Saturday, May 21, 2011

Bethlehem University Marketing Students Wrap Up Google Adwords Campaigns


Marketing students taking E-Business course in the spring 2011 semester were enrolled through the registration of the Business Administration lecturer Ms. Nadira Alaraj, in the Global Google Online Marketing Challenge Competition.  The online marketing competition gives the students practical experience through marketing an online campaign, using Google Adwords for real businesses. Google Adwords, as illustrated in Fig. 1 below, as those ads are triggered by the keywords of user’s search terms and appears to the right of the screen of the search results on Google search engine.

Upon realizing of the importance of this opportunity Ms. Nadira Alaraj introduced the online marketing concept to the E-Business course which is offered to the minor marketing students.  The students formed 11 teams and each team received US $200 in their Adwords account to conduct their marketing campaign to their client.  One of the teams is seen, to the right, showing their work with Ms. Nadira. The students are Jessica Salameh, Ramzy Zreineh Firas Nofal. The following clients’ website Beit Jala Pharmaceutical, Caritas Baby Hospital, Carsales.ps, Dar Al-Kalima College, EnglishPal, Kattan Training, Murad Investment Tourism Resort, Nativity Bells Hotel, PalDemocracy, Sima Café, Sharikat Gargour Al-Tijariyyah, got an average of 1,700 visitors during the 21 days of the campaign period. 
This unique experience is a win-win situation for all stakeholders allowing students to learn how to write a consultant report for clients on the outcomes of their online marketing campaigns. Clients, for their part, got free online advertisement for their websites and experienced the benefit of improving their website content and interface and even Google got the advantage of spreading the awareness of one of its services to this region.

Fig. 1 The ad of one of the teams whose client was Beit Jala Pharmaceutical.

Thursday, May 19, 2011

E auction by nader abu hadeed

E-Auction
"What is an e-Auction?
E-Auctions had different uses. It can be used in business market where the goods and services sold are valuable (like art) or when their real price can't be easily determined. Big organizations also used it the procurement organizations like councils and municipalities. Also, it is used for car sales market for used and classical cars.
How does e-Auction work?
The goal of an auction is to find a perfect price for the goods by connecting buyers who need them the most, with sellers, who need to make profit. You can make the bidding process electronically using special software or website.
What are benefits of e-Auctions?
E-Auction benefits the user of negotiation of contracts between suppliers and buyers in less time and cost process.   Conducting with contract negotiations live in the internet, the process is faster than the normal negotiation process, and as a result the bidding process cycle is significantly reduced it save over 30% in time and therefore cost of process. The main benefits of eauciton are as follows:
1.     Paper elimination and long time processes
2.     Negotiation is shorter
3.     Money procurement is perfect
4.     Transparency of the contract increased award process

What are the main costs of E-auction?
E-Auction requires must prepare product details specification; where completion about the price only, it is very important inform a clear product specification and service as it will help bidders and suppliers in their bidding. Also, some organization must involve in suppliers with o recruiting – in taking part in electronic e- auctions some suppliers are not experienced and therefore may not be immediately willing to join in.  Also it is costly of training suppliers how to use software or website.
it may requires, organization to  pre-selecting the suppliers In addition in a full tendering process so that all the suppliers are acceptable of taking part in the auction and have the ability of delivering pricing  or supplying in e-auction
When to Use e-Auction?
In general, e-auction should be used either when buyer have full information about the goods that advertised under auction and the completion are for perfect price and when fair value for that good can’t be known. Some entities put a base price (minimum price that you must bid above) so all prices must be above based price. In procurement of goods e-Auction can be used when buying an undifferentiated products when similar products or product specification are the same and available and the competition is on price. Where value is determinate by the technical proposal there are others used for Auction bid prices is not the main issue when companies seek the best value solution for the solution offered and the price.
As a conclusion we can notice that our time limited direct us of using the E auction that make our information of goods and services about price or specification is much wider and taking the decision wiser with the best price that we can get".

Thursday, April 28, 2011

The plastic cards by Jane Matar

       I think most of you had heard about credit cards, which are important things in our life, it is known as
plastic card which is a way to purchase goods and services through the bank, it’s business to business and business to consumer process. Through debit and credit. This card provides the buyer carry money in his pocket. The buyer gives the credit to the seller and passes the card in the machine and the process of payment to the seller through the bank. This service Tofferaly people carries money with them.
      This mechanism works through an agreement between the bank and the person concerned, and by selecting a certain amount gives the Bank on this basis the card. When the owner of the card buy something, he gives this card to the owner of the shop and the passing it through the machine own, And this deducted from his account of the bank immediately to the owner of the shop. As for the amount agreed to be repaid to the Bank during the period specified by the parties. When you want to work your own credit card, you must give the bank or company-specific data about you to enable them to work this credit card for you and to protect you in case your card is stolen. Like: First name, Last name, Address. Also you must known about the advantages and disadvantages for it. Advantages of credit card are, Give you protection if the thing you bought was stolen or damaged or lost, the existence of this card with you properly in many of the useful things when you submit a job or take your loan from the bank and other, also Credit cards can  be useful in times of emergency. Some credit cards offer additional benefits, such as discounts, bonuses, and special insurances. However, it’s disadvantages are, drive people to spend a huge amount of money which can not be owned at this time. The bank puts interest on money withdrawn as a debit at the end of each month. Besides that, this card can be stolen by people or by telephone or website. Credit card is a type of loan where you get a certain amount of money to spend appointed by you, and there is interest every month. Takes to insert a credit card machine and make sure their own as a legitimate and enough money in just a few seconds. and the information required to perform this verification is obtained from the magnetic strip on the back of the card, or via the silicon microchip embedded in the card.
        For the company, if it wants to operate a credit card, they contracted with a private bank or private companies that provide this service, for the convenience of its customers make purchases, especially in companies that deal with foreigners. However, this service requires from the company many several factors to help them to get these services, like: Phone line, Internet service, Par code (computerized).The most important thing a bank account The Company defines a certain amount of it in agreement with the bank to customize it to the credit card; the company shouldn’t have debt and financial matters.
       In conclusion, Credit cards are a way to help people and companies to facilitate the process of procurement and financial transactions. However, credit cards can provide convenience but they can also leave you in debt through risky choices. In order to defeat the risks of credit card use, avoid accumulating too may and pay the debt off on time, be carful to avoid deception.
References:
Aleksandar,  2010, what is credit card <http://www.hackpconline.com/2010/07/how-to-hack-credit-card.html>

2009, (How Credit Cards Work) available from < http://www.plastiq.co.za/tips-and-tricks-article.asp?ssID=170>

Analiza paulino, 2008, Advantages and Disadvantages of Credit cards , available from < http://is.gd/UjR7kO> February 24, 2008

Electronic Customer Relationship Management By Amira Janinah

 By: Amera Janeneh              Electronic Customer Relationship Management          14.4.2011
(E-CRM)
         According to the development of technologies, internet, and the large number of competitors form a big challenge for marketers. They do not need only attract new customers but also retain existing customers. For that reason, marketers search for new solutions to attract new customers and retain the existing customers. One of those solutions is the Electronic Customer Relationship Management (E-CRM).
            
             E-CRM is software provides profiles and historical data of each interaction the organization has with its customers, making it an important tool for all small and medium businesses. E-CRM, or electronic Customer Relationship Management," is an integrated online sales, marketing and service strategy that are used to identify, attract and retain an organization’s customers". It describes improved and increased communication between an organization and its clients by creating and enhancing customer interaction through innovative technology.
  
    E-CRM starts with data. This data comes from, in essence, existing customers." The data consists of things like when a product was bought, what its value was, whether it was bought following a sequence of events, or driven by a promotion, or facilitated by a third party". That kind of observed behavioral and motivational data can be layered with information about the customer herself – family size, age, location, whether others they know are also customers, whether they belong to this, that or the other social group. Integrating and analyzing this data often shows up connections and trends.
     We may find for example that a customer is likely to use e-banking of the AL-Ahli Bank (ahlionline.com.ps) that facilitate financial transactions, enable customers to account convertibility, check accounts, send feedback…etc . clients only need to get their username and password from their bank, and then the website will be valid. this site enables marketers to be more ineractive with their customers, and also enable them from understandingtheir needs in the other hand clients do not waste time and wait for a long time and wait for a long time to get their turn.
      E-CRM uses a lot of methods or means to interact with cuctomers like email, SMS, web touch points, pop ups, call centers,field,partners.... .The E-CRM is there to help companies to reduce cost of marketing, improve accuracy and customer’s satisfaction, increase customer retention and frequency, order size, customer response, competiveness through differentiation, and increase profitability.
       We can derive the benefits of E-CRM as: faster and more informed decision making, improved accuracy and customer service, faster product to market realization, and migration from product to customer focus.  
        In the age of social media, E-CRM is the key for businesses and associations to succeed is to build better relationships with customers. E-CRM  do it the right way by using these trends & maybe more, these trends are : personalization and customization, branding, value is the new black, and customer experience.   
         Nowadays, customers are the center of attention and marketers try to increase their satisfaction. Marketerscan relyand utilize E-CRM systems to harness customer data and deliver customized products and services will more efficiently attract and retain customers than
 
Resources:
Albert Einstein,Imagination is more important than knowledge: Top 5 CRM Trends for 2011.Available from: http://crmtrends.com/crm.html
Raed Juha, credit officer at AL-Ahli Bank,2011.Electronic Customer Relationship Manegement. interviewd by Amira Janinah.10-4-2011.

 

Internet Privacy By Nadine Abu Thrideh

When we surf the internet we often reveal a lot of information about ourselves. Nowadays, there are a lot of ways in which personal information can be obtained without your permission and knowledge. So from these factors, internet privacy came into account which means concerns and strategies that people must use to protect their information that are meant to be private. Some of these ways that are used to collect information are Cookies, Web browsers, Search engines etc. However my focus in this report is mainly on social networking sites and privacy.
Being in the 21st century, social networking has acquired the greatest popularity and people using these networks are increasing dramatically .Such websites are used for sharing information, getting your idea out to the world and many more. Nowadays, “information is being spread faster through social network sites than real life network” (Rip , S 2008 ). Facebook , twitter, myspace, blooger are examples of these Social network sites and they are now among the most visited websites globally. Despite the advantages that you could gain through these networks such as staying in touch with people and building a network of contacts, on the other hand there are many disadvantages that must be taken into consideration because social networks are easy to access and the users are not aware of the nature and the size of the people accessing their profiles. This can result in some privacy threats for the members and their personal information that they upload to these social networks that can be used by people for illegal activities. Moreover, many people pretend to be someone else and use other people’s personal information. people  can  use it to stalk and harass others that’s why we must be careful and take some procedures that keeps you on the safe track. “Most users are not aware that they can modify their privacy settings and unless they modify them their information is open to the public”..(Guo . M 2011 ) When registering to the social network site there are some tips that you should take into consideration, this can be done by keeping in mind that some information should be kept private, you should understand what information can harm you and what details you choose to share on your profile. Beware of providing personal information and always remember to read the privacy policy provided by the websites before agreeing as sometimes such policies might mislead people and mention basic stuff that they might not be responsible about as their main aim is to inform customers. As an example Facebook’s privacy policy considered that “Although we allow you to set privacy options that limit access to your information, please be aware that no security measures are perfect or impenetrable. We cannot control the actions of other users with whom you share your information. We cannot guarantee that only authorized persons will view your information. We cannot ensure that information you share on Facebook will not become publicly available. We are not responsible for third party circumvention of privacy setting or security measures on Facebook “(fb website). Furthermore, because the social network sites have marketers that obtain more information about the users and give this information to these partners whom they use in their marketing strategies, and these users are not in a position to bargain about the terms at which they disclose their information so they leave the users vulnerable to harms.
            Social networks offer new opportunities for communication but also lead to new privacy concerns. While it is a great tool for keeping in touch with others, you need to use it properly and that is by raising awareness of privacy and adjust your privacy setting before you become member of these social networks or don`t join until you feel ready to do so, also remember that internet is a public network, if you are connected protect yourself.
References

