Sunday, January 26, 2020

The Evolution Of The Operations Management Commerce Essay

The Evolution Of The Operations Management Commerce Essay Life would be much easier if the world would stand still, but of course it doesnt. As the world evolves, so must the disciplines whose mission includes helping managers deal with it? Operations Management is no exception. Operations Management is the function of managing the operating core of an organisation: the activities associated with creation, production, distribution and delivery of the organizations goods and services. (HAYES, R.) The operations function comprises a significant percentage of the employees and physical assets in most organizations. Operations managers are concerned with each step in providing a service or product. They determine what should go into an operating system such as equipment, labor, tools, facilities, materials, energy, and information and how these inputs can best be obtained and used to satisfy the requirements of the market place. Managers are also responsible for critical activities such as quality management and control, capacity planning, mate rials management, purchasing, and scheduling. (Russell, Roberta S. and Bernard W. Taylor III, 2000) This essay is going to discuss about the relationship between strategy and operation management and further explaining about how the capacity, location, TQM, flexibility and process can add value to the delivery of goods and services. There are many definitions put forward for the business processes. Business processes can be defined as structured measured set of activities designed to produce a specified output for a particular customer or market (Davenport 1993, P 5). Rosemann (2001, P 18) defines business processes as self-contained, temporal and logical order (parallel and/or serial) of those activities, that are executed for the transformation of a business object with a goal of accomplishing a given task. Business processes is a collection of interrelated work tasks, initiated in response to an event that achieve a specific result for the customer of the process (Portugal and Sundaram, 2005). Processes in the business under taken to achieve particular task that for example producing a particular goods or service for the customer. The result must be countable and identifiable. The business processes is a set of clearly identifiable tasks, executed by one or more actors (person, or organisation, or machine, or department (Portugal and Sundaram, 2005). The business processes helps us to identify various tasks involved in delivering results by the organisation. Business process may be generic or particular to given industry or organisation. Processes are the methods used to convert raw materials and components into products (Hall, 2004). Processes may include, designing, cutting, bending, soldering and polishing. These types of processes are mainly performed using machines and tools Business today is set in a global environment. This global environment is forcing companies, regardless to their location or primary market base, to consider the rest of the world in their competitive strategy analysis. Firms cannot ignore external factors such as economic trends, competitive situations or technology innovation in other countries if some of their competitors are competing or are located in these countries. Nowadays, it is uncommon for a company to develop a new product in the United States, manufacture it in Asia and sell it in Europe. (Gourdin, 2006 P 140) Argos offers its customers with wide range of products at reasonable prices so thatmore and more people can afford them. Argos is the number one retailer for toys and small electric appliances, and a leading player in many other markets including D.I.Y, gardening, consumer electronics and furniture. Argos also have a significant market share in jewellery, sports equipment, D.I.Y products and furniture and it is popular organisation with approximately 60 employees in each branch Argos is successfully doing so, as its branches have gone up from 500 stores into 800 stores in the past year. Argos aims to offer best service to its costumers. They hope their costumers gain maximum choice in their shopping, and have maximum access to Argos. Offering Internet shopping as an option does this. Another of their objective is to expand enough and become market leader with a good reputation. They have a service where you can phone up and reserve your chosen item and find out if they have it in stock, you can even find what day they will be getting it in the store. Argos is to grow capacity and improve customer service in Argos direct, the delivery to home operation. Sales via Argos grew by 50% compared to last year. It accounted for 16% of Argos sales up from 12% last year. Preparation for the construction of new Argos direct warehouse has started, with completion planned before the end of the current financial year. They serve over 130 million customers a year though their stores and take 26% of sales through the internet channel alone and 4 million customer orders either online or over the phone. On average18 million UK households or around two thirds of the population, have Argos catalogue at home at any time. They intend to open approximately 20 stores this financial year. OPERATIONS STRATEGY Operations strategy is related with matching the characteristics of the operations function with the requirements of the market in order to carry out the needs of the business. A proper understanding of this process requires not just an understanding of the beliefs and methods used to develop an operations strategy but also knowledge of the techniques and principles involved in its implementation. Implementation requires knowledge of operations systems and polices including those that relate to resource planning and activity control, quality, plant management, motivation and organization of people, performance metrics and continuous improvement. The decision taken as part of a companys operation strategy are considered strategic because they are widespread in their effect and so are significant in the part of the organization to which the strategy refers and define the position of the organization relative to its environment. Components of the Operations Strategy Structural decision categories: Capacity  ·Ã‚  Ã‚  Ã‚   Growth as needed through additional stores but capacity added carefully  ·Ã‚  Ã‚  Ã‚   Well-utilized franchisees well-being depends on it being used heavily Facilities  ·Ã‚  Ã‚  Ã‚   Distributed facilities, each facility being very similar to the next, all focused around the same menu although the uniformity is beginning to change Vertical integration  ·Ã‚  Ã‚  Ã‚   Partnership arrangement  ·Ã‚  Ã‚  Ã‚   Long-term relationship with suppliers to promote innovation and quality improvement Technology  ·Ã‚  Ã‚  Ã‚   High degree of process understanding, emphasis on fool-proof processes  ·Ã‚  Ã‚  Ã‚   A leader in the technology of product keeping fresh Infrastructural decision categories: Workforce Organization  ·Ã‚  Ã‚  Ã‚   Franchisees: well-trained, carefully selected, entrepreneurs  ·Ã‚  Ã‚  Ã‚   Operators: high-turnover, cheap  ·Ã‚  Ã‚  Ã‚   Guidelines provided by corporation  ·Ã‚  Ã‚  Ã‚   Shareholders  ·Ã‚  Ã‚  Ã‚   shareholders Information/control systems  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Centralized buying Competitive priorities: Cost  ·Ã‚   pricing is extremely competitive  ·Ã‚   Turnover is now over  £4 billion and pre-tax margins are still amongst the best in the industry Quality High-performance design  ·Ã‚  Ã‚  Ã‚   origins of store sites and the town and locality in which the store was built and how they integrated this into the overall structural design of the site.   Development speed  ·Ã‚   a leader in retail management information systems. Flexibility  ·Ã‚  Argos did not regard their stores as one stop shops, although with over 27,000 lines in every store they were approaching it Customization  ·Ã‚  Ã‚   It has been estimated that over 50,000 stores strolleys go astray every year in the UK.   Argos has developed a unique operations strategy which many have tried to follow. The companys motto is: We offer the best customer service through the most convenient shopping experience The key elements of the Argos operations strategy include design, store layout, distribution network, market segmentation. Argoss strategy achieves differentiation and cost leadership. The differentiation is in the quality of the design stylish, modern and well-presented in the store and on the website. Argos strives in offering the best quality products for it customers, at a price up to 30% cheaper than any other UK retailer. Home delivery service and Argos additions (clothes) has improved getting customers into the store and spending their money. The home delivery service has grown for Argos from TVs being delivered to a whole delivery network and Argos Direct warehouses set up thought out the UK. You can get delivery to any were in the UK free on items over 100 pound. OPERATION COMPETIVE DIMENSION There are seven major competitive dimensions that form the competitive position of a firm, they are as follow: cost or price, quality, delivery speed, delivery reliability, coping with changes in demand, flexibility new product introduction speed, and other product-specific criteria. A strategic position is not sustainable unless there are compromises with other positions. Trade-offs occurs when activities are incompatible so that more of one thing necessitates less of another. Order winners and order qualifiers describe marketing-oriented dimensions that are keys to competitive success. Order winners are the criteria that differentiate the products and services of one firm from another, where as order qualifiers are the criteria that permit the firms products to be considered as candidates for purchase by customers. CAPASITY PLANNING Capacity planning is the process of determining the production capacity needed by an organization to meet changing demands for its products. In the context of capacity planning, capacity is the maximum amount of work that an organization is capable of completing in a given period of time. A discrepancy between the capacity of an organization and the demands of its customers results in an inefficiency, either in under-utilized resources or unfulfilled customers. The goal of capacity planning is to minimize this discrepancy. Demand for an organizations capacity varies based on changes in production output, such as increasing or decreasing the production quantity of an existing product, or producing new products. Capacity can be increased through introducing new techniques, equipment and materials, increasing the number of workers or machines, increasing the number of shifts, or acquiring additional production facilities. By definition, design capacity is the maximum output that can pos sibly be attained (Stevenson 1999). Many organizations operate at below their maximum processing capacity, either because there is insufficient demand completely to fill their capacity or as a deliberate policy so that the operation can respond quickly to every new order. It is quite often that organizations find themselves with some parts of their operation operating below their capacity while other parts are at their capacity ceiling. It is the parts of the operation that are operating at their capacity ceiling which are the capacity constraint for whole operation. For example a retail super store offers gift wrap service which at normal times can cope with all requests for its services. (Slack,ChambersJohnston1995 P 322) Argos has selected the Retek supply chain planning solution to improve to capacity and sales while reducing total inventory levels in 2003. With sales of over GBP 3 billion, multi-channel giant Argos was named UKs Retailer of the Year in 2003. With Retek AIP, Argos will optimize its supply chain through improved planning of stock moving into the warehouse and then out to the stores. With supply chain they can take more stock out and achieve better stock turns and improve their buying processes. Argos also uses