Professional Documents
Culture Documents
CHAPTER-1
INTRODUCTION
1.1 INTRODUCTION
Paytm means “Pay through mobile” it is one of the largest is one of the fastest
growing Indian-E-Commerce shopping websites launched in 2010 The name of the
company who launched the Paytm is one 97 communication. Initially it is focused on
mobile and DTH recharging, the company headquartered in Noida, India it gradually
provided recharging and bill payment of various portals including electricity bills, gas
well as telephone bills.
In 2014 Paytm has started the business same like as the facilities are getting
from the other E-Commerce company such as Flipkart, Amazon, and SnapdealToday
it is India’s most popular online destination for prepaid mobile and DTH recharges
and shopping and it’s Android and 150 apps have been ranked among the most
popular apps in only 3 years since the founding the company created ausers base of 25
million wallet users and 10 million app downloads.
Paytm works with the all mobile operators in all states in India for prepaid
mobile DTH and datacard recharges and postpaid mobile, landline, and data card bill
payments, it has partnered with multiple national banks for credit card debit card, and
net banking payments paytm also works with various billers for utility bill payments,
In 2015 paytm received a license from RBI for starting India’s first payments, Banks,
The Bank Intends to use the paytm’s.
The development and the ascent of versatile innovation all through the world
among individuals has extended to a great extent in light of the prepaid model because
of this all classes of society approaches the budgetary administrations and have turned
out to be exceptionally comfortable with the versatile cash framework, for the been
opened for the middleclass and the poor people using the new innovation, with the
presentation of advanced wallets in mid-90’s spearheaded by Davangere with the
vision fundamental the necessities of the clients a simple to utilize interface, capacity
to safely execute in the virtual and certifiable in came application-based wallets.
Which is nowadays available in each shop in rural and urban areas Debit cards
are also available for paytm online payments are accepted and the option for payment
comes with no maintenance charge but there is a commission cut on each transaction
Initially paytm had only recharge services and paytm was only for recharge but now
thing have changed using paytm we can even pay educational fees and bills, for both
buyers and sellers paytm is still serving as alternative means of cash transaction and
offers a convenient safe and secure use on mobile applications for both consumers
and marketers achievement of an innovation is the point at which a customer
acknowledges an item and administration over a market depends on another heap of
advantage traded at a price or a value paytm gained attention importance in to day to
day life.
There are number of facilitators which are leading to the growth of digital
payment and transition from cash economy to less cash economy, Thesefacilitator
include penetration of internet connectivity on smart phones, non- banking financial
institution facilitating digital payment, one touch payment rise of financial technology
sector and push by government either by giving incentives or tax breaks, these all
factor are creating positive atmosphere for growth of digital payment in India.
satisfying customers, Ina competitive market place where businesses compete for
customers customer satisfaction is seen as a key differentiator and increasingly has
become a key element of business strategy organizations need to retain existing
customers while targeting non-customers.
Strategy structure which was offered by our India government are towards
innovation are make in India startup India and skill India And paytm was one among
such innovation which came as an alternative to the cash transactions demonetization
as given paytm an elevate in the India’s money exchange economy constrained
individuals and specifically the little venders to look for alternatives the shoppers
started utilizing computerized instalment modes and paytm currently enrolled as a
safe versatile wallet and is slowly expanding It’s relationship with more providers.
It’s a change over to a digital model according to the market place. After
demonetizing the 500 and 1000 rs notes paytm understood that it can successful only
by offering services towards cashless economy paytm is successful technological
innovationwhich as created a balance between cast and efficiency. The main aim is to
study the importance given to paytm by people in there daily routine life and success
of paytm in motivating the cashless economy. The aim is also to study the flexible
services offered by paytm promoting cashless economy and also supporting digital
India.
Digital India’s drive towards a cashless economy has modernized the launch
of unified payment Interface (UPI) applications since It’slaunch in Jan 2016 the usage
of smart phones as virtual debit cards has double to send or receive money instantly
the current study has been conducted in order to meticulously evaluate and examine
the level of customer satisfaction towards paytm UPI app, the purpose of this study is
also to observe and analyze the purpose of using paytm as one of the UPI
applications, reasons for choosing and to find out the problems encountered by the
customers, the primary data for this study was compiled through well-structured
questionnaire filled in on a one-to-one basis by 150 customers of sanglimirajkupwad
corporation, the study result clearly in dicates that the majority of the users of paytm
UIP application were in the high level of satisfaction Hence the study highlights the
important point the paytm UIP application must consider in order to increase the
number of users and to improve their service quality.
3)DR, M, SENTHIL.
The present area is entering into a new pace in payment system by using
digital wallets filled with coupons and offers in this today’s busiest world people
don’t have their time to sit and relax then how can do their personal works like to
recharge their phones to pay electricity bill insurance or to shop etc, so to make
people stress free new application in their mobile phones in higher percentage and
made help them to do their works easier the present research paper is focusing on the
impact of these new digital payment systems on customers and problems encountered
if any.