Cheever, J , 2011 , Dangers of Social Networking Sites.
http://www.life123.com/technology/internet/online-social-networking/dangers-of-social-networking-sites.shtml
Rip, D ,  S 2008 , Privacy in Social Network sites. http://privacyinsocialnetworksites.wordpress.com/
Elizabeth, M , what is internet privacy . http://www.wisegeek.com/what-is-internet-privacy.htm
J 1995 , Online Privacy:Using the internet safely. http://www.privacyrights.org/fs/fs18-cyb.htm

Internet Security By Jamileh Shokeh

Recently, computers and internet has become the spirit of life. No one can facilitate his or her affairs efficiently and professionally without using internet. We also started making deals via the internet. But we shouldn’t forget the security view because internet is insecure channel for exchanging information.
By increasing the numbers of online businesses and the entry of e-commerce, the security issue has become a necessity to be taken into account for the success of the business. Many consumers refrain from making deals online because they fear from stealing their information such as their credit or debit card numbers, login details and payable details. This adversely affects online businesses and leads to falling back. To overcome these obstacles many protection systems have been developed such as SSL (Secure Socket Layer), TLS (Transport Layer Security) and others. These are cryptographic protocols uses two keys to encrypt data (public and private keys) that provide communication security over the internet. According to Johnny Papa “SSL is the security method used to transmit sensitive information like credit card numbers and online banking data over the Internet. SSL is the technology used to encrypt and decrypt messages sent between the browser and server. By encrypting the data, you protect messages from being read while they are transferred across the Internet. SSL encrypts a message from the browser, and then sends it to the server. When the message is received by the server, SSL decrypts it and verifies that it came from the correct sender (a process known as authentication).” (Microsoft 2011). The encryption of data, prevent “bad guys” from stealing information for malicious intent. The URL requires SSL connection start with https instead of http and there is a padlock icon at the page of the website or in the address bar (QuinStreet Inc 2011).  There are vendors provide certificates for such systems one of these is VeriSign. It provides SSL certificate since 1995 and it still interested in the needs of consumers for secure websites in order to make transaction online (Symantec Corporation 2011). By having SSL certificate you and your customers will benefit from it. Your Customers feel safe; trust you and your website. When they see secure icons on the website they know that they can make transaction without anxiety or fear. They have the willingness to communicate and exchange information because you provide them with private communication feature (Donkey Internet Ltd 2010). As online business that is success depend on electronic transactions and e-commerce. Now you can secure your website and protect your business. This in fact is protection for your customers and keeps them loyal for you! Moreover, the visitors will favor your website over other competitors and you will have a competitive advantage among others. People will know you as a reputable and safe online business.
As a conclusion, consumers constantly are seeking for secure online transactions. So for each business wants to spread online and have success e-commerce should secure its website and the information transmission between the client and the server.
References:
  1. Microsoft 2011. Available from: <http://msdn.microsoft.com/en-us/magazine/cc301946.aspx>. [ April 2001]
  2. QuinStreet Inc 2011. Available from: < (http://www.webopedia.com/DidYouKnow/Internet/2005/ssl.asp>. [1 Sept 2010]
  3. Symantec Corporation 2011. Available from: <http://www.verisign.com/ssl/>.
   4.Donkey Internet Ltd 2010. Available from: <http://sslguide.org/ssl-articles/benefits-of-ssl>.

Tuesday, April 26, 2011

Cloud computing companies By: Amira Abu Mohor.


                                   
     People all over the world are using cloud computing systems nowadays without even realizing it like in our studies and work through Gmail, Facebook, Google documents, etc.. In this report I’ll explain what  cloud computing is, Where the term “cloud computing” comes from, reasons and benefits, advantages and disadvantages of cloud computing along with examples.

     “Anthony T.Velte, Toby J.Velte &Robert elsenpeter, 2010”Cloud computing is a term that applies to applications and data storage that are delivered over the Internet. The individual user's device like computer provides an interface to interact with the computer programs and data. The programs are run on the service provider's computers and the data is stored where ever the provider deems necessary. This way the applications are available where ever you have a connection to the Internet or wireless network.

