Category: Electronic Payments
February 20th, 2014 by Elma Jane
Android-iPhone-Credit-Card-Reader
Several options exist for mobile credit card processing.
Credit card processing on iPhone/ipad/Android/BlackBerry or Tablets – Using NTC’s portable credit card readers, merchants can now swipe credit cards on iPad or Android tablet devices. NTC’s Virtual Merchant solution allows users to download a secure application to interfere your smartphone with our merchant account services seamlessly. The application and credit card processing data on the carriers network or a WiFi connection to the internet.
NTC’s MagTek Bullet Swipe Credit Card Reader for Android Phones and Tablets.
Using any Android 2.2. or higher device you can process credit card transactions securely to the smartphone via Bluetooth and utilize wireless devices internet connection (WiFi or Carrier) to send the credit card processing data encrypted for processing approval.
Security anywhere. With the BulleT Secure Credit Card Reader Authenticator (SCRA), security comes with the flexibility and portability of a Bluetooth wireless interface. Small enough to fit into the palm of your hand, the BulleT enables secure wireless communications with a PC or mobile phone using the popular Bluetooth interface. Not only does the BulleT encrypt card data from the moment the card is swiped, but it also enables card authentication to immediately detect counterfeit or altered cards.
Ideal for merchant services accounts and financial institutions’’ mobile credit card processing, NTC’s BulleT offers MagnaSafe credit card processing security features with the convenience of a Bluetooth interface. This powerful combination assures credit card data protection, transaction security and convenience needed to secure mobile credit card processing with strong encryption and 2-factor authentication. The BulleT is specifically designed to leverage the existing magnetic stripe credit card reader as a secure token empowering cardholders with the freedom and confidence of knowing that their credit card transactions are secure and protected anytime, anywhere. Android Credit Card Swipe Reader for Android Phones and Tablets on your wireless mobile merchant account.
NTC’s MagTek iDynamo Credit Card processing swipe reader for iPhone and Ipad.
Credit card processing on an iPhone has never been easier. Simply attach NTC’s iDynamo card reader to your iPhone or iPad device, install our Virtual Merchant software from the App Store and you’re ready to go. Take advantage of lower credit card processing rates by processing swiped transactions instead of keying the credit card in later and get paid faster. From the company that leads with Security from the Inside MagTek has done it again with the iDynamo, a secure card reader authenticator (SCRA) designed to work with the iPhone and iPad. The iDynamo offers MagnasafeTM security and delivers open standards encryptions with simple, yet proven DUKPT key management, immediate tokenization of card data and MagnePrint card authentication to maximize data protection and prevent the use of counterfeit cards. Mobile merchants can now leverage the power of their iPhone/iPod Touch products without the worries of handling or storing sensitive card data at any time. Ideal for wireless mobile merchant accounts and mobile credit card processing, the iDynamo offers MagneSafe security features combined with the power of iPhone and iPod Touch products. This powerful combination assures convenience and cost savings, while maximizing credit card data protection and credit card transaction security from the moment the card is swiped all the way to authorization. No other credit card reader beats the protection offered by a MagnaSafe product.
Other credit card devices claim to encrypt data in the reader. NTC’s iDynamo encrypts the data inside the read head, closest to the magnetic stripe and offers additional credit card security layers with immediate tokenization of card data and MagnePrint card authentication. This layered approach to security far exceeds the protection of encryption by itself, decreases the scope of PCI compliance, and reduces fraud.
NTC’s iDynamo is rugged and affordable, so it not only withstands real world use, it performs to the high standards set by MagTek as the leader in magnetic credit card swipe reading products for nearly 40 years.
Posted in Credit card Processing, Credit Card Reader Terminal, Credit Card Security, Digital Wallet Privacy, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Merchant Services Account, Mobile Payments, Mobile Point of Sale, Payment Card Industry PCI Security, Smartphone Tagged with: Android, android phones and tablets, authenticator, blackberry, bluetooth, card authentication, credit card processing data, devices, encrypt card data, encrypted, internet, ipad, Iphone, magnetic stripe, magtek bullet, merchant account, merchant services accounts, Merchant's, mobile credit card processing, portable credit card readers, process credit card transactions, processing approval, secure, secure application, secure token, smartphone, swipe credit card reader, swipe credit cards, tablets, transaction security, virtual merchant, wifi, wireless devices internet connection
February 18th, 2014 by Elma Jane
Payment Tokenization Standards
Tokenization is the process of replacing a traditional card account number with a unique payment token that is restricted in how it can be used with a specific device, merchant, transaction type or channel. When using tokenization, merchants and digital wallet operators do not need to store card account numbers; instead they are able to store payment tokens that can only be used for their designated purpose. The tokenization process happens in the background in a manner that is expected to be invisible to the consumer.
