66:
168:
25:
392:. Instead of entering card details on the purchaser's site, in this system the payment gateway allows one to specify which bank they wish to pay from. Then the user is redirected to the bank's website, where one can authenticate oneself and then approve the payment. Typically there will also be some form of
260:
remain the most common form of payment for e-commerce transactions. As of 2008, in North
America, almost 90% of online retail transactions were made with this payment type. It is difficult for an online retailer to operate without supporting credit and debit cards due to their widespread use. Online
411:
In some developing countries, many people do not have access to banking facilities, especially in tier II and tier III cities. Taking the example of India, there are more mobile phone users than there are people with active bank accounts. Telecom operators, in such locations, have started offering
399:
It is typically seen as being safer than using credit cards, as it is much more difficult for hackers to gain login credentials compared to credit card numbers. For many eCommerce merchants, offering an option for customers to pay with the cash in their bank account reduces cart abandonment as it
379:
but can be expensive for the merchant to accept because of transaction fees primarily. Debit cards constitute an excellent alternative with similar security but usually much cheaper charges. Besides card-based payments, alternative payment methods have emerged and sometimes even claimed market
412:
mobile money wallets which allow adding funds easily through their existing mobile subscription number, by visiting physical recharge points close to their homes and offices and converting their cash into mobile wallet currency. This can be used for online transaction and eCommerce purchases.
353:
The speed and simplicity with which cyber-mediary accounts can be established and used have contributed to their widespread use, despite the risk of theft, abuse, and the typically arduous process of seeking recourse when things go wrong. The inherent
358:
of large financial institutions maintaining information safeguards provides the end-user with little insight into the system when the system mishandles funds, leaving disgruntled users frequently accusing the mediaries of sloppy or wrongful behavior;
326:
Despite widespread use in North
America, there are still many countries such as China and India that have some problems to overcome in regard to credit card security. Increased security measures include the use of the
280:
E-commerce payment system often use B2B mode. The security of customer information, business information, and payment information base is a concern during the payment process of transactions under the conventional
312:(TLS) in place to safeguard the portion of the transaction conducted over public networks—especially with payment systems—the customer-facing website itself must be coded with great care, so as not to
363:
between the public and the banking corporations is not improved when large financial institutions are revealed to have taken flagrant advantage of their asymmetric power, such as the 2016
342:
for alternative payment methods at checkout. Many of the mediaries permit consumers to establish an account quickly, and to transfer funds between their on-line accounts and traditional
375:
There are varied types of electronic payment methods such as online credit card transactions, e-wallets, e-cash and wireless payment system. Credit cards constitute a popular method of
331:(CVN) which detects fraud by comparing the verification number printed on the signature strip on the back of the card with the information on file with the cardholder's issuing bank.
620:
Turban, E. King, D. McKay, J. Marshall, P. Lee, J & Vielhand, D. (2008). Electronic
Commerce 2008: A Managerial Perspective. London: Pearson Education Ltd. p. 554
536:
Turban, E. King, D. McKay, J. Marshall, P. Lee, J & Vielhand, D. (2008). Electronic
Commerce 2008: A Managerial Perspective. London: Pearson Education Ltd. p.554
470:
Turban, E. King, D. McKay, J. Marshall, P. Lee, J & Vielhand, D. (2008). Electronic
Commerce 2008: A Managerial Perspective. London: Pearson Education Ltd. p.550
254:(EDI), e-commerce payment systems have become increasingly popular due to the widespread use of the internet-based shopping and banking.
130:
83:
38:
102:
109:
422:
116:
388:
This is a system that does not involve any sort of physical card. It is used by customers who have accounts enabled with
633:
98:
364:
229:
211:
149:
52:
300:
of the electronic information exchanged over the public network involves obtaining a certificate from an authorized
193:
178:
87:
44:
479:
427:
251:
250:) facilitates the acceptance of electronic payment for offline transfer, also known as a subcomponent of
123:
432:
305:
289:
638:
483:
447:
442:
347:
309:
185:
609:
Lowry, Paul
Benjamin, Taylor Wells, Gregory D. Moody, Sean Humpherys, and Degan Kettles (2006). "
261:
merchants must comply with stringent rules stipulated by the credit and debit card issuers (e.g.
189:
76:
360:
611:
Online payment gateways used to facilitate e-commerce transactions and improve risk management
437:
393:
355:
301:
562:
274:
575:
550:
8:
613:", Communications of the Association for Information Systems, vol. 17(6), pp. 1–48 (
334:
There are companies that specialize in financial transactions over the
Internet, such as
313:
566:
588:
328:
498:"Research on model mechanism of B2B transaction based on delivery means of blockchain"
592:
580:
519:
288:
For the vast majority of payment systems accessible on the public
Internet, baseline
570:
509:
389:
335:
270:
376:
320:
293:
282:
514:
497:
627:
584:
523:
614:
404:
343:
338:
for credit card processing, Smartpay for direct online bank payments and
316:
257:
266:
262:
196:. Statements consisting only of original research should be removed.
65:
610:
277:
in the countries where the debit/credit service conducts business.
297:
339:
400:
enables a way to complete a transaction without credit cards.
502:
International
Journal of Technology, Policy and Management
480:
Mastercard: Security Rules and
Procedures-Merchant Edition
549:
Fatonah, S; Yulandari, A; Wibowo, F W (December 2018).
548:
292:(of the financial institution on the receiving end),
496:
Zhou, Kai; Zhao, Weibin; Zhou, Huiyan (2022-01-01).
90:. Unsourced material may be challenged and removed.
625:
16:System that facilitates e-commerce transactions
551:"A Review of E-Payment System in E-Commerce"
495:
370:
53:Learn how and when to remove these messages
615:http://aisel.aisnet.org/cais/vol17/iss1/6
574:
513:
230:Learn how and when to remove this message
212:Learn how and when to remove this message
150:Learn how and when to remove this message
466:
464:
403:
626:
555:Journal of Physics: Conference Series
461:
423:E-commerce credit card payment system
544:
542:
161:
88:adding citations to reliable sources
59:
18:
319:and expose customers to subsequent
13:
603:
14:
650:
539:
365:Wells Fargo account fraud scandal
34:This article has multiple issues.
486:). 2009. Retrieved: May 12, 2009
383:
166:
64:
23:
576:10.1088/1742-6596/1140/1/012033
75:needs additional citations for
42:or discuss these issues on the
530:
489:
473:
1:
454:
7:
428:Electronic data interchange
415:
252:electronic data interchange
192:the claims made and adding
99:"E-commerce payment system"
10:
655:
634:Electronic funds transfer
515:10.1504/IJTPM.2022.122560
433:Electronic funds transfer
394:two-factor authentication
371:Methods of online payment
306:public-key infrastructure
248:electronic payment system
244:e-commerce payment system
448:Online Banking ePayments
443:Payment service provider
348:automated clearing house
329:card verification number
310:transport layer security
269:) in accordance with a
438:Payments as a service
356:information asymmetry
302:certificate authority
350:(ACH) transactions.
275:financial regulation
84:improve this article
567:2018JPhCS1140a2033F
304:(CA) who provides
177:possibly contains
308:(PKI). Even with
240:
239:
232:
222:
221:
214:
179:original research
160:
159:
152:
134:
57:
646:
597:
596:
578:
546:
537:
534:
528:
527:
517:
508:(1–2): 114–140.
493:
487:
477:
471:
468:
390:Internet banking
346:, typically via
235:
228:
217:
210:
206:
203:
197:
194:inline citations
170:
169:
162:
155:
148:
144:
141:
135:
133:
92:
68:
60:
49:
27:
26:
19:
654:
653:
649:
648:
647:
645:
644:
643:
639:Online payments
624:
623:
606:
604:Further reading
601:
600:
547:
540:
535:
531:
494:
490:
478:
474:
469:
462:
457:
452:
418:
409:
386:
373:
298:confidentiality
236:
225:
224:
223:
218:
207:
201:
198:
183:
171:
167:
156:
145:
139:
136:
93:
91:
81:
69:
28:
24:
17:
12:
11:
5:
652:
642:
641:
636:
622:
621:
618:
605:
602:
599:
598:
538:
529:
488:
472:
459:
458:
456:
453:
451:
450:
445:
440:
435:
430:
425:
419:
417:
414:
408:
402:
385:
382:
377:online payment
372:
369:
321:identity theft
294:data integrity
290:authentication
283:B2B e-commerce
238:
237:
220:
219:
174:
172:
165:
158:
157:
72:
70:
63:
58:
32:
31:
29:
22:
15:
9:
6:
4:
3:
2:
651:
640:
637:
635:
632:
631:
629:
619:
616:
612:
608:
607:
594:
590:
586:
582:
577:
572:
568:
564:
561:(1): 012033.
560:
556:
552:
545:
543:
533:
525:
521:
516:
511:
507:
503:
499:
492:
485:
481:
476:
467:
465:
460:
449:
446:
444:
441:
439:
436:
434:
431:
429:
426:
424:
421:
420:
413:
407:money wallets
406:
401:
397:
395:
391:
384:Bank payments
381:
378:
368:
366:
362:
357:
351:
349:
345:
344:bank accounts
341:
337:
332:
330:
324:
322:
318:
315:
311:
307:
303:
299:
295:
291:
286:
284:
278:
276:
272:
268:
264:
259:
255:
253:
249:
245:
234:
231:
216:
213:
205:
195:
191:
187:
181:
180:
175:This article
173:
164:
163:
154:
151:
143:
140:November 2008
132:
129:
125:
122:
118:
115:
111:
108:
104:
101: –
100:
96:
95:Find sources:
89:
85:
79:
78:
73:This article
71:
67:
62:
61:
56:
54:
47:
46:
41:
40:
35:
30:
21:
20:
558:
554:
532:
505:
501:
491:
475:
410:
398:
387:
380:leadership.
374:
352:
333:
325:
287:
279:
258:Credit cards
256:
247:
243:
241:
226:
208:
199:
176:
146:
137:
127:
120:
113:
106:
94:
82:Please help
77:verification
74:
50:
43:
37:
36:Please help
33:
317:credentials
628:Categories
455:References
267:Mastercard
202:March 2012
186:improve it
110:newspapers
39:improve it
593:169710429
585:1742-6588
524:1468-4322
190:verifying
45:talk page
416:See also
563:Bibcode
285:model.
246:(or an
184:Please
124:scholar
591:
583:
522:
405:Mobile
340:PayPal
336:Stripe
296:, and
126:
119:
112:
105:
97:
589:S2CID
361:trust
131:JSTOR
117:books
581:ISSN
559:1140
520:ISSN
314:leak
273:and
271:bank
265:and
263:Visa
103:news
571:doi
510:doi
484:PDF
242:An
188:by
86:by
630::
587:.
579:.
569:.
557:.
553:.
541:^
518:.
506:22
504:.
500:.
463:^
396:.
367:.
323:.
48:.
617:)
595:.
573::
565::
526:.
512::
482:(
233:)
227:(
215:)
209:(
204:)
200:(
182:.
153:)
147:(
142:)
138:(
128:·
121:·
114:·
107:·
80:.
55:)
51:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.