Building Secure Online Billing System For BangaloreElectronic Supply Company Limited
Loss of Privacy or Confidentiality
Unauthorized access and misuse of data
Cracking, spoofing or root kits related errors
Viruses, Trojan horse, worms mediators for theft attacks
System unavailability or power interruptions or network errors
The use of existing materials which are available on the internet without the permission of the owner can leads to the treats to the intellectual property. However, the threat to the computer used by the client can also cause various errors and theft incidents of confidential data. There are also various server threats like Common Gateway Interface or unauthorized file transfer and spamming (E-commerce securities, 2017).
Electronic Fund Transfer at the Point of Sales (EFT/POS)
EFT/POS is about the use of plastic cards in the payment terminal on the merchants’ premises. The Electronic Fund transfer consists of two distinct mechanisms:
Debit-card transactions: The debit card transaction consists of a form of value-transfer by an authenticated presentation of token that is a data bearing card along with a keyword named as the PIN used for authorized monetary exchange through a terminal from an account of the customer to the merchant’s account (Monkhouse, & Monkhouse, 2017).
Credit-card transactions: The credit card transaction is a system to capture data with automated environment to continue the purchase procedure by revolving the credit account of the customer and transact a value to the merchant’s account.
There are also direct data entry transactions, financial electronic data interchange, home banking, stored value card and electronic cash mechanisms in the online monetary transactions.
Nonrepudiation: The nonrepudiation is about prevention against reneging on agreement by one party to the other party.
Q2. What are the criteria of choosing the payment gateway?
Q3. Does BESCOM enable the security measures in their e-payment system?
Q4. What are the steps taken by the company for enabling the security supports?
The second question is needed for knowing the strategy of BESCOM of operating their online business transactions.
The third question is important because it is important to know the crucial facts of security measures in the online payment system of BESCOM.
The fourth question is important since it will help to understand, how much importance for the security BESCOM is giving in their business.
The population of India is growing day by day and hence the state electricity boards in different states has increased the productivity and business processes for serving better the customers in India. The study by Sridharan states that, the modern advancement in the information technology in India has influenced the billing communication between the state electricity boards and their customers. The growth of the smart grid technology has build up the approaches by the electricity companies towards the implementation for the online bill payment system for their customers. The study has also concluded that the smart grid architecture is necessary for the better communication process (Kovendan & Sridharan, 2017).
Another research by Damodaran and fellows concluded that, the cloud based real life system is required to be implemented for the purpose of the online billing system of the Electricity boards. The research has gone through the cloud based frameworks to ease the understanding of the structural design of the artifact required for online billing system (Damodaran et al, 2015). The study shows that, for the development of the artifact design for the successful implementation of the online billing system the smart grid system should be implemented as well.
The concept of online billing is not as new as thought by many people and organizations. The revolution of internet has made the billing system easier with the help of online hosting and various softwares (Sharma et al, 2014). However, in today’s life, there are small numbers of people who use the electronic billing system, instead of paper bills. In the online billing system, the companies can send the bills to their customers without using any paper and the method is easier too. The increasing spread of internet is now influencing various sectors such as telephone companies, electricity companies to use the online billing system to make the payments easier than ever. For this purpose, the organizations need to develop some software to get the system flow easier.
According to the research article by Rahman and other researchers, the research has focuses on assessing the service quality of Dhaka Electric Supply Company Limited (DESCO), the online billing and payment system. In this research, the author found that, the DESCO has focuses on the security measures in the online billing system and it has extended their service by using SERVQUAL model to integrate customer’s expectation towards their organization (Rahman et al, 2017).
According to various researches on the online billing system of various countries, the security in the online billing system is necessary for building the perception of the actual service quality which will enhance the customer satisfaction rate and loyalty towards the company. Along with that, the SERVQUAL-Butterfly model can help in eliminating the research limitations. Online billing system is one of the highest growing technologies around the globe (Jakobson, G., & Rueben, 2014). According to the recent surveys, there are big numbers of state electricity organization around the world is now approaching for the online billing system, for the ease of the payment and the loyalty of the customers. The in-depth penetration of the internet has leaded the application of various transactional processes (Singh & Chana, 2013).
According to an article by C. Meinel, it is stated that, there are various countries where the government of that country has given interest in building online billing and other e-government systems to improve the efficiency of delivering the government services to the citizen. This strategy has increased the accountability of government processes and trust of the citizen of that country on their government.
However, the research has found that, in such cases, the government has faced various issues relating to the security measures in implementation and access of such systems (Sukmana & Meinel, 2016). The research discusses that, the evaluation of such security tools and implementation in the system was hard enough but the importance was given to those security terms and at present they are following up the updates security norms to give flawless services to all the citizen.
According to the research by Pal and fellows the year 2016, the author has focus on the theft and related security measures in the online billing and e-payment system. The author states that, security is a crucial aspect of electronic payment systems. In few recent cases, it is found that, theft of personal data, confidential information regarding online account and monetary loss has been accounted by various media platforms.
Now days, it has become a major concern for all the organizations using such online medium for their billing purposes and monetary transactions. The research has found that how such theft incidents has affected the choice of payment methods among the customers and still various researches are going on to stop this obstacles. The survey conducted by Survey of Consumer Payment Choice (SCPC) results in the decision that, the identity theft and monetary loss has increased the negative perception among the people in adopting money orders, debit or credit cards, back account payments and other various online bill payments systems. In the past centuries, the electricity sector has undergone significant transformations and they have acquired various security measures in their entire business operations with the help of technological innovations (Gupta, Muttoo & Pal, 2014)
However, there are various obstacles found in the online system. Various theft incidents were happened and these incidents have affected the perception of the people. Presently various technological advanced solutions have reached to this organization and the research focus to deduce few more facts to increase the understanding the importance of security among all.
The Design science research can be constructed between the design science and the design research and these will reflects the guidance on the construction of the artifact and its evaluation. However, some of the design signs papers deals mainly with the evaluation part. The extension of the original research could be presented through specific design research frameworks.
The figure 1 shows that, the structural design of the online billing system that will enhance the billing system of the company BESCOM. The figure 1 is mentioning the entities involved in the online billing system of any company that are Internet connectivity, Electricity department, Customers, Banks, Twins, water department and other organizational departments (Baskerville et al, 2014).
Figure 1: Entities implicated in online billing system
The figure 2 states the overall workflow of the online billing system with following steps as mentioned below –
1. Customer gets an electronic chequebook from the bank. The use of the book with be required for the bill payments.
2. After getting the chequebook, the customer requests for the online billing through the website of the company or any responsible websites for the purpose.
3. The biller will then verify the credentials attached with the application of the customer and then the biller will grant a subscription for the online billing.
4. In the next step, the biller will send a unique user-id and password to the customer through the provided e-mail id. This will enable the customer to view and pay bills (Lohmann, 2013).
5. The next step consists of the process of logging in the website of the company. Along with the user-id and password, the customer will log in an activate their online profile over the company’s website.
6. In the next step, the customer pays the bill with the electronic chequebook and the e-cheque will be send to the biller.
7. The further step lies with the reception of the online e-cheque from the customer and the sending of the acknowledgement for the reception of the e-cheque.
8. Then the biller will check the validity statements, credentials of the endorses and proceed them for the processing in bank.
9. In the next step, the bank validates the reception of the e-cheques and sends them to the customer’s bank for making the clearance part.
10. After the cheque clearance, the biller updates the customer’s billing data on the system of the respective company and appropriate information will be send to the customer regarding this purpose.
The user registration process can be understood with the help of the Flow chart below –
The role of the artifact design lies with various components of the system such as –
Clients: The user or the customeris the main component of the system who will be benefitted with the online billing system. The customers can access the implemented online billing system from the website of the respective company and the user interface should be designed in such a way that will ease the interaction of the customers with the system. In the use of the system, the customer should enter he id and the password to the information bars to introduce the respective bank group to the biller organization (Gregor & Hevner, 2013).