The term cloud computing originally comes from the visual image of cloud in the sky but this cloud is a cloud full data that floats out on the internet and that can be accessed from anywhere with an internet connection on any computing device which  developed from web _hosted applications.

Fortunately, through cloud computing they can share software, servers and data and other devices instead of developing their own networks and servers. In short, cloud computing is the things we do with our computers like office tasks and files storing, except that it’s done online.

“What is Cloud Computing, video recording” Cloud offers several advantages to small and medium size business in terms of reduced costs. You pay for what you use, in other words that individuals who have good business ideas but don’t have enough money and have limited funding and budgets for office space and private servers, networks, storage space and teams of experts so don’t have a chance to even start working as its expensive to finance these ideas.

“Advantages and Disadvantages of Cloud Computing” Cloud computing like anything else has its advantages and disadvantages. Its advantages can be summarized with several points. First, reducing Costs; it helps to reduce both capital and operating costs, through economies of scale. To use an analogy, it is like replacing the electricity generator in your home by plugging into an electricity supply. Because you need only a computer and to be connected to the Internet costs are significantly reduced. Another example is like when a vendor supports a hundred customers with his bank of servers and support staff, the cost for each individual customer goes down. Second, increased Storage; organizations can store more data than on private computer systems, as their data and information is stored online. Third, highly Automated; no longer the It personnel need do to worry about constant server updates and other computing issues, as software and other applications are automatically updated , this  allows the IT staff to concentrate on innovation and creativity to improve services and outputs. Finally, flexibility and mobility; cloud computing offers much more flexibility than past computing methods. Because this information can be accessed wherever they are, rather than having to remain at their desks in the office.

As for disadvantages. First, additional cost of data transfer fees. Second, one does not have control over the remote servers, the software, or security. Finally, one’s data is at the mercy of a third-party company so better make sure they earn your trust.

     With the growing demand for IT cloud computing presents itself as an all-in-one solution, being able to satisfy the growing IT needs while, at the same time, reducing energy usage at an affordable price.

References:

Anthony T.Velte, Toby J.Velte &Robert elsenpeter, 2010, Cloud computing a practical approach, USA Cloud news desk, Six Advantages of Cloud Computing. Available from:            < http://web2.sys-con.com/node/640237 >. [3 November 2008]

Benefits of cloud computing. Available from <http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1084688657&site=181&type=RESOURCE>

Salesforce.com: What is Cloud Computing? <http://www.youtube.com/watch?v=ae_DKNwK_ms>

Advantages and Disadvantages of Cloud Computing .available from

<http://www.serverschool.com/cloud-computing/benefits-and-disadvantages-of-cloud-computing/>. (June 16th, 2010)


Internet Security By:Afteem Salameh



     There are lots of discussions nowadays about computer security as more people are using email and more services such as banking, mail orders and subscriptions through the Internet. In this report I’ll explain the definition of Internet security, its objective, methods, importance, examples, and benefits.  

     Internet security is the ability to browse the web peacefully, knowing that no one is looking over your shoulders whereas others see it to be the ability to conduct financial and commercial transactions safely.

(2011 Best Internet Security Suites Software)

Its objective is to establish rules and measures to use against attacks over the internet and many different methods are used to protect the transfer of data.
Internet security is important for internet users for it increases the e-commerce and online business which happens using cryptographic methods and protocols developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGPforemail, and IPSec for the network layer security. (August 05, 2009, Grass Roots Design)

What are SSL Certificates?

The SSL is a protocol created by Netscape and to which is a short form for secure socket layer certificate. This technology is used widely in the Internet transactions to make them secure. The protocol works in the following manner. First, web browser requests a secure page from the client side. Second, if the website already has it, certificate will be sent along with its public key by the web server. After receiving it; client’s side web browser checks for the validity of the certificate. If it is still valid and if it’s been issued by a trusted party ( normally  tested  through a Certificate Authority (CA)). If it fails on any of the checks the browser will display a warning to the end user to let them know. Then; the web browser uses its public key to encrypt the data and sends it to the web server with the encrypted URL required and any other encrypted http data. Decryption of the symmetric encrypted key will take place at the web server by the web server using its private key and the symmetric key to decrypt the URL and http data. Next, the web server sends back the requested html document and http data in the encrypted form; the web browser at the client side decrypts them and displays the information.