EMVCo – which is collectively owned by American Express, Discover, JCB, MasterCard, UnionPay and Visa – has announced that it is expanding its scope to lead the payments industry’s work to standardize payment tokenization. EMVCo says that the new specification will help provide the payments community with a consistent, secure and interoperable environment to make digital payments when using a mobile handset, tablet, personal computer or other smart device.
Key elements of EMVCo’s work include adding new data fields to provide richer industry information about the transaction, which will improve transaction efficiency and enhance the consumer and merchant payment experience by helping to prevent fraudulent card account use. EMVCo will also create a consistent approach to identify and verify the valid use of a token during payment processing including authorization, capture, clearing and settlement.
EMVCo’s announcement follows an earlier joint announcement from MasterCard, Visa and American Express that proposed an initial framework for industry collaboration to standardize payment tokenization. EMVCo says it will now build on this framework with collective input from all of its members and the industry as a whole.
Posted in Credit card Processing, Credit Card Reader Terminal, Credit Card Security, Digital Wallet Privacy, Electronic Payments, Financial Services, Payment Card Industry PCI Security, Visa MasterCard American Express Tagged with: American Express, authorization, capture, card account numbers, clearing, data fields, device, digital payments, Digital Wallet, Discover, EMV, emvco, fraudulent card account, interoperable, jcb, MasterCard, merchant, mobile handset, payment, payment processing, payment token, secure, security standards, settlement, smart device, specification, standardize, tablet, token, tokenization, transaction, visa
February 17th, 2014 by Elma Jane
Facts about Chargeback
Merchants know chargebacks are bad, but many aren’t aware of simple facts that can help them better understand and guard against fraud accordingly.
Do you know which month is the worst for fraud charge backs?
which transaction amounts are the most likely to be disputed?
or which U.S. states are the biggest offenders?
If not, a Big Data fraud science firm – will help you prepare for a smoother 2014.
Facts you’ll learn:
The most common fraudulent chargeback amount.
The day of the week when chargebacks are most likely to occur.
The time of year charge backs are most likely to occur.
49% of all fraudulent chargebacks happen after 60 days or more from date of purchase.
$1,000 is the most common attempted unauthorized sales amount (followed by $2,500, $2,000, $1,500 and $5,000).
11% of all fraudulent transactions fall under the Merchant category “Code of 7299”.
Services. The word most often found in registered fictitious names for fraudulent merchant accounts is “Services”.
Wednesday Is the day of the week when the most chargebacks (19%) occur.
One-Third of all fraud chargebacks happen in the fall (September to November).
California Republic is the top state registered by fraudulent businesses, accounting for 14% of chargebacks the U.S. total.
Florida, Texas and New York round out the top four states with 12%, 9% and 7% respectively.
Posted in Best Practices for Merchants, Credit card Processing, Credit Card Security, Electronic Payments, Merchant Services Account, Payment Card Industry PCI Security Tagged with: big data, charge backs, chargeback, disputed, fraudulent businesses, fraudulent transactions, guard against fraud, merchant accounts, unauthorized sales
February 14th, 2014 by Elma Jane
News from Target, increasing the number of cards compromised to 70 million and the expansion of data loss to mailing and email addresses, phone numbers and names, affirms that we are in a security crisis.
Card data is from a brand and business perspective, the new radioactive material. Add personally identifiable information (PII) to the list of toxic isotopes.
The depressing vulnerabilities these breaches reveal are a result of skilled hackers, the Internet’s lack of inherent security, inadequate protections through misapplied tools or their outright absence. Security is very very hard when it comes to playing defense.
There is a set of new technologies that could, in a combination produce a defense in depth that we have not enjoyed for some time.
Looking at the Age of Context (ACTs)
Age of Context released, a book based on the hundreds of interviews conducted with tech start-up and established company leaders. A wide-ranging survey. They examine what happens when our location and to whom we are connected are combined with the histories of where and when we shop. Result is a very clear picture of our needs, wants and even what we may do next.
Combining the smartphone and the cloud, five Age of Context technologies ACTs, will change how we live, interact, market, sell and navigate through our daily and transactional lives. The five technologies are:
1. Big Data. Ocean of data generated from mobile streams and our online activity, can be examined to develop rich behavioral data sets. This data enables merchants to mold individually targeted marketing messages or to let financial institutions improve risk management at an individual level.
2. Geolocation. Nearly every cell phone is equipped with GPS. Mobile network operators and an array of service providers can now take that data to predict travel patterns, improve advertising efficiency and more.
3. Mobile Devices and Communications. These are aggregation points for cloud-based services, sending to the cloud torrents of very specific data.
4. Sensors. Smartphones, wearables (think Fitbits, smart watches and Google Glass) and other devices are armed with accelerometers, cameras, fingerprint readers and other sensors. Sensors enable highly granular contextual placement. A merchant could know not only which building we are at and the checkout line we are standing in but even which stack of jeans we are perusing.
5. Social. Social networks map the relationships between people and the groups they belong to, becoming powerful predictors of behavior, affiliations, likes, dislikes and even health. Their role in risk assessment is already growing.
The many combinations and intersections of these technologies are raising expectations and concerns over what is to come. Everyone has a stake in the outcome: consumers, retailers, major CPG brands, watchdog organizations, regulators, politicians and the likes of Google, Apple, Microsoft, Amazon, eBay / PayPal and the entire payments industry.
We are at the beginning of the process. We should have misgivings about this and as an industry, individuals and as a society, we need to do better with respect to privacy and certainly with respect to relevance.
Provided we can manage privacy permissions we grant and the occasionally creepy sense that someone knows way too much about us, the intersections of these tools should provide more relevant information and services to us than what we have today. Anyone who has sighed at the sight of yet another web ad for a product long since purchased or completely inappropriate to you understands that personalized commerce has a long way to go. That’s part of what the Age of Context technologies promise to provide.
ACTs in Security
ACTs role in commerce is one albeit essential application. They have the potential to power security services as well, specially authentication and identity-based approaches. We can combine data from two or more of these technologies to generate more accurate and timely risk assessments.
It doesn’t take the use of all five to make improvements. One firm have demonstrated that the correlation of just two data points is useful, it demonstrated that if you can show that a POS transaction took place in the same state as the cardholder’s location then you can improve risk assessment substantially. (based off of triangulated cell phone tower data).
Powerful questions of each technology that ACTs let us ask:
Data – What have I done in the past? Is there a pattern? How does that fit with what I’m doing now?
Geolocation – What building am I in? Is it where the transaction should be? Which direction am I going in or am I running away?
Mobile – Where does device typically operate? How’s the device configured? Is the current profile consistent with the past?
Sensors – Where am I standing? What am I looking at? Is this my typical walking gait? What is my heart rate and temperature?
Social – Am I a real person? Who am I connected to? What is their reputation?
Knowing just a fraction of the answers to these questions places the customer’s transaction origination, the profiles of the devices used to initiate that transaction and the merchant location into a precise context. The result should improve payment security.
More payments security firms are making use of data signals from non-payment sources, going beyond the traditional approach of assessing risk based primarily on payment data. One firm have added social data to improve fraud detection for ecommerce payment risk scoring. Another firm, calling its approach Social Biometrics, evaluates the authenticity of social profiles across multiple social networks including Facebook, Google+, LinkedIn, Twitter and email with the goal of identifying bogus profiles. These tools are of course attractive to ecommerce merchants and others employing social sign on to simplify site registration. That ability to ferret out bogus accounts supports payment fraud detection as well.
This triangulation of information is what creates notion of context. Apply it to security. If you can add the cardholder’s current location based on mobile GPS to the access device’s digital fingerprint to the payment card, to the time of the day when she typically shops, then the risk becomes negligible. Such precise contextual information could pave the way for the retirement of the distinction between card present and card-not-present transactions to generate a card-holder-present status to guide risk decision-making.
Sales First, Then Security
The use of ACT generated and derived signals will be based on the anticipated return for the investment. Merchants and financial institutions are more willing to pay to increase sales than pay for potential cost savings from security services. As a result, the ACTs will impact commerce decision making first-who to display an ad to, who to provide an incentive to.
New Combinations
Behind the scene, the impact of the ACTs on security will be fascinating and important to watch. From a privacy perspective, the use of the ACTs in security should prove less controversial because their application in security serves the individual, merchant and the community.
Determining the optimal mix of these tools will take time. How different are the risks for QR-code initiated transactions vs. a contactless NFC transaction? What’s the right set of tools to apply in that case? What sensor-generated data will prove useful? Is geolocation sufficient? Will we find social relationships to be strong predictor of payment risk or are these more relevant for lending? And what level of data sharing will the user allow-a question that grows in importance as data generation and consumption is shared more broadly and across organizational boundaries. It will be important for providers of security tools to identify the minimum data for the maximum result.
I expect the ACT’s to generate both a proliferation of tools to choose from and a period of intense competition. The ability to smoothly integrate these disparate tools sets will be a competitive differentiator because the difficulty of deployment for many merchants is as important as cost. Similar APIs would be a start.
Getting More from What We Already Have
The relying parties in a transaction – consumers, merchants, banks, suppliers – have acquired their own tools to manage those relationships. Multi-factor authentication is one tool kit. Banks, of course issue payment credentials that represent an account and proxy for the card holder herself at the point of sale or online. Financial institutions at account opening perform know your customer work to assure identity and lower risk.
Those siloed efforts are now entering an era where the federated exchange of this user and transactional data is becoming practical. Firms are building tools and the economic models to leverage these novel combinations of established attributes and ACT generated data.
The ACTs are already impacting the evolution of the payments security market. Payment security incumbents, choose just two from the social side, find themselves in an innovation rich period. Done well, society’s security posture could strengthen.
Posted in Best Practices for Merchants, Credit card Processing, Credit Card Security, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Payment Card Industry PCI Security, Point of Sale, Smartphone, Visa MasterCard American Express Tagged with: big data, breaches, card data, cardholders, checkout lines, commerce, data loss, data sets, digital, ecommerce, geolocation, GPS, inherent security, Merchant's, Mobile Devices, mobile network, online activity, personally identifiable information, pii, POS, Security, security crisis, sensors, smartphone, social networks, transaction, transactional, travel patterns, vulnerabilities
February 13th, 2014 by Elma Jane
How To Target Customers Based on Past Purchase Behavior
One of the best ways to predict how someone will behave in the future is to look at what they’ve done in the past. By tracking a consumer’s past purchasing behavior, marketers can design highly targeted ads based on the specific preferences and tastes of individual customers.
The question, of course, is how to gain access to data about a consumer’s spending history without violating privacy standards. For many marketers, the answer is to partner with a vendor that provides card-linked offers. A survey of 300 marketers found that three-quarters believe card-linking marketing programs will replace existing types of advertising in the years to come – a strong vote of confidence from the very industry vendors are trying to tap.
Here are tools that marketers can use to gather information about their customers’ past purchasing habits.
1. BlueKai: Find prospects based on previous buying habits.
BlueKai offers marketers a third-party marketplace, known as the Audience Data Marketplace, where they can collect data on consumers in their target demographics. One type of data that marketers can collect is past purchasing behavior. Marketers can search for consumers who are likely to buy their products based on their previous spending habits. For example, an electronics brand may search for data about consumers who’ve purchased laptops in the past year. Using this information, marketers are able to create more targeted campaigns that are delivered only to those shoppers in qualified demographics.
2. Cardlytics: Learn where else your customers shop.
Cardlytics provides advertisers with insight into the purchasing behavior of more than 30 million households. Marketers have the option to target only those buyers who have been active in their sector. Cardlytics tracks where a consumer shops, when they shop, where they live, and how much they spend. For example, a retailer might only collect information about consumers who have spent more than $1,000 at competing businesses in the tri-state area. Using the Cardlytics platform, advertisers can create targeted offers meant to improve loyalty or build stronger customer relationships. Cardlytics offers pay-for-performance pricing.
3. Cartera: Reward consumers for shopping at retail partners.
Businesses that are looking to improve the effectiveness of their rewards programs can use Cartera’s card-linked platform to gain additional insight into the spending patterns of their top customers. By connecting loyalty programs to their customer’s credit and debit cards, marketers can offer better rewards — including cash back and airline miles. Retailers also have the option to reward consumers for shopping at “complementary merchants.” A few of Cartera’s best-known clients include Best Buy and Charter Communication.
4. Catalina: Actively pinpoint the shopping behaviors of specific buyers.
Using Catalina’s BuyerVision tool, marketers are able to target their digital advertising – including display, video and mobile – based on past purchasing behaviors. Catalina analyzes the in – store purchasing behavior of consumers and matches that data to online behaviors using cookies. For example, a grocery store could send recipe ideas to consumers who have purchased a specific combination of items in the past week. The company says it has access to transactions at more than 30,000 stores, allowing its clients to define their target audiences send mobile ads to more than 70 million households.
5. Edo Interactive: Target consumers based on competitive spending patterns.
Brands, agencies, and even small businesses can use edo Interactive’s card-linked marketing platform to send targeted offers to consumers based on their competitive spending patterns. The company has partnered with more than 200 banks, giving clients access to information about 200 million consumers. As a result, marketers connect their advertising to in-store purchases and send consumers relevant offers that they’re likely to redeem. Taking it a step further, edo’s Geocommerce feature combines purchase data with location information. Edo operates on a pay-for-performance model, which means marketers only pay when the customers they’ve targeted make purchases at their businesses.
Posted in Best Practices for Merchants, Credit card Processing, Electronic Payments Tagged with: access to transactions, competitive spending patterns, complementary merchants, consumer's spending, customer's credit and debit cards, customers purchase, in-store-purchases, Loyalty Programs, marketing platform, online behaviors, previous buying habits, purchasing behavior, purchasing behaviors, retailers, rewards, shoppers, store purchasing behavior, target demographics, targeted campaigns
February 13th, 2014 by Elma Jane
Becoming an e-commerce entrepreneur is an increasingly attainable dream for many aspiring business owners, as new online sales platforms and Web design tools continue to emerge. While just about anyone can launch an online business, it takes a dedicated salesperson to actually succeed, and that means staying on top of current marketplace trends.
If you’re ready to take your e-commerce business to the next level in 2014, watch these five current trends in online sales:
Access through smartphones, tablets and other mobile devices. Major gains seen in e-commerce usage of mobile devices such as smartphones and tablets, especially during the holiday season. Trend to accelerate as mobile adoption continues to increase and more mobile technologies become available. Small businesses should have a mobile version of their website, with mobile-optimized checkout to help facilitate a better mobile experience. Small retailers should also look at their site across multiple mobile devices and pay attention to new technologies, such as smartwatches.
Goodbye, traditional SEO. Google is constantly updating its algorithm in an effort to serve the best, most relevant content to its users. This means that traditional (SEO) search engine optimization tactics are falling by the wayside, and an increased push toward quality, unique content — along with social media signals — will be of huge importance in 2014. To help stay ahead of the SEO curve, small retailers should focus less on Traditional SEO Tenets like keyword usage and density, and instead aim efforts toward creating content that is tailored and useful for their target audience. Example, create more lifestyle-oriented content in the form of blog posts, videos and other types of media that encourage sharing by readers.
Increased dependence on data. Smaller online businesses continue to expand their presence across channels, the need to turn to performance data from both a channel-specific and holistic standpoint becomes even more important. Google Analytics is a good tool for this, because business owners can measure their site traffic from multiple devices and referral sites.
Small shops squeezed by larger merchants. Mega-retailers like Amazon continue to steal market share from other big-box retailers (both online and offline), smaller online businesses will need to become more nimble in how they compete, from a price, customer-service and marketing standpoint. This involves identifying true points of difference from larger merchants, showcasing these points in marketing and branding, and delivering personalized experiences.
The importance of multichannel selling. Customer shopping behaviors become more fragmented, so must the presence of small online businesses owners. Simply having an e-commerce site is no longer enough. Small and medium-size businesses (SMBs) should begin looking for efficient ways to expand their presence, including integrations with various shopping feeds and other outlets that can reach more consumers.
Posted in Best Practices for Merchants, Credit card Processing, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Mobile Payments, Mobile Point of Sale, Point of Sale, Small Business Improvement, Smartphone Tagged with: content, e-commerce, integrations, mobile adoption, Mobile Devices, mobile version, mobile-optimized checkout, multiple devices, online business, online sales, search engine optimization, shopping feeds, Small and medium-size businesses (SMBs), small online business owners, small retailers, Smartphones, smartwatches, social media signals, tablets
February 10th, 2014 by Elma Jane
Is traditional POS on its way out? Not so fast. It is likely to be an enhancement rather than a replacement to traditional POS.
Trending topic when it comes to POS is all about the mobile kind because Mobile Point of Sale (POS) systems have rocked the retail world. When one searches the term POS, nearly every article that comes up is all about mobile. Many seem to believe it will change the retail industry.
There is definitely a need and a place for both.
Retailers everywhere have incorporated the Internet into their business model by creating multi-channel sales strategies, such as e-commerce, digital marketing, social media marketing, online product information, specifications, reviews and online customer service.
In addition to their online presence, these same retailers have started to bring the Internet in-house by integrating such services as customer centric promotions at point of sale, introducing loyalty programs and member registration, facilitating digital signage, offering e-receipts via email, and self check out centers; all at the traditional POS kiosk. In fact, 95% of all sales transactions are conducted via traditional POS terminals.
Why bother with mobile POS anyway?
While it’s true that traditional POS system won’t be going anywhere soon and with good reason, mobile POS systems have allowed retailers to make great strides when it comes to efficiency and customer service, as well as customer satisfaction.
Companies have made big changes in the way they handle customer transactions in-store, thus affording faster checkout, waiting line reduction, consultative selling and more.
List of mobile POS benefits goes on:
Email Receipts – Better for the environment, more convenient for customers and faster to process, a digital purchase receipts sent via email tells the customer that you care about the earth and about them.
Expanded Reach – With mobile POS, your sales are no longer confined within the four walls of your brick and mortar store. Sidewalk sales, seasonal mall kiosks, and special sponsorship events are just a few examples of all the places you can take your retail sales to, with a POS in hand.
Inventory and Price Search – When customers can be assisted with finding an item color, size or availability on the spot, rather than having to wait in line to do so, it makes them happier. The same can be said for pricing. POS in the hands of store reps can go a long way toward customer satisfaction.
Inventory Return Stations – There is always a certain volume of returns, but that volume increases for retailers particularly after the holidays. The implementation of mobile POS allows for retailers to set up additional return stations in order to avoid long lines and customer frustrations.
Mobile POS goes Mobile – Your investment in your company POS system doesn’t need to be one size fits all, regardless of store traffic volume in one location or another. Retailers may opt to have a blow out sale in one location, thus require additional checkout power for that location for a specific period of time. With mobile POS, devises and licensing can be utilized throughout different store locations on an as needed basis.
Optional Seasonal Subscription – The great thing about mobile POS is that you needn’t pay for a POS system year round if you’re not using it year around. Seasonal spikes in retail sales warrant the additional cost of extra POS licensing and hardware, but the rest of the year your budget shouldn’t need to encompass more than what is needed. Mobile lets you better manage your overall POS investment.
Storewide Promotion Opportunities – Mobile POS has allowed retailers to drive sales in various sections of the store by holding demonstrations or promotions in different departments to tout products or services. Customers can be marketed and sold to, on the spot.
The growing industry of mobile payments doesn’t stop at in-store mobile POS. Digital wallets like Google Wallet and Apple Passbook, mobile-to-mobile cell phone transfers, Near Field Communication (NFC) payments, mobile device credit card swipe and other emerging technologies are quickly changing our cash and credit card world.
What about traditional POS?
Mobile payment systems are indeed terrific. So, when should you consider going with traditional POS? The reality is, in addition to the aforementioned benefits of traditional checkout kiosk functions, there times when mobile POS simply will not suffice.
Mobile POS is great when a customer wants to choose and pay for one item while on the sales room floor, but what about when the customer has a multitude of items? Ringing up and bagging groceries, removing anti-theft mechanisms, neatly folding and bagging clothing items and managing the sales of numerous agents, stations or departments are just a few examples of situations that often require the traditional POS checkout station.
By combining traditional POS strategies with mobile POS flexibility, retailers can leverage the command of a complex, and multi-dimensional, marketing and retail sales management system.
Posted in Credit card Processing, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Mobile Payments, Mobile Point of Sale, Near Field Communication, Point of Sale, Smartphone Tagged with: apple passbook, checkout station, credit card swipe, customer satisfaction, e-commerce, e-receipts via email, faster process, Google Wallet, Loyalty Programs, mobile payment system, mobile point of sale, mobile pos, mobile-to-mobile cell phone transfers, MPOS, multi-channel sales strategies, Near Field Communication, nfc, online customer service, online presence, POS, retail industry, retail sales, retail sales management system, traditional POS kiosk
February 10th, 2014 by Elma Jane
Impact on 2013 Holiday Sales’s Big Data
Holiday season has ended and the analysis has begun to understand what worked and what did not for ecommerce merchants. Cyber Monday became the biggest online shopping day in history with a 20.6 percent increase in sales over 2012, according to the IBM 2013 Holiday Benchmark Report. Retailers are increasingly tapping into the avalanche of data from their own sites and from third-party sites to drive sales and better serve their customers. This article will address five key ways Big Data impacted the 2013 holiday shopping season.
Contextual Promotions
The use of Big Data has enabled contextual promotions – mostly real-time push notifications based on consumers’ social media activity, tracking their locations, or capturing their interactions on the web and mobile devices. This holiday season contextual promotions were heavily used. IBM’s Cyber Monday Report states, “On average, retailers sent 77 percent more push notifications during the five day holiday shopping period when compared to daily averages over the past two months.” Retailers invested in social media sites like Facebook, Pinterest, and Instagram (among others) during the November and December holiday season. This led to higher referral sales from these sources.
Several physical retailers, including Best Buy and Kohl’s, also deployed location-based promotions to push notifications while the consumer is in or near the store. Some retailers tracked consumers’ locations without their knowledge, raising privacy concerns. Other retailers required an opt in by consumers to receive these promotions.
Additionally, some retailers used mobile apps to send contextual promotions based on tracking shoppers’ activities on the app and their physical locations with using it. Macy’s and J.C. Penney, for example, partnered with Shopkick (a shopping app provider) during this holiday season to reward brick-and-mortar shoppers with discounts or song downloads for trying on clothes, scanning barcodes, or making purchases.
Gift Selection
Holidays are all about gift giving. Some retailers used their Big Data recommendation algorithms to make it simpler to select gifts. These retailers built predictive models that process data from multiple sources like social media, wish lists, gift registries, and past purchases to predict the right gift for an individual.
Improved Customer Service
The holiday season results in more traffic for ecommerce merchants, which naturally leads to an increase in the volume of customer service issues. To keep customers happy during this time and manage customer service costs, some retailers implemented Big Data solutions to monitor customer activity and proactively respond to negative social media posts or issues. After all, one negative tweet can significantly impact business during this time of the year.
Real-time data feeds inform retailers in advance if customers will experience issues like a slow site, out of stock products, or delayed delivery. Retailers can either proactively correct the issue or notify the customers afterwards. Fab.com, for example, automatically credits a customer the difference if a price of an item drops immediately after purchase. T-Mobile USA has integrated Big Data across multiple IT systems to combine customer transaction and interactions data to better predict customer defections. By monitoring social media interactions with transaction data and billing systems, T-Mobile USA has reportedly reduced customer defections in half in a single quarter. Dell uses Big Data solutions to analyze real-time feeds from weather reports, delivery trucks, and orders to proactively resolve delivery problems before customers are aware of them.
Integrated Analytics
Most large retailers serve customers across multiple channels and devices. This makes it critical for those retailers to have a single view of all customer and product activity using data from all sources. Some retailers are already using such solutions and several more deployed such solutions before the holiday season. This one capability is crucial to track other Big Data uses, such as contextual promotions, gift selection, personalized customer experience, and improved customer service.
Personalized Customer Experience
Retailers have used Big Data to personalize their site content for several years. This was a competitive differentiator during this holiday season, however, as indicated by pre-holiday survey by Baynote, a personalized customer experience solution provider. The survey noted that eighty-one percent of retailers planned to upgrade ecommerce platforms to focus on customer experience, and to increase engagement, revenue, and ultimately lifetime value from improved relationships with shoppers. Retailers can categorize each shopper into a segment of one with its own customized landing pages, product catalog, campaigns, and even content. The result is an enhanced customer experience and an improved conversion rate.
Amazon.com continued to maintain its dominance in this space by using its extremely rich data set to personalize the shopping experience for its millions of shoppers. Another benefit from personalizing the customer experience is increased impulse buys, which become more important during the holidays as shoppers are in the right frame of mind to spend money.
Posted in e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Merchant Account Services News Articles, Small Business Improvement Tagged with: analysis, analyze real-time feeds, barcode, benchmark, big data, brick and mortar, credits a customer the difference, customer service issues, customer transaction and interactions data, ecommerce merchants, large retailers, location based promotions, making purchases, online shopping, physical retailers, real-time data feeds, retailers, rich data set, shopping season, social media activity, transaction data and billing systems
February 3rd, 2014 by Elma Jane
National Transaction and Virtuoso Agreement Official
National transaction and Virtuoso signed a preferred supplier agreement this 30th of January. NTC’s Electronic Payment System will be offered to its more than 330 agencies with 7,200 elite advisors in 20 countries.
Virtuoso is the travel industry’s leading luxury network. Travelers who use Virtuoso’s Advisors get access to more than 1,300 of the world’s premier travel providers, as well as exclusive, experiences and products. Virtuoso’s history dates to the 1950s, when the tour company Allied Travel formed to help travel agencies with foreign, international and group trips. In 1986, Allied Travel merged with Percival Tours to form (API) Allied Percival International, joining the best travel agents in the country. In 2000, API was rebranded Virtuoso, and has since become the leading travel network in the world.
While National Transaction with over 15 years in the payment service industry, has gained experience to integrate vast range of payment services. Processing digital transactions for more than 3,000 business owners and has been the preferred merchant account provider for many industry associations including ASTA, CLIA, HBTA, ARTA OSSN and now VIRTUOSO.
Posted in Best Practices for Merchants, Credit card Processing, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Travel Agency Agents, Visa MasterCard American Express Tagged with: arta, ASTA, clia, hbta, merchant account provider, National Transaction Corporation, ossn, travel, travel agencies, travel industry's, travel network, travel providers, travelers, Virtuoso
February 3rd, 2014 by Elma Jane
The migration to cards that use chips instead of magnetic strips, known as EMV technology, is well underway in the U.S. No government regulation is needed to make it happen. But the EMV migration and the Target breach are different things. It’s true that EMV chip cards can prevent criminals from producing counterfeit cards using stolen account numbers. But EMV doesn’t stop criminals using stolen cards online. So innovators are deploying new technologies to deter other forms of fraud.
Headline-grabbing events inevitably lead to calls for new laws. But in the case of our nation’s electronic payments systems, new government mandates would stifle marketplace innovations that hold great promise for providing consumer benefits and reducing criminal activities.
Financial institutions compete for customers by providing consumer protections even beyond requirements of current law. Many retailers also offer customers speedy transactions, such as “sign and go” and “swipe and go” for small transactions, while the payments industry ensures consumers still have zero liability. These protections and flexibility are why U.S. consumers are going cashless and carry more than one billion debit and credit cards. More than 70% of retail purchases are made with electronic payments, and our member companies process more than $4 trillion in electronic payments each year.
Fraud accounts for fewer than six cents of every $100 spent on payments systems – a fraction of a tenth of a percent. U.S. companies have made significant financial and technological investments, building sophisticated fraud tools that insulate consumers from liability. To build on this, Congress should foster greater international law enforcement cooperation to fight cybercrime, particularly in countries that harbor crime rings, and replace 46 divergent state breach notification laws with a uniform national standard.
The private sector is best positioned to address the constantly shifting tactics of criminals, and it is doing so without government mandates. Do Americans really want the government in charge of the security and monitoring of our payments?
Posted in Best Practices for Merchants, Credit card Processing, Credit Card Security, Electronic Payments, EMV EuroPay MasterCard Visa, Financial Services, Visa MasterCard American Express Tagged with: counterfeit cards, cybercrime, data breach, debit and credit cards, electronic payment systems, electronic payments, emv chip cards, emv technology, fraud, liability, magnetic strips, migration, online, security and monitoring of our payments, small transactions