BLACKBOOK (CHP 2)
BLACKBOOK (CHP 2)
BLACKBOOK (CHP 2)
C
RESEARCH
METHODOLOGY
Data about the scheme of digital India and steps taken to achieve success in this scheme has
been collected. Various benefits of scheme and problems in implementing this scheme have
been mentioned. The source of data is secondary and much more can be done to make this
scheme a huge success.
10. to reduce the costs and risks of handling cash and to increase the ease of conducting
transactions.
11.To reduce the corruption which takes place mostly through the cash medium
12.To reduce the burden of the cost of printing currency and also handling them.
14.To track the movement of money which is not possible completely in cash medium.
15.To revive the banking sector which is high on NPA and bad loans.
Themainissueofhavingacashlesssocietyiswhetherthebenefitswouldoutweighdisadvantages.It
is important that, if society moves toward a cash free economy, the benefits must outweigh the
negativeaspectsintheend.Therearemajorsocialandeconomicbenefitstoacashlesssocietysuchas
reductionincashrelatedcrimesandmonetarybenefits.Therearemajornegativeimplicationswitha
cashlesssocietysuchasprivacyissuesandlosingthelibertyofcash.Acashlesssocietycouldonlybe
implementedbythegovernmentsincethegovernmentistheorganizationthatprintsandcontrolsthe
supply of cash in society. With the implementation of a cash free society the major government
agency,CBNmaybeintotalcontrol.Whatthismeansisthatthegovernmentablebeabletomonitor
purchases,spendinghabitsandbusinessespatronized.“Therealdangeristooheavyahandwatching
overyourlife.It'snobody'sbusinesswhereyouspendyourmoneysolongasyouearnitlegally.No
governmententityshouldknowwhereyouspendmoneyforgroceries."Themaindisadvantagesofa
cashlesssocietyconsistofprivacyissuesandcomputerhackers.Oneofthemainissuesregardingthe
implementation of a smart card/chip that would record and control all financial transactions
electronicallyistheassaultonprivacy.Withallprivatemonetarydataexposedtogovernmentofficials
manycitizensmaybelievethatthegovernmenthassubstantialpoweroversocietybyhavingaccessto
these types of confidential information. People value their ability to make some of their purchases
using cash, with absolutely no record,electroniclog,oraudittrailofthosetransactions,asawayto
safeguardtheirprivacy(Brown,1997).Anothermajordisadvantagewithacashlesssocietyistherisk
of computer hackers. Computer experts, so-called "Yahoo-Yahoo Boys", who trick unsuspecting
individuals, and organizations online to part with their money, might alter records, create fictitious
millionaires,setupdummycompanies,andsoon.nshort,theycouldcreateanelectronicunderground
societyaswellascontributetotheissueofidentitytheft.Securityisclearlyofcrucialimportancein
considering any alternative to physical cash. At the root of this lies the problem of authentication,
i.e. the process ofverifyingtheidentityofaperson.Thisistypicallyperformedbyexaminingsome
identifying information such as a password or digital signature.
ACK OF AWARENESS
L AMONG PEOPLE FOR CASHLESS
TRANSACTIONS
Just 60% of our country is basically literates I.e., the just know whotoreadandwritetheirnames.
They don’t even have full-fledgedrunningbankaccountsandareunawareofitsbenefits.Education
is a big limitation in cashless transactions. So, for this technology to survive, the problem of
unawareness among people who are illiterates is again a challenging one to cope up with.
The money you earn should be yours and nobody has right to keep watching an eye onit.
CYBER CRIME
With people getting online, the bad one’s are also smart enough to tackle the technology with
unethicalmoveslikehackingandphishingwhereifyoutellthenthepasswordinanyway,thereisa
possibility that you will lose all your hard-earned penny.
Thismayseemlikeano-brainer,butyou’dbesurprisedhowmanypeoplechecktheirbankaccounts
ormakepurchaseswithacreditcardwhileusingpublicWi-Fi.It’sbesttodothosethingsonasecure
connection.
Cashlesseconomyisthetermthateveryoneusestodescribethesituationwheretheflowofcashdoes
not exist within the economy. All the transactions take place through electronic channels. Going
cashless eases, one's life. It also helps formalize the transactions.
Further, it helps to curb corruption. And also, the flow of black money results in an increase in
economic growth.
Now, in the situation of this global coronavirus pandemic. The people of all statures got to know
about the benefits of cash-less economic transactions.
ManyofusfromtheeventsofLockdownsandtillnowareafraidtousethecurrencynotes.Andwe
tendtosanitizethemassoonaswereachourhomes.Becauseweallfearthatthiscurrencymaycarry
the virus, and that's why we don't want to use it.
Additionally,intheeventofacompletelockdown,manyofuswereunabletowithdrawmoneyfrom
banks and ATMs. Due to this problem, we started using UPI and other digital payment options to
purchase goods. And further, we understood the importance of these payment methods.
Thesamethingishappeningwitheveryonearoundtheworld.Soweall,withcorporateandbusiness
houses, are shifting towards cashless transactions.
So,tohelpyouallunderstandtheeffortsGovernmentistakingtomakeIndiaaCashlessEconomy,we
havepreparedthisarticle.Andwethinkthatwiththisblog,youcanassesswhatourstateisdoingfor
us and how we can contribute and improve it. Let's begin with it.
● accountsfrompubliccomputersthatcouldbeinfectedwithspywareormalware,ormayusean
unsecuredInternetconnection.Ifyoudousepubliccomputers,besuretologoutwhenyouare
finished.Ingeneral,itismoresecuretouseasmartphone’scellulardatanetworkthanapublic
or unsecured Internet connection.
● Use multifactor authentication on your accounts. Multifactor authentication works like this:
Whenyouenteryourpasswordforyouremailaccount,forexample,youaredirectedtoapage
that asks for a four-digit code. Your email provider then sends aunique,temporarycodeina
textmessageortoanotheremailaccount.Youmustenterthecode,whichexpiresafterashort
amount of time, toaccessyouraccount.Thismeansthathackerswhoobtainedyourpassword
still can’t access your account unless they also have access to that verification code, adding
another layer of protection. Many email providers, social media websites, and financial
institutions now make it easy for users to set up multifactor authentication on their accounts.
● Be cautious with “Save my information for next time.” Many websites now store personal
bankingorcreditcardinformationtomakeiteasierforyoutobuyaproductortopayabillin
the future. Although convenient,ifyouraccountishacked,yourpaymentinformationismore
easily available to hackers. Ensure any website where you enteryourfinancialinformationis
secure(thewebsite’sURLshouldstartwith“https://”—rememberthatthe“s”isfor“secure”),
that your password is unique to that account, and that you log out once you are done.
IF YOUR DEVICE OR ONLINE ACCOUNTS ARE HACKED
● Have devices inspected. If your computer or other device is hacked, disconnect it from the
Internet and have it looked at and repaired by a trusted specialist. Be cautious when calling
telephonenumbersfortechnicalsupportspecialiststhatyoufindonline.Scamartistssometimes
set up authentic-looking websites that may appear to be affiliated with your computer’s
manufacturer. When consumers call these entities, they are often told they must
p ayhundredsofdollarsfortheircomputertobefixed,orthe“technician”installsotherviruses
onto the computer that steal information or cause more problems. It is often best to take the
device to a physical repair shop, rather than trying to find a technician online. If you call a
technician online, be sure to research the company and its phone number to be sure it is
legitimate.
● Change your passwords. After getting a device repaired or cleaned of viruses, you should
change all the passwords for any accounts you accessed using the device. The malicious
software that was removed from your computer may have transmitted your passwords to an
attacker, granting the hacker easy access to your information. Similarly,ifoneofyouronline
accounts has been hacked, be sure to change your password immediately. Ahackermayalso
change your password, denying you access to the account. If you are unable to access your
account, contact the website directly and it can assist you in restoring your account.
● Monitor financial accounts. If a hacked account contains financial information, contact your
bank or credit card company immediately, letting it know that your account may be
compromised.Yourbankorcreditcardcompanymayissueyouanewcardoraccountnumber.
Be sure to monitor activity on the account for any fraudulent transactions. In some cases,
hackersmayhaveobtainedyourinformation,butwillnotuseitrightaway.Ifyouarenotissued
a new card or account number, you should monitor your account for an extended period.
● Notify others. When appropriate, contact your friends and family and make themawareyour
device or account has been hacked. Hackers maytrytogainaccesstoyouremailcontactlist,
and send emails from your account. Notifying friends and family that your account has been
hacked, and instructingthemnottoopenurgentorstrangeemails,“click”onsuspiciouslinks,
or download attachments that seem to come from you may help protect their accounts from
hackers.
.
SELECTION OF THE PROBLEMS:
Problems for the unbanked- Cashless systems can be problematic for people who currently rely on
cash, who are concentrated in certain populations such as the poor, near poor, elderly, electronic
transactions require a bank account and some familiarity with the paymentsystem.Manypeoplein
impoverished areas are underbanked or unbanked. In the United States, almost one-third of the
population lacked the full range of basic financial services. According to FDICdata,ofhouseholds
that earnanannualincomeoflessthan$15,000peryear,almost25.6%donothaveabankaccount.
Nationwide,7.7%ofpeopleinUnitedStatesdonothavebankaccounts,withlevelsover20%insome
cities and rural counties, and over40%insomecensustracts.FraudulentActivities-Whenpayment
transactionsarestoredinservers,itincreasestherisksofunauthorizedbreachesbyhackers.Financial
cyber-attacksanddigitalcrimealsoformagreaterriskwhengoingcashless.Manycompaniesalready
suffer data breaches, including of payment systems. Electronic accounts are vulnerable to
unauthorizedaccessandtransferoffundstoanotheraccountorunauthorizedpurchases.Attacksonor
accidental outages of telecommunication infrastructure also prevents electronic payments from
working, unlike cash transactions which can continue with minimal infrastructure.
the sample is collected from random people (students, businessman, workers)
thesampleisprimarysourcefortheprojectandthedetailsiscorrectandtrueaccordingtomeandmy
knowledge.
DATA COLLECTION
PRIMARY DATA
ThemainprospectofmyreportIhavedecidedtouseprimarydataanalysis.ForthisIhavestructured
asmallsurveyusingthe“GoogleFormsurvey”intheperspectiveofrecruitmentandselectionofthe
company using a Questionnaire model.
SECONDARY DