Professional Documents
Culture Documents
ACADEMIC YEAR
2023-2024
UNIVERSITY OF MUMBAI
A PROJECT REPORT ON
“A STUD ON ELECTONIC PAYMENT FRAUD FACED BY
CONSUMERS”
SUBMITTED BY
NAME: MAKWANA KARAN VIVEKBHAI
T.Y.B.A.F. SEMESTER
VI
PROJECT GUIDE
ACADEMIC YEAR
2023-2024
UNIVERSITY OF MUMBAI
A PROJECT REPORT ON
“A STUD ON ELECTONIC PAYMENT FRAUD FACED BY
CONSUMERS”
SUBMITTED BY
MAKWANA KARAN VIVEKBHAI
NO: 09
T.Y.B.A.F.
SEMESTER VI
PROJECT GUIDE
ACADEMIC YEAR
2023-2024
DECLARATION
I, the undersigned Ms. Makwana karan Vivek Bhai. student of Lilavati Lalji Dayal College
of Commerce (Night), 375/77 S.V.P. Road, Charni Road (E),Mumbai – 400004 studying in
T.Y.B.A.F. hereby declare that the project work entitled “A STUDY ON ELECTONIC
PAYMENT FRAUD FACED BY CONSUMERS” submitted to the University of
Mumbai is a record of an original work done by me to the best of my knowledge under the
guidance of Ms. Namrata Bahalerao.
This project work is submitted in the partial fulfillment of the requirements for the award of the
degree of Bachelor of Commerce (Accounting and Finance). Theresults embodied in this project
have not been submitted to any other Universityor Institute for the award of any degree or diploma.
I hereby further declare that all information of this document has been obtained and presented in
accordance with academic rules and ethical conduct.
Date:
Place: Mumbai
CERTIFICATE
FACED BY CONSUMERS” has been prepared and submitted by Makwana Karan Vivek
guidance during the academic year 2022-2023, which is being submitted in partialfulfillment of the
requirement of the Project Work as part of Third Year SemesterVI of the “Bachelor of Commerce
Date of Submission:
Place: Mumbai
ACKNOWLEDGEMENT
Last but not the least I owe a lot to my family and friends who have supported
methroughout my project.
0|Page
INDEX
SR TOPICS PG
NO. NO.
1 INTRODUCTION 3-26
DIFFERENT MODES OF DIGIDAL 5
PAYMENT (2016-2024)
1.1 NEFT 5
1.2 RTGS 6
1.3 Advantages 6
1.4 Disadvantages 7
1.5 Mobile Wallet 7
1.6 The impact of COVID-19 pandemic on payment 15
behaviour
1.7 Types of frauds 18
1.8 Measures for fraud prevention and detection 23
1.9 Security in e-payment process 25
1.10 Awareness and education 25
1.11 Protection from internal threats 25
2 REVIEW OF LITERATIURE 27-33
3 RESEARCH METHODOLOGY 34-40
3.1 Research Statement 34
3.2 Objective of the study 34
3.3 Scope of the study 34
3.4 Sample size 40
3.5 Data analysis tool 40
3.6 Limitation of study 40
4 DATA ANALYSIS 41-55
5 DATA INTERPRETATION 56-57
6 FINDINGS & CONCLUSION 58-59
7 SUGGESTION & RECOMMENDATION 60-61
8 REFFRENCE 62
9 APPENDIX 63-65
1|Page
TABLE INDEX
TABLE PG
NO. TOPIC NO.
4 4.1 Age 43
4.2 Gender 44
4.3 Qualification 45
4.4 Use of electronic payment 46
4.9 Preference 51
4.10 Opinions 52
4.13 Recommendation 55
2|Page
CHAPTER-1
INTRODUCTION
With the development of the Internet in the 1990s and subsequent evolution of
electronic commerce (e-commerce) have given rise to a dynamic business environment
where transactions take place without face-to-face interaction. The International
Telecommunication Union reported that internet is quickly becoming the first stop for
people for making decision about buying services and products over internet and that
the number of internet users has reached 2.3 billion in 2011. The increase in the volume
of transactions has given rise to numerous electronic payment (e-payments) systems.
Recent studies (Manning 1998, Wortington 2000) agree that electronic payment
transactions have been in use for quite some years, like automatic teller machines
(ATM), credit and debit cards, direct deposit and direct payment. In no pay Online
payment report (2011) found that there is massive growth in the market for digital goods
and this has given rise to numerous payment systems making the process of payment
over the Internet easier for consumers. E-payment ensures smooth, secure and efficient
transactions in e-business.
However, the development of e-payment methods has expanded and with it the fakery
has inevitably kept pace. As a result, the consumers face a number of risks to personal
information and have second thoughts of giving their credit account information over
internet (2002). A recent study found that more than 7 million consumer complaints
have been received during the period from 2007 to 2011and a total of 990,242 of these
complaints were related to frauds The Consumer Sentinel Network (2012) (CSN).
Consumers have reported paying over $1.5 billion in those fraud complaints. According
to CyberSource (2012) found that merchants have reported losing an average of 1.0%
of the total online revenue to fraud. It is also reported that the fraud rate of international
order is 2% more than domestic orders. For the merchants managing e-frauds remain
to be major and growing cost. Fraud in e-payment transaction is a global problem. We
find fraudsters manoeuvre in all countries and industries.
3|Page
The purpose of this research is to study frauds in e-payments transactions, in order to
point out some prospective threats and countermeasure required to reduce frauds. This
paper discusses e-fraud (electronic fraud) and the different types of frauds in e-payment
transactions. It further addresses various possible measures for prevention and detection
of frauds in order to minimize frauds and make internet a safer, sound and trusted
environment to consumers and merchants.
The consensus around the origin and the forms of ancient money has kept changing
over the course of recorded history. But what has not changed over the years is what
money does; broadly, it facilitates trade in goods and services as medium of exchange
and acts as a credible store of value. Modern day trade demands massive payments to
be settled fast over long distances with minimum transaction cost. Evidently, to suit
these needs the payment systems are being digitized globally.
Cash, however, remains a crucial part of the trade. Therefore, the discourse on the
current age payment system revolves around cash vs digital transactions. A digital
payment, often known as an e-payment, is a method of making electronic payments
between a payer and a payee. Both the payer and the payee use digital modes to
complete the transaction. Right from barter system to paper money, there has been a
huge evolution in the modes of payment in India. And now in the second decade of the
millennium with the youth and coming generation, cashless i.e., digital payment mode
is the new phase of payments. Before the evolution.
The basic concept of traditional banking was that the users have to go the bank for the
primary banking requirement such as withdrawal or deposit of cash, funds transfer,
verifying statement of accounts etc. It has been called as the original banks which was
the method of past in the economy. They were the original commercial mediators to
provide bank accounts. From the exterior they had the big buildings with pillars made
by marbles but in the interior, it had an abundance of money in the box. This has been
called “Bank”.
They were big athletes in the commercial markets. They converted the savings of the
house into loans for business as an investment. Traditional Banking designed on IT
4|Page
acceptance. The Indian Banking Sector arose in the world of technology in the
beginning of 1990s. In India public sector banks have been influenced by the banking
sector, which occupied above 80% base of total asset (Gupta & Gupta, 2020).
1.1 NEFT:
NEFT stands for National Electronic Funds Transfer. Started in November 2005, NEFT
is an electronic funds transfer system set up and managed by the Reserve Bank of India.
NEFT allows the online transfer of funds from one NEFT -enabled bank account to
another.
An individual / firm / corporate willing to transfer funds through NEFT can use the
internet / mobile banking facility offered by his / her bank for initiating online funds
transfer request. The remitter has to provide details of beneficiary such as, name of the
beneficiary, name of the bank branch where the beneficiary has an account, IFSC of the
beneficiary bank branch, account type and account number, etc. for addition of the
beneficiary to his / her internet / mobile banking module. Upon successful beneficiary
addition, the remitter can initiate online NEFT funds transfer by authorising debit to his
/ her account. Alternatively, the remitter can also visit his / her bank branch for initiating
NEFT funds transfer through branch / off-line mode. The customer has to fill-in the
beneficiary details in NEFT application form available at the bank branch and authorise
the branch to debit to his / her account to the extent of the amount requested in NEFT
application form.
Case example: Narendra Pal, a government school teacher in Zirakpur near Chandigarh,
received an SMS just before midnight informing him that Rs 10,000 had been
withdrawn from his account through an ATM in Surat1. Before he could comprehend
what was happening, he received two more messages about withdrawals of Rs 10,000
and Rs 20,0001. The first debit happened a few minutes before 12 midnight, allowing
the fraudster to transact again immediately as the withdrawal limit for the next day set
in.
5|Page
Despite Pal not having shared his bank account or ATM card details with anyone, he
fell victim to online fraud. He reported the fraudulent transactions to his bank
immediately by calling the helpline number, wrote to the bank branch and the RBI, and
also filed a complaint with the crime branch’s cyber cell. However, it took him more
than two months and multiple visits to the branch to get his money back.
This case highlights the importance of being vigilant while making NEFT transactions
and the need to report any suspicious activity to your bank immediately. Always
remember to keep your banking details secure and never share them with anyone.
1.2 RTGS:
Real-time gross settlements are a process that is used for high-value inter-bank
transactions. These transactions typically require instant and full clearing and are
generally done by the central bank of the country. RTGS reduces the overall risk as
these settlements are made almost instantly throughout the day. It is not like National
Electronic Funds Transfer (NEFT), in which settlements are made in batches. Hence,
the charges involved in the real-time gross transfer of funds may incur higher costs for
customers.
1.3 Advantages:
Real-time Transfer: The fund transfer occurs in real time, which means that the
funds are credited instantly to the beneficiary’s account1.
High-Value Transactions: RTGS is predominantly used for high-value
transactions1.
Reliability: The system is highly reliable and is powered by the RBI1.
Immediate Clearing: It offers immediate clearing1.
Safety: Using the RTGS method reduces the delivery risk (especially of high-
value transactions) and a time lag in completion of transactions as the
transactions happen in real time4.
6|Page
24/7 Availability: It is available 24/75.
1.4 Disadvantages:
Cost: RTGS can often incur a higher charge than processes that bundle and net
payments2.
Minimum Limit: The minimum transaction amount is INR 2 lakh, which might not be
suitable for smaller transactions.
A mobile wallet is a way to carry cash in a digital format. You can link your credit card
or debit card information on your mobile device to the mobile wallet app or You can
transfer money online to a mobile wallet. Instead of using your physical plastic card to
make purchases, you can pay with your smartphone, tablet, or smart watch. An
individual's account. It is required to be linked to the digital wallet to load money into
it. The majority of banks have their own email, wallets and some private companies,
e.g., Paytm, Free charge, Mobikwik, Oxigen, mRupee, Airtel Money, Jio Money, SBI
Buddy, Itz Cash, Citrus Pay, Vodafone M-Pesa, Axis Bank Lime, ICICI Pockets,
Speed-Pay etc.
Google pay:
Google Pay is a popular mobile wallet and digital payment app. As part of the Google
ecosystem, it has scaled up its user base quickly. With Google Pay, you can send money
to friends, pay bills, and buy online, all via UPI and directly from your bank account.
Since Google Pay works with your existing bank account, your money is safe with your
bank. There’s no need to worry about reloading wallets and you don’t be transferred
into your bank account. Now you can also recharge your mobile or monthly utility bills.
has witnessed a notable surge in financial fraud cases in the last few years. According to
Google, the company prevented financial scams worth ₹12,000 crore on their instant
payment’s app — Google Pay, in the last one year. The company also said that GPay has
7|Page
also declined one lakh transactions every day after AI models detected that the transaction
could be suspicious.
Google spokesperson said that the company had taken action against almost 3,500 lenders
in cases of fraud and non-compliance. Google said that they have collaborated with the
Fintech Association for Consumer Empowerment (FACE) and onboard them as a priority
flagger, as part of its efforts to combat predatory digital lending apps on google play store.
Financial frauds, ranging from online scams to complex Ponzi schemes, have raised serious
questions about the efficacy of regulatory measures and the need for heightened vigilance
in the financial sector. To safeguard people from increasingly sophisticated financial scams,
Google announced the launch of its flagship program, DigiKavach — an early threat
detection and warning system designed to identify and study emerging financial fraud
patterns. Google said that DigiKavach studies the methods and modus operandi of
scammers and collaborates with the wider ecosystem of experts. The new program aims to
identify and mitigate new scams. Google believes that the initiative will protect users from
scams, malware and online fraud.
“To fully realise the potential of digital, ensuring the safety and security of individuals online
is not just a necessity, but an imperative. With DigiKavach, we're doubling down our efforts
to protect people against ever-evolving financial scams and fraud. Leveraging our internal
expertise, we're focused on understanding and detecting threats early so we can act quickly
and effectively to prevent the spread of scams and share our insights and findings with
committed experts," said Saikat Mitra, Vice President & Head of Trust & Safety, Google
APAC.
Paytm:
Paytm is a payment app in India providing e‐wallet services; it is also the most prominent
mobile e‐commerce app in the world’s third‐largest economy. This article uses Paytm as a
case study to better understand the global platform economy and its implications for social
and economic inequities. We contextualize the emergence of Paytm by drawing attention to
its relationship with India’s developing digital infrastructure and marginalized
populations—many of whom are part of the platform’s user base. We use a political
8|Page
economy lens to investigate Paytm’s market structure, stakeholders, innovations, and
beneficiaries.
What resources, infrastructures, and policies have given rise to India’s digital payment
ecosystem, and how have these contributed to economic and social inequities? Accordingly,
we audited the international and Indian business press and Paytm’s corporate
communications from 2016 to 2020. Our analysis points to the tensions between private and
public interests in the larger platform ecosystem, dispelling notions of platforms as neutral
arbiters of market transactions.
We argue that Paytm is socially beneficial to the extent that it reduces transaction costs and
makes digital payments more accessible for marginalized populations; it is detrimental to
the time that it jeopardizes user data and privacy while suppressing competition in the
platform economy.
Paytm's customers:
Paytm's mission is to serve its Indian customers, especially mobile-phone users. Many
Indian customers believed that the digital world made it simple for them to open a bank
account. It turned out, however, that this was not the case. The concept of simple online
payments fell short, and consumers had nothing but a bad experience. Paytm presented itself
as a superior option in this regard.
To keep in touch with its clients Paytm has a customer service centre that is open seven days
a week, 24 hours a day. At the same time, the majority of Paytm's services are self-serve and
can be accessed directly via their websites.
One of Paytm's more prominent propositions was its recharging market, which was the
company's original service proposition. Following that, the company proceeded to diversify
and progress, launching unique services such as Paytm-wallet, E-commerce, and Digital-
Gold. These efforts have earned the organization the blessings of Alibaba, a Chinese
9|Page
conglomerate that has contributed large amounts of money to the organization, thus
enhancing its investment potential. To hit more clients, Paytm used cricket and television
ads.
Paytm’ Channel:
Paytm attracts customers through a variety of networks. It has established relationships with
several client and vendor sites that sponsor its enterprise, in addition to its website that drives
clicks.
Paytm services a large number of customers, which is why it is so low-cost. Its platform and
consumer acquisition account for the majority of its costs. It's a common expense faced by
many companies around the world where the cost of acquiring new customers is high [25].
The amount of money spent on this method is greater than the amount of money made on
the original transactions.
Apple Pay:
Apple pay is an Apple's solution for a digital wallet and mobile payment service using iOS
devices that allow the users to make payments in iOS apps, web and in person. It digitizes
and replaces the card (debit & credit) to store encrypted information about the payment in
order to enhance security and to generate a dynamic security code that is used in EMV-mode
is a magnetic strip-based data emulation method of transaction to include dynamic card
verification value (DCVV) during the transaction. EMV is a Europay, MasterCard, and
Visa, that was originally created by the three companies.
It is often called a Signature cards, PIN, a chip, that depends on the authentication methods
that are employed by the card issuer. It hides the track usage details between banks, the
vendors and the customers. It replaces the customer’s Permanent Account Number (PAN)
with a tokenized Device Account Number (TDAN) in order to hide the transaction details
from the retailer by using EMV-payment tokenization method. Apple pay request the user
to authenticate the device to proceed with the payment. It creates a unique value to check
the transaction is arrived from an authorized device. This distinctive identifier along with its
cryptogram and token (DAN) involves the transaction to authorize and it cannot be used
10 | P a g e
from another device even if the token is stolen because the token must come from the
registered device.
The authentication includes PIN number and finger print identification method using sensor
(Touch ID). Finger print authentication provide security in case of stolen device that
enhances high level of customer satisfaction. Apple pay provides services that compatible
with the devices include 6 S plus, iPad pro, iPhone 6, and the Apple watch. Data integrity to
provide data integrity for existing records generated by a trusted device refers the data stored
in the database including metadata to track the origin of each unique customer data record.
The Meta data has an application identifier to identify which app is used to store the
customer data record. A digitally signed copy of the customer data record is available in the
possible metadata to ensure integrity of customer details during the transaction.
Data Security a Highly Secure Element (SE) is a secure chip available in Apple devices is a
tamper evident e.g., the device automatically blanks the memory to make sure that no keys
can be extracted if it detects any trial of reading its contents. The terminal converse directly
through the Near Field Communication (NFC) controller with the Secure Element over a
dedicated hardware bus and the payment authorization details are never exposed to the
application processor and it is localized to the local NFC field.
Google Wallet:
Google wallet stores the encrypted user data in the Secure Element as its trusted store of
sensitive payment information. The Secure Element (SE) chip is separate from the device
(phones) components like memory, hardware and operating system. It allows only trusted
programs to access the particulars like Google Wallet that is stored within. It is designed
mainly for the region of customer retail.
A user must unlock the phone, to enter the applications unique Personal Identification
number between the merchant by tapping the device against a compatible card reader during
the transaction. At last, the merchant receives a printed receipt with the confirmation on the
point of sales terminal in order to receive the confirmation in the user’s mobile device. Now
days Google using Host Card Emulation based payment credentials in which the data are
stored in the cloud. For transition from SE to HCE, Google focus on integration with other
apps, authentication process, and loyalty rewards. The wallet controller released the Wallet
app on a user’s device to store information in the timeline with contactless payment
11 | P a g e
functionality and current state of the application. Authentication It offers a number of
authenticate methods to the customers before any payments.
It accepts PIN number, password and fingerprint authentication or a pattern to process the
transaction. The tokens are loaded into the device prior before made the payment. When the
connectivity is available then the tokens are sent by the Google server. Data Protection The
user’s data stored on any device is vulnerable (in case of stolen device or compromised
service by attack) it is essential to store the card sensitive data base in a secured cloud
environment. Finger print can validate the device profile tokens to reduce the risk by
replacing the PAN with limited data during the payment system. Security keys are limited
to prevent the misuse during transaction. It checks the transaction risk analysis. Data
integrity It is mandatory for the users to register about their cards (Credit /Debit) with
Android Pay. Android Pay (and Google) is free from the responsibility of identifying the
user to the customer’s bank. The card issuer provides a number of verification methods to
decide whether the user identity is verified.
1. The customer’s bank will send an email/text with a verification code to the user.
2. The customer could call the bank and request the verification code.
3. If the customer installed with the bank’s application on the mobile, it is possible to sign
in to verify the card to the app. This verification process will require a small charge. So, the
user needs to log on to the electronic banking system to provide the verification code.
The user enrolling a card on Android Pay needs to be aware that the card number is going
to be transmitted and stored in Google’s cloud server.
Free charge:
Free Charge, a leading digital payments system allows consumers to buy a Google Play
recharge code on its platforms. Customers use their Free Charge app to select the „Google
Play‟ option on the website, and enter their details like mobile number, desired amount,
make payment and receive a Google Play recharge code. Payment for these recharge codes
can be done using Free Charge for wallet balance, debit cards, credit cards, Net banking or
UPI. The recharge code can be converted instantly through the “Redeem Now” link on the
Google Play store. Consumers can change the recharge code on the Google Play Store and
at the time of requesting for the code by the user it is sent to the users registered email and
12 | P a g e
through SMS on the mobile number registered by them. Free charge consumers will be able
to purchase digital content by topping up on the Google Play Store like movies, games,
eBooks, android paid apps and so on. The SMS and email notification is not highly secured
in sharing the device. To provide security then the user is continuously logged in and no
password is required for any transaction.
Free Charge never logs out the user automatically. It is not easy to find the logout option.
There is no session timeout in the app. It allows for auto login to the app. Transaction is not
password-protected. These shortcomings could allow fraudulent transactions to occur, if the
user is not careful. Unusual transaction patterns, though logged, are not detected and no
warning is provided to the user. Will be an issue in case of fraud transaction repudiations
Not linked to vendors, hence there is no concern of deducting money without explicit
consent. Each transaction is identified by a unique Transaction ID, which gives a sense of
transparency and accountability.
Transaction confirmation SMS & email are provided immediately in line with reliable
transaction procedures. The balance amount does not accurately reflect the available
transaction amount. Though the app explicitly requests for privileges, it does not allow
transactions without internet to access the phone, SMS and storage of user devices. The Free
Charge wallet balance displayed in the home page of a user did not represent the transferable
balance accurately. On clicking on it, a pop-up displayed that the amount was not usable
cash balance but voucher balance. Voucher balance is not transferable and usable only for
paying to certain third-party vendors like mobile recharge, flight ticket booking, etc.
However, the wallet balance display was misleading, giving a sense of available cash
balance. In the latest Android and iOS platforms, Free Charge allows users to explicitly
accept or deny access to privileges. However denying access to phone, SMS and storage
caused installation failure and did not allow the user to carry out any transaction.
Android Pay:
Android pay is a digital wallet to enable users to make payments with Android phones,
tablets or Apple watches and it is developed by Google. Android Pay uses near field
communication (NFC) to facilitating funds transfer, it allows to transmit card information
to the retailer. It replaces the card (credit / debit card), or magnetic stripe transaction to
upload the same in Android Pay wallet with point-of-sale terminals (POS). It provides two-
13 | P a g e
step authentication method. The service allows Android devices to communicate with point
of sale (POS) systems wirelessly by using a near field communication (NFC) antenna, Host-
based card emulation (HCE), and Android's security. Security It locks with a new password
or wipe all the personal information and data for a stolen device. It is recommended to use
lock screen security. It waits for certain time to allow the user to unlock the device, if not it
arises some security issues to delete all the personal details from the device. It uses a virtual
account number to provide high-end security and easy to identify if suspicious activity
happens and lock the screen automatically. Android Pay is supported by standard
tokenization that will not be shared to the payment terminal during payment transaction via
Android Pay. It does not send the credit/debit card number with the payment to a merchant,
instead it generates a virtual account number to represent users account information to keep
privacy in customers information, by sending a one-time security code instead of card/user
details. It is available with Finger print identification in absence Android pay allows to
access with pass code.
14 | P a g e
1.6 The impact of the COVID-19 pandemic on payment behaviour:
The COVID-19 pandemic offers a unique opportunity to study to what extent an external
shock and accompanying measures by the government, banks and retailers can result in a
change in payment behaviour and payment preferences. There are some first studies that
point at mixed effects. Based on a yearly payment diary carried out in May 2020 in the
United States, Kim et al. (2020) find that, in general, participants hold more cash in their
wallet and as a store of value in their homes, compared to trends reported in the 2019 diary.
Moreover, approximately 20% of the participants have switched from making in-person
payments to paying online or over the phone. In a follow-up study Foster and Greene (2021)
show that far less US citizens reported making in-person payments in spring 2020 (34%)
than in fall 2019 (96%). Furthermore, those who made in-person payments, were about as
likely to use cash in spring 2020 as they had been in the fall of 2019. Of people who paid in
person at least once in the prior 30 days, 57% used cash at least once in October 2019, 59%
in spring 2020, and 72% in August 2020.
Studies covering other countries report a (sharp) increase of card usage at the expense of
cash and there are indications that part of these changes may be persistent. Chen et al. (2020)
shows some early survey evidence from spring 2020 that cash usage at the POS by Canadian
citizens has decreased at the expense of debit and credit card payments, but that the role of
cash as a store of value has somewhat increased. In particular, a third of the survey
respondents reported that they had decreased their use of cash in response to the pandemic.
Results from follow-up studies (Chen et al., 2021a, 2021b) indicate that part of these effects
were temporary.
