Sie sind auf Seite 1von 21

Topic:- E BANKING A CASE STUDY OF PAYTM

CONTENTS

CHAPTER -1

 INTRODUCTION
 OBJECTIVE OF THE STUDY
 SCOPE OF STUDTY
 RESEARCH METHODOLOGY
 LIMITATION OF THE STUDY

CHAPTER-2

 REVIEW OF LITERATURE
CHAPTER-3

 COMPANY PROFILE
CHAPTER-4

 E-COMMERCE SECURITY & PAYTM

CHAPTER-5

 FINDINGS AND CONCLUSION


 BIBLIOGRAPHY

1
CHAPTER-1
INTRODUCTION
Paytm is an Indian e-commerce shopping website headquartered in
Noida, India, launched in 2010 as a prepaid mobile recharge website with
Android, Windows and iOS applications. Paytm is an acronym for "Pay
Through Mobile". It was founded by Vijay Shekhar Sharma, incubated and
owned by One97 Communications. Paytm is One97’s flagship brand. The firm
started by offering mobile recharging, adding bill payment and e-commerce,
with products similar to businesses such as Flipkart, Amazon, Snapdeal. In
2014, the company launched Paytm RBI approved semi-closed Wallet - inspired
and driven by a commitment to great consumer experience. Paytm is also a
leading payment solutions provider to ecommerce merchants and is now India's
largest mobile payment service platform with over 40 million wallets. The
service became the prefe rred mode of payment across leading consumer
internet companies. In 2015, it added booking bus travel. Also in that year,
Indian industrialist Ratan Tata made personal investment in the firm. The
company receiveda $575 million investment from Chinese e-commerce
company Alibaba Group. After Ant Financial Services Group, an Alibaba
Group affiliate, took 25% stake in One97 as part of a strategic agreement.
Paytm works with the all mobile operators in all states in India for prepaid
mobile, DTH, and Datacard recharges and postpaid mobile, landline, and
Datacard bill payments. It has partnered with multiple national banks for credit
card, debit card, and net banking payments. Paytm also works with various
billers for utility bill payments. In 2015 Paytm received a license from RBI for
starting India's first payments bank. The bank intends to use the Paytm’s
existing user base for offering new services, including debit cards, savings
accounts, online banking and transfers, to enable a cashless economy. The
payments bank would be a separate entity in which the founder Vijay Shekhar
Sharma will hold 51%, One97 Communications will hold 39% and 10% will be
held by a subsidiary of One97 and Sharma. Paytm holds the title sponsorship
rights from Board of Control for Cricket in India (BCCI) for all international
and domestic bilateral series hosted by the BCCI for a period of four years (a

2
total of 84 matches) starting from August 2015 for INR 203 crore (32 Million
USD), or INR 2.42 crore per match played in India.

OBJECTIVE OF THE STUDY

 Paytm’s objective has been to increase the market share of the Wallet,
capturing the market.
 To achieve this, it had to overcome several hurdles, the biggest of which is
that the adoption of the Wallet as a way of keeping money online and
transacting using mobile phones is a challenge for many people in India.
The brand also had to figure out how to increase the number of Paytm
Wallets, since success depends on volumes.
 Paytm’s target market is all of India’s internet users and smart phone users.
The Paytm mobile app is available on all possible platforms including
Android, IOS and Windows.
 The publicity strategy was uniform and aimed at mass audiences across all
cities. To truly reach everyone, including those in regional markets, the
brand even began using local vernacular with its press ads, in an attempt to
reach out to regional markets.

SCOPE OF THE STUDY

Paytm has become synonymous with quick recharge. The company has
made tremendous progress since its inception in the year 2009. A brainchild of
Vijay Shekhar Sharma, offers Online Mobile Recharge, DTH Recharge,
Electricity Bills, Data cards, Landline Bills, Gas Bills, Add Money to Paytm
Wallet, Send Money to Friends, Bus Tickets, Coupons and more. Paytm’s
mobile application is available on Android, IOS & Windows to satiate your
need of on the go payments.

RESEARCH OF METHODOLOGY

3
Secondary data are the easiest to gather and the cost of colleting
this data is very low. The investigation relied on books, documents,
annual report, financial assessments, literature, files and personal
observation to have an idea about the company set up, functions of
the financial department an other groups.
 Books.
 Newspapers
 Internet
LIMITATION OF THE STUDY

These are the limitations within the project due to constraints of


authority and the company. These are as follows:

 There is lack of some required data which need to be presented.


 The data analyzed is strictly limited to views expressed by the
respondents in the survey.

 Since the study is based only on secondary data,some aspects


might have been ignored.the company does not shows the exact
information to meet the objective of the study

4
CHAPTER-2

LITERATURE REVIEW
 Rajesh Krishna Balan, Narayan Ramasubbu, Giri Kumar Tayi studied in their
paper, “Digital Wallet: Requirements and Challenges” (2006) that the requirements
and challenges of deploying a nationwide digital wallet solution in Singapore. Further
they discussed why Singapore is ready for a digital wallet and identify the key challenges
in building and deploying a digital wallet. Then discussed one of the key challenges,
supporting peer -to-peer cash transactions between individuals using a digital wallet, in
more detail and end the paper with their proposed solution.
 Prof Trilok Nath Shukla in his paper “Mobile Wallet: Present and the Future”
(June 2016) Has discussed about mobile wallet, working, types and its advantages and
disadvantages. His analysis included perception of consumers and retailers about mobile
wallets. He concluded that mobile wallets will be used to engage with the customer by the
marketers and digital businesses. Irrespective of the market status of these mobile wallets,
marketers should take advantage of the emerging opportunities.
 Dr. Poonam Painuly, Shalu Rathi in their paper “Mobile Wallet: An upcoming
mode of business transactions” (May 2016) Has explained about mobile wallet, types
and trends. Then discussed about Role of mobile wallet in various sectors like Banks,
Retail and Hospitality. The paper explains the importance of mobile wallet for Banks,
Customers and Companies. In future scope it talks of mobile wallets becoming a latest
marketing channel in near future. And contribute highly in a seamless shopping
experience for the customers that increase their tendency for frequent and more
repurchases with delightful experiences. To conclude they speak the importance and
growth of mobile money in business, social and economic prospective. The presence of
mobile wallet spreading from urban to rural areas on a large scale. Hence, wallet money
sees a high bright future in near time.
 Dr. Karminder Ghuman and CS Shruti Srivastava in their paper “Recharging: the
Right Way?? A case study on e-payment giants: Freecharge & PayTM” has asked readers
a strategic question that in the emerging internet based service provision industry,
whether it is a better strategy to develop a unique positioning on the basis of single key
service or it’s better for an organization to offer multiple services, thereby reducing risk,
increasing traction and thus increasing its valuation? And thus they have compared Paytm
and Freecharge who are employing opposite strategies to find out which one is better
 Key Pousttchi and Dietmar G. Wiedemann in their paper “What Influences
Consumers’ Intention to Use Mobile Payments?” (2008) studied the adoption of

5
mobile payments and evaluated what key influences affected consumers to use mobile
payments and found that subjective security was not a primary driver of mobile payment
acceptance. They found that perceived confidentiality of payment details and perceived
trustworthiness were strongly correlated. Four key variables were found to directly
impacting consumer intention and usage behavior: performance expectancy, effort
expectancy, social influence, and facilitating conditions.
 The Min Lee in his paper “The impact of perceptions of interactivity on customer
trust and transaction intentions in mobile commerce” (2005) investigated the impact
of perceptions of interactivity on consumer trust and transactions in mobile commerce
and concluded that trust does in fact play a significant role in determining consumer
transaction intentions. Hsin-Hui Lin and Yi-Shun Wang in their paper “An examination
of the determinants of customer loyalty in mobile commerce contexts” (2005) examined
the factors that contributed to customer loyalty in mobile commerce; perceived value and
trust were found to be directly related to customer satisfaction and customer loyalty;
customer satisfaction was also suggested to positively affect customer loyalty; and habit
was proposed to determine customer loyalty. They also found that customer loyalty was
directly affected by perceived value, trust, habit, and customer satisfaction. Customer
loyalty was evaluated to be a strong determining factor in acceptance of mobile
commerce
 Gao et al. (2005) Have proposed the architecture for peer-to-peer m-payment system
using symmetric key mechanism. The system allows the customers to make payments
over the wireless Internet or via Bluetooth communication. The proposed solution
employs security mechanisms such as service registration, access control.
 Sinha in his article “The Risk of Financing telecom Projects” released in Vikalpa,
Vol.22, No.3 July- September 1997 reviews the emerging competitive structure of the
Indian Telecom Sector, identifies the constraints within which the private sector is
expecting to operate, and discuss issues related in to interconnection cost and quantity27.
It also looks at the regulation of tariffs in the context of acrosssubsidies in the existing
tariff structure and identifies area for further work.

6
CHAPTER -3
COMPANY PROFILE
ABOUT PAYTM:
Paytm means “Pay through Mobile”. It is one of the largest is one of the fastest
growing Indian e-commerce shopping websites launched in 2010. The name of the company
who launched the Paytm is One97 communication. Initially it is focused on Mobile and DTH
recharging. The Company headquartered in Noida, India. It gradually provided recharging
and bill payment of various portals including electricity bills, gas bills as well as telephone
bills.

In 2014 Paytm has started the business same like as the facilities are getting from the other E-
Commerce company such as Flipkart, Amazon, and Snapdeal. Today, it is India's most
popular online destination for prepaid mobile & DTH recharges and shopping, and its
Android and iOS apps have been ranked among the most popular apps. In only 3 years since
the founding, the company created a user base of 25 million wallet users and 10 million app
downloads.

What is Paytm?

Paytm is India’s largest mobile payments, e-wallet, and commerce


platform. Though started as a recharge platform in 2010, Paytm has
subsequently changed its business model to a marketplace and a virtual bank
model. It is also one of the pioneers of the cashback business model. The
company has transformed itself into one of the Indian giants dealing in mobile
payments, banking services, marketplace, gold, recharge and bill payments, etc.
who serve around 100 million registered users

7
SERVICE: In 2014, the company launched Paytm Wallet, India's largest mobile payment
service platform with over 40 million wallets. The service became the preferred mode of
payment across leading consumer internet companies such as Uber, Book my show,
Makemytrip.

FUNDING: Paytm got a major boost in e-commerce when Indian industrialist Ratan
Tata made personal investment in the firm in March 2015.In the same month, the company
received a $575 million investment from Chinese e-commerce company Alibaba
Group, after Ant Financial Services Group, an Alibaba Group affiliate, took 25% stake in
One97 as part of a strategic agreement.

PARTNER: Paytm works with all mobile operators in all states in India for prepaid mobile,
DTH and Data card recharges and postpaid mobile, landline and Data card bill payments. Its
partners with the multiple national banks, for credit card, debit card and net banking
payments. Pay tm also works with various billers for utility bill payments.

ACHIVEMENTS:
2014 – Paytm is Gold Winner at the MMA Smarties in the Mobile App category.
2014 – Paytm is Silver Winner at the MMA Smarties in the mCommerce category
2014 – Paytm wins the Best Mobile Money product at the 4th India Digital Awards.
2013 – Paytm wins Knowledge Faber Best Mobile Wallet Program Award.

2013 – Paytm wins a special mention in m Billionth Awards in mCommerce/mBusiness


category.
2013 – Paytm is Gold Winner at the MMA Smarties for E-Commerce.

2012 – Paytm is recognized as the Most Innovative Startup of the Year at the
Entrepreneur India event organized by Franchise India.

TECHNICAL ARCHITECTURE OF PAYTM:

8
A high-level architecture for electronic commerce.

There are three components to this architecture: the Internet, a firewall, and your
organization. The Internet is where you will interact electronically with your customers, your
firewall will provide you with reasonable protection against people who wish you harm, and
your organization’s systems will process the business transactions generated on the WWW by
your customers.
WORKING AND TECHNOLOGIES OF PAYTM

SUPPLY CHAIN MANAGEMENT OF PAYTM:

It is the management of flow of goods and services to the customer. Supply chain
management has been defined as the "design, planning, execution, control, and monitoring of
supply chain activities with the objective of creating net value, building a competitive
infrastructure, leveraging worldwide logistics, synchronizing supply with demand and
measuring performance globally.

SCM of paytm

WEB TECHONOLOGY OF PAYTM:

9
SERVER SIDE PROGRAMMING LANGUAGE

 JAVASCRIPT

CLIENT SIDE PROGRAMMING LANGUAGE

 JAVASCRIPT

MARKUP LANGUAGE

 HTML

CHARACTER ENCODING

 UTF-8: UTF-8 (8-bit Unicode Transformation Format) is a variable-length character


encoding for Unicode, which is backwards compatible with ASCII.

EXTERNAL CSS

 External Cascading Style Sheets define style rules in a separate CSS file.

EMBEDDED CSS

 Embedded Cascading Style Sheets define a set of style rules in a <style> element
within a web page.

INLINE CSS

 Inline Cascading Style Sheets define style rules directly within an (X)HTML element
using the style attribute.

SESSION COOKIES

 Session cookies are temporary cookies, which are deleted when the user closes the
browser.

EXTERNAL CSS

 External Cascading Style Sheets define style rules in a separate CSS file.

EMBEDDED CSS

 Embedded Cascading Style Sheets define a set of style rules in a <style> element
within a web page.

INLINE CSS

 Inline Cascading Style Sheets define style rules directly within an (X)HTML element
using the style attribute.

SESSION COOKIES

10
 Session cookies are temporary cookies, which are deleted when the user closes the
browser

HTTPONLY COOKIES

 Http Only cookies are used only in the HTTP protocol and not in client side scripts,
which may increase security.

NON-HTTPONLY COOKIES

 Non-Http Only cookies are used in the HTTP protocol and also in client side scripts,
which may be a security threat.

SECURE COOKIES

 Secure cookies are used only via an encrypted connections, which may increase
security.

HTTP STIRCT TRANSPORT SECURTIY

 HTTP Strict Transport Security (HSTS) defines a mechanism enabling web sites to
declare themselves

SSL CERTIFICATE AUTHORITY

 GeoTrust is a SSL certificate authority owned by Symantec. This includes SSL


certificates issues by the certification branch of Equifax, which was acquired by
GeoTrust.

WEB SERVER

 NGINX - Nginx (pronounced as "engine X") is a lightweight open source web server.

 NODE.JS - Node.js is a server-side JavaScript environment for writing network


programs such as web servers.

TOP LEVEL DOMAIN

 .COM - Commercial entities

WEB BASED TOOLS OF PAYTM

The basic requirement for a merchant to have a Web presence or have an electronic
commerce site, is
 a connection to the Internet, and
 a Web server in the company network.

11
The two main ingredients in a Web server are its hardware and software.
WEB SERVER HARDWARE:
A merchant should think carefully when making a decision on the Web server computer. The
decision depends on factors such as:

Operating system of the network. UNIX operating system is found to be more rugged
than that of Windows, but UNIX is more complex to manage than Windows.

Hardware requirement of the Web server software. A PC with a midrange CPU, small
hard drive, and 32 megabytes of memory will perform poorly when compared with a
high-end workstation or a powerful UNIX-based computer.