Merchandise Planner for its annual sales and stock planning process, as well as for planning its catalogue and promotional activities. The solution, which has been developed for retailers, helps companies plan their product assortments, pricing and store an allocation which sets targets across the retailers different seasons. Argos also plans by range for each week over the course of a years sales and stock. That data flows through to fulfilments planning, ensuring that Argos does not exceed the available capacity. Argos is also following the 21st century brand concepts and products suitable. The important characteristic of capacity planning and control, as we are discussing it here, is that it is concerned with setting capacity levels over the medium and short terms in aggregated terms. That is making overall, broad capacity decisions, but not concerned with all of the details of the individual products and the services offered. This is what aggregated means different products and services are bundled together in order to get a broad view of demand and capacity. LOCATION Location is a key factor for every business including Argos and many aspects of a location must be analysed before it can be chosen. This includes the competition in the area, the reputation and the population of the area. The major factors affecting location decisions are;  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Labour  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Premise costs  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Financial assist and local government charges  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Transport links  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Near Customers  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   History and tradition  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sales techniques  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Business activity  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Number and location of competitors  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Reliance on personal visits by customers  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Reliance on local supplies  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Reliance on specialised labour skills  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Methods used to contact customers Finding an ideal location is a decision that requires a lot of reconsideration and investigation particularly as Argos is such a huge company with such big stores. Firstly all Argos stores require a large area for the stores, as they will be accommodating such a huge variety of products. Secondly they will need a huge car park space for their customers, as the store can have hundreds of customers at any given time as well as providing disabled parking and family car parks. They also require a substantial area for a warehouse to stock their goods as well as loading bays where they receive their deliveries of stock. TOTAL QUALITY MANAGEMENT In todays globalized market, with interdependent economies of scale and cross-cultural product initiatives, businesses strive to maintain their profit margins and market shares by providing the best possible products and services to their customers. Profit is the applause you get for taking care of your customers and creating a motivating environment for your people (Blanchard, 2007, p. 4). According to John Stark Associates, total quality management (TQM) is a management strategy used today in business, manufacturing, education, government, and the service industries to maximize efficiencies in all organizational processes (John Stark Associates, 1998). Although organizations differ in their operational definitions of TQM, common threads exist which span the breadth of business and private enterprise. Ponzi and Koenig describe total quality as the culture, attitude, and organization of a company that aims to provide, and continue to provide, its customers with products and services that satisfy their needs. In their definition, the organizational culture requires quality in all aspects of the companys operations, with things done right first time, and defects and waste eradicated from operations (Ponzi Koenig, 2002). TQM is an integrated management system for creating and implementing a continuous improvement process. Such process will lead to producing results that exceed customer expectations. TQM places the responsibilities related to quality problems with upper management levels rather than on the workers. The objective of TQM is to have a continuous improvement in the processes. TQM achieves its objective through data collection and analysis, flow charts, cause and effect diagrams, and other tools which are used to understand and improve processes of any organization. Customers entering an Argos for the first time know immediately that something is different. You have to choose your item from catalogue, order and pay to cash till. The different thing is you dont have to wait too long and if they dont have that item you can check another Argos stores. Argos has a Matrix structure. People within the organisation mix with employees from other departments which means there is little possibility of departments becoming very defensive about their territories. This creates a comfortable workforce, which will lead to motivated employees who will achieve their best efforts to produce a satisfying service to costumers. When costumers gain the service they aim to, they will shop more often in Argos, which will result in Argos expanding and becoming more popular. The management style used in Argos stores is consultative. The manager of the store tends to seek other employees within the company for advice before making decisions. This means the employees get involved more sharing their new ideas and past experiences. This will help Argos make sure that they are pleasing their costumers by using a variety of ideas they share. Costumer satisfaction implies the likeliness of the costumer to shop at Argos. If they are satisfied, which is linked to having a consultative management style, and then they would shop more often at Argos. More costumers result in a higher profit. Argos management sees its role as assisting in this value-creation process, not only by scripting the customers new role but also by making it easier for the customer to assume the role. Catalogue and in-store assistants carefully detail the assembly process and free car-top racks are available at every Argos location. As a result, customer receives a level of quality that in no t available elsewhere . FLEXIBILITY Flexibility is a characteristic of a firms process that enables them to react to customers needs quickly and efficiently. Some processes require one or more of the following types of flexibility: customization, variety and volume flexibility. A concept of strategic flexibility in product competition is developed in which flexibility depends jointly on ; -The resource flexibility of the product creation resources available to a firm and -The coordination flexibility of the firm in using its available resources in product markets. Strategic flexibility, then, is the capability of the firm to preach or respond quickly to changing competitive conditions and thereby develop and/or maintain competitive advantage. The rest of this work explains the actions that individually or in combination help firms to achieve strategic flexibility and competitive advantage. There are a number of actions that help firms navigate in the new competitive landscape. In specific, these actions directly or indirectly contribute to the achievement of strategic flexibility and competitive advantage. Among those is exercising strategic leadership which has direct effects on a firms strategic flexibility and competitive advantage. Strategic leadership also affects these outcomes indirectly through the other major actions of Developing dynamic core competences Focusing and building human capital Effectively using new technology Engaging in valuable strategies Building new organization structures and culture. CONCLUSION In conclusion, the operation and strategic management is the process of developing plans, policies and allocating resources to achieve organizational objectives. So in reality operation management is combining the various activities of business to achieve organizational objectives. Therefore it can be said that it is the highest level of managerial activity. In this case it is understood that, Argos had several problems in managing their operational and strategic management, but later they overcame it by realizing the importance of operational management in a business. Now Argos is one of the successful companies in the world in managing their operational management. In order to continue this success the company needs the right people and best tools available to ensure a seamless transition and has to be able to resolve any problems as quickly as possible, especially when it is the worlds leading home furnishing retailer

Saturday, January 18, 2020

Cyberbully Essay Essay

Cyberbullies should be prosecuted for what they say or do on social media. Physiologist Eden Foster stated â€Å"In order for behavior to be defined as cyberbullying it must be repeated, hostile, and sever with the intent to embarrass threaten or harass.† â€Å"Twenty percent of youth ages 11-18 have been a victim of cyberbullying† says the Cyberbullying Research Center. This needs to stop. If Cyberbullying is against the law, less people would be victimized. Keep in mind, cyberbullying can cause mental disturbance to teens. Suicide and self-harm is a big problem in our world. A lot of suicidal people are like this because of cyberbullying. A girl named Amanda Todd took her life due to being cyberbullied by fake friends, boys, and total strangers. There are teens like her going through the same thing. Physiologist Eden Foster further states â€Å"If the bill is passed it will ensure that the cyberbully will be held accountable for the behavior that led to someone getting hurt.† The cyberbullies say mean stuff which causes teens to be depressed and want to commit suicide. The bully will be held responsible for putting thoughts in teen’s heads which causes suicide. As you may know, most kids are on social media. In fact nine out of 10 kids are on social media, to connect with family and friends. But, sadly there are people who invade on teens accounts and their privacy. These people are cyberbullies who pretend to be someone else. Fake identification is against the law. â€Å"Lori Drew was convicted of violating the Computer Fraud and Abuse Act after creating a fake MySpace account.† Says the Dangers of Cyberbulling Radio Interview. This account was used to victimize a 13 year old girl, Megan Meir. The Cyberbully infiltrates into the victims account. This is wrong because the victim is just using the social media account to connect with family and friends. Furthermore, â€Å"It is very difficult to flee a cyberbully. As they can  Ã¢â‚¬Å"attack† through a variety of electronic means† says Physiologist Eden Foster. I suggest that since it is hard to get rid of a cyberbully, that the law should get rid of the bully for the victim. A lot of teens do not know their bully. IN fact â€Å"only 34% of teens know who their bullies are.† says the Cyberbullying Research Center. Kids don’t know there cyberbully so they don’t know how to stop them. The law should get involved to track the cyberbully down and stop them. Opponents may question, â€Å"Why don’t they just unplug?† Eden Foster further states that â€Å"Technology has become an essential part of society and our homes.† Teens use there smart phones for more than just social networking. Cell phones are used to contact parents in emergencies as well. Teens need a cell phone because like Eden Foster states it is a big part of our lives. To Sum it all up, cyberbullies need to be prosecuted for statements made over social media. It is a serious thing that many people take their lives from. The Cyberbullies need to stop, and the only way to they can be stopped is if we make it a law.

Friday, January 10, 2020

E Payment

Chapter 1. Introduction 1. 1 Electronic payment systems and their place in electronic commerce 1. 1. 1 E-commerce and electronic payment systems 1. 1. 2 Limitations of traditional payment systems in the context of online payments 1. 1. 3 The need for new payment systems designed for e-commerce 1. 2 User acceptance: understanding and issues 1. 3 Research objectives 1. 4 Research scope 1. 4. The role of electronic payments in customer e-commerce activities 1. 4. 2 Approach and methodology Chapter 2. Classification and characteristics of electronic payment systems 2. 1 Classification of payment systems 2. 1. 1 Introduction 2. 1. 2 Primary classification of payment systems 2. 1. 3 Further classification of account-based systems 2. 1. 4 Further classification of electronic cash systems 2. 1. Payment mediation services vs. payment systems 2. 2 Identifying the characteristics of payment systems 2. 3 Advantages and limitations of payment models 2. 3. 1 Advantages and limitations of the elect ronic cash model 2. 3. 2 Advantages and limitations of the acount-based model 2. 5 Conclusions Chapter 3. User survey of electronic payment systems 3. 1 User acceptance of electronic payment systems 3. 2 Survey of users’ attitudes towards characteristics of payment systems 3. 2. 1 Survey participants . 2. 2 Questionnaire design and analysis 3. 2. 3 Survey results and discussion 3. 2. 4 Implications for user acceptanc Introduction 1. 1 Electronic payment systems and their place in electronic commerce In the early 1990s the business and consumer world encountered a new way of conducting trade business, which was named electronic commerce (e-commerce). Over the years electronic commerce has evolved into a popular and acknowledged way of conducting business.While researchers are still trying to understand it and gauge its importance and turnover, e-commerce is changing and growing incredibly quickly, producing such extraordinary results from both business and customer perspective that its phenomenon cannot be overlooked by anyone who has ever thought of conducting business, whether in online or offline environments. With many organisations and people labouring in the field of e-commerce it has become very clear that ecommerce is here to stay and organisations and customers are trying to get maximum benefit from it.E-commerce has become especially important in two interrelated dimensions, namely business-to-consumer (B2C) and business-to-business (B2B) e-commerce. Business to-consumer e-commerce is enabling customers to have an increasing influence on products created, how products are customised, and how services are delivered. Ecommerce offers customers convenient shopping methods for products, information and services, electronic banking, and personal finance management.It is making it easier for consumers to find the desired products and services, match them more precisely to their requirements, and compare prices, (Vulkan, 2003). Several business models have been developed to support various customers’ needs, among them are online portals, content providers, transaction brokers and community creators. For business-to-business relations e-commerce facilitates the form of organisation where companies rely on suppliers and product distribution to respond more effectively to the changing market and customers demand and to achieve more efficient operation.This type of e-commerce relationships offers organisations the possibility to work in the direct contact with producers, giving more room for customization and control over business activities. This helps to reduce the costs significantly by removing ‘middlemen’ from the supply chain. Good examples of companies that employ this business model are Dell and Cisco, (Guttmann, 2003; Laudon & Traver, 2002). Consequences that e-commerce brings for business-to-business relationships are eliminating inventory, and operational and distributional costs that indirectly provid e customers with lower prices.E-commerce can help businesses to increase production flexibility by ensuring timely availability of components from suppliers, to improve quality of the products by increasing cooperation between buyers and sellers and reducing quality issues, to increase opportunities for collaborating with suppliers and distributors, and to create greater price transparency — the ability to see the actual prices on the market, (Laudon & Traver, 2002). In this way e-commerce responses to the customer demand of lower prices and greater convenience. 1. 1. 1E-commerce and electronic payment systemsThe most popular definition of e-commerce is based on the online perspective of the conducted business. E-commerce provides the capability of buying and selling products, information and services on the Internet and other online environments. As for any trading activity, the issue of safe and reliable money exchange between transacting parties is essential. In an e-comme rce environment, payments take the form of money exchange in an electronic form, and are therefore called electronic payments. Electronic payments are an integral part of e-commerce and are one of its most critical as pects.Generally defined, electronic payment is a form of a financial exchange that takes place between the buyer and seller facilitated by means of electronic communications. An e-commerce electronic payment is a financial exchange that takes place in an online environment, (Kalakota & Whinston, 1997). Electronic payment systems (EPSs) are summoned to facilitate the most important action after the customer’s decision to pay for a product or service – to deliver payments from customers to vendors in a most effective, efficient and problem-free way.The role of e-commerce electronic payment systems is pivotal for future of ecommerce, whose further growth depends on the timely development of EPSs. The development of new types of e-commerce purchasing relation ships and business models has created the need for new ways of money exchange and new EPSs. For instance, online auctions, (Ribbers & Heck, 2004), has spurred the necessity for personto- person payment systems to allow online money exchange between individuals. Certain types of information products and services require small payments and micropayments.Businesses would like to sell information content that costs very little, accumulating revenues with high turnover. E-commerce EPSs can be designed for selling specific types of products, for example for trading copyrighted online content, such as music. Another unforeseen earlier requirement is conducting e-commerce using wireless mobile devices, such as mobile phones or personal digital assistants (PDA). The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce, (Laudon & Traver, 2002).In addition, ecommerce provides the possibility to enhance current payment systems or substi tute them with online variants. The need for online payments was first addressed by using extant payment methods of the offline world for online payments. For example credit cards, originally intended as an offline credit instrument, have become the major payment instrument for ecommerce. As e-commerce and online purchasing grows, the weaknesses of credit and debit cards, and cheques are becoming more apparent. These limitations are discussed in section 1. . 2. The lack of the fit-for purpose payment mechanisms and infrastructure is one of the main restricting factors that hold back the growth and evolution of ecommerce, (Guttmann, 2003; Laudon & Traver, 2002; O'Mahony, Peirce, & Tewari, 1997). 1. 1. 2 Limitations of traditional payment systems in the context of online payments Three factors are stimulating the development of electronic payment systems: reduced operational and payments processing costs, growing online commerce and decreasing the costs of technology, (Kalakota & Whin ston, 1997).Reduction of costs is one of the major reasons for research and development of EPSs. The central impetus for ecommerce and e-business is to provide a more efficient service, primarily in terms of costs. In this light, paying online with traditional payment systems such as credit cards is rather paradoxical, given that credit cards are one of the most expensive of all available mainstream payment means for both end consumers and merchants, defeated perhaps only by paper checks, (Lietaer, 2002; Laudon & Traver, 2002). Several limitations of traditional payment systems in the context of e-commerce can be outlined.Existing payment systems, such as credit cards, are inadequate for retail customer digital business from the following viewpoints: Lack of usability. Existing payment systems for the Internet require from the end user to provide a large amount of information, or make payments using complex elaborated web site interfaces. E. g. credit card payments via a web site ar e not the easiest way to pay, as these require entering extensive amounts of personal data and contact details in a web form, (Kalakota & Whinston, 1997). Lack of security.Existing payment systems for the Internet are an easy target for stealing money and personal information. Customers have to provide credit card or payment account details and other personal information online. This data is sometimes transmitted in an un-secured way, (Kalakota & Whinston, 1997). In practice this happens even in spite of introduction of secure transactions mechanisms, such as Secured Socket Layer. Providing these details by mail or over the telephone also entails security risks, (Guttmann, 2003; Laudon & Traver, 2002). Lack of trust.Users tend not to trust existing systems with the long history of fraud, misuse or low reliability, as well as novel systems without established positive reputation. In the present situation, money loss by customers is quite possible when using existing payment systems, such as credit cards, for Internet payments. Potential customers often mention this risk as the key reason why they do not trust a payment service and therefore do not make Internet purchases, (Lietaer, 2002). Lack of applicability. Not all web sites support a particular payment method, thus limiting customers’ ability to pay.Credit cards work only with merchants who have signed-up to the services of the corresponding credit card company, and do not support direct business-to-business or interpersonal payments, (Kalakota & Whinston, 1997). Lack of eligibility. Not every potential customer with money and intention to pay can make use of certain payment methods. Not all potential buyers can obtain credit cards due to credit history limitations, low income or other reasons, (ibid). Lack of efficiency. Some payments over the Internet can be too small to be handled by existing payment systems, because of overheads included in the processing of payments and transaction.Credit cards are too expensive for effecting small payments and are unsuited for small transactions. The minimum fixed fee charged to the retailer for processing a transaction could even surpass the value of the goods sold, (Guttmann, 2003). High usage costs for customers and merchants. Existing payment systems use a rather expensive infrastructure to facilitate the payment process. Credit cards are very expensive for end users, not in the least because of the enormous and growing size of fraud, which amounts to billions dollars per year.This loss is invisibly re-financed by users by the higher costs of credit card services. In addition, credit card payments are still heavily paper-dependent. Most credit card bills are sent in a paper form to customers by post, and the bills are mostly settled by posting paper documents, like checks of giro payments, which makes the whole cycle rather expensive. As mentioned above, this means that resources employed in processing of credit cards transactions re nder them rather ineffective for small payments, because the high overhead of credit cards, (Laudon & Traver, 2002; Guttmann, 2003).In online credit card payments credit cards are not physically available for inspection by the payee, (this situation is referred as ‘card not present’). This imposes higher charges for merchants, because the chance of fraud is higher; see section 2. 1. 3 for more discussion. Credit cards have low finality of payments because users can refute or repudiate credit cards payments in certain situations. Moreover, financial regulations in certain countries, e. g. in the USA and the UK, place the risks of repudiation, fraud, or non-payment largely on the merchant and issuing banks, (Laudon & Traver, 2002; APACS, 2002).These issues make credit cards less attractive to merchants. Certain authentication schemes, e. g. Verified by Visa and SecureCode from MasterCard allow to shit fraud liability from merchant to credit cards issuing banks, and can ea se this burden for merchants, (see www. verifiedbyvisa. com and www. mastercard. com). However, end users can found themselves paying more for the cards issued by the banks to refinance bank’s losses due to fraud. There are more concerns related to the credit card use in online e-commerce that are responsible for reluctant users acceptance of credit cards and e-commerce.According to the report published by marketing research firm IDC, (Asmussen, Raschke, & Arend, 2002), almost half of European users of the Internet do not buy goods online because they either do not trust the Web merchants or fear their credit card details will not be secure. According to analysts, total credit card fraud rose to $4 billion in 2002 (i. e. $2 for every card issued). Industry estimates that the amount of online credit card fraud could be in the $5oo million range, (Laudon & Traver, 2002).Authorities believe that hackers have stolen more than one million credit card numbers from E-commerce sites. It would not be a surprise that many customers use their credit cards with reservations. A survey by Visa of 15 Banks from 12 EU countries in 2002 found that online credit card payments account for nearly half of all complaints. More than one in five of these came from people who had not even shopped on the Internet, but were billed for online transactions, (Philippsohn & Thomas, 2003). Privacy issues are also associated with the use of existing payment systems.There are cases when users’ identities (i. e. personal data such as credit card numbers, names and addresses) were stolen when hackers break into websites’ databases and obtain personal information of the customers. Fraudsters then attempt to use this information to open new credit and bank accounts using the stolen identity, (Philippsohn & Thomas, 2003). These and other issues with existing payment systems such as credit cards render them not very suitable for online payments. 1. 1. 3 The need for new payment systems designed or e-commerce Despite that electronic commerce is a growing phenomenon, its future development is, to a large extent, hampered by the lack of appropriate payment systems. Since most of business-to-consumer payments over the Internet are performed currently via credit cards, an admittedly problematic payment medium due to costs, security and trust problems, the need for new payment systems clearly emerges from the existing situation, (Lynch & Lundquist, 1996; Wayner, 1997; Laudon & Traver, 2002; Guttmann, 2003).Research and development in Internet-based payments tried to resolve this situation by conjuring numerous online EPSs, a good proportion of which has been put to use. This was possible due to the stimulating factors listed above, and in the first place due to the availability and reduced costs of the enabling technology. However, the new payment systems, purposely crafted for the Internet, also could not avoid their own share of problems. This has led to the r eluctant use of new online electronic payment systems, i. e. esulted in low user acceptance of newly introduced payment systems by customers, (see section 1. 2). User acceptance of electronic payment systems At this stage the situation with the development of online EPSs is far from ideal. A survey on electronic money developments by the Bank for International Settlement reports a rather low level of EPSs use, even in the most advanced countries, (BIS, 2000). According to the European Central Bank, the proportion of online payments among cashless payment instruments in the European Union is rather low.The report admits that although there has been a lot of discussion on the use of EPSs and their importance â€Å"it is still not a widely used medium†, (ECB, 2001). The lack of customer demand, the diversity of technological standards and the lack of support by financial institutions are mentioned among the reasons preventing the development of electronic payment systems, (ECB, 2003). Some experts estimate that about 85% of all Internet transactions are done with credit cards that were not originally designed for the Internet, (Philippsohn & Thomas, 2003).According to a survey by marketing research firm Jupiter Research, credit cards are still the dominant payment method for online purchases, accounting up to 95% of online transactions in the United States, (Jupiter Media Metrix, 2000). This demonstrates still low user acceptance of alternative electronic payment systems, designed specifically for e-commerce. 1. 2User acceptance: understanding and issues End user acceptance of such sensitive technology as money-circulating payment systems is the critical key aspect of the whole path of payment systems’ establishment.Without such acceptance no technology can successfully exist on the market, and payment systems are not an exception. According to Dillon & Morris (1996) user acceptance is â€Å"the demonstrable willingness within a user group to emplo y information technology for the tasks it is designed to support†. This definition can be enhanced with the understanding that the user perception of information technology (IT) can be influenced by objective characteristics of technology, as well as by human factors and interaction with other users and related parties.For example, the social information processing model (SIPM), (Salancik & Pfeffer, 1978), suggests that attitudes towards technology are influenced by opinions, information, and behaviour of others. User acceptance is a pivotal factor determining the success or failure of any information system project, (Davis, 1993). Many studies on information technology report that user attitudes and human factors are important aspects affecting the success of an information system, (Davis, 1989, Burkhardt, 1994, Rice & Adyn, 1991). The arguments in section 1. and in the following paragraphs suggest that this is the case also with EPSs. Besides SIPM, a well-known approach to e xplaining and modelling user acceptance is the Technology Acceptance Model (TAM), (Davis, 1989). TAM suggests that users formulate attitudes toward the technology that depends on whether they perceive the IT to be useful and easy to use. However, TAM does not take into account other factors that may be critical to user acceptance or rejection of such specific technology as EPSs, such as security, trust, privacy and involved risks.Extending the SIPM assumption, user acceptance of online EPSs could be affected by a number of factors and parties, creating a broader sense of the social context of EPSs in the Internet environment. User experience with an EPS can be influenced or manipulated by various aspects, such as marketing, publicity, the reputation of the bank behind the system, trust towards the company operating the system and technology behind the system, and convenience of the user interface, see also Guttmann (2003), Kalakota & Whinston (1997), Egger (2003). Figure 1. attempts to illustrate the social context in which parties and factors could possibly influence user perception and experience with electronic payment systems. These parties and factors should be taken into consideration when exploring issues of user acceptance of online EPSs. They are either required for a successful operation of a payment system (banks), its promotion (marketing organisations), or monitor and regulate its operation (government). For example, the company operating the payment service will have to address users’ concerns about security, privacy and trust.Users can be influenced in their experience by other parties than the operator itself, e. g. the bank or financial institution that facilitates the payment transactions, see Figure 1. 1. Customers can be influenced by the user interface, or by other parties involved in the payment service, such as technical partners. Since e-commerce EPSs operate in the Internet environment, the reputation and impression of the syste m can be easily communicated to other users via online communities, creating yet another social impact on the system.Therefore, social influences, e. g. opinions and behaviour of other users, like family and friends, and reputation of banks and the parties involved, should be taken into account for user acceptance of EPSs. This argument can be supported by above-mentioned SIPM, (Salancik & Pfeffer, 1978). Issues such as trust, usability, applicability, security, and convertibility are extremely important because they can influence subsequent decisions of people whether to use a payment system or not.There are several obstacles to user acceptance of EPSs: developers not only have to sell the service to potential users, they also have to convince the users to entrust their money to a third party institution, to rely on the payment system in their business and personal finance, and to use it frequently for convenience, reliability, specific applications, services and for a variety of o ther reasons. To achieve this high standard of user acceptance, the creators of a payment system should bear in mind user-related factors from the very beginning of the conception of the payment system.Designing for user acceptance of online electronic payment systems is thus the main issue put forward by research described in this thesis. An open challenge remains for designers and developers of novel Internet-based payment systems to meet user expectations, requirements, preferences and needs in design and operation of the systems. Resolving these issues is critical for the development and operation of new payment systems and future growth of e-commerce. 1. 2. 1User factors in payment technology The importance of user-related factors can be demonstrated in the example of the notorious problem of security of information systems.There are thousands of security mechanisms, matched with a growing number of hacks and security breaches, (Flynn, 2001, p. 61). However, the nature of secur ity issues is changing with the constant improvement of information technology. While security technology is becoming increasingly sophisticated and tamper-proof, experts in information security admit that user factors are the most important issues for security problems. The vast majority of all security issues in IT environments is caused or assisted by users inside organisations, rather than hackers and other utsiders. Security experts know many stories about people exchanging their passwords, or IT managers attaching notes with logins and passwords to their monitors, or about hackers finding these notes in the trash. To avoid this kind of mistakes, experts are talking about enforcing security policies in organisations, to be able to address user-related factors in security, (Flynn, 2001). Therefore, security practices have embraced user-related factors. This example helps to illustrate the importance of user-related factors in the design and operation of information systems.The f ollowing example illustrates a failure of a payment system due to neglecting to focus on user and market needs. The Chipknip â„ ¢ and Chipper â„ ¢ smart card payment technologies, (Nannery, 1998), were introduced in the Netherlands in early 90s. Both systems were intended to provide a way of paying small amounts in everyday transactions, which people would normally pay with cash. However, these two systems competed with each other for some time, being incompatible, so customers could not pay with the competitor’s card at certain shops, (BIS, 2001).Eventually, this created problems of interoperability and limited the user base for both systems. Another obstacle was that the card readers were installed in shops where people already had another method of payment – debit cards, which worked very effectively and efficiently and which were used by most people for all kinds of payments. In a way, Chipknip and Chipper duplicated the functions and applications of debit ca rds. On the other hand, the real need for Chipknip and Chipper for small payments at parking lots, vending, and public transport tickets machines was not met.A serious situation arose regarding the high costs of accepting Chipknip for merchants. As the result, the union of Small and Medium Enterprises in the Netherlands threatened to boycott Chipknip, (Het Financieele Dagblad, 2001). In this case, an important factor stimulating the development of EPSs was not met, namely the reduced operational and processing costs. Despite of a certain potential for uses acceptance of e-purse technology (Van Hove, 2004), this situation is changing slowly.All these issues led to a low acceptance of Chipper and Chipknip technologies. Chipper International decided to stop operations and support of Chipper in the Dutch market, (Libbenga, 2001; BIS, 2001); Chipper has fused with Chipknip, and while some issues have been addressed, the expected applications for this smart-card technology are yet to come . The example above helps to illustrate the complexity of human and marketing factors in the context of payment systems and their crucial influence on the eventual success of a payment system.Therefore, for successful design of electronic payment systems from the user perspective it is important to find out what user-related factors and systems’ aspects have the most direct impact on user acceptance and which of them can cause problems when neglected in design. 1. 3Research objectives 1. 4Research scope 1. 4. 1 The role of electronic payments in customer e-commerce activities The process of paying is an essential part of customers’ online buying activities. These activities are well described by the Consumer Mercantile Activities Model, (Kalakota & Whinston, 1997).The model comprises prepurchase interaction, purchase consummation and postpurchase interaction phases. The payment activity takes place within the purchase consummation phase, Figure 1. 2. â€Å"The purchas e consummation phase specifies the flow of information and documents associated with purchasing and negotiating with merchants for suitable terms, such as price, availability, and delivery dates; and electronic payment mechanisms that integrate payment into the purchasing process†, (Kalakota & Whinston, 1997). The buyer arrives to payment activities after identifying products of services to be purchased.The buyer and seller conduct then a mercantile transaction. In a mercantile transaction the buyer and the seller exchange information followed by the necessary payment. The payment methods they use should be mutually negotiated and agreed on (ibid). Therefore, in order to conduct a successful e-commerce mercantile transaction the buyer should at least be willing to use the payment method offered by merchants. From this viewpoint, user acceptance of e-commerce EPSs is critical for the completion of the purchase consummation phase and the whole purchasing process. It can be there fore bserved that the payment process and the user involvement in it are highly important for e-commerce activities. Scope of payment systems Business-to-consumer Payment Systems This research is focused on user acceptance of new payment systems in consumer ecommerceenvironments. The main focus of the presented work is therefore Businessto- Consumer e-commerce EPSs, which are designed with the main purpose to facilitate payments for consumer e-commerce. Taking into account the B2B systems would have made the scope too broad to handle within this research. Payment Systems designed for the WebCurrently, consumer e-commerce is done mainly via the WWW (Web) service of the Internet. The market for conducting e-commerce payments via wireless PDAs, mobile phones and other Internet services is still under development, (Bohle, 2001a), and therefore does not have a wide user basis and usage experience. Thus, in the scope are Web-oriented online e-commerce EPSs and Web e-commerce applications. Scope of payment tasks Because the scope of the defined business relations is Business-to-Consumer, the payment tasks in the focus of this thesis are related to consumer e-commerce and trade of goods and services.In these tasks there should be at least one 1) business party involved and 2) one physical person, who is conducting purchasing activities in an ecommerce environment. Scope of target activities These activities include those that are related to buying goods and services, and essentially represent consumer e-commerce. The scope of these activities is embracing a significant and, arguably, the most important part of the consumer e-commerce represented by B2C relations. Purchasing goods: tangible, require shipping, intermediated (by shipping companies). Purchasing information and software: intangible, immediate, not intermediated (by shipping companies). Purchasing services: intangible/tangible, not always immediate, can be intermediated (by service companies). The followi ng activities are therefore excluded from the scope because they are not in line with the defined scope of electronic payment systems, namely B2C consumer ecommerce. Consumer-to-Consumer (C2C) money payments and exchange.C2C payments do not belong to B2C e-commerce, (Figure 1. 3), e. g. personal auctions payments, debt settlement. Specific payment applications, for instance, gambling or adult-content sites. In this context the sites place specific requirements on B2C relations and userrelated factors, e. g. on privacy. Related activities Additional activities that have to be explored are the influence of pre- and postpurchase interaction phases, according to Kalakota and Winston (1997) on the user experience with a payment system on the whole.It is very likely that correct introduction,application and follow up of payment products and services in retail e-commerce are important for user acceptance of EPSs, and therefore the pre- and post-purchase interaction phases cannot be reaso nably disregarded when investigating the payment process. The user experience within these phases could affect their decision as to whether to use the e-commerce service at all, without even arriving at the payment process itself. Amount of money The minimum amount of money within the scope was chosen to be above â‚ ¬2.This means excluding small and micropayments. The nature of payment tasks in case of micropayments is different from higher amounts. For instance, users may wish to automate this kind of payments to avoid the need to authorize a payment of â‚ ¬0. 01 every time, while with bigger amounts they are likely to have control over each transaction. Furthermore, different researches show that at this moment there is little market for services that support small and micropayments, (Bohle, 2001b). In the focus are therefore small to medium sized payments, e. g. from â‚ ¬2 to â‚ ¬1,000.The upper payment limit is set to â‚ ¬1,000 to indicate that highest amount with in the scope of this research. The suggested range of payment amounts is typical for the current status of the domain and is similar to range of payments with existing offline EPSs, like credit, debit and smart cards, (Lelieveldt, 2001; Bohle, 2001a). Larger payments can be expected to raise different user acceptance issues, because of more user attention to risks, security, efficiency and other aspects of transactions with such amounts, (Humphrey, 1995). 1. 4. 2 Approach and methodologyThis research employs practices of the multidisciplinary scientific field of Human- Computer Interaction in order to research issues of user acceptance and user-related factors in online e-commerce electronic payment systems. Specifics of HCI research The nature of Human-Computer Interaction is such that it has to employ various scientific, research and design disciplines and cross borders between them for successful research. HCI is different from other disciplines in that it studies interaction bet ween people and artificially created artefacts, and not an independent natural phenomenon, like in other disciplines.This complex nature of HCI and its research goals compel researchers to adopt both inductive and deductive approaches to science, as described in Mackay & Fayard (1997). In the deductive approach the purpose is to generate a set of hypothesis that can explain real world phenomena. The scientist proposes a theory about a phenomenon, and formulates a hypothesis to be tested in an empirical research. In order to verify the hypothesis, an experiment is conducted, and with the revision of its results the theory is re-examined and an updated hypothesis is created.This approach is employed by the experimental study of this thesis. The inductive model aims to construct the most precise description of the real world, as opposed to explanation. The scientist observes phenomena in the real world without having a preconception or theory of what they are looking for. Then the scie ntist attempts to create a model of the world that explains the phenomena. By returning to the real world the model can be validated and changed if there are contradictions between the model and the studied phenomena.The qualitative study in this thesis employ this approach for requirements elicitation and creation of the design recommendations. The research process applied in this thesis, aimed to gain validated design knowledge, can be described as an iterative circular or spiral movement. This process is best described by Figure 1. 4, adapted from the work of Rauterberg (2000). This approach asserts to combine â€Å"analytical strength of empirical validation methods (e. g. , observation, experiment, inquiry, etc. with the synthetic strength of system design†. This triangle structure conceptualizes the three most important components of HCI research: â€Å"(1) the collection of ‘design relevant knowledge’, (2) the ‘interactive system’ in differen t possible representation forms, and (3) the several possibilities to represent a ‘user’ for (empirical) validation†, (ibid). The following sections describe how using diverse research activities helped to combine these components in the research reported in this thesis. Outline of the thesis The diagram in Figure 1. illustrates a combination of the research and design activities of this thesis. These activities included acquiring design knowledge on ecommerce EPSs, applying the knowledge to a commercial payment system designed by an industrial party, and empirical validation of the design knowledge. Chapter 2 presents a survey of literature on EPSs, which was necessary for understanding EPSs. The outcome this survey is a classification and a set of characteristics of EPSs. The importance of the characteristics of EPSs had to be confirmed with potential users of EPSs.Chapter 3 describes an investigation into the importance of the characteristics of EPSs to end use rs by means of a survey of consumer attitudes towards EPSs. The user survey helped to identify what characteristics should be given more attention in the design of EPSs. However, the knowledge about the importance of the characteristics did not inform how they should be realised in design of EPSs. To acquire a deeper understanding of these issues, a qualitative research in the form of a diary study was conducted, Chapter 4.The diary study aimed to understand how EPSs are experienced and perceived by users in the context of actual use and how EPSs can be designed to meet users’ needs. As the outcome of the diary study, implications for design of Internet-based payment systems have been derived and formulated as design recommendations. To ensure that the application of the design recommendations benefits user acceptance of EPSs, an experimental study was conducted, that is described in Chapter 5. This study helped to substantiate the validity of a subset of the design recommend ations.It was hoped to find the ideal situation where it is possible to apply the hypothesised design knowledge to a real-life system, rather than testing them in the laboratory, in order to achieve high realism of the results. Due to the participation of industrial parties, this situation has become available. The experimental study involved two parts: 1) a real-life EPS was redesigned in accordance with the proposed DRs, 2) an experimental comparison of the redesigned system with the old one has indicated improvements of user attitudes in several aspects, thus demonstrating the validity of the design recommendations.Chapter 2 2. 1 Classification of payment systems 2. 1. 1 Introduction This chapter presents a framework for classification and characterising of electronic systems that facilitate paying in an e-commerce environment. This framework is an attempt to describe and to relate the wide variety of the payment systems, with more than 150 payment mechanisms invented worldwide. This chapter also presents a survey of literature on EPSs, which has been a necessary step for understanding payment systems. The outcome of this phase of the research is a classification and characterisation of electronic payment systems. . 1. 2 Primary classification of payment systems The principal classification of EPSs is based on the form of money representation and the principle of money transfer. Existing payment systems can be divided into two groups: electronic cash mechanisms (or electronic currency) and credit-debit systems, (Medvinsky & Neuman, 1993). Electronic cash resembles conventional cash, when parties exchange electronic tokens that represent value, just as banknotes and coins determine the nominal value of conventional cash money.The credit-debit approach in the context of electronic payments means that money is represented by records in bank accounts, and this information is electronically transferred between parties over computer networks. Another terminologic al approach offered by Wayner (1997), based on the type of information that is exchanged, distinguishes between ‘account-based’ and ’token-based’ systems, which, respectively, corresponds to credit-debit systems and electronic cash in the definition of Medvinsky and Neuman. A similar distinction is found in Camp et al. 1995), who distinguish between notational and token forms of money. A different view on classification of EPSs is offered in Asokan et al. (1997), where payment mechanisms are classified based on the temporal sequence of money flows between the payer and receiver of the payments. Various attempts of classification of payment systems are also reported in Kuttner and McAndrews (2001), and Schreft (2002). These references are aggregated into the classification of electronic payment systems, illustrated in Figure 2. , which was first reported in Abrazhevich (2001b). The figure illustrates the further classification of EPSs, described in the foll owing sections. It provides examples of EPSs in each subcategory; some of these systems are described further in the text. The figure illustrates if the systems are only theoretical developments, that were only tested as limited pilots, and that have never been implemented for the commercial use. Payment mediation services that aggregate various EPSs in one payment infrastructure are described in section 2. 1. 5. 2. . 3 Further classification of account-based systems In the group of account-based systems, one can distinguish between 1) generic online EPSs that use simple account-based model for serving Internet payments, 2) systems that use the debit and credit cards model, and 3) specialized payment systems that, for instance, were designed for trading content online such as music. Some researchers consider credit cards systems as a separate group of payment models, (Medvinsky and Neuman, 1993), others consider them to be a variant of the credit-debit type.This classification adopt s the latter distinction. The basic principle of account-based systems is that the exchange of money between accounts is maintained by a payment service provider. Users can authorize charges against their EPS accounts, as they would do with usual bank accounts, though the ways of authorization are different for various systems. With the debit approach, the customer maintains a positive balance of the account and money is subtracted when a debit transaction is performed.With the credit approach, charges are posted against the customer's account and the customer is billed for this amount later or subsequently pays the balance of the account to the payment service. One of the most widely used systems for electronic payments is the debit card, which as the name suggest, is a clear example of a debit system, (Evans & Schmalensee, 1999). Debit cards combine the service of Automatic Teller Machines (ATM) cards and cheques. When customers pay with a debit card, the money is automatically de ducted from their checking bank account.In contrast with the credit cards, the spent money comes from the bank account directly. Many banks issue a combined ATM/debit card that looks like a credit card and can be used in places where credit cards are accepted. In this case, when users pay with a debit card, the payment will still be processed as a debit transaction. Other payment mechanisms that use the credit-debit model are Yahoo PayDirect, Pay- Pal. com, and theoretical payment projects like NetBill (Sirbu and Tygar, 1995), and NetCheque (Medvinsky and Neuman, 1993).A special group of account-based instruments that are currently in wide use are credit card systems. A great part of trade on the Internet is done using credit cards and these payment systems should not be overlooked. The biggest advantage of this approach is that the customers, who have already received credit cards offline, can use them directly for online payments. This also results in high scalability, as no addit ional installations are necessary. Credit cards provide a large customer base for merchants who accept them, thus their applicability is quite high.There are critical security issues associated with the use of credit cards in an online environment. When using credit cards over open networks, encryption mechanisms, such as widely used Secure Socket Lauer (SSL), in principle can prevent a hacker or eavesdropper from intercepting the customer's credit card number. There are some schemes that even hide card numbers from the merchant, providing protection against intercepting the card details from merchant databases or against fraud by the merchant. Nevertheless, these incidents happen regularly (Caunter, 2001; IFCC, 2003; Wales, 2003).It is important to note, however, that without some form of customer registration with a payment service or substantial proofs of identity, credit cards can be very risky to pay with and can be easily abused. Even encrypted Internet credit card transaction s do not include the owner’s signature, and anyone with knowledge of the customer's credit card number and expiration date can create a payment order. An important aspect of credit card payments in the online world is referred to as card-not-present (CNP) transactions.CNP transactions are those where neither the card, nor its holder are present at the point of sale, e. g. in orders by mail, telephone, fax or the Internet. The buyer does not have to demonstrate the physical presence of the card, or the card and the buyer do not have to be co-located. This imposes issues with card validation, security and fraud. CNP transactions are widely used in mail order/telephone order purchasing (MOTO) which also do not require co-location of buyer and seller. To secure transactions of this type, credit card companies ask for additional information, such as name, address, etc. that can be used to verify their identity, for instance, if the ordered goods should be mailed to the billing add ress associated with the credit card. Other information often required is the additional 3-4 digits code, printed on the back side of the card and not present in the credit card number. Merchants ask the customer to read this code from the card in a card-not-present order. The merchant then asks for verification during the authorization process. The issuer (or credit card processor) validates the code and relays the decision to decline or approve the transaction to the merchant.Nevertheless, the MOTO transactions incorporate limited protection against credit card fraud. Credit card CNP transactions could sometimes employ even less identity verification information. Since no signature involved in CNP transactions, the buyers can opt out of any order, if they claim they did not agree with the purchase, (O'Mahony, Peirce, & Tewari, 1997). The charges for orders cancellation are borne by merchants in the form of the higher costs for processing of CNP transactions. In addition, merchants could be liable for the whole amount of the disputed order, (APACS, 2002).Furthermore, because online payments are administered as standard credit card charges, the costs are too high to make this method unsuitable for payments below â‚ ¬1 and hence inefficient. Credit card companies are constantly lowering the minimum amount that can be paid to enable small payments, but charges for merchants still remain high. It should be also taken into account that cards are issued by banks and organisations, which after a screening, decide whether they can issue credit cards to certain customers.Customers with a low income, an imperfect credit history, might not be eligible for a credit card. This may restrict the customer base to a certain degree and limit user and merchant acceptance of credit cards as a payment method. 2. 1. 