Canadian citizens stated they made more usage of nearly all POS payment instruments, but
especially of cash in July 2020 – just after the easing of containment measures limiting in-
person payments in Canada – compared to April 2020. Furthermore, consumer cash
holdings returned to pre-pandemic levels. According to Gutmann et al. (2021) the COVID-
19 pandemic accelerated the trend decline in cash usage in Australia. Survey data suggest
that the shift away from daily cash use may become permanent for many people; two-third
of the people using less cash said they expected to continue to use less cash also after the
pandemic is over. The survey results are supported by the reduction in the volume and the
value of cash withdrawals at ATMs and a shift to online shopping, which have endured even
15 | P a g e
after the easing of physical restrictions. For example, the share of online sales to total retail
sales had risen sharply from 6.5% in the second half of 2019 to 10% since March 2020.
There are also studies showing that the pandemic has accelerated the use of electronic
payment instruments in Europe. Four out of ten respondents of an ECB study carried out in
July 2020 say they use less cash since the beginning of the COVID-19 pandemic and a
majority of these people expect to continue this behaviour after the ending of the pandemic
(ECB, 2020). The fact that electronic payment instruments have been made more convenient
is the most often mentioned reason for the change in behaviour. Wisniewski et al. (2021)
examine the influence of the COVID-19 pandemic on payment behaviour in the EU, using
survey results collected in July and August 2020 of 5504 citizens from 22 European
countries. The usage of cashless payment instruments increased at the expense of cash,
because of the fear of getting infected by the virus by using cash. Moreover, their results
suggest that this change in behaviour may be persistent.
In addition, there are studies focusing on one particular European country. The first group
of studies uses survey data. Denmark’s National bank (2020) shows that contactless and
online payments quickly gained ground in Denmark while cash payments fell during the
lockdown. More specifically, 30% of the Danish respondents reported increased payment
card use relative to before the lockdown, and 41% reported less cash usage. The Danish
study also indicates that the use of cash gradually increased during the reopening of the
economy by the end of August 2020. In addition, online payments have returned to pre-
lockdown levels in Denmark.
Schweizer National bank (SNB) (2021) uses survey and payment diary data collected in fall
2020. Compared with the previous study held by SNB in 2017 the share of cash payments
in the number of non-recurring payments has dropped considerably from 70% in 2017 to
43% in 2020. Both improved appreciation of cashless payment instruments and the
pandemic triggered the increased usage of cashless payment instruments. For instance, 36%
of respondents state that they have made lasting changes to their payment behaviour as a
result of the pandemic. Within this group, most people state that they intend to pay more
frequently (contactless) by card, or to use less cash. This self-assessment is in line with the
observed partial recovery in cash withdrawals at ATMs in the summer of 2020, while card
16 | P a g e
usage at the POS remained above pre-crisis level. Using survey and payment diary data
collected between August 18 and October 19 2020 Deutsche Bundesbank (2021) reports a
strong growth in the usage of cashless payment instruments by German consumers during
the pandemic. Compared to its previous payment survey covering 2017, the share of card
payments at the POS rose by 9 percentage points to 30%, while the share of cash payments
decreased from 74% to 60%.
It seems likely that part of the substitution of cash by (contactless) card payments was fuelled
by the pandemic. About half of the people who used contactless card payments for the first
time during the pandemic said this was because of better hygiene or signs in shops. For
Norway, Norge’s Bank (2021) finds that the share of cash in the total number of POS
payments dropped from 7% in fall 2019 to 3% in spring 2020. Although the cash share
partly recovered to 4% in autumn 2020, it went down again to 3% in spring 2021.
Studies on European countries that use card transaction data show a drop of card transactions
during the pandemic. In Minguzzite. (2020) information on the usage of cards as a means
of payment is used to estimate the drop in consumptive expenditures during the lockdown
in Spain. The study reports that immediately after the start of the full lockdown and the state
of alert was declared in Spain, payment card spending and ATM withdrawals saw a drastic
drop of around 50% (year-on-year). Payment card spending returned back to normal levels
by the end of June 2020, while ATM withdrawals remained well below 2019 levels. Online
purchases in Spain have shown a large increase. Bounie et al. (2020) investigate the impact
of the COVID-19 pandemic using detailed French consumer card transaction data covering
the period before and during the first year of the pandemic in France.
They find a strong decline in both the value (−54%) and the volume (−61%) of card
payments at the POS during the lockdown period in spring 2020, and a rise of 19% in the
average transaction value. These findings suggest that French consumers made fewer
shopping trips but larger purchases during the lockdown. The decline in POS expenditures
using cards was approximately twice as large as the decline in online expenditures.
However, online expenditures increased in some of the economic sectors for which home
delivery of goods was feasible. Using transaction data from Dutch customers of ABN
AMRO bank, Golec et al. (2020) attempt to separate the economic effects of voluntary
17 | P a g e
responses to COVID-19 from those attributable to government lockdown measures. Their
findings suggest that in municipalities with higher levels of infections, the impact on
consumption is larger.3 For Switzerland, Kraenzlinetal. (2020) investigate the impact of the
pandemic on card usage in the Swiss retail sector using card transaction data covering the
year before the pandemic (January - May 2019) and the pandemic year 2020 (January –
May 2020). Apart from aggregate effects on retail spending, they provide evidence for
pronounced regional shifts – which persist post-lockdown – based on retail card payment
spending across areas with different levels of urbanization and across the Swiss cantons. E-
commerce and cash substitution are identified as main drivers.
To summarise, there is compelling evidence that the pandemic has affected payment
patterns in various countries around the globe. However, the extent and duration vary a lot
across countries. Moreover, in some countries the shifts in payment patterns were
temporary, whereas in other countries, like Australia, Norway and Switzerland, they are
expected to persist longer.
A key advantage of our payment diary data set compared to survey data used in other studies
is that we use a continuous daily series covering both the pre-COVID-19 period and the
COVID-19 period. Moreover, we have detailed information on the transactions and
respondents. Our main value added, in contrast to studies that use card transaction data,
derives from the fact that we use information on both electronic and cash payments, joint
with information on payment preferences.
In order to assess the risks of and combat payment fraud there should be an understanding
of its many facets. E-payment frauds have a multiplicity of types and there is no exact
number or fixed list of these types. Frauds are classified as online fraud and offline frauds.
Online frauds occur when fraudster possess legitimate company to obtain sensitive personal
information and illegally conduct transactions in the existing accounts. Phishing and
spoofing are examples of online frauds.
Online frauds occur when fraudster steals personal information such as credit number, bank
account number or other identification and uses it repeatedly to open new account or pledges
transaction in the real individual/company’s name. Offline fraud includes credit card fraud,
18 | P a g e
phone solicitations, print fraud, check scams and mail fraud. Department of Justice (DOJ)
U.S has divided frauds (computer fraud) into three categories:
1) crimes in which computer hardware, peripherals, and software are the target of a crime;
where in the fraudster obtains objects illegally:
2) crimes in which the computer is the immediate subject of a crime, that is the attacks is on
a computer or a system, destruction or disrupting of which is the damage caused; and
3) crimes in which computers and related systems are the means or "instrument" by which
ordinary crimes are committed, such as theft of identities, data, or money or the distribution
of child pornography. There are different types of e-fraud and all of these attack in a slightly
different way. Fraud can occur in a number of ways as listed below.
Account Hacking:
Hacking includes gaining illegal entry into a person computer (PC) system. Fraudster use
compromised customer credentials to hijack the origination system and use it in the lawful
account holder’s name. Corporation are also targeted and also seen on a rise. Attacks are
aimed
Identity theft:
Fraudsters acquire users' personal information (e.g. PAN/Aadhaar details or social media
credentials) or critical information about their bank accounts in order to gain access and
initiate online payments or open a payment account to execute transactions. Personal data
of customers is made available on the dark web, enabling fraudsters to carry out this type of
fraud. There have been multiple incidents in India involving banks, payments banks and
other Fin Techs wherein the victims of identity theft have reported that their personal details
were used by fraudsters to perform fraudulent transactions, including availing of credit card
facility from banks. Fraudsters may also impersonate an authorised official (bank employee,
police, Government official, health official, etc.) or the user's trusted acquaintance, and
manipulate the user into transferring money.
19 | P a g e
Phishing:
This is an act of creating a hoax web site or to say duplication of a website for criminal use.
The fraudsters use legitimate companies name, logos, graphics and even code. This usually
take form of know chat room or trade sites where in people would innocently giving out
personal information to criminals or make a fake purchase of a product the does not exist.
The Internet has made certain types of gambling possible. A person in India or China from
his home can participate in internet poker game in Caribbean over the Internet. CERT-
LEXSI (2006) as cited by McAfee (2009) there are around 15000 active online gambling
sites in 2006 out of which 1766 operate on license. Although there are operating online
casinos in an honest manner, the potential for fraud connected with casinos and
bookmarking operations is far greater. Online gambling establishment appear and disappear
with regularity, collecting from losers and not paying winners without any fear of being
appended and prosecuted.
This e-fraud is the most popular and lucrative fraud, which is named after the section of
Nigerian law that covers it “419”. The hoax often arrives with bulk mailing or family
20 | P a g e
member email of asking the recipients to enter into business and getting money transferred
with huge commission in return. Once the contact is established the fraudsters request
money in advance which need opening of an account in the bank or paying some fee which
leads to troubles and expenses.
ACH Frauds:
Automated Clearing House (ACH) Fraud is basically information fraud. With the
increase in ACH transactions for corporate payments obviously there is increase in the
ACH frauds. The fraudsters access the account information and route number
illegitimately to steal funds directly from accounts. Government payment, payroll and
other online payment face these frauds. In the year 2011, 17% of the organizations that
are victims of fraud, suffered financial loss (AFP 2012)
Lottery frauds:
One will receive scam emails informing of winning a substantial amount of money in
a lottery draw. When the receiver reply’s, the sender then asks for bank account details
and other personal information so they can transfer the money. These emails are fake
and may ask to pay a handling feel that will lead to loss of money and your personal
information which may be used in other fraud.
Cryptocurrency frauds:
With the increasing public interest around cryptocurrencies, it is only expected that this
currency will also be susceptible to malicious attacks and be exploited by attackers and
cybercriminals. According to a report released by the Federal Trade Commission (FTC)
consumer sentinel scams in crypto are seeing an exponential rise in the United States,
with losses of around USD 80 million from Oct 2020—Mar 2021, which is ten times
that of the previous year. The most common and emerging cryptocurrency frauds can
be classified as below:
a. Investment scams:
With little knowledge of the digital currency market, users or investors are
easily tricked into believing the authenticity of a cryptocurrency. New types of
21 | P a g e
coins are introduced every day and released in the market as an initial coin
offering (ICO). Fraudsters are creating fake websites that draw investors in
these currencies with the promise of substantial returns. As more and more
investments come in — inflating the value of the currency — the initial
investors pull out their holdings in an act frequently termed as a ‘rug pull’. Once
the scammer's money has been pulled out, the platform is taken down, leaving
investors with no option to sell their assets.
b. Wallet scams:
There are two types of wallets in the crypto world, commonly distinguished by
the mode of storage of the currency — online or offline. These are known as hot
and cold wallets respectively. Hot wallets are susceptible to potential phishing
scams, whereas cold wallets are susceptible to loss of currency when the storage
device is lost or the passkey to access it is forgotten.
22 | P a g e
1.8 MEASURES FOR FRAUD PREVENTION AND DETECTION:
With the increase in e-commerce sales the merchants face challenges to reduce frauds
in e-payment transactions. E-frauds start with diversion of personal information. A
poorly protected computer, a trash or recycling bin, an email message or chat on internet
exposes to fraud. For the merchants the majority of fraud loss is due to consumer’s
claim of fraudulent account used and/or subsequent information from additional orders
placed by fraudster. Fraud has become the persistent threat to merchants in e-payment
transactions in e-business. It is impossible to totally eliminate the chance of fraud but
timely measures taken can reduce the frauds. The merchant and the financial Institution
take the necessary measures in combating fraud effectively. Fraud prevention involves
taking measures to stop fraud from occurring and while fraud prevention fails then the
merchant takes steps to detect the frauds quickly and stop it as soon as possible. Fraud
prevention and detection involves planning, detecting and avoiding risk. Frauds can be
controlled by monitoring the internet threats, understanding the customer and
implementing security measures. Different techniques are required as there are different
types of fraud in e-payment transactions.
Fraud detection tools are those that are used to assess the probability of frauds in payment
transactions. Cyber source 2012 shows that 56% of merchants surveyed utilize an automated
screening system. Every merchant doing e-business should be aware that frauds cannot be
totally eliminated but can be controlled with protective measures. Some of these measures
are to counter internal threats and some are to stop external threats. Some are relatively
inexpensive while others are expensive involving huge amount of money. The anti-fraud
tool is required to detect frauds accurately and in time, automate processes when required,
adapt to changing patterns of fraud and behaviour of customers. Some of the Anti-fraud
tools are include
23 | P a g e
1.Universal Payment Identification Code (UPIC):
This can place a „block‟ preventing ACH activity when the merchant account is
unauthorized for ACH transaction. The merchant can receive alert from the bank to ACH
transactions that don’t meet predefined conditions and then take decision whether to accept
or decline the transaction. This enables the merchant to stop e-fraud before it happens.
The organization doing e-business should install fraud detection software/tools that can
detect fraud and to reduce fraud rates. The software will give fraud results and the merchant
will be able to take decision whether to accept, reject or review the transaction. There are
different categories of fraud detection tools which are grouped into validation service,
proprietary data, purchase device tracing and multi-merchant data. Some of the tools are
AVS – Address Verification Service, CVC – Card Verification Code and Risk Management
Modules or Fraud Screens. According to CyberSource (2012), 56% of the merchants‟
survey made use of these tools.
It provides the merchant the data on user’s exact location and displays its origin on a
map, giving approximately the city and state. It also calculates the distance between the
billing address of online buyer and actual location of persons entering the orders. This
is not a fool proof that visitor is using a proxy; however, the merchants can apply
authentication measures for transaction wherein there is a great difference in distance
and take decision on which transaction to review and which to allow. There should a
check to if any users are using anonymous proxy servers to hide their IP address, which
can be done by obtaining a list of anonymous proxy server.
24 | P a g e
1.9 Security in e-payment process:
Awareness of security risks by merchants and consumers plays an important role in reducing
fraud in e-payments Merchants awareness and education is also important. They should be
aware of the types of frauds, statistic and best practices. Consumer awareness and education
is important in order to reduce Identity theft or payment data theft. This would help the user
in adopting active and cautious attitude when doing transaction using internet. It could teach
them to be aware of possible risks, avoid e-scams, and minimize giving information to
merchants when buying online. This would increase consumers‟ responsibility in keeping
personal data secured in physical and virtual world.
Organizations should take measures to minimize internal tampering with the computer
system. The Management should take precautionary measures which include
monitoring the use of computers and network by employees. The physical access to
25 | P a g e
computer should be limited by use of passwords, magnetic card reader and biometrics
to verify the identity of the user. Management should stress the importance of keeping
the password confidential to employees. There should be responsibility for custody,
safeguarding and limiting access to computers. Fraud prevention not only saves money
but also cost money. In Fraud prevention organizations have to be highly cautious as
false rejection of non-fraudulent transaction will cost the company. At times, in spite of
using technology tools in detection of fraud, fraud prevention involves manual
procession of the transaction. Different techniques may be needed for different kind of
fraud. The organization should formulate successful strategy for detecting and
preventing fraud and thereby eliminating fraud losses.
26 | P a g e
CHAPTER 2
REVIEW OF LITERATURE
From a system point of view, the essence of electronic fraud reflects the synthetic abuse
of interaction between resources in three worlds: the fraudster’s intelligence abuse in
the social world, the abuse of web technology and Internet banking resources in the
cyber world, and the abuse of trading tools and resources in the physical world. A close
investigation of the characteristics is important for developing effective solutions,
which will then be helpful for other problem-solving. (Sahin, Y., and Duman, E. 2011)
The data set is large and highly imbalanced. According to a study on one Australian
bank’s electronic banking data, electronic banking fraud detection involves a large
number of transactions, usually millions. However, the number of daily frauds is
usually very small. For instance, there were only 5 frauds among more than 300,000
transactions on one day. These results in the task of detecting very rare fraud dispersed
among a massive number of genuine transactions.
According to Linda D., Hussein A., John P., (2009), In Electronic banking, the interval
between a customer making a payment and the payment being transferred to its
destination account is usually very short. To prevent instant money loss, a fraud
27 | P a g e
detection alert should be generated as quickly as possible. This requires a high level of
efficiency in detecting fraud in large and imbalanced data. The fraud behaviour is
dynamic.
28 | P a g e
The Electronic banking system is fixed.
The Electronic banking process and system of any bank are fixed. Every customer
access the same banking system and can only use the services in a predefined way. This
leads to good references for characterizing common genuine behaviour sequences, and
for identifying tiny suspicions in fraudulent electronic banking.
The above characteristics make it very difficult to detect electronic banking fraud, and
electronic banking fraud detection presents several major challenges to the research,
especially for the mainstream data mining community: extremely imbalanced data, big
data, model efficiency in dealing with complex data, dynamic data mining, pattern
mining with limited or no labels, and discriminate analysis of data without clear
differentiation. In addition, it is very challenging to develop a single model to tackle all
of the above aspects, which greatly challenge the existing work in fraud detection.
(Tung-shou Chen, 2006)
Miss. R. Elavarasi
29 | P a g e
financial inclusivity for unbanked, fast across the world transactions, safety and security
of payments and cost savings over traditional payment systems. In this paper, we look
at e-Payments, what they entail and basic payments infrastructure. We also look at the
future of e-Payments as well as challenges and recommendations for e-Payment
systems of tomorrow. In the next paper we will deep dive into the recommendations
for-Payments. Keyword Payments, Banking, E-Payments, bit coin, mobile payments,
digital wallet payments, biometric payments, financial service kiosks, NFC, financial
inclusion.
30 | P a g e
Nitsure (2014)
in his paper observed that the problem being faced by developing countries like India
in the adoption of E-banking initiatives due to low dissemination of Information
Technology. The paper highlighted the problems such as security concerns, rules,
regulation and management. In India there isa major risk of the emergence of a digital
split as the poor are excluded from the internet and so from the financial system.
AASTHAGUPTA (2013)
describes that RBI played a significant role in developing the payment system in the
nation through its establishment. ATM also provide better alternative to traditional
31 | P a g e
payment system. RBI also enhance the payment system by introducing MICR, RTGS,
Card based clearing etc.
Rachna (2013)
describes that electronic payment system is the basis of on-line payments
and it make electronic payment at any time through the internet directly to
manage the e -business environment. The risk to the on-line payments are
theft of payments data personal data and fraudulent rejection on the part of
customer.
Many statistic and machine learning techniques have been developed for tackling fraud
for example, Neural Network, Decision Tree, Logistic Regression and Rule-based
Expert Systems. They have been used to detect abnormal activities and for fraud
detection in many fields, such as money laundering, credit card fraud, computer
intrusion, and so on. They can be categorized as unsupervised approaches and
supervised ones. Unsupervised approaches, such as hidden Markov Model, are mainly
used in outlier detection and spike detection when the training samples are unlabelled.
Based on historical data and domain knowledge, electronic banking can collect clearly
labelled data samples for the reports from victims or related crime control
organizations. Unsupervised approaches cannot use such label information, and the
accuracy is lower than that of supervised approaches. Some supervised methods, such
as Neural Network and Random Forests, perform well in many classification
applications, including fraud detection applications, even in certain class-imbalanced
scenarios. However, they either cannot tackle extremely imbalanced data, or are not
capable of dealing with comprehensive complexities as shown in the electronic banking
data and business.
32 | P a g e
emergence of contrast pattern mining, such as emerging pattern, jumping emerging
patterns, and mining contrast sets. However, various research works show that these
approaches are not efficient for detecting rare fraud among an extremely large number
of genuine transactions.
33 | P a g e
CHAPTER-3
RESEARCH METHODOLOGY
With how fast payment fraud evolves, it can be difficult for businesses to be as
educated—and prepared—as possible to fight it. That’s why having effective strategies
to prevent online payment fraud in place is so vital for businesses. Rather than be
reactive, it is important businesses take a proactive stance and identify suspicious
behaviour and patterns, in as close to real-time as possible.
It’s one thing to be familiar with the kinds of check and digital payment fraud we
mentioned earlier. To actively detect whether a fraudulent scheme is at play, you’ll
want to be on the lookout for a few telling indicators. Here are some of the most
common signs of payment fraud:
34 | P a g e
1. Falsified or inconsistent information:
Be on the lookout for buyers transacting using false information—such as phone
numbers and email addresses. In many cases the information might appear to be
accurate, but if there are inconsistencies—such as the same email address but
different names used across multiple purchases—that’s a red flag.
Fraudsters look to target as many businesses as they can in as little time as possible. To
expedite the process, they often use canned or scripted responses. If communication
with a prospective customer seems stiff or off or abnormal in any way, it might signal
the start of a fraudulent attack.
4. Atypical requests:
Identifying fraud unfortunately requires a fair amount of qualitative analysis.
Listening to your gut feeling is important. If you notice some unusual requests
are being made, this could be a sign of fraudulent activity. For example, you
might receive requests to:
Split a large order into multiple payments across different cards with
different billing addresses.
Provide a refund outside the card network from which the charge
originated—such as via check or ACH.
35 | P a g e
Implement payment fraud detection methods (that simultaneously
improve CX)
Unfortunately, this often impedes customer experience. It’s important you blend your
payment fraud prevention tactics into your payment acceptance and processing
workflows seamlessly, so that your customers’ payments are secure and their payment
experience as a whole is enjoyable and memorable—for the right reasons; not for the
unnecessary friction that’s often imposed on them.
FRAUD
DETCTION HOW TO BOOST CX
METHOD
transaction
analytics Proactively identifies potential for payment fraud.
Unobtrusively protects users, enhancing CX.
36 | P a g e
Payment fraud prevention tactics can actually improve customer
experience while minimizing payment fraud risk—here’s a sampling
of how:
There are further payment fraud protection and best practices for online payment fraud
prevention—and anti-fraud controls businesses can action—including:
One of the most important things you can do to prevent payment fraud is establish
processes and tools that enable you to stop fraudulent activity early—not just merely
detect it. With digital payments—specifically credit cards—the critical window to
mitigate fraudulent activity is before authorization occurs—here, fees are still incurred
even if a transaction is not approved.
One such tool that can help mitigate fraud is the use of CAPTCHAs. These are systems
that help web hosts understand if humans or robots are accessing a website. They are
unobtrusive safeguards that protect websites from spam and abuse. A common practice
among fraudsters is card testing, which involves using automated scripts to run high
volumes of authorization tests on illegally obtained credit cards. CAPTCHAs can block
these mass tests.
37 | P a g e
2. Make compliance a year-round priority:
While adhering to PCI compliance guidelines is necessary for businesses that handle
credit card information, being PCI-compliant does not guarantee your business will not
fall victim to a data breach or payment fraud.
There is, however, a noticeable trend of businesses being non-compliant at the time of
experiencing a data breach. According to Verizon’s 2020 Payment Security Report, of
the companies that experienced a breach between 2014 and 2019, 53% were confirmed
to be non-compliant. A remarkable 0% of PCI compliant companies surveyed
experienced a breach. It’s important to view PCI compliance as a continuous effort that
goes beyond the time of your annual certification.
Sources of data:
38 | P a g e
Primary data:
The researcher has collected the data using structured questionnaire
In questionnaire method there are certain sets of questions which the respondents have
to answer. The effectiveness of the questionnaire totally depends on the sincerity and
dependability of the respondents. There are several ways in which the questionnaire can
be presented like open ended and closed ended. A good questionnaire should have at
least 10-12 questions in which 5-9 should be closed ended or multiple-choice questions
and 2-3 should be open ended questions. The questionnaire is mainly used for a sample
size population in order to get accurate, efficient and effective results. The questionnaire
is made according to the structured format. The response to the questionnaire can be
collected from the many ways like mail questionnaire telephonic questionnaire.
The secondary source is collected from the information that is available from the study
of the past researchers. The secondary data source includes sources like guidelines of
e-payment, from the annual reports of Reserve bank of India.
Secondary data:
The researcher has collected data from articles, research papers, thesis.
The secondary data comprises of that data which the researcher acquires from the
sources like magazines journals, annual reports of the company etc. basically it is that
data which is already available in several different resources. In the present research
the researcher has used both the primary data and secondary data. The techniques that
the researcher has used in collecting primary data are a questionnaire and interviews.
The secondary data in the topic include the annual report of the Union Bank of India.
The questionnaire consists of questions which are both close ended as well as open
ended. The respondents were insured that their identities would not bed is closed so as
to make sure that they provide genuine responses and do not hide any facts.
QUALITATIVE RESEARCH:
Qualitative research provides a deep insight into the behaviour of people towards any
process and activity and the reasons that forces this kind of attitude.
39 | P a g e
Hence, Qualitative research helps to understand the reasons behind these issues and has
been also been conducted in this project.
Sample size can be defined as the total number of respondents that is to be taken from
the population. In this research, 70 respondents were taken from Public.
There are different kinds of tools used to analyse the data for research project such as
charts, tables, diagrams etc. Here we have used the following tools in this project: -
The research was carried based on primary and secondary data. The primary data for
research objectives was collected from the samples based in India. Though South India
is one of the most significant cities of the country. However, the objective of the survey
was to verify the customers perceptions on digital payments with regard to the concept
of general banking. Since the study is about current scenario, results cannot be extended
for future developments in E-Payments. So, the limitation is that only 3 years of data
will be used.
40 | P a g e
CHAPTER-4
Introduction:
Data analysis and interpretation are crucial components of any research project. They
involve the systematic examination and evaluation of data collected from a study to
draw meaningful conclusions and insights. In this section of the project, we will explore
the various techniques used in data analysis and interpretation.
The primary objective of data analysis is to identify patterns, relationships, and trends
within the collected data. It is the process of transforming raw data into meaningful
information that can be used to answer research questions or test hypotheses. This
section will cover the different approaches to data analysis, including descriptive
statistics, inferential statistics, and data visualization
Once the data has been analysed, the next step is data interpretation. This involves
making sense of the analysed data and drawing conclusions based on the findings. In
this section, we will explore the different techniques used in data interpretation,
including thematic analysis, content analysis, and discourse analysis.
In summary, this section of the project will provide an overview of the different
approaches and techniques used in data analysis and interpretation. We will explore the
different software tools, statistical methods, and data visualization techniques used to
analyse and interpret data. By the end of this section, you will have a comprehensive
understanding of how to analyse and interpret data and draw meaningful conclusions
from research findings
Data interpretation:
The increasing prevalence of e-commerce has led to a growing dependence on online
payment systems as the demand for secure, efficient, and convenient payment options
continues to rise, it is important to understand consumer perceptions and behaviours
41 | P a g e
towards these systems. In this data analysis section, we will present the results of an
online survey conducted to explore the attitudes and experiences of 70 respondents
towards online payment systems. The findings will provide valuable insights into the
current state of online payment systems and inform future strategies for enhancing their
adoption and usage.
42 | P a g e
AGE No. of respondents Percentage
Below 25 42 60%
26-35 14 20%
36-45 6 8.6%
46-55 6 8.6%
56 & above 2 2.8%
Total 70 100%
Table no. 4.1
26-35 Below 25
20.0% 60.0%
This suggests that a significant majority of the respondents are below 25 years old. The
data could be useful for understanding the demographic of a certain group or for market
research purposes. Please note that the specific context or purpose of this data isn’t
provided in the image. For a more detailed and accurate analysis, a more comprehensive
study may be needed.
43 | P a g e
Gender No. of respondents Percentage
Male 26 37.1%
Female 43 61.4%
Prefer not to say 1 1.4%
Total 70 100%
Table no. 4.2
Male
37.1%
Female
61.4%
This suggests that a significant majority of the respondents are female. However,
without additional context or information, it’s difficult to provide a more detailed
analysis or interpretation. Factors such as the respondents’ demographic characteristics,
the specific context of the survey, and the reasons for the gender distribution would be
useful for a more comprehensive understanding of these results.
44 | P a g e
Qualifaction No. of respondents Percentage
SSC 2 2.9%
HSC 11 15.7%
Student 18 25.7%
Graduate 14 41.4%
Other 8 11.4%
Post graduate 2 2.9%
Total 70 100%
Table no. 4.3
Student
Graduate 25.7%
41.4%
45 | P a g e
Use of electronic No. of respondents Percentage
payment
Yes 58 82.9%
No 12 17.1%
Total 70 100%
Table no. 4.4
No
17.1%
Yes
82.9%
Yes No
The above pai diagram shows that among the respondents 82.9% people are using are
using electronic payment mode for buying in day-to-day life and around 17.1% of
people don’t use electronic payment
46 | P a g e
Fund Transfer No. of respondents Percentage
method
G-pay 53 75.7%
Phone pay 16 22.9%
BHIM 6 8.6%
Paytm 11 15.7%
Other 8 11.4%
Total 70 100%
Table no. 4.5
60 80.0%
75.7%
70.0%
50 53
60.0%
40
50.0%
30 40.0%
30.0%
20
22.9%
15.7% 20.0%
10 16 8.6% 11.4%
11 10.0%
6 8
0 0.0%
G-pay Phone pay BHIM Paytm Other
It appears that most respondents have used electronic payment methods, with a few
exceptions.
This data suggests that among the respondents, G-pay is the most popular electronic
payment method, and the majority of respondents have a Graduate degree. Please let
me know if you need further analysis or have any other questions!
47 | P a g e
Victims of fraud No. of respondents Percentage
Yes 20 65.7%
No 46 28.6%
Maybe 4 5.7%
Total 70 100%
Table no. 4.6
Maybe
5.7%
Yes
28.6%
No
65.7%
Yes No Maybe
The above chart represents that majority of respondents have never been a victim of
electronic payment fraud i.e. around 46 or 65.7% people have never been a victim of
fraud and on the other hand 20 people or 28.6% people have been victim of the fraud.
48 | P a g e
Mode of fraud No. of respondents Percentage
transfer
Credit card 4 5.7%
Debit card 7 10%
Mobile-wallet {G- 18 35.7%
pay, phone, Etc}
Online banking 9 12.9%
Other 32 45.7%
Total 70 100%
Table no. 4.7
Credit card
5.7% Debit card
10.0%
Other
45.7%
Mobile-wallet {G-
pay, phone, Etc}
25.7%
Online banking
12.9%
Credit card Debit card Mobile-wallet {G-pay, phone, Etc} Online banking Other
This suggests that out of 58 respondents who have been victims of electronic payment
fraud, 22 (or about 38%) were using Mobile wallets like G-pay or Phone-pay, 6 (or
about 10%) were using Online banking, 7 (or about 12%) were using Debit cards, and
3 (or about 5%) were using Credit cards at the time the fraud occurred. There are 20
respondents (or about 34%) who were using other payment methods.
49 | P a g e
No. of frauds in a No. of respondents Percentage
year
Never 40 57.1%
Once 19 27.1%
Twice 5 7.1%
More than twice 6 8.6%
Total 70 100%
Table no. 4.8
Once Never
27% 57%
This suggests that out of 70 respondents who have been victims of electronic payment
fraud in the past year, 6 (or about 8.6%) experienced it more than twice, 19 (or about
27.1%) experienced it once, and 5 (or about 7.1%) experienced it twice. The majority,
40 respondents (or about 57.1%), have never experienced electronic payment fraud in
the past year.
50 | P a g e
preferance No. of respondents Percentage
convenience 39 55.7%
Speed 40 57.1%
Safety 30 42.9%
Rewards or cash back 14 20%
No need to cary cash 26 37.1%
Other 11 15.7%
Total 70 100%
Table no. 4.9
45 60.00%
55.7% 57.1%
40
39 40 50.00%
35
42.9%
30 40.00%
30 37.1%
25
26 30.00%
20
15 20.0% 20.00%
15.7%
14
10
11 10.00%
5
0 0.00%
convenience Speed Safety Rewards or No need to Other
cash back cary cash
This suggests that out of 70 respondents, the most common reason for choosing
electronic payment methods is Convenience (39 respondents), followed by Speed (40
respondents), Safety (30 respondents), and No need to carry cash (26 respondents).
Rewards or cash back is also a significant factor for 14 respondents. There are 11
respondents who chose electronic payment methods for other reasons.
51 | P a g e
Opinions No. of respondents Percentage
Phishing 30 42.9%
Public wi-fi networks 20 28.6%
Data breaches 15 21.4%
Card skimming 19 27.1%
Lack of user awareness 29 41.4%
Total 70 100%
Table no. 4.10
35 50.0%
42.9% 41.4% 45.0%
30
40.0%
25 35.0%
28.6% 30.0%
20 27.1%
21.4% 25.0%
15 20.0%
10 15.0%
10.0%
5
5.0%
30 20 15 19 29
0 0.0%
Phishing Public wi-fi Data breaches Card skimming Lack of user
networks awareness
The most significant factors contributing to electronic payment fraud are phishing
attacks, data breaches, card skimming, and the lack of user awareness regarding security
measures. These factors underscore the importance of educating consumers about fraud
prevention strategies, implementing robust security measures, and enhancing
collaboration between stakeholders to combat electronic payment fraud effectively.
52 | P a g e
Security measurers No. of respondents Percentage
Yes 30 42.9%
No 20 28.6%
Maybe 20 28.6%
Total 70 100%
Table no. 4.11
Maybe
28.6%
Yes
42.9%
No
28.6%
Yes No Maybe
There is a significant proportion of respondents who either reported not having any
security measures in place or were unsure about the level of security at the time of the
fraud incidents. This highlights a potential gap in awareness or implementation of
essential security practices among consumers, which could increase their susceptibility
to fraudulent activities.
Overall, the presence or absence of security measures at the time of the fraud incidents
underscores the importance of implementing robust security practices, such as two-
factor authentication, secure passwords, and regular monitoring of account activity, to
mitigate the risk of electronic payment fraud. Enhancing consumer awareness and
education about security best practices is crucial in reducing vulnerabilities and
protecting against fraudulent activities in the digital realm.
53 | P a g e
Fraud prevention No. of respondents Percentage
Yes 41 58.6%
No 7 10%
Maybe 22 31.4%
Total 70 100%
Table no. 4.12
Maybe
31.4%
Yes
58.6%
No
10.0%
Yes No Maybe
Based on the responses provided, there is a mix of opinions regarding whether the fraud
could have been prevented. While many individuals believe that preventive measures
could have been taken to avoid the fraud incidents, some are uncertain or sceptical about
the possibility of prevention. This variability in perspectives suggests that the
effectiveness of preventive measures may vary depending on the specific circumstances
and security practices in place.
54 | P a g e
Recemmendation No. of respondents Percentage
Ye 27 38.6%
No 11 15.7%
Maybe 32 45.7%
Total 70 100%
Table no. 4.13
Ye
Maybe 38.6%
45.7%
No
15.7%
Ye No Maybe
Overall, the responses reflect the nuanced perspective individuals have towards
electronic payment methods, highlighting the importance of considering individual
circumstances and preferences when making recommendations. While electronic
payment methods offer convenience and efficiency, it's essential to weigh the associated
risks and benefits and choose payment methods that align with one's comfort level and
security preferences
55 | P a g e
CHAPTER-5
FINDINGS
Demographic Insights:
The majority of respondents are below the age of 25, indicating a younger
demographic.
There is a fairly even distribution of genders among the respondents.
Most respondents have attained at least a high school education, with many
being graduates.
The most commonly used electronic payment method among respondents is "G-
pay" (Google Pay), followed by "Phone pay," "Paytm," and "BHIM."
Many respondents use multiple electronic payment methods, suggesting a
diverse range of preferences among users.
56 | P a g e
While some respondents reported having security measures in place at the time
of fraud, such as two-factor authentication and secure passwords, others did not,
indicating a varied level of awareness and preparedness.
There is a belief among respondents that fraud incidents could have been
prevented with proper security measures and user education.
While some respondent’s express satisfaction with the convenience and benefits
of electronic payment methods, others highlight concerns about security risks
and the need for greater user education and awareness.
There is a recognition of the importance of proper knowledge and caution in
using electronic payment methods to mitigate the risk of fraud.
57 | P a g e
CHAPTER-6
FINDINGS & CONCLUSION
Secondly, effective detection and prevention strategies are essential for combating
electronic payment fraud. Advanced fraud detection systems powered by AI and
machine learning offer real-time insights into suspicious activities, enabling timely
intervention. Additionally, implementing multi-factor authentication, encryption, and
tokenization enhances the security of payment transactions and protects sensitive data
from unauthorized access.
Furthermore, technological innovation holds promise for enhancing the security and
efficiency of electronic payments. From blockchain-based solutions to biometric
authentication, ongoing research and development efforts aim to bolster the resilience
of digital payment ecosystems against fraudsters' tactics. By embracing innovative
58 | P a g e
technologies and standards, stakeholders can stay ahead of evolving threats and ensure
the integrity of electronic transactions.
Lastly, consumer awareness and education are paramount in the fight against electronic
payment fraud. Empowering consumers with knowledge about common fraud schemes,
phishing tactics, and security best practices enables them to recognize and report
suspicious activities. Similarly, educating employees within organizations helps
cultivate a culture of vigilance and compliance, reducing the likelihood of insider
threats and human errors.
59 | P a g e
CHAPTER-7
SUGGESTIONS & RECOMMENDATIONS
Educate Yourself:
Take the time to educate yourself about common electronic payment fraud schemes,
such as phishing, identity theft, and card skimming. Understand the warning signs and
red flags of potential fraud, such as unsolicited emails or requests for personal
information.
Ensure that all your devices, including smartphones, tablets, and computers, have up-
to-date security software installed. Regularly update operating systems and applications
to patch vulnerabilities and protect against malware and viruses that could compromise
your sensitive information.
Stay vigilant by regularly monitoring your bank statements, credit card transactions,
and other financial accounts for any unauthorized or suspicious activity. Report any
discrepancies or unfamiliar transactions to your financial institution immediately.
Exercise caution when receiving emails, text messages, or phone calls requesting
personal or financial information. Avoid clicking on links or downloading attachments
from unknown sources, as they may be phishing attempts designed to steal your
sensitive data.
60 | P a g e
Protect Your Personal Information:
Take advantage of account alerts and notifications offered by your financial institution
to receive real-time updates on account activity. Set up alerts for large transactions,
account logins from unrecognized devices or locations, and other suspicious activities
to detect potential fraud early.
Use strong, unique passwords for each of your online accounts and avoid using easily
guessable information such as birthdays or common phrases. Consider using a reputable
password manager to securely store and manage your passwords across different
accounts.
Exercise caution when encountering unsolicited offers or deals that seem too good to
be true, especially when shopping online or downloading apps. Fraudsters often use
enticing offers as bait to lure unsuspecting consumers into scams or fraudulent schemes.
If you suspect that you've been a victim of electronic payment fraud or have
encountered fraudulent activity, report it to your financial institution, credit card issuer,
or relevant authorities immediately. Prompt reporting can help mitigate further damage
and facilitate investigations into the incident.
61 | P a g e
APENDIX-1
REFFERANCE
https://shodhganga.inflibnet.ac.in/handle/10603/387459
https://www.scribd.com/document/418661246/Electronic-
Payment-Current-Scenario-and-Scope-for-Improvement
https://journalppw.com/
https://www.jstor.org/stable/249008?seq=1#page_scan_tab_content
s
http://rbi.org.in/scripts/publicationvisiondocument.aspx?id=678
www.ijcrt.org
https://www.researchgate.net/publication/349381000
https://www.statista.com/outlook/296 /119/digital-payments/
http://cashlessindia.gov.in/aeps.html
https://www.pwc.in/consulting/finan cial-
services/fintech/dp/impact-of- the-covid-19-outbreak-on-digital-
payments.html
https://www.thehindu.com/data
https://www.outlookindia.com
62 | P a g e
APENDIX-2
1. AGE?
Below 25
26-35
36-45
46-55
56 & above
2. GENDER?
Male
Female
Prefer not to say
3. QUALIFICATION?
SSC
HSC
Student
Graduate
Other
4. Have you ever used any electronic payment methods {credit card,
mobile wallet, online banking, etc}?
Yes
No
63 | P a g e
7. If yes, what type of electronic payment method where you using
when the fraud occurred?
Credit card
Debit card
Mobile wallet {G-pay, phone pay, etc.}
Online banking
Other
11.Did you have any security in place of time of the fraud {e.g. two-
factor authentication, secure passwords}?
Yes
No
Maybe
64 | P a g e
12.Do you believe the fraud could have been prevented?
Yes
No
Maybe
13.Would you recommend electronic payment method to others?
Yes
No
Depends on the situation
65 | P a g e