Gateway: The gateway is an important component that will detail the role of the artifact design in the online billing system. The Gateway is used to take control on the several operation for the access purposes and the billing purposes. The Gateway is used to check the reliability and thevalidity of the customers for the use of the online billing system of a particular company. The gateway also assures whether the customer is a participant of the e-bank group he/she provided before. The user of the organization online billing system can login to the website of the e-bank group after the verification and assurance by the gateway. The gateway authenticates the user for the dealing purposes with the e-bank. The password and the user id be checked by the gateway to grant the customer the access to the online account and this also ensures the security purposes of online billing system.
E-bank operations: The users need to choose a particular bank to deal the transaction processes for the online purposes. The attachment of the e-bank is required for such four operations namely the account balance information access, withdrawal of money, deposit of money, transfer of money from one account to another account.
Limitations Of The Research Methodology
1. Unavailability of required funds for the success of the research.
2. Lack of information available for the research.
3. Unwillingness of the customers.
4. Unwillingness of the employees.
Alonso, I. A., Verdún, J. C., & Caro, E. T. (2016). Designing an IT Artifact: Framework for the Entire Process of IT Demand Management. In New Advances in Information Systems and Technologies (pp. 317-329). Springer International Publishing.
Baiyere, A., Hevner, A., Gregor, S., & Rossi, M. (2015). Artifact and/or Theory? Publishing Design Science Research in IS.
Baskerville, R., Davison, R., Kaul, M., & Wong, L. (2014, December). Designing Artifacts for Systems of Information. In Working Conference on Information Systems and Organizations (pp. 233-245). Springer Berlin Heidelberg.
Collis, J., & Hussey, R. (2013). Business research: A practical guide for undergraduate and postgraduate students. Palgrave macmillan.
Dahlberg, T., Guo, J., &Ondrus, J. (2015). A critical review of mobile payment research. Electronic Commerce Research and Applications, 14(5), 265-284.
Dyas, J., & Leighton, P. (2014). EFFECTIVE RESEARCH PROPOSAL. An Introduction to Health Services Research: A Practical Guide, 51.
E-commerce securities. (2017). Uky.edu. Retrieved 2 April 2017, from http://www.uky.edu/~dsianita/390/390wk4.html
Gaffney, F., Deane, J. P., & Gallachóir, B. Ó. (2017). A 100 year review of electricity policy in Ireland (1916–2015). Energy Policy, 105, 67-79.
Gregor, S., & Hevner, A. R. (2013). Positioning and presenting design science research for maximum impact. MIS quarterly, 37(2), 337-355.
Gupta, R., Muttoo, S. K., & Pal, S. K. (2014, September). Proposal for integrated system architecture in utilities. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 1995-1998). IEEE.
Inomata, K., Lee, N., Nikata, K., & Nagata, N. (2016). Comprehensive value evaluation structure for artifact design. International Journal of Psychology, 51, 190.
Jakobson, G., & Rueben, S. (2014). U.S. Patent No. 8,646,103. Washington, DC: U.S. Patent and Trademark Office.
Kahn, C. M., & Liñares-Zegarra, J. M. (2016). Identity theft and consumer payment choice: Does security really matter?.Journal of Financial Services Research, 50(1), 121-159.
Kovendan, A. K. P., & Sridharan, D. (2017). Development of Smart Grid System in India: A Survey. In Proceedings of the International Conference on Nano-electronics, Circuits & Communication Systems (pp. 275-285). Springer, Singapore.
Kreutz, D., Malichevskyy, O., Feitosa, E., Barbosa, K., & Cunha, H. (2014). System design artifacts for resilient identification and authentication infrastructures. parameters, 11, 12.
Lee, A. S., Thomas, M., & Baskerville, R. L. (2015). Going back to basics in design science: from the information technology artifact to the information systems artifact. Information Systems Journal, 25(1), 5-21.
Lohmann, N. (2013). Compliance by design for artifact-centric business processes. Information Systems, 38(4), 606-618.
Millum, J., &Sina, B. (2014). Introduction: international research ethics education. Journal of Empirical Research on Human Research Ethics, 9(2), 1-2.
Mital, M., Pani, A. K., Damodaran, S., & Ramesh, R. (2015). Cloud based management and control system for smart communities: A practical case study. Computers in Industry, 74, 162-172.
Monkhouse, D., & Monkhouse, D. (2017). Why Is Security So Crucial For E-Commerce? BCW. Businesscomputingworld.co.uk. Retrieved 2 April 2017, from https://www.businesscomputingworld.co.uk/why-is-security-so-crucial-for-e-commerce/
National Electricity policy Government of India, Ministry of power Retrieved 4 April 2017, from powermin.nic.in
Prat, N., Comyn-Wattiau, I., & Akoka, J. (2014, June). Artifact Evaluation in Information Systems Design-Science Research-a Holistic View. In PACIS (p. 23).
Rahman, M. A., Qi, X., Mohammad Saif, A. N., Ibrahim, I. B., & Sultana, R. (2017). Assessing service quality of online bill payment system using extended SERVQUAL model (SERVQUAL-Butterfly model): A case study of Dhaka electric supply company limited (DESCO), Bangladesh. Cogent Business & Management, 4(1), 1301195.
Ritchie, J., Lewis, J., Nicholls, C. M., & Ormston, R. (Eds.). (2013). Qualitative research practice: A guide for social science students and researchers. Sage.
Rysman, M., & Schuh, S. (2017). New innovations in payments. Innovation Policy and the Economy, 17(1), 27-48.
Shariatmadari, H., Ratasuk, R., Iraji, S., Laya, A., Taleb, T., Jäntti, R., & Ghosh, A. (2015). Machine-type communications: current status and future perspectives toward 5G systems. IEEE Communications Magazine, 53(9), 10-17.
Sharma, V. S., Sakar, S., Verma, K., Panayappan, A., & Kass, A. (2014). U.S. Patent No. 8,677,313. Washington, DC: U.S. Patent and Trademark Office.
Singh, S., & Chana, I. (2013). Advance billing and metering architecture for infrastructure as a service. International Journal of Cloud Computing and Services Science, 2(2), 123.
Sukmana, M., & Meinel, C. (2016). e-Government and Security Evaluation Tools Comparison for Indonesian e-Government System. In Proceedings of the 4th International Conference on Information and Network Security (pp. 96-103). ACM.
Swiatek, P. R., Chung, K. C., &Mahmoudi, E. (2016). Surgery and Research: A Practical Approach to Managing the Research Process. Plastic and reconstructive surgery, 137(1), 361.
Thomas, G. (2013). How to do your research project: A guide for students in education and applied social sciences. Sage.
Vaishnavi, V. K., & Kuechler, W. (2015). Design science research methods and patterns: innovating information and communication technology. Crc Press.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2022). DISSE8005 Dissertation Essay. Retrieved from https://myassignmenthelp.com/free-samples/disse8005-dissertation/online-payment-mechanisms.html.
"DISSE8005 Dissertation Essay." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/disse8005-dissertation/online-payment-mechanisms.html.
My Assignment Help (2022) DISSE8005 Dissertation Essay [Online]. Available from: https://myassignmenthelp.com/free-samples/disse8005-dissertation/online-payment-mechanisms.html
[Accessed 14 November 2024].
My Assignment Help. 'DISSE8005 Dissertation Essay' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/disse8005-dissertation/online-payment-mechanisms.html> accessed 14 November 2024.
My Assignment Help. DISSE8005 Dissertation Essay [Internet]. My Assignment Help. 2022 [cited 14 November 2024]. Available from: https://myassignmenthelp.com/free-samples/disse8005-dissertation/online-payment-mechanisms.html.