Open Access   Article Go Back

Reviews on Digital Payment System

S. Ramani1

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 119-123, Dec-2018

Online published on Dec 31, 2018

Copyright © S. Ramani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Ramani, “Reviews on Digital Payment System,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.119-123, 2018.

MLA Style Citation: S. Ramani "Reviews on Digital Payment System." International Journal of Computer Sciences and Engineering 06.11 (2018): 119-123.

APA Style Citation: S. Ramani, (2018). Reviews on Digital Payment System. International Journal of Computer Sciences and Engineering, 06(11), 119-123.

BibTex Style Citation:
@article{Ramani_2018,
author = {S. Ramani},
title = {Reviews on Digital Payment System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {119-123},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=554},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=554
TI - Reviews on Digital Payment System
T2 - International Journal of Computer Sciences and Engineering
AU - S. Ramani
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 119-123
IS - 11
VL - 06
SN - 2347-2693
ER -

           

Abstract

this paper digital payments are using in developing countries. As the world has become globalized, it is tough to give the whole perspective of digital payments & how this is really helpful in our day-to-day life. This work will give maximum contribution to the knowledge and understanding the digital payment. It reveals that covered some basic points of digital payments & customer relationship management that goes to little higher level. So that it can give the overview on its structure & how it works. The customer can place orders at home to save their time. Digital payment systems have a very important role in E-commerce and they are used to complete E-commerce transactions. The purpose of this paper is to introduce current state, the challenges and future expectations of Digital Payment Systems. It depicts that the details of history of the e-commerce, the current situation of e-commerce and the methods of digital payment systems used in e-commerce. The results of the research show that now-a-days online payment systems are popular. All the respondents have experience on digital payments. Debit card (Visa or MasterCard) and Net Bank, PayPal, Payment wall ,Google Wallet, Mobile Money Wallets, Braintree, Stripe are the most popular digital payment systems, not only in countries. The second one is third-party digital payment systems. PayPal is more popular in the country. The two main factors contributing to choosing digital payment system are convenience and the quickness of transaction. Technical problems and vulnerability to cyber-crime are the main pros of digital payment system. Malware attack and financial issue are the main challenges of digital payment. Having a secure, reliable and trustworthy digital payment environment is important.

Key-Words / Index Term

Digital payment system, card types, payment

References

[1] Vineet Kandpal and **R. K. Singh, Latest Face of Cybercrime and Its Prevention In India, International Journal of Basic and Applied Sciences Vol. 2. No. 4. 2013
[2] Er. Harpreet Singh Dalla, Ms. Geeta HOD, Department of CSE & IT Patiala Institute of Engineering & Technology for Women, Patiala, India, Cyber Crime – A Threat to Persons, Property, Government and Societies, Volume 3, Issue 5, May 2013 ISSN: 2277 128X
[3] Jamal Raiyn, A survey of Cyber Attack Detection Strategies, International Journal of Security and Its Applications Vol.8, No.1 (2014).
[4] Angel cruz,chief information security officer state of Texas, cyber security tips, monthly newsletter 2013
[5] Atul M. Tonge1, Suraj S. Kasture2, Surbhi R. Chaudhari3 IOSR Journal of Computer Engineering (IOSR-JCE) CSE, Cyber security: challenges for society,ISSN: 2278-0661, p- ISSN: 2278-8727, Volume 12, Issue 2 (May. - Jun. 2013).
[6] Forensic technology services cybercrime survey report 2014 kpmg.com/in
[7] Atul Kum ar, Sr. Analyst, Chiranshu Ahuja, Sr. Analyst, Cyber Security Research Developments Global and Indian Context, A NASSCOM® Initiative
[8] Sumanjit Das and Tapaswini Nayak, “impact of cyber crime: issues and challenges‖, International Journal of Engineering Sciences & Emerging Technologies, October 2013. ISSN: 22316604 Volume 6, Issue 2, pp: 142-153.
[9] Janhavi J Deshmukh and Surbhi R Chaudhari, Cyber crime in Indian scenario – a literature snapshot, International Journal of Conceptions on Computing and Information Technology Vol.2, Issue 2, April‘ 2014; ISSN: 2345 – 9808.
[10] Shantosh Rout (2008), Network Interferences, Available at: http://www.santoshraut.com/ forensic/ cybercrime.htm, Visited: 28/01/2012
[11] By Jessica Stanicon (2009), Available at: http://www.dynamicbusiness.com/articles/articles-news/one-in-five-victims-of-cybercrime3907.html, Visited: 28/01/2012.
[12] Ictact Journal On Soft Computing: Special Issue On Soft Computing Models For Big Data, July 2015, Volume: 05, Issue: 04 1035
[13] Application Of Big Data In Education Data Mining And Learning Analytics – A Literature Review -Katrina Sin1 and Loganathan Muthu2-1Faculty of Education and Languages, Open University Malaysia, Malaysia-http://bmcbioinformatics.biomedcentral.com/articles/10.1186/1471-2105-11-12-1
[14] https://developer.yahoo.com/blogs/hadoop/comparing-pig-latin-sql-constructing-data-processing-pipelines-444.html
[15] M.Chen et al., Big data: Related Technologies, Challenges and future Prospects,:"-Springer Brief in computer science 319-06245-7_6#page-2.
[16] Newswise (2009), China Linked to 70 Percent of World`s Spam, Says Computer Forensics Expert, Available at: http://www.newswise.com/articles/view/553655/, Visited: 28/01/2012.
[17] Cyberlawtimes (2009), Available at: http://www.cyberlawtimes.com/forums/index.php?board =52.0, Visited: 10/31/09
[18] Kevin G. Coleman (2011), Cyber Intelligence: The Huge Economic Impact of Cyber Crime, Available at: http://gov.aol.com/2011/09/19/cyber-intelligence-the-huge-economic-impact-of-cyber-crime/, Visited: 28/01/2012
[19] Gordon, L. A. et al., 2003, A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, 46(3): 81-85.
[20] D. Ariz. (April 19, 2000), American Guarantee & Liability Insurance Co. v. Ingram Micro, Inc. Civ. 99-185 TUC ACM, 2000 U.S. Dist. Lexis 7299.
[21] Kelly, B. J., 1999, Preserve, Protect, and Defend, Journal of Business Strategy, 20(5): 22-26.
[22] Berinato, S. (2002), Enron IT: A take of Excess and Chaos, CIO.com, March 5 http://www.cio.com/executive/edit/030502_enron.html, Visited: 28/01/2012
[23] Power, R., 2001, 2001 CSI/FBI Computer Crime and Security Survey, Computer Security Issues and Trends, 7(1): 1-18.
[24] Hoffer, J. A., and D. W. Straub, 1989, The 9 to 5 Underground: Are You Policing Computer Crimes?, Sloan Management Review (Summer 1989): 35-43
[25] Sprecher, R., and M. Pertl, 1988, Intra-Industry Effects of the MGM Grand Fire, Quarterly Journal of Business and Economics, 27: 96-16.
[26] Baskerville, R., 1991, Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security, European Journal of Information Systems, 1(2): 121-130.
[27] Lyman, J., 2002, In Search of the World‘s Costliest Computer Virus, http://www. newsfactor.com/perl/story/16407.html. 2002.
[28] D‘Amico, A., 2000, What Does a Computer Security Breach Really Cost?, The Sans Institute
[29] Hancock, B., 2002, Security Crisis Management—The Basics, Computers & Security, 21(5): 397-401.
[30] Cyber Trust and Crime Prevention, Mid-Term Review, November 2005 – January 2009, Available at: http://www.bis.gov.uk/assets/bispartners/foresight/docs/cyber/ctcp_midterm_ review.pdf, Visited: 28/01/2012