Skip to main content

Time as a cost

The Bank of Canada published an interesting working paper on retail payment transaction times ("How Long Does It Take You to Pay? A Duration Study of Canadian Retail Transaction Payment Times", Working Paper 2018-46, September 2018). The author finds that "cash is more efficient in terms of time than cards, allowing for the processing of more payments... it helps explain the continued use of cash to pay for low-value retail purchases, despite the increase in payment innovations. This is a useful contribution to the discussion about cashlessness and I was thinking about it when I went to the fish and chip shop recently. Now, I haven't used cash in the fish and chip shop for years. Like most normal people, I pay by contactless, and it seems pretty quick to me, even allowing for the time taken for online authorisation. So while I was waiting for the haddock and chips, I watched the couple of people behind me in the queue. One used contactless but the other used a £10 note, which meant that the .

xxx

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...