Expected traffic or the number of transaction per unit time. Running a large, enterprise-
class application server (such as an ERP system) on a personal computer is not feasible.

Other software running on the same computer. For example, running a Web server and a
database server can significantly slow down the performance of a computer.

Scalability of the hardware -- meaning upgrade of components such memory, disk space,
disk mirroring, or even connect additional Web servers if necessary.
Benchmarking Web Server Hardware and Software:
A benchmark test considers several factors such as:
 The computer hardware
 The Web server software
 Network connection: A Web server on a T3 connection can deliver Web pages to
clients much faster than it could on a T1 connection.
 Throughput: It is the number of HTTP requests that a particular hardware and
software combination can process in a unit of time.
 Response Time: It is the amount of time that a server requires to process one request.
 Type of Web page: A server that delivers mostly static Web pages will perform better
than the same server that delivers dynamic Web pages. A dynamic page is a Web
page whose content is shaped by a program in response to user request (such as a
database query), versus a static page, which is just a plain HTML page.

Web Server Software Feature Sets


All Web server software provides some basic features which can be classified as:
Core capabilities
Site management
Application Construction, and
Electronic commerce
12
CORE CAPABILITIES:
IP-Sharing or Virtual Server
Logical file
Security
FTP
Site Analysis
Searching

SITE MANAGEMENT:
 A Web server provides tools to manage multiple Web sites, file security, virtual file,
and log file analysis.
 Administration of a Web server can be performed from a remote computer in the
network.

APPLICATION DEVELOPMENT:
Application development includes Web editors and extensions to produce Web pages – either
static or dynamic. These include HTML editors such as FrontPage for static Web pages. For
dynamic Web pages, there are protocols such as Common Gateway Interface (CGI) and
Application programming Interface (API) that are used by programs such as Java and C++ to
develop dynamic Web pages.
ELECTRONIC COMMERCE:
Some Web servers provide advanced services that support online selling and buying (such as
shopping cart and catalog services). An electronic commerce software can provide templates
and other tools to quickly develop an e-commerce site. This might include templates for
product browsing, shopping carts, and credit card processing.

13
CHAPTER-4

E-COMMERCE SECURITY & PAYTM


Computer security refers to the technological and managerial procedures
applied to computer systems to ensure the availability, integrity, and confidentiality of
information managed by the computer system against unauthorised access, modification, or
destruction. It deals with the transmission of data in a secured environment to the people
sitting thousand miles away from each other. Intruders penetrate into the computer using
different ways; they make use of malicious programs to cause destruction and breach privacy.
Security experts make use of firewall and cryptography techniques to prevent suspicious data
from reaching to the host computer and use algorithms to encrypt the data while sending it
across the network. Computer security refers to the protection given to computers and the
information contained in them from unauthorised access. It involves the measures and
controls that ensure confidentiality, integrity, and availability of the information, processed
and stored by a computer. These three aspects are responsible for effective computer security.

With an increasing amount of people getting connected to networks, the security threats that
cause massive harm are increasing also. Network security is a major part of a network that
needs to be maintained because information is being passed between computers etc and is
very vulnerable to attack. Over the past five years people that manage network security have
seen a massive increase of hackers and criminals creating malicious threats that have been
pumped into networks across the world

E-commerce security is the protection of e-commerce assets from unauthorized access, use,
alteration, or destruction of data. More than $388 billion globally per year attributed to
cyber crime and a large portion of that is related to e-commerce.

14
Six Dimensions of E-Commerce Security :
Integrity: prevention against unauthorized data modification
Nonrepudiation: prevention against any one party from reneging on an agreement
after the fact
Authenticity: authentication of data source
Confidentiality: protection against unauthorized data disclosure
Privacy: provision of data control and disclosure
Availability: prevention against data delays or removal

E-COMMERCE THREATS:
Intellectual Property Threats:
These are those use existing materials found on the Internet without the owner's
permission, e.g., music downloading, domain name (cyber squatting), software
pirating.
Client Computer Threats:
 Trojan horse : Appears benign, but does something other than expected.

 Bots: Covertly installed on computer; respond to external commands sent by attacker


to create a network of compromised computers for sending spam, generating a DDoS
attack, and stealing info from computers.
 Viruses : Replicate and spread to other files; most deliver “payload” (destructive or
benign) Macro viruses, file-infecting viruses, script viruses.
 Worms: Designed to spread from computer to computer Can replicate without being
executed by a user or program like virus.

Unwanted Programmes Installed Without User’s Informed:


Browser parasites : Can monitor and change settings of a user’s browser
Adware : Calls for unwanted pop-up ads
Spyware : Can be used to obtain information, such as a user’s keystrokes, e-mail, IMs, etc.
Communication Channel Threats:

 Sniffer Program : Eavesdropping program that monitors information traveling


over a network.
 Phishing : Deceptive online attempt to obtain confidential information
 E-Mail Scams:
15
Spoofing Legitimate Web Sites: Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else Spoofing a Web site is called “pharming,”
redirecting a Web link to another IP address different from the real one Threatens
integrity (steal business from true site, or alter orders and send to true site), and
authenticity (difficult to distinguish between true and fake Web address) Carried out by
hacking local DNS servers.
Denial-of-service (DOS) Attack : Hackers flood Web site with useless traffic to
inundate and overwhelm network. Use of bot networks built from hundreds of
compromised workstations.

Distributed Denial Of Service (Ddos) Attack : Hackers use multiple


computers to attack target network from numerous launch points Microsoft and Yahoo
have experienced such attacks.

Fig 16#

Server Threats:
Hacking : Hackers are those Individual who intends to gain unauthorized
access to computer systems. Where as Crackers are those Hacker with criminal intent. Types
of hackers:
 White hats – hired by corporate to find weaknesses in the firm’s computer system
 Black hats – hackers with intention of causing harm
 Grey hats – hackers breaking in and revealing system flaws without disrupting site or attempting to
profit from their finds.

Cybervandalism: Intentionally disrupting, defacing, destroying Web site.

Data Breach : When organizations lose control over corporate information to


outsiders.
Credit Card Fraud: Fear of stolen credit card information deters online

purchases.
16
 US’s federal law limits liability of individuals to $50 for a stolen credit card.
 Hackers target credit card files and other customer information files on merchant servers;
use stolen data to establish credit under false identity.
 Online companies at higher risk than offline due to difficulty of guarenteeing true
identity of customers.
 E-Sign” law giving digital signatures same authority as hand-written ones applies only to
large corporations, but not to B2C e-commerce.
Spoofing (Pharming) : Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else . Spoofing a Web site is called “pharming,” redirecting a Web
link to another IP address different from the real one. Threatens integrity (steal business from
true site, or alter orders and send to true site), and authenticity (difficult to
distinguish between true and fake Web address) Carried out by hacking local DNS servers
.
Spam (Junk) Web Sites : Collection of advertisements for other sites, some of which
containing malicious code. Appears on search results, hiding their identities by using domain
names similar to legitimate ones, and redirecting traffic to spammer domains.

OTHER SECURITY THREATS :

Sniffing : Eavesdropping program that monitors information traveling over a


network.
Insider Jobs: Single largest financial threat.
Poorly Designed Server And Client Software : Due to increase in
complexity and size of OS, application software, and browsers.
Social Network Security : Social engineering attacks tempting visitors to FB
pages to click on “bad-behavior” links.
Mobile Platform Threats : Same risks as any Internet device Malware,
botnets, vishing/smishing.
A PROCEDURE THAT RECOGNIZES, REDUCES, OR ELIMINATES A
THREAT:
Intellectual Property Protection
 Legislature
 Authentication

17
CHAPTER-5

FINDING
The present findings from the interpretation of the results regarding
factors considered for adopting Paytm / internet mobile banking services by
bank customers, functional / psychological barriers, and usefulness and
benefits of e-banking services are enumerated here.

 Though majority of the bank customers perceive the ATM usage as


important, the importance of ATM usage is significantly related to location,
education and occupation of the bank customers based on the present
study. The perceived importance of Tele-banking is independent of the
location and income but depends upon sex, age, education and occupation
of the bank customers.
 The internet banking is important for bank customers and at the same time
the importance of internet banking is significantly related to their age,
education, occupation and income.
 The extent of services like Online Enquiry, Online Payment, Credit Card and
Telephone Banking has been at “Fair” level whereas the extent of services
such as ATM Card, Debit Card, Internet Banking, Depository Service, and
Investment Advisory Service, e-Transfer of Funds, Core Banking and
Anywhere Banking has been “good” by the banks.
 There is significant difference in the extent of services as provided by both
private sector banks.

18
 The preference to manual banking is little more than that of e-banking and
preference towards manual banking and e-banking is largely associated
with location, age, education and occupation of the bank customers.
 There is significant relationship between adoption of e-banking and
location, age, education and income of the bank customers.
 The adoption of e-banking is significantly associated with the number of
banking transactions per month among bank customers.
 The bank customers consider “Like to use new technologies”, “IB has made
banking easy” and “Use IB for better rate offers and charges only” as the
primary reasons for adoption of e-banking

SUGGESTION
 To achieve this sound financial and banking service is essential and therefore
Indian bankers should take resolutions to implement the policy of
“inclusion” in all the branches, which enable its customers to enhance the
knowledge of Paytm of banking services.
 It will include the maximum number of people under the shelter of financial
inclusion for this purpose, it is the duty of the bankers to inculcate the
feeling of that Paytm banking is safe and secure. This can be possible only
when a banker take steps to have a separate on-line centre in their premises
with enough number of computers and uninterrupted internet facility.
 It is argued that as Paytm banking services are in the nature of public good, it
is essential that availability of banking and payment services to the entire
population without discrimination is the prime objective of public policy.
 The delivery of financial services at affordable costs to vast sections of
people including disadvantaged and low income groups’ is relates to
financial inclusion. Unrestrained access to public goods and services is the
sine qua non of an open and efficient society.

19
CONCLUSION

Paytm saves customer's time on going to sepa rate websites for sepa
rate payment s. Most importantly, it's very easy to use. In a nutshell, it is one
useful app that can really come in "handy for customers" and is definitely
worth a try. Paytm for Android is available for free on Google Play store. The
present study concludes that the usage of Paytm is only at a satisfactory level.
The customers face problems in ease of use, security issues and slow Paytm
server in the usage of Paytm. Paytm can establish a separate wing with trained
staff to address the issues and problems related to Paytm services. The Paytm
may initiate necessary action for periodic updation, up gradation and
maintenance of both hardware and software and to prevent cases of slow
server and complete breakdown of system by having back storages. Present
study has made an attempt to understand customer perception regarding
digital payment. It was found that demographic factor except education does
not have much impact on the adoption of the digital payment. Anova
computation supported this finding as there was no signification difference is
perceived by the respondents on the basis of gender age, profession and
annual income. It was only education level of the respondents where
20
signification difference is perceived by the respondents. It indicates that
adoption of digital payment is influenced by the education level of the
customer. If a person has studied beyond matriculation and internet savvy, he
or she will be inclined to use the digital payment mode. It was also found that
in the areas/region where education level is high such as Delhi NCR and other
metropolitan area, the possibility of acceptance of digital payment is much
higher. The growth of users of Smartphone and internet penetration in such
area also facilitated the adoption of digital payment.

BIBLIOGRAPHY

WEBSITE

WWW.WIKIPEDIA.COM

WWW.PAYTM.COM

WWW.SLIDESHARE.NET

PAYTM------COMPANY IN INDIA

MAGAZINE

 Times of India
 India Today
 Business India

21

Das könnte Ihnen auch gefallen