What is Payment Cards?
Payment cards are physical or virtual cards that are issued by financial institutions or payment processors and are used to make payments for goods and services. Payment cards come in various forms, including credit cards, debit cards, prepaid cards, and gift cards.
Table of Content
Currently, credit cards and debit cards represent the most common forms of e-payment. These cards are mostly plastic cards with an inbuilt magnetic stripe. These cards are assigned numbers that help in the identification and authentication of the user.
Benefits of Payment Cards
Some benefits of payment cards are as follows:
- Payment is convenient and secure.
- They allow consumers the flexibility of payment without the need to carry a large amount of cash in their pockets.
- They offer consumers the power to purchase items in a physical store, through the Internet and mail-order catalogs, or even over the phone.
- They save time for both merchants and customers.
Issues with Payment Cards
However, there are certain issues related to the use of payment cards, which are as follows:
- A payment card holds the entire information, such as the cardholder’s name, expiry date, Card Verification Value (CVV), etc. In case these cards are misplaced or stolen, they can be easily misused. However, the use of a secure Personal Identification Number (PIN) solves the problem to a great extent.
- The use of payment cards over the Internet increases the chances of information being hacked for misuse later. Customers must ensure that the website and payment gateways are secure.
- Since these cards can be used to make payments easily, people generally indulge in impulse buying exceeding their budgets. Cash statements and maintaining records can reduce this problem.
- The payment mechanism of these cards depends on technology. In case of technical failure, the payment process might be blocked.
Types of Payment Cards
Let us now study these payment cards in detail in the subsequent sections.
Credit Cards
Credit cards are used for short-term credit and repayment options. They enable customers to cover unexpected expenses and make everyday purchases. They also help to establish the credit histories of customers. A credit history is required to apply for loans and other long-term financial commitments.
A credit card is a thin plastic card with identification information along with a person’s name and signature on it. It is used to charge customers for their purchases or services to their accounts for which they will be billed periodically. The identification information on the card is read by ATMs, store readers, banks, the Internet, etc.
The back of the credit card has a black magnetic stripe, which is made up of tiny iron-based magnetic particles in a plastic-like film. Once a customer swipes the credit card through a card reader and enters the PIN, the Electronic Data Capture (EDC) software at the Point-of-Sale (POS) terminal dials a stored telephone number (using a modem) to reach the acquirer. An acquirer is an organization that acquires credit-authentication requests from merchants and sends payment guarantees back to the merchants.
When the acquirer receives the credit card authentication request, it verifies the transaction for validity and checks the magnetic stripe for:
- Merchant ID
- Validity of the card number
- Expiration date
- Credit card limit
- Card usage
After verification, the acquirer transfers the data back to the merchant, generating an approval code. The merchant enters this code after which two copies of the charge slip are generated. The charge slip is the customer’s agreement to repay to the issuing bank the amount of the purchase within a period. One slip is retained by the merchant, while the other is the customer’s copy.
The CVV code on the back of a credit or debit card is a security feature for credit or debit card transactions, providing enhanced protection against credit card fraud.
Debit Cards
Debit cards are directly linked to the customers’ accounts, allowing instant access to cash from ATMs around the world and at many retail POS locations. The process of payment using a debit card is much similar to that of a credit card. When a customer swipes his debit card and enters the PIN, the details are transmitted through the merchants or POS terminal to an authentication terminal. The terminal checks the magnetic strip on the back of the card and transmits the data to a card-processing network.
The network performs a fraud analysis and sends the information to the issuing bank. The bank authenticates that the card is valid and confirms the availability of funding in the customer’s account. The merchant is notified again through the network, whether the transaction has been approved.
The 16 digits on the card are used for the authorization and authentication of the cardholder. The digits consist of:
- A six-digit Issuer Identification Number (IIN), previously called the Bank Identification Number (BIN), of which the first is the Industry ID indicating the type of card, such as VISA or Maestro.
- An individual account identifier, usually up to 12 digits.
- A single check digit is calculated based on a simple checksum formula used to validate a variety of identification numbers.
Prepaid Cards
Prepaid cards are also referred to as stored-value cards since a set amount of money has been loaded into these cards for use later. These are one of the most commonly used payment methods. Prepaid cards can be reloaded with cash repeatedly. They offer greater flexibility than credit cards and debit cards.
Although prepaid cards resemble credit and debit cards in appearance, they are not like credit cards, which provide you with a line of credit, or debit cards, which are linked to a bank account with an overdraft facility. When a transaction is made by a customer, the amount of purchase is reduced from the prepaid card’s value. A customer can only spend the money that has been loaded onto the card.
Prepaid cards can be of two types, which are as follows:
- Single-purpose cards: They are also called closed-loop cards, as they are designated for a specific merchant or purpose only and cannot be used beyond that. Examples of single-purpose cards are store-branded cards, prepaid telephone cards, and benefits cards offered by employers.
- Multi-purpose cards: They are also called open-loop cards and carry the logo of the bank card association that has issued the multi-purpose cards, such as VISA or MasterCard. For example, a multi-purpose card holding a Visa logo can be used to avail cash at ATMs and purchase products at places where Visa credit or debit cards are accepted. Examples of multi-purpose cards are gift cards.