Normally a SSL certificate contains the company name, domain name, address with country, state, and city along with the details of your CA and your SSL certificate expiration date. (SSL Certificates HOWTO, September 2010)

Network layer security

TCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPSec for the network layer security.

IPSec security protocol is designed to protect communication in a secure manner using TCP/IP. It supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection by providing security and authentication at the IP layer by using cryptography. To protect the content, the data is transformed using encryption techniques. There are many types of transformation that form the basis of IPSec; the Authentication Header (AH), encapsulating Security Payload (ESP) and Internet Engineering Task Force (IETF) standards. (6 November 2005, Network Layer Security – Structure and Challenges)

Examples on websites using this protocol to obtain confidential user information are paypal, shipwire, regionalone, etc…

     Computer security is a vast topic that is becoming more important because the world is becoming highly interconnected, with networks being used to carry out critical transactions. The environment in which machines must survive has changed radically since the popularization of the Internet.

References :

Internet Security Suites Available



IPSec, 2011, available from:



 IPSec

http://www.grassrootsdesign.com/intro/security.php

Network Layer Security – Structure and Challenges


https://www.cs.columbia.edu/~smb/talks/netsec-dimacs/index.htm

E-CRM By Violet Handal

In seeking new opportunities such as the Internet, many companies nowadays are trying to compete in the global electronic marketplaces. A business’ greatest asset is the customer, and the most important thing is to keep your existing customers satisfied and make them long-term or lifetime customers. Therefore, one way to communicate with the customers efficiently is through “Electronic Customer Relationship Management” or “E-CRM”.
E-CRM means the activities that identify, attract, and retain the organization’s customers by using electronic ways like the internet, web browsers or others. In addition, it provides the employees with the information they need to know about customer’s needs and wants, therefore provide them with products and services customized to their needs. So, E-CRM manages and increases interactions between the organization and its customers and the most important thing improves their satisfaction. (State of Victoria, 2004)
There are three different levels of E-CRM:
1.     Foundational Services: these contain the minimum most important services. For instance, web site effectiveness and responsiveness, also order satisfaction.
2.     Customer-Centered Services: these contain order following, product shape and customization as well as security or trust.
3.     Value-Added Services: These are additional services such as online sales and online training and education.

(M.Phil. Scholar, 2009)
Business Benefits of E-CRM:
1.     Increase customer loyalty: an effective E-CRM provides all the employees in a company with the same history and information about the customer. And if the company has multiple electronic lines of business that interact with the same customers, by using E-CRM it will be enable to do business with them anytime through any channel and make them feel like they are dealing with a single company that follows them every step. The company then can identify the “Best” profitable customers and focuses its time and resources on them.

2.     More effective marketing: with the detailed customer information the company has; it can forecast the kind of products that a customer is likely to buy and the timing of the purchases. So this will help the company to create effective sales or marketing campaigns targeted to attract the profitable customers. In addition, this will help the company to segment the customers with similar needs by grouping them, and this will allow it to market specific products to the targeted groups effectively. 

3.     Improve customer service and support: this will help reduce or eliminate customer’s frustrating and time-consuming, because E-CRM helps the company to serve customers’ needs quickly and efficiently. Also it enables the company to provide the customers with the services they deserve through any channel, and search for proven solution and best practices.

4.     Greater efficiency and cost reduction: data mining that analysis the data to explore the possible relationships between sets of data can reduce costs.

(Shannon Scullin, 2002)

There are three dimensions in E-CRM:
1.     Acquisition (increase number of new customers).
2.     Expansion (increase profits and earnings by encouraging customers to purchase more products & services).
3.      Retention (increase the amount of time customers stay as customers).

(An insight into e-crm, 2009)

E-CRM creates a central repository that stores all kind of customer data allowing all the employees contact to this information any time. The more the data stored, the more services the company can provide to the customer, such as “cookies” that the company uses on it’s website to collect information and to know the behavior of the customer. In addition, the design of the website can influence the level of trust of the customers and their enthusiasm to do a transaction or give personal information.  (State of Victoria, 2004)
To conclude, E-CRM is the solution to manage and strengthens the relations with customers and satisfying them. Also it can be a competitive advantage by serving and satisfying its customers.
References:
  • M.Phil. Scholar, E-CRM, 2009, available from:
 [18/4/2011]
  • Shannon Scullin, Electronic Customer Relationship Management, 2002, available from:
[18/4/2011]
  • State of Victoria, ecustomer Relationship Management, 2004, available from:
[17/4/2011]
  • An Insight Into e-CRM, 2009, available from:
<http://www.slideshare.net/guest87f145/an-insight-into-ecrm>
[18/4/2011]

Credit card prepared by may shaer

A card issued by a financial company giving the holder an option to borrow funds, and pay/purchase for as much amount as they want. Credit cards charge interest and are primarily used for short-term financing. Interest usually begins one month after a purchase is made and borrowing limits are pre-set according to the individual's credit rating.
The roles and importance of credit cards nowadays are clearly significant. The credit card users can spend future’s money today. It allows the users to be flexible and increases ability to spend for shoppers. In addition, installment plan gives more times for paying back the amounts used in later periods. There are no barriers for the users to spend in any currency since shops and stores only concern whether the cards are visa or master cards, usable worldwide.( Goyal, A. 2009)
Bank credit card is one of today's most ubiquitous financial instruments For bank management perspectives, identifying the appropriate market for the credit card, interpreting consumers’ needs for the product and developing business strategies are crucial to cope with fierce competition in the credit card market. (Wolters, 2009).
credit cards came with important technology to help facilitate several financial transactions for consumers, but the cards have capacity to support consumers in their everyday life activities without much concerning about cash in hands (Bernthal, Crockett, and Rose(2008).
such borrowing came with high interest rates which might appear irrational, but low transactions costs can make credit cards attractive relative to bank loans. In addition, credit cards offer liquidity services by helping consumers to avoid some of the opportunity costs of holding money .(Brito and Hartley 2005)
service products, such as credit cards, being intangible and experiential in nature are different to evaluate prior to purchase and consumption. Information regarding supplementary services can help consumers make pre-purchase evaluation of credit cards. In addition to pre-purchase evaluation, the impact of supplementary services is studied towards post-purchase evaluation of credit card services.(seminar report 2007).
Credit Card Fraud - Like cash, sometimes credit cards can be stolen. They may be physically stolen (if you lose your wallet) or someone may steal your credit card number (from a receipt, over the phone, or from a Web site) and use your card to rack up debts. The good news is that, unlike cash, if you realize your credit card or number has been stolen and you report it to your credit card company immediately, you will not be charged for any purchases that someone else has made. Even if you don't realize your credit card number has been stolen (sometimes you might not know until you receive your monthly statement), most credit card companies don't charge you or only charge a small fee, like $25 or $50, even if the thief has charged thousands of dollars to your card.( Cargill, T. F., & Wendel, 2006).
Most often credit cards can provide convenience but they can also land you in debt through unwise choices or through no fault of your own. In order to overcome the risks of credit card use, avoid accumulating too may and pay the debt off on time, read terms and conditions carefully and take measures to avoid fraud.

References:                                                                                                                                                                     
*Bernthal, Crockett, and Rose 2008, Monitoring the Behaviour of Credit Card Holders .available from <http://www.creditcards.com/> .                                                                                                                            
*From Wikipedia, the free encyclopedia .available from< http://en.wikipedia.org/wiki/Credit_card>  
* Wolters, Carry your credit in your pocket", 2009.<http://www.investopedia.com/terms/c/creditcard.asp
* Cargill, T. F., & Wendel org, 2006, An analysis of main and subsidiary credit card holding and spending available from <http://www.creditcards.com/> .