4 Further classification of electronic cash systems Electronic cash is stored in a digital form and serves as a cash substitute for the Internet or other informatio n systems. Electronic cash represents value in some form and can be spent with merchants, who deposit money in their own accounts or can spend it in other places.It can be represented by electronic ‘bills’ and ‘coins’, certificates, packets of data, or electronic tokens in one form or another. When using electronic cash systems, customers purchase electronic digital tokens from the issuing company using a conventional payment system, e. g. credit cards, electronic checks, or even paper currency (for example, via a reverse automatic teller machine which accepts cash, or when purchasing prepaid cards). Some of the systems allow converting electronic cash back into another form of money (Medvinsky and Neuman, 1993), which is very important for convertibility of the systems.Another distinction amongst electronic cash systems is between those that use smart cards for the storage of tokens and those where tokens reside only on user’s accounts and computer networks. The former are often called electronic purses (e-purses), the latter are sometimes addressed as ‘online cash’ or ‘Web cash’. Examples of e-purse electronic cash systems are CAFE project, (Boly et al. , 1994) and Mondex (Martin, 1994). Tokens in these systems exist and travel in the computer environment,for example, on a currency server or customers’ hard disk.Mondex is a smart card payment system that was designed to enable person-to-person as well as Internet payments, (Van Hove, 1999, p. 141). The card can be used to make small payments, store personal and application-specific information, and serve as a telephone card. Web cash representatives are E-cash, E-gold, Millicent (Glassman & Manasse, 1995), PayWord and MicroMint (Rivest & Shamir, 1996), and NetCash system (Medvinsky and Neuman, 1993). It has to be noted that these systems are mostly theoretical work and have not been implemented on the market. Systems that employ smart cards e. g. Chipknip, Chipper in the Netherlands, Proton in Belgium, and Visa Cash can be also placed in the category of electronic cash and also called e-purses, however, in representing money they hardly use tokens. In this case, the numerical data stored on the card is changed when a payment takes place. Judged by the principle of the operation and use they act like electronic purses. The value is stored on a card and if the card is lost, the money is gone, in a fashion similar to cash. It has to be noted that smart cards like Chipknip are not principally designed for Internet payments and are used mainly at point-of-sale terminals.There have been nevertheless pilot tests of facilitating paying over the Internet with Belgian Proton smart card EPS, but the use of Proton on the Internet is now discontinued. An important development towards standardisation of e-purses is establishing Common Electronic Purse Specifications with the goal to define requirements needed to implement a globally i nteroperable electronic purse program, while maintaining full accountability, (see www. cepsco. org). CEPS, which were made available in March of 1999, outline overall system security and certification.Being established by the key parties in electronic purse cards, and supported by organisations from over 30 countries, CEPS paved the way for the creation of an open global electronic purse standard. For cardholders it means that they will be able to use their electronic purse cards domestically and internationally with the knowledge that the card will be accepted wherever the acceptance mark is displayed. Visa Cash is an example of CEPS implementation, (see www. visa. com). Prepaid card EPSs can be also included in the same category of electronic cash, because the principle of their work resembles the use of e-purses, such as Chipknip.Users can buy a prepaid card for a specified amount. Prepaid card systems are specifically designed for Internet payments. Users can pay with a prepaid card by entering on merchant sites the card’s unique number, which corresponds to the card’s nominal. The value of the card is decreased by the amount paid to the merchant. To better understand what issues that surround electronic payment systems, it makes certain sense to introduce a definition of payment mediation services, which use existing payment systems as mediators to provide extra services. 2. 1. 5 Payment mediation services vs. payment systemsTo further refine the focus of this research, we have to make one important distinction, which is between payment mediation services and payment systems. This distinction particularly makes sense in the context of electronic and Internet payment mechanisms. Payment mediating services have appeared as a response to the imperfection and inefficiency of current payment systems for the Internet. They extend the services of the existing systems and operate as mediators between merchant, payment systems and users. Their goal is to help merchants to accept as many payment systems users could possibly want to use when paying over the Internet.In payment mediation services the existing payment infrastructure from many payments providers is aggregated to provide broader services, or to overcome shortcomings of the available payment options. Figure 2. 2 describes the relations between merchants, EPSs and payment mediation services. The difference between payment mediation services and payment systems can be summarized in that a payment mediation service is as an intermediary between payer, business, and payment system, while there is no such middle tire for payment systems. The payment process in this case is transparent to the users of a site.A mediating service provider ‘intercepts’ payments from users, processes them, and credits the account of the owner of the site when the authorization and transactions are completed. For example, there are numerous companies among mediating services provid ers that facilitate acceptance and processing of various credit cards. A special class of payment mediation services has emerged, that provides convenience for paying bills for businesses and end users. An example of payment mediation services is providing bill payments for end users and companies, for instance, utilities or telephone bills.Over a Web front-end provided by the billing systems, customers and companies can pay bills that are normally paid offline by paper cheques or bank transfers. Some systems even provide additional services such as automated accounting merged with online payment facilities. Syndication of payment services Another angle on payment mediating systems is viewing them as a form of syndication of payment services in an online environment. The notion of syndication originates from the entertainment world, where it forms the fundamental organizing principle.With the advent of the ‘new economy’ and the use of the power of Internet distribution, syndication can be recognised as an emerging model for e-commerce. In this context syndication would mean selling the same information to many different customers, who render and integrate it with other information in various value-adding ways and then redistribute it. According to this principle, businesses involved can play three or more roles: originators who create original content; syndicators, who collect and package digital information to meet specific customers’ needs; and distributors who deliver digital content to customers, (Werbach, 2000).In the context of online payments, payment mediation services can be seen as syndicators of the original services offered by payment systems. Payment mediation services syndicate e-commerce EPSs, offering merchants the way to accept a variety of payment systems. Examples of payment mediation services A good illustration a payment mediation service is Bibit Billing Services (www. bibit. com). This Dutch company specializes in Int ernet payment and billing services. The service supported about 70 payment methods from 18 countries by 2004.When customers want to pay on a Web site of a Bibit’s client, they select one of the provided payment methods. The payment process goes as follows: 1. A customer selects products on sale in a virtual shop. 2. For payment, the customer is then redirected to Bibit Payment Service. 3. Within Bibit Payment Service, the customer can select a payment system he or she would like to pay with, provided it is supported by Bibit. The customer makes the payment with the system of his or her choice. 4. After a successful payment, Bibit notifies the merchant that the order can be shipped and transfers the money to the merchant.The processing of the transactions, which is conducted entirely by Bibit, is therefore transparent to the customers of the site and the client company. The company business model, which utilizes a number of payment systems, relies on providing extra services t o facilitate payments, and therefore it fits into the definition of a mediating system. It is interesting to note that the service allows the use of micropayments, by accumulating charges for products like news, articles, stock and research reports, online games and charging users on a subscription basis.Examples of other payment mediation services are Orbiscom (www. orbiscom. com), iBill (Ibill. com), PayTrust, (www. paytrust. com), DataCash (www. datacash. com), PayNet (www. paynet. ch). Systems that conceal real customer’s credit card numbers by providing them a unique temporary card number for each transaction have gained certain popularity among payment mediation services. The customers can then use this unique number in a normal credit card transaction, and their real credit card will be charged.This temporary card number expires after every transaction and would not be approved for the subsequent use. The data of real credit cards of customers is not exposed to parties online in online transactions. In this case the payment mediation services are using credit cards infrastructure to provide extra security and anonymity (ABN-Amro e-wallet, O-Card by Orbiscom. com). By using these measures merchants expect to accept more secured payments without changing the way shoppers pay and without changing existing payment processes or infrastructure.The research summarized in this thesis is concerned mainly with payment systems and not with mediating solutions for existing payment infrastructure. Payment mediation services on the Internet emerged because of the absence of relevant payment solutions or have problems that prevent their successful use by merchants and users. Many of EPSs are probably transitory systems, unable to completely solve problems that appear in the context of the Internet paying process, because the problems originate in the payment systems they use; see discussion on PayPal. om in section 2. 4. While syndication of EPSs by payment med iation services provides in the end a better level of service than individual EPSs they use, it also places the payment mediation systems out of the scope of this research, which is exploring ways to design better individual EPSs. 2. 2 Identifying the characteristics of payment systems As observed in the example with Chipknip and Chipper in the previous chapter, there are a lot of factors that determine the success or failure of payment systems, and not all of them are of technical nature.As mentioned already, user acceptance depends on many issues, such as consumer choice, preferences, advertisement, a state of the market, etc. The discussion of diverse aspects of electronic payment systems can be found in many works on development and research of payment systems. Attempts to classify and describe the requirements and characteristics of payment systems such as security, reliability, convertibility, efficiency, traceability, and others can be found, among others, in the works of Med vinsky & Neuman (1995), Langdon et al. (2000), Lynch & Lundquist (1996), Wayner (1997).It has to be noted however, that these studies are mainly focused on technical aspects of electronic payment systems, which is not the only facet that is important in this field. Below the characteristics of payment systems are extended to account for user-related aspects of EPSs. These characteristics can be also used for assessment of payment systems, as described further. The list of characteristics of payment systems Anonymity, privacy This characteristic reflects the desire of users to protect their privacy, identity and personal information.In some transactions, the identities of the parties could be protected by anonymity. Anonymity suggests that it is not possible to discover someone’s identity or to monitor an individual's spending patterns. Where anonymity is important, the cost of tracking a transaction should outweigh the value of the information that can be obtained by doing so . As an illustration, when a customer pays with a debit card, the purchase is registered at the vendor and bank’s databases. It is possible to find out what amount was paid and what actually was purchased. Thus debit card payments are not anonymous.On the contrary, when one pays with cash at a shop or in a marketplace, no one can say by examining the cash that money came from the payer, as there is no direct information about this payer’s personality associated with the banknotes. Thus, cash is an anonymous payment system. Currently, the right of users to choose how their personal information is disclosed is viewed as privacy. There are privacy laws in several countries that limit usage of personal information by banks, authorities and other parties, including online businesses and payment systems, like European privacy acts or similar directives, e. . European Commission Data Protection Directive. Applicability The added value of a payment mechanism is dependent upon how useful it is for buying something. Applicability (or acceptability, as it is often referred in literature, (Medvinsky & Neuman, 1995)) of a payment system is defined as the extent to which it is accepted for payments at points of sale, or at online e-commerce sites in this case. For instance, cash is accepted widely and virtually everywhere in the offline world and thus has a very high level of applicability.Debit cards and credit cards have a very high applicability, as one can pay with them in a variety of places. The applicability of a payment system may vary from country to country. For example, in Germany and in the Netherlands cheques are no longer common due to the steady growth of other payment methods. However, in the UK and the USA cheques are still quite a common method of payment and the level of their applicability is quite high. Authorization type Authorization type is referred in the literature as the form of a control over the validity of transactions, (Lynch and Lundquist, 1996; Asokan et al. 1997). The authorization type can be offline or online. Offline authorization means that users of the system can exchange money while not connected to a network, without a third party mediating for the transaction. Paper cheques are an illustration of offli

Thursday, January 2, 2020

should illegal immigrants be made legal citizens

A persons family or Family background can help determine one’s identity. Where you come from or who you’re raised by can help determine your identity in society. There are many other things that can help influence your identity, but your family’s background is one of the main ways and this is evident In â€Å"Public and Private Language† by Richard Rodriquez. Depending on what background you’re from your identity will automatically be determined. There are many different factors in this idea that play a vital part however. For example if you come from an Asian background people will automatically identify you as a math wizard or if you are from a Latino background that you should automatically understand Spanish. This is basically the†¦show more content†¦What I mean by this is if your parents, siblings, and other family members all went to college then you will be identified as an individual that will most likely go to college because of t he environment you are growing up in and are exposed to. I feel like this will inevitably influence you to go to college. On the other hand if no one went to college in your family you will be identified as an individual that will most likely not go to college due to the fact no one in your household went. Of course there are situations in which this theory is proven not true but unfortunately this is what you will be identified as. A person’s identity may be determined by him/her family background and this is proven evident in the essay â€Å"Private and Public Language† by Rodriguez. We live in a world in which identities are determined prematurely without hesitation. This means that even without getting to know an individuals personality the first thing that is done instead is determining identities based on your physical state, family, or family background. As a culture we live in a diverse environment in which the majority of people come from a different place, an d as a result many are identified differently depending on where he/she and their family are from. Today’s culture is more diverse than ever, and more and more people are migrating to different countries and settling so I feel like itShow MoreRelatedIllegal Immigration Should Be Allowed721 Words   |  3 PagesIllegal Immigration Should Be Allowed Illegal immigration is the immigration of someone from his or her home country to another country without becoming a legal citizen. Illegal immigrants have many different names; illegal aliens, undocumented workers, and unauthorized citizens are just a few names they are called. Whether undocumented workers should stay in the country or leave has been debated in the United States for a long time. In the year 2006, there was an estimated 11.5 to 12 million undocumentedRead MoreThe Economic Impact Of Illegal Immigration902 Words   |  4 PagesThe economic impact of illegal immigrants in Texas has brought concerns for the state s economy. Such as opportunities, health care, and education. Illegal immigrants contribute both positively and negatively to the Texas economy. They contribute positively by paying for taxes such as sales taxes, health taxes and taxes imposed on items. The negative impacts these immigrants have on the Texas economy seems to overweigh these positive impacts. Th eir presence has made general wages go down for unqualifiedRead MoreIllegal Immigrants Persuasive Essay1217 Words   |  5 PagesIllegal Immigrants Taking Advantage of the United States Should illegal immigrants be allowed to get in for free? Should they be allowed to enter while others spend years following the rules in order to gain their legal entry? In today’s society, the people of the United States are being taken advantage by the illegal immigrants. There are many examples in the news today demonstrating illegal immigrants shouldn’t be allowed to cross the border like the economic deficit, crime or the protection ofRead MoreThe Immigrant Problem in the US1780 Words   |  7 Pagesnot everyone is as lucky as we are to be able to call themselves citizens of the United States. We still have many immigrants entering the United States to start a new and better life but this can create problems for the legal citizens when they do so illegally. There has been much debate on how to address this problem and how to figure out a solution to it. I believe that we have to have a clear path to citizenship for immigrants who come here illegally. The Senate passed a comprehensive bill lastRead MoreImmigration : The United States1087 Words   |  5 Pagesthe job market for American citizens. It is the jobs of American citizens to be given more to this illegal immigrant. I believe the U.S. borders should remain closed. While it is clear that opening the borders can have benefits, I believe it is more important to keep jobs available for Americans. In my opinion, I think the US borders should remain close because Citizens` or Americans` should be the first getting opportunity better than an Immigrant. The US should close its borders because openRead MoreThe Official Definition Of Illegal Is â€Å"Contrary To Or Forbidden1517 Words   |  7 PagesThe official definition of illegal is â€Å"contrary to or forbidden by law†. T he definition of an Immigrant is â€Å"an individual who comes to live permanently in a foreign country†. Therefore Illegal Immigrants are foreigners who enter another country, the United States of America, without a Visa. They cross the border by avoiding inspection and overstay the allotted period of time allowed as a visitor, tourist, or businessperson. There are 12 million illegal immigrants in America today. How is the possibleRead MoreBecoming A United States Citizen1075 Words   |  5 PagesBecoming a United States citizen is such a difficult task that many immigrants are crossing the border illegally. Today, the naturalization process is a large controversial topic. To become a citizen one has to go through a series of tests including topics about US government, language, and civics. One has to be able to speak and understand English which can be extremely difficult as a second language. Because it is so difficult to becoming a citizen or let alone enter a country wi th certain permissionsRead MorePersuasive Essay Immigration843 Words   |  4 Pageshas no obligation to be fair and take more immigrants in under their wing than they can handle and give support financially if needed. During this essay, I will be focusing on the topic of immigration including benefits and receiving education in the United States and will discuss my expectations I have when traveling to a foreign country. The United States has many immigrants who are legal citizens from across the globe. On the other hand, many are illegal while still receiving benefits from the countryRead MoreTighter Border Restrictions Will Reduce Illegal Immigration Essay1677 Words   |  7 PagesOne of America’s many problems is the rise of illegal immigration. While steps have already been taken to reduce the number of immigrants coming through unlawfully, many are still entering. Such passage brings forth numerous problems that must be dealt with accordingly. Therefore, I propose tighter border restrictions as well as ways to offer more legal immigration to those who wish to enter the United States for residential purposes. By doing so, our country will become saferRead MoreJust Like Us1218 Words   |  5 Pagescame to the United States illegally from Mexico. All four of the girls have grown up in the United States. They all have hopes of living the American dream. Marisela and Yadira do not have their legal documents and therefore are not legal American citizens, Clara and Elissa; on the other hand have legal documentation. During high school the girls struggled with the question about their futures and discovered that it was going to be a lot more difficult then they originally imagined. Malcolm Gladwell