Smart Cards
A smart card is a plastic card similar in appearance to a credit or debit card, but it has an embedded microchip loaded with data. The microprocessor is enclosed in a gold contact pad on one side of the card. The microprocessor is loaded with information just like the magnetic black strip on the back of debit and credit cards. However, the information in a microprocessor is vast and programmed for different applications.
Smart cards can be used with a smart-card reader attached to a personal computer to authenticate a user. The host computer and card reader rereadshe information on the microprocessor. This microprocessor on the smart card ensures security and administers access to the data on the card. Smart cards are used for electronic payments, telephone booth calling, or satellite television access.
Smart cards can be of two types, which are as follows:
- Contact smart cards: These cards require a card reader to read and update information.
- Contactless smart cards: These cards do not require a card reader to read and update information.
Business Analytics Tutorial
(Click on Topic to Read)
- What is Data?
- Big Data Management
- Types of Big Data Technologies
- Big Data Analytics
- What is Business Intelligence?
- Business Intelligence Challenges in Organisation
- Essential Skills for Business Analytics Professionals
- Data Analytics Challenges
- What is Descriptive Analytics?
- What is Descriptive Statistics?
- What is Predictive Analytics?
- What is Predictive Modelling?
- What is Data Mining?
- What is Prescriptive Analytics?
- What is Diagnostic Analytics?
- Implementing Business Analytics in Medium Sized Organisations
- Cincinnati Zoo Used Business Analytics for Improving Performance
- Dundas Bi Solution Helped Medidata and Its Clients in Getting Better Data Visualisation
- What is Data Visualisation?
- Tools for Data Visualisation
- Open Source Data Visualisation Tools
- Advantages and Disadvantages of Data Visualisation
- What is Social Media?
- What is Text Mining?
- What is Sentiment Analysis?
- What is Mobile Analytics?
- Types of Results From Mobile Analytics
- Mobile Analytics Tools
- Performing Mobile Analytics
- Financial Fraud Analytics
- What is HR Analytics?
- What is Healthcare Analytics?
- What is Supply Chain Analytics?
- What is Marketing Analytics?
- What is Web Analytics?
- What is Sports Analytics?
- Data Analytics for Government and NGO
E-Business
Enterprise Resource Planning
- What is Enterprise Resource Planning?
- Benefits and Advantages of ERP & Reasons for Growth
- Success Factors of ERP Implementation
- ERP Implementation Life Cycle
- Risk in ERP Implementation, Cross Function, ERP Technology
- Maintenance of ERP
- What is Business Model?
- Business Process Reengineering (BPR)
- Types of Information Systems: TPS, MIS, DSS, EIS
- What is SAP?
- Modules of ERP Software
- SAP Application Modules
- SAP R/3 System
- ERP Modules
- ERP in Manufacturing
- ERP Purchasing Module
- What is SAP Sales and Distribution (SAP SD)?
- ERP Inventory Management Module
- ERP Implementation
- ERP Vendors, Consultants and Users
- BaaN ERP
- Oracle Corporation
- PeopleSoft ERP
- Edwards & Company ERP
- Systems Software Associates ERP
- QAD ERP
- What is ERP II?
- ERP Implementation at Rolls-royce
Management Information Systems
- What is MIS?
- Requirements of Management Information System
- What is Risk Management?
- Nolan Six Stage Model
- What is Cloud Computing?
- Types of Information Systems: TPS, MIS, DSS, EIS
- Information Systems in Organisations
- Challenges Faced by Manager in Managing Information Systems
- Decision Making With MIS
- What is E-Governance?
- What is Green IT?
- What is Smart Cities?
- What is IT Infrastructure?
- What is Cloud Computing?
- Cloud Service Models
- Cloud Migration Challenges
- Security Threats Faced by Organization
- Managing Security of Information Systems
- Software Project Management Challenges
- What is Data Management?
- What is Database?
- What is Data Warehouses?
- Enterprise Resource Planning Systems
Project Management
- What is Project Management?
- Functions of Project Management
- What is Project?
- Project Managers
- What is Project Life Cycle?
- Project Feasibility Study
- What is Project Analysis?
- What is Project Planning?
- What is Project Selection?
- What is Project Schedule?
- What is Project Budget?
- What is Project Risk Management?
- What is Project Control?
- Project Management Body of Knowledge (PMBOK)
- Best Project Management Tools
- What is Project Organisation?
- What is Project Contract?
- Types of Cost Estimates
- What is Project Execution Plan?
- Work Breakdown Structure (WBS)
- Project Scope Management
- Project Scheduling Tools and Techniques
- Project Risk Identification
- Risk Monitoring
- Allocating Scarce Resources in IT Project
- Goldratt’s Critical Chain
- Communication in Project Management | Case Study
- Plan Monitor Control Cycle in Project Management
- Reporting in Project Management
- IT Project Quality Plan
- Project Outsourcing of Software Development
- Implementation Plan of Software Project
- What is Project Implementation?
- What is Project Closure?
- What is Project Evaluation?
- Software Project Management Challenges
- What is Project Management Office (PMO)?
- IT Project Team
- Business Case in IT Project Life Cycle
- PMP Study Guide
Emerging Technologies