4)DR,T,VENKATESAN.
Smartphones have brought out a huge change in the lives of people, people
enjoy great comfort with the advancement in science and technology people in the
present day find thing much easier and perceive things based on technology
smartphones play a vital rale in this regard offering users a great platform for
communication and access to a wide range of applications, paytm is the Indian mobile
first financial services company that offers payments, banking, lending, and
insurances to consumers and merchants through it’s mobile app the total number
paytm users crossed more than 280 million users till 2017 the aim of this research
paper is to analyse the usage of paytm by users in Madurai city.
GIRI KUMAR TAYI Studied in their paper “Digital Wallet: Requirement and
challenges” 2006 that the prerequisites and difficulties of sending money across the
country using computerized wallet arrangement in Singapore. Advance, they
examined why Singapore is prepared for a computerized wallet and recognize the key
difficulties in building and sending a computerized wallet and at that point the
exchange was on the difficulties confronted when utilized with digital wallet frame
work in real money exchange and more detail and end the paper with their proposed
arrangement.
(2016) In his paper “mobile wallet: present and the future” has discussed about
mobile wallet, working, types, and it’s advantages and disadvantages. He concluded
that mobile wallets will be used to engage with the customer by the marketers and
digital businesses. Irrespective of the market status of these mobile wallets, marketers
should take advantage of the emerging opportunities.
(2015) asked questions for clarification about paytm in their article named
“Recharging: The right way ?- A case study on e-payment giants:
Freecharge&paytm.” One among the questions is that do the customers prefer a one
stop shop for everything on a single platform like paytm or specialist websites like
freecharge that are specialists in that domain and a strong and unique positioning.
Strategy structure which was offered by our Indian Government are towards
innovation are make in India, Startup India and skill India. And paytm was one among
such innovation which came as an alternative to the cash transaction. Demonetization
has given paytm an elevate in the India’s money exchange economy and constrained
individuals, and specifically the little vendors to look for alternatives. The shoppers
started utilizing computerized installment modes and paytm is currently enrolled as a
safe versatile wallet and is slowly expanding its relationship with more providers. It is
To explore the way to improve the awareness about paytm in Davangere city.
This research focuses on paytm service users Davangere in general the scope
of the research will describe the relationship between paytm services on safety and
security transaction speed convenience recharge ticket booking shopping booking
hotels insurance premium and transfer of funds which can directly influence on the
customer satisfaction level and intention to use in further moreover the respondent of
this research will randomly select from business people and educational group in
Davangere city who are normally use the paytm services in Davangere city.
Demonetization drive paved way for unified payment interface (UIP) app
through which was promptly promoted by the government,
However, the issue of ease of use transaction delay security and privacy issues
cropped up currently paytm holds 38% market share in UIP apps despite the issues the
researchers were interested to know the level of satisfaction derived while using
promoting the paytm app and why it’s still the unique choice among it’s rivals.
PRIMARY SOURCES.
SECONDARY SOURCES.
PRIMARY SOURCES
By direct observation
By interviews
By survey
Data collected by interacting with the paytm workers and also by the
customers of the paytm,
SECONDARY SOURCES
Literature Reviews
Websites
Articles
Collecting secondary sources involves less cost less time and less effort the
data which is collected by some one else,
Sample Size Samples were collected buyers of online shopping in which the
total sample size of Respondents are 50.
The study focuses only Davangere city. The result may or may not be
applicable to other areas.
The samples were restricted only with 50 samples due to time constraint.
The bias in samples could not be controlled because of their buys schedule in
there Respondents.
Chapter 1- Introduction.
Here in the first chapter we will discuss the Introduction of this study and also
will discuss the following literature review, objectives of the study, needs of the
study, scope of the study Plan for research methodology, Limitations and chapter
scheme.
In the second chapter we will discuss the Company profile, company logo,
history of paytm, the Funding of paytm, mission and vision of paytm, objectives of
the company, types of paytm account, How to open new paytm account,
Achievements of company, Advantages and Disadvantages of paytm.
This Chapter presents the analysing of the study gender wise classification of
the respondents, age group of the respondents, Educational status of the respondents.
Here in the last chapter we will discuss the finding and the suggestions and
conclusion to the study.
CHAPTER 2
COMPANY PROFILE
By January 2014 the company launched the paytm wallet and the Indian
Railways and uber added It as a payment option It launched into E- Commerce with
online deals and bus ticketing in 2015 it unveiled more use- cases like education fees
metro recharges, electricity, gas, and water bill payments, it also started powering the
payment gateway for Indian Railways.
In 2016 paytm launched movies events and amusement parks ticketing as well
as flight ticket bookings and paytmQ,R, later that year it launched rail booking and
gift cards.
Paytm’s registered user base grew from 11.8 million in August 2014 to 104
million in August 2015 it’s travel business crossed $500 million in annualized GMV
run rate while booking 2 million tickets per month.
In 2017 paytm became Indian’s first payment app to cross over 100 million
app downloads the year It launched paytm gold online it also launched the paytm
payments bank and Inbox a messaging platform with in chat payments directly into
their bank accounts at 0% charge, it also launched the paytm for business app
allowing merchants to track their payments and day-to day settlements instantly. This
led its merchant base to grow to more than 7 million by march 2018.
The company launched two new wealth management products- paytm gold
savings plan and gold gifting to simplify long-term savings. It launched into gaming
and investments, partnering with AGTech to launch a mobile games platform
gamepind, and setting up paytm money with an investment of rs 9 crores to bring
investment and wealth management products for the Indians.
FUNDING
The same year paytm launched an app for Canadian mobile phone cable
internet electricity and water bill payments in 2018 it set up paytm money to build
investment and wealth management offerings for its users this business was expected
to bring direct mutual funds and money market funds to the Indian masses in august
2016 paytm raised funding from mountain capital one of Taiwan based media tek’s
investment funds at a valuation of over $5 billion.
In may 2017 paytm received Its biggest round of funding by a single investor
– Softbank which also has a large stake in Alibaba thus bringing the company’s
valuation to an estimated $10 billion in august 2018 Berkhire Hathaway invested
$356 million for 3% 4% stake in paytm although Berkshire Hathaway confirmed that
warren Buffett was not involved in the transaction.
MISSION.
VISION.
Based on how much money you are going to put in paytm wallet there are two
types of accounts in paytm.
BASIC ACCOUNT
PRIME ACCOUNT
BASIC ACCOUNT:
PRIME ACCOUNT:
Prime account means customer paytm wallet which is KYC compliant and
which allows person to-person transfer and payment to all identified merchants as per
RBI.
You can download the paytm app on your smartphone (Google playstore,
apple itune windows) or go to its website paytm.com.
Enter your mobile number, email id and desired password (you can change the
password and other details) and click on continue.
Enter that to confirm your mobile number and after you do so, you will see
your paytm account profile page. You can enter your name and other details there for
completing your full profile.
For verifying your email id on paytm you have to check your account page.
Select your current operator (if it’s showing your previous operator).
Enter your paytm password (or create a password if visiting for the first time).
Select your paytm method (credit card, debit card, internet banking).
You can transfer paytm cash to any bank account. Enter your bank details and
the amount to be transferred. However, the following T&Cs apply here:
Paytm Tow words that come to almost every Indian’s mind while shopping,
post demonetization, are “PAYTM KARO” paytm has brought a paradigm shift in the
retail industry by completely transforming the payment methodology. Initially, this
online wallet cum E-Commerce website was used to make payments for limited
utilities like mobile and DTH recharge and shopping bills. Over the years, this portal
has expanded its scope and has brought about anything and everything under the
ambit of its operations. Customers now can recharge their metro card, pay bills for
utilities like electricity and water, transfer funds to other bank accounts, book
flight/train/bus tickets, make hotel reservations, etc. now the latest paytm success
story is everexpanding with the addition of e-retail and m-commerce stores.
This gives the option to small vendors to list their products on the website and
allows them to expand their customer base.
2.8.1 ABOUT
Paytm is a reserve bank India (RBI)-approved e-wallet, i.e., the user’s money
is secured under the escrow account with a nationalized bank, The security feature
and easy user interface make paytm the most favored digital payment platform in
India. Paytm uses verisign – certified SSL (secure sockets layer) 128 – bit encryption
technology. This ensures that the online information of the user,i.e., the passwords
and other financial details, is safe thus providing greater protection to usere.
This online payment system is not only secure but also robust. One of paytm
success story is it can handle around 5000 transactions per second. A high capacity of
transactions has been made possible by the implementation of a very simple yet
effective and safe payment method. Users can simply pay by either scanning a QR
code of the shop or by entering the mobile number of the recipient. The paytm wallet
also has an option where a user can either safely park his or her money in the
application and pay from the money in the wallet or pay directly from the bank via the
application. The combination of secure transaction and high capacity has made paytm
one of the most favored payment applications. More and more number of people are
now using paytm to pay for their daily utilities and other expenses.
Last year paytm’s market share among the e-payment companies was 26%
paytm is now planning to explore new avenues. By 2020, paytm plans to tap the loan
market and disburse small loans to 500 million people.
The paytm payment bank was launched a chat app with more sophisticated
features. Paytm acquired shifu and near. In to improve and strengthen its offline and
online platform and enhance customer experience.
ADVANTAGE OF COMPANY
CHAPTER – 3
SCM practice draws heavily from the areas of industrial engineering, systems
engineering, operations management, logistics, procurement, information technology,
and marketing and strives for an integrated approach,
region includes the interchange between 1-70 and 1-75, one of the busiest in the
nation, with 154,000 vehicles passing through per day, 30-35% of which are trucks
hauling goods. In addition, the 1-75 corridor is home to the busiest north-south rail
route east of the Mississippi river.
“Supply chain management as the integration of business process from the end
user through original supplier who provide products, services and information that
adds value for the customers.”
Operational level
Daily production and distribution planning, including all nodes in the supply
chain.
Order promising, accounting for all constraints in the supply chain, including all
suppliers, manufacturing facilities, distribution centers, and other customers.
From production level to supply level accounting all transit damage cases and
arrange to settlement at customer level by maintaining company loss through
insurance company.
When the server server data in a commonly used manner, for example
according to the HTTP or FTP protocols, users may have their choice of a number of
client programs (most modern web browsers can request and receive data using both
of those protocols). In the case of more specialized applications, programmers may
write their own server client, and communications protocol, that can only be used
with one another.
When the server serves data in a commonly used manner, for example
according to standard protocois such as HTTP or FTP, users may have their choice of
a number of client programs (e.g. most modern web browsers can request and receive
data using both HTTP and FTP). In the case of more specialized applications,
programmers may write their own server, client, and communications protocol which
can only be used with one another.
MARKUP LANGUAGE
Some markup languages, such as the widely used HTML, have pre-defined
presentation semantics-meaning that their specification prescribes generally how to
present the structured data on particular media. Others, such as XML and its
predecessor SGML, permit but do not impose such prescriptions, and permit users to
define any custom document components they wish.
Hyper Text markup language (HTML), one of the document formats of the
worldwide web, is an application of SGML and XML.other applications such as
DocBook, open e book, JATS and others, are heavily used in the communication of
work between authors, editors, and printers.
CHARACTER ENCOUDING
Early character codes associated with the optical or electrical telegraph could
only represent a subset of the characters used in written languages, sometimes
restricted to upper case letters, numerals and some punctuation only. The low cost of
digital representation of data in modern computer systems allows more elaborate
character codes (such as Unicode) which represent most of the character used in many
written languages. Character encoding using internationally accepted standards
permits worldwide interchange of text in electronic form.
EXTERNAL CSS
External cascading style sheet define style rule in a separate CSS file.
This is the most powerful of all the css attachment methods, as it allows a
single style sheet to control the rendering of multiple documents. This results in a
time-savings for other, a savings of space for the web server, and less download time
for the users. In addition, method can be used in both HTML and XML.
An External style sheet is a file containing only css syntax (no document
content or elements) and should carry a MIME type of “text/css.” The style
information is not explicitly tide directly to the document’s elements, so selectors
syntax is used to specify what styles attach to which portions of the document tree.
The full range of css syntax is allowed in this method.
In HTM, an external style sheet is specified using the LINK [Index DOT
Html] element within the HEAD element block to specify the URL location of the
external style sheet. URL values may be relative or absolute.
Syntax:
Syntax:
Type = “text/css”?>.
INLINE CSS
Inline cascading style sheet define style rules directly within an (x) HTML
element using the style attribute.
Inline style are css styles that are applied to one element using the style
attribute before closing the opening tag. Inline styling is useful for applying a unique
style to a single HTML element. Inline styles are easy and quick to add.
Basically, before closing any opening tag of an element you add the following:
Syntax:
Where property and value refer to the same terms used in CSS.
When more than one style property has to be applied you just add a semicolon like so:
Now lets see a real example. Add a line of text in your html document:
We cannot use quotations within Inline CSS. If you use quotations the browser
will interpret this as an end of your style value.
These style cannot be reused anywhere else. These style are tough to be edited
because they are not stored in a single place.
Inlining CSS simply means putting your CSS into your HTML file instead of
an external CSS file.
Why use it ?
Inlined CSS reduces the amount of files the browser has to download prior to
displaying your web page. If you are using an external CSS file, the browsing must
first load your HTML file, then downloading two. When done right it is an important
part of an optimized CSS delivery. Solution.
SESSION COOKIES
Session cooking are temporary cookies, which are deleted when the user
closes the browser.
Session cookie. Also called a transient cookie, a cookie that is erased when the
user closes the web browser, they typically will store information in the form of a
session identification that does not personally identify the user.
What is a cookie?
Each time the user’s web browser interacts with a web server it will pass the
cookie information to the server. Only the cookies stored by the browser that relate to
the domain in the requested URL will be sent to the server. This means that cookies
that relate to www.example. Com will not be sent to www.exampledomain.com.
In essence, a cookie is a great way of linking one page to the next for a user’s
interaction with a web site or web application.
What is a session?
Instead of strong large and constantly changing information via cookies in the
user’s browser, only a unique identifier is stored on the client side (“called a session
id”). The session id is passed to the web server every time the browser makes an
HTTP request (ie a page link or AJAX request). The web application pairs this
session id with it’s internal database and retrieves the stored variables for use the by
the requested page.
Using the [cookie-set] method we can set cookies to store information for use
in later pages. The following code shows how easy it is to store a user’s details such
as their name and email address which they may have later pages to per – populate
forms with this information.
-domain=’example.com,
-expires=’1440’
-path=’/’
In this example the cookie named “user details” contains the users name and
email address delimited by a “pipe” character. This can be read and interpreted, then
output in the following code.
‘<br />’
Using sessions
To set up a new session, we first start the session, then add to it the variables
we would like to store in it. Those variables are stored within lasso’s session database.
Lines 2-6: Initialilzing the session. This needs to happen on every page you
wish the session information to be readable and writable. Here we start a session
named ‘my session name’ with an idle expiry of 1440 minutes (1 day)and set to track
via cookie.
Lines 9-14: The “if” conditional here checks to see if the session-result shows
a new session and adds nevaiables to the session if it is new.
The variables added to the session can now be used just like any other variable
in the page. These variables are are both readable and writiable. This means that when
the value is changed, it will be stored in the session with the new value.
TROUBLESHOOTING
If you’re having problems with sessions, there are a few things to check.
If the clock on the server and /or the client pc is incorrect, the session may
expire prematurely. For example if your session idle expiry time is short (ie 15
minutes) and the clocks differ by greater than that amount, the session will expire
before it can be used on the next page.
Browsers allow users to decide to not allow cookies to be set. If a user has
blocked cookies you will have to use links to persist sessions. See the session
documentation for more information.
EXTERNAL CSS
External cascading style sheets define style rules in a separate CSS file.
An external style sheet is a file containing only CSS syntax (no document
content or elements) and should carry a MIME type of “text /CS.” The style
information is not explicitly tide directly to the document’s elements, so selector
syntax is used to specify what styles attach to which portions of the document tree.
What is it?
This is the most powerful of all the CSS attachment methods, as it allows a
single style sheet to control the rendering of multiple documents. This results in a
time- savings for the author, a savings of space for the web server, and less download
time for the user. In addition, this method can be used in both HTML and XML.
An external style sheet is a file containing only CSS syntax (no document
content or elements) and should carry a MIME type of “text/css.” The style
information is not explicitly tied directly to the document’s elements, so selector
syntax is used to specify what styles attach to which portions of the document tree.
The full range of CSS syntax is allowed in this method.
In HTML, an external style sheet is specified using the link [index dot HTML]
element within the HEAD element block to specify the URL location of the external
style sheet. URL values may be relative or absolute.
Syntax:
EMBEDDED CSS
Embedded cascading style sheet define style rules in a separate CSS file.
A linked style sheet is a text file with the extension.css. for example the style
sheet for this course is called tutorial. CSS, and is “linked” to from all the course’s
various web pages. Linked style sheets are more flexible than embedded style sheets
but we shall use an embedded style sheets as our first example.
As the name implies this particular type of style sheet is part of the web page
and its definition appears in the head of the web page using the following tag
elements.
Style sheet rules are made up to of the selectors (basically the HTML tags to
which the style will be applied) the declarations (the various properties, e.g. font
selection) and values. A style sheet rule is of the general form:
For example, suppose we want a black page with white text then a style sheet
rule would be:
Body is the selector, background and color are properties and black and white
are value, note: the selector (body in this example )is used without the angel brackets
and the property list is separated by semicolons.
INLINECSS
Inline cascading style sheets define style rules directly within an (x) HTML
element using the style attribute. Inline CSS refers to CSS found in an HTML file. It
is found in the head of a document between style tags. Inlining CSS simply means
putting your CSS into your HTML file instead of an external CSS file. Inline CSS
refers to CSS found in an HTML file.it is found in the head of a document between
style tags.Inlining CSS simply means putting your CSS into your HTML file instead
of an external CSS file.
Inlined CSS reduces the amount of files the browser has to download prior to
displaying your web page. If you are using an external CSS file, the browser must
first load your HTML file, then download your CSS file. After you inline your CSS
the browser only has to download your HTML file. Downloading two. When done
right it is an important part of an optimized CSS delivery. Solution.
SESSION COOKIES
Session cooking are temporary cookies, which are deleted when the user
closes the browser.
browser after the session is completed or the web browser is closed. This cookie
stores information that the user has inputted and tracks the movements of the user
within websites. A session cookie is also known as transient cookie.
HTTPONLY COOKIES
Http only cooking are used only in the HTTP protocol and not in client side
scripts, which may increase security.
NON-HTTPONLY COOKIES
Non-Http only cookies are used in the HTTP protocol and also in client side
scripts, which may be a security threat.
If you browser supports HTTPONLY, and you enable it for a cookie, a client-
side script should not be able to read or write to that cookie, but the browser can still
send its value to the server can still send its value to the server. However, some
browsers only prevent client side read access, but do not prevent write access.
SECURE COOKIES
Secure cooking are used only via an encrypted connections, which may
increase security.
Secure cookies are a type of HTTP COOKIE that have secure attribute set,
which limits the scope of the cookie to “secure” channels when a cookie has the
secure attribute, the user agent will include the cookie in an HTTP request only if the
request is transmitted over a secure channel. Although seemingly useful for protecting
cookies from active network attackers, the secure attribute protects only the cookie’s
confidentiality. An active network attackers, the secure attribute protects only the
cookie’s confidentiality. An active network attacker can overwrite secure cookies
from an insecure channel, disrupting their integrity. This issue is officially referred to
as weak integrity. However, some browsers, including chrome 52 and higher and
firefox 52 and higher, forego this specification in favor of better security and forbid
insecure sites from setting cookies with the secure directive.
HTTP strict Transport security (HSTS) define a mechanism enabling web sites
to declare themselves.
A malevolent hacker has booked a room at this same hotel. They are
eavesdropping on all of the connections going over this insecure, wireless network.
Within the hacker’s sheaf of evil-doings is something called a ‘ packet sniffer’. A
packet sniffer is network utility that analyses and may inject tasks into the data-stream
travelling over the targeted network.
This hacker could capture your network traffic over HTTP for any website that
relies on 301 redirects alone for switching from HTTP to HTTPS. This method
presents a window of opportunity for the hacker to strip down your SSL encryption
and steal valuable data or even worse, present a fake login portal page. This is why
your website must employ HTTP strict transport security over just HTTPS. Obtaining
an SSL certificate will never be enough.
Geo Trust is a SSL certificate authority owned by Symantec, this includes SSL
certificates issues by the certification branch of Equifax, which was acquired by geo
Trust.
The digital certificate certifies the ownership of a public key by the named
subject of the certificate. This allows others to rely upon signatures or assertions made
by the private key that corresponds to the public key that is certified. in this model of
trust relationships, a CA is a trusted third party that is trusted by both the subject of
the certificate and the party relying upon the certificate.
In the context of a website, when we use the term digital certificate we often
refer to SSL certificates. The CA is the authority responsible for issuing SSL
certificates publicly trusted by web browsers.Any one can issue SSL certificates, but
those certificates would not be trusted automatically by web browsers. Certificates
such as these are called self-signed. The CA has the responsibility to validate the
entity behind an SSL certificate request and, upon successful validation, the ability to
issue publicly trusted SSL certificates that will be accepted by web browsers.
Essentially, the browser vendors rely on CAs to validate the entity behind a web site.
WEB SERVER
Originally, the top-level domain space was organized into three main groups:
countries, categories, and multiorganization. An additional temporary group consisted
of only the initial DNS domain, arpa and was intended for transitional purposes
toward the stabilization of the domain name system.
The basic requirement for a merchant to have a web presence or have an electronic
commerce site, is
A web server is a system that delivers content or services to end users over the
internet. A web server consists of a physical server, server operating system (os) and
software used to facilitate HTTP communication. A web server is also known as an
internet server.
The most simple definition is that a web server runs a website by returning
HTML files over an HTTP connection. This definition may have been true in the
early days of the internet, but the line has blurred between websites, web applications
and web services, etc. for example, a server that device an XML document to another
device can be a web server. A better definition might be that a web server is any
internet server that responds to HTTP requests to deliver content and services.
Depending on context, the term can refer to the hardware or web server
software on the server. For example, saying that you have” 10 web servers at the web
farm” is just as a accurate as, “The iis web server is on the machine that has 32 GB of
RMA.”
The two main ingredients in a web server are its hardware and software.
A merchant should think carefully when making a decision on the web server
computer. The decision depends on factors such as
Expected traffic or the number of transaction per unit time, Running a large
enterprise class application server (such as an ERP system) on a personal
computer is not feasible.
Other software running on the same computer. For example, running a web
server and a database server can significantly slow down the performance of a
computer.
Response Time: it is the amount of time that a server requires to process one
request.
Type of web page: A server that delivers mostly static web pages will perform
better than the same server that delivers dynamic web pages. A dynamic page is a
web page whose content is shaped by a program in response to user request (such
as a database query), versus a static page, which is just a plain HTML page.
Core capabilities
Site management
Electronic commerce
CORE CAPABLITIES:
Logical file
Security
FTP
Site Analysis
Searching
SITE MANAGEMENT
A web server provides tools to manage multiple web sites, file security, virtual
file, and log file analysis.
APPLICATION DEVELOPMET
Mobile application development is the process of creating apps that run on any
mobile platform: Android and ios. With everything you need right at your fingertips,
you can track inventory or make instant updates from your phone.
How many times have you heard it? There’s an app for that. Helpful
suggestion offered by a friend who has just heard you complain about some mundane
task you’d rather not have to spend your precious free time on in order to get it off of
your to-do list.
The steps include in a system lifecycle for developing a computer application are:
Analysis: Documenting the functional requirement for the app and anticipating
potential problems that may be encountered.
Design: Defining how the app will work and what features and components it will
have.
Construction: This is where the actual programming occurs using the requirements
and design as a guidline.
Testing: Try out the app looking for errors and confirming that documented
requirements are met.
Implementation: making the app looking for errors and confirming that documented
requirements are met.
Although the steps that should be taken in application design are always the
same, the methods used to execute them can be different. The three most common
types of application development methodologies are: waterfall development, agile
development and rapid application development.
ELECTRONIC COMMERCE:
Some web servers provide advanced services that support online selling and
buying (such as shopping cart and catalog services). An electronic commerce software
can provide templates and other tools to quickly develop an E-commerce site. This
might include templates for product browsing shopping carts, and credit card
processing.
Why has ecommerce seen explosive growth over the past decade? As the
internet becomes ingrained in our daily lives, acceptance of ecommerce continues to
grow, and businesses are taking advantage of this. In the early 2000’s many people
were skeptical about handing over their card details to an online retailer. Whereas,
ecommerce transactions are now second nature. SSL certificates, encryption and
reliable external payment systems such as paypal, world pay, and skrill have helped
improve people’s confidence in e commerce.
CHAPTER - 4
The process by which sense and meaning are made of the data gathered in
qualitative research, and by which the emergent knowledge is applied to clients’
problems. This data often takes the form of records of group discussions and
interviews, but is not limited to this. Through processes of revisiting and immersion in
the data, and through complex activities of structuring, re-framing or otherwise
exploring it, the researcher looks for patterns and insights relevant to the research
issues and these to address the client’s brief.
Sl
Age No of respondent Percentage
No
1 18 years 2 4%
2 18-30 years 32 64%
3 30-40 years 15 30%
4 above 40 years 1 2%
Total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that out of 50 Respondents,4% of the
Respondents below age of 18 years, 64% of the Respondents are in between the age
of 18-30 years,30% of the Respondents are in between the age of 30-40 years and 2%
of the Respondents are above the age of 40 years.
1.Classification of the respondents on the basis of age group
Graph No-4.1
Interpretation:
From the above analysis I conclude that majority of respondents are belongs to
age group 18-30years.
Interpretation:
From the above analysis I conclude that majority of respondents are male.
Interpretation:
From the above analysis I conclude that majority of respondent are post
graduate.
No of
Sl no Occupation Percentage
Respondents
1 Student 25 50%
2 Employee 11 22%
3 Business men 12 24%
4 others 2 4%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that out of 50 Respondents, 50% of the
respondents belong to student, 22% of the respondents belong to employee, 24% of
the respondents belong to businessman and 4% of the respondents belong to other
occupation.
Interpretation:
From the above analysis I conclude that majority of respondents are students.
No of
Sl No Monthly Income Percentage
Respondents
1 5000-10000 1 2%
2 10000-25000 5 10%
3 25000-50000 2 4%
4 Above 50000 42 84%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table It is clear that, out of 50 Respondents, 2% of the
respondents have monthly income of 5,000-10,000, 10% of the respondents have
monthly income of 10,000-25,000, 4% of the respondents have monthly income of
25,000-50,000 and 4% of the respondents have to above 50,000.
5. Classification of the respondents on the basis of Monthly Income.
Graph No-4.5
84%
90%
80%
70%
5000-10000
60%
50% 10000-25000
40% 25000-50000
30% Above 50000
20% 10%
2% 4%
10%
0%
5000-10000 10000-25000 25000-50000 Above 50000
Interpretation:
From the above analysis I conclude that majority of respondents have monthly
income of above 50,000.
Analysis:
From the above Table, It is clear that, out of 50 Respondents, 100% of the
Respondents are aware of Paytm.
100%
100%
80%
60% Yes
No
40%
20%
0
0%
Yes No
Interpretation:
From the above analysis I conclude that majority of respondents are aware of
paytm.
Analysis:
From the above Table, It is clear that, out of 50 Respoundents,16% of the
respondents get information from social media, 76% of the respondents get
information from friends, 2% of the respondents get information from magazine, 6%
of the respondents get information from television.
Interpretation:
From the above analysis I conclude that majority of respondents get
information from Friends
No of
Sl No Prefer Paytm Percentage
Respondent
1 Time Saving 30 60%
2 Ease of use 10 20%
3 Security 10 20%
Total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that, out of 50 Respondents, 60% of the
respondents Prefer Paytm Payment because for Time Savings, 20% of the
respondents Prefer Paytm Payment use Ease of use, 20% of the respondents Prefer
Paytm Payment use security.
Interpretation:
From the above analysis I conclude that majority of respondents Prefer paytm
are Time saving.
No of
Sl No Use of Paytm Percentage
Respondents
1 Daily 2 4%
2 Weekly 10 20%
3 Monthly 38 76%
Total 50 100%
Source: Field Survey
Analysis :
From the above Table, It is clear that, out of 50 Respondents,4% of the
respondents paytm use daily, 20% of the respondents Paytm use weekly, 76% of the
respondents paytm use monthly.
Interpretation:
From the above analysis I conclude that majority of respondents use of Paytm
monthly.
10. Classification of the respondents on the basis of device payment while paytm.
Table No- 4.10
No of
Sl no Device Payment Percentag
Respondents
1 Smart phone 30 60%
2 Computer 15 30%
3 Both 5 10%
Total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that, out of 50 Respondents, 60% of the
respondents use Smart Phone, 30% of the respondents use Computer, 10% of the
respondents use both from payment.
10. Classification of the respondents on the basis of device payment while paytm.
Graph No- 4.10
Interpretation:
From the above analysis I conclude that majority of respondents use Smart
Phone from payment.
11. Classification of the respondents on the basis of paytm from financial transactions.
Table No-4.11
No of
Sl No Financial Transactions Percentage
Respondents
1 Yes 48 96%
2 No 2 4%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, It is clear that, out of 50 Respondents,96% of the
respondents use paytm of Financial Transactions and 4% of the respondents are not
using paytm Financial Transaction.
Graph No-4.11
Interpretation:
From the above analysis I conclude that majority of respondents are use paytm
for Financial Transactions.
Interpretation:
From the above analysis I conclude that majority of respondents are using
paytm for Money Transfer.
Graph No-4.13
Interpretation:
From the above analysis I conclude that majority of respondents using paytm
from Cash Back.
Table No-4.14
Interpretation:
From the above analysis I conclude that majority of respondents Money
Transaction of paytm are less than 5000.
Interpretation:
From the above analysis I conclude that majority of respondents have
satisfied with paytm.
16. Classification of the respondents on the basis of obstacles face while using
paytm.
Table No-4.16
No of
Sl No Obstacles you face paytm Percentage
Respondents
1 Security of mobile Payment 20 40%
2 Too Time consumption to set up 22 44%
3 Involves danger of losing money 5 10%
Cannot be used for International
3 3 6%
Transaction
Total 50 100%
Source: Field Survey
Analysis:
From the above table, It is clear that, out of 50 respondents, 40% of the
respondents facing security problems , , 44% of the respondents facing Time problem,
10% of the respondent opinion that Paytm Involves danger of losing money, 6% of
the respondents opinion that Paytm Cannot be used for international transaction.
16. Classification of the respondents on the basis of obstacles face while using
paytm.
Interpretation:
From the above analysis I conclude that majority of respondents obstacles face
the time problem.
Continue Using No of
Sl No Percentage
Paytm Respondents
1 Very likely 27 54%
2 likely 22 44%
3 Natural 1 2%
4 unlikely 0 0%
Total 50 100%
Source: Field Survey
Analysis:
From the above Table, it is clear that, out of 50 respondents, 54% of the
respondents very likely to Continue using Paytm, 44% of the respondents Continue
using Paytm are likely, 2% of the respondents Continue using Paytm are neutral, 0%
of the respondents Continue using Paytm are unlikely.
17. Classification of the respondent on the basis of continue using paytm.
Graph No- 4.17
Interpretation:
From the above analysis I conclude that majority of respondents Continue
using Paytm are Very likely.
Interpretation:
From the above analysis I conclude that majority of respondents
Transactions secured Paytm are Strongly agree.
CHAPTER – 5
5.1 FINDINGS
Most of the Respondents (84%) has monthly income above Rs. 50,000 and
only 2% of Respondents have monthly income Rs.5000-10000.
Most of the Respondents, (60%) are use Smartphone from Payment out of 50
Respondents.
Out of 50 Respondents, (96%) of the Respondents are use paytm for Financial
Transactions.
Out of 50 Respondents, (46%) of the Respondents are using paytm for money
Transfer.
Most of the Respondents, (64%) are money transaction of paytm less then
5000 out of 50 Respondents.
Majority of the Respondents are Continue Using Paytm is Very likely, out of
50 Respondents.
5.2 SUGGESTIONS
From the Researcher suggested that the Respondents are satisfied by paytm
service.
But level of satisfaction is low in the following areas shopping, ticket booking,
transaction speed,
The Researcher would like to request the Paytm to probe in to the suggestions
mentioned and take actions, if necessary for the benefit of paytm services.
Premium offers.
5.3 CONCLUSION
QUESTIONNAIRE
Dear Sir/Madam,
1. Name:
2. Age:
A.18 years ( ) B.18-30years ( )
C.30-40years ( ) D. Above 40years ( )
3. Gender:
A. Male ( ) B. Female ( )
4. Qualification:
A. P U C ( ) B. Degree ( )
C. Post graduate ( )
D. Engineering ( ) E. Others ( )
5. Occupation:
6. Monthly Income:
A.5000-10000 ( ) B. 10000-25000 ( )
A. yes ( ) B. No ( )
C. Magazine ( ) D. Television ( )
11. Which device do you use for making the payment while paytm?
A. Yes ( ) B. No ( )
A. Money Transfer ( )
B. Recharge ( )
A. Available discount ( )
B. Premium offers ( )
C. Cash back ( )
15. How much money have you transaction in paytm till now?
16. How do you rate the paytm service that you have used?
C. Neutral ( ) D. Unsatisfied ( )
17. What are the obstacles you face while using paytm?
A. Very likely ( )
B. Likely ( )
C. Neutral ( )
D. Unlikely ( )
E. Very likely ( )
Place:
Date: Signature:
Thank you.
BIBLIOGRAPHY
JOURNALS:
Mobile based secure digital wallet for peer to peer payment system
WEB SITES:
http://en.m.wikipedia.org> wiki>paytm.
Slideshare.net paytm.