information is still a big problem, we can conclude that legacy payment methods in a networked environment is similarly not secured. However, despite of this, there are several solutions that have been developed to protect information from payments made in a networked environment.

One of the most common and basic solution that was developed to protect sensitive data is encryption in which information are sent in random forms of code. This was made more secured with SET (Secure Electronic Transaction) technology. In SET, the credit card number is not totally disclosed to the merchant....

Instead, it is sent in encrypted form and can only be decrypted by the user with the use of digital signature that is known only by the user (Claessens, 2002). However, because of the complex process involved in SET, such as the requirement of a software, called "wallet," in the user's machine, this method is not commonly used.
Another recent development in the legacy payment methods in a networked environment is the emergence of software and card readers for the users that allow them to swipe their cards themselves without the need to disclose the credit card number online. Claessens suggests that Real-life electronic payment means, such as electronic purses (e.g., Proton [78]), and debit cards, are also starting to be deployed on the WWW. Software and card readers are now available (e.g., Banxafe [7]) that provide the necessary hooks to browsers and Web servers to connect these real-life electronic payment systems to the WWW.Finally, with the common existence of mobile phones to many individuals, legacy payment methods in a networked environment can be done via mobile phone's SMS capabilities. Authentications are done with the use of random codes that are sent to mobile users that are in turn used to complete a payment transaction.

Bibliography

Orr, Bill. The Great Card Question: Will it be Smart or Debit?

ABA Banking Journal, Vol. 90, Issue 9, pp 54-57.

Credit Cards.

2005. The BeeHive Online. 2005. http://www.thebeehive.org/money/credit-cards-benefits.asp

Advantages to Accepting Credit Cards Online.

R&R Web Design Online. 2005. http://r-rwebdesign.com/accepting_credit_cards.html

Claessens, Joris, et. al. A Tangled World Wide Web of Security Issues.

First Monday Online. http://www.firstmonday.org/issues/issue7_3/claessens/#c7

Sources used in this document:
Bibliography

Orr, Bill. The Great Card Question: Will it be Smart or Debit?

ABA Banking Journal, Vol. 90, Issue 9, pp 54-57.

Credit Cards.

2005. The BeeHive Online. 2005. http://www.thebeehive.org/money/credit-cards-benefits.asp
R&R Web Design Online. 2005. http://r-rwebdesign.com/accepting_credit_cards.html
First Monday Online. http://www.firstmonday.org/issues/issue7_3/claessens/#c7
Cite this Document:
Copy Bibliography Citation

Related Documents

Business Scenario Type the Document
Words: 17664 Length: 45 Document Type: Dissertation

This means that you must continually monitor and communicate about possible changes, pertaining to the overall scope of the threat. Once this occurs, is when an entity will have an effective security procedure that will adapt to the various changes that are taking place. This is significant, because this information can be used to corroborate the overall nature of security threats that could be faced by the SME. Where, this

Data Warehouse a Strategic Weapon of an Organization
Words: 19027 Length: 50 Document Type: Term Paper

Growth Aided by Data Warehousing Adaptability of data warehousing to changes Using existing data effectively can lead to growth Uses of data warehouses for Public Service Getting investment through data warehouse Using Data Warehouse for Business Information Ongoing changes in Data Warehousing The Origin of Data Warehousing and its current importance Relationship between new operating system and data warehousing Developing Organizations through Data Warehousing Telephone and Data Warehousing Choose your own partner Data Warehousing for Societal Causes Updating inaccessible data Data warehousing for investors Usefulness

Arafat's Images Examined Arafat's Origins
Words: 4260 Length: 15 Document Type: Essay

The West may even become addicted to you and your PLO (Pacepa 1987, 25) The above conversation occurred in the early Carter administration, although the Romanian dictator first began advising and consorting with Arafat in 1972 (ibid, 37). Ceau-escu was not a prophet. Rather, he was just a shrewd dictatorial leader who knew how to use image, propaganda and the repetition of the same information over and over again until

Elites in Engineering in the
Words: 11890 Length: 40 Document Type: Dissertation

Engineers should focus on the improvement of the performance of the economy. This relates to the transformation of the theories of controlling the world and adopting new frameworks in the operating in conjunction with the planet. New engineers need to adopt and implement new theories of focusing on the economic, social, and political concepts in relation to both technical and nontechnical disciplines (Cameron 2010 p.40). Leaders in British Engineering According to

Establishing an NP-Led Day Treatment Facility in Bessemer Alabama
Words: 12948 Length: 47 Document Type: Multiple Chapters

Establishing an NP Led Wellness and Recovery Center for Deinstitutionalized Individuals Historically, nursing, and medicine professions have been loath to utilize tools commonly linked with mercenary aspects of business, such as market research and decision analysis. In the contemporary health care setting, however, consumers hold numerous options for care providers. The division of the market or market segmentation into different subgroups allows the determination of target markets and the buildup of

Nursing Education
Words: 10931 Length: 40 Document Type: Term Paper

Cross-Sectional Study to Determine Factors in the Educational Advancement of the Licensed Practical Nurse to the Registered Nurse in the State of North Carolina According to the Harvard Nursing Research Institute, United States nursing school enrollments dropped by 20.9% from 1995 to 1998 (Healthcare Review, 2000). Behind headlines such as this one are the overwhelming issues which threaten the nursing workforce: 1) staffing cuts, 2) mandatory overtime, and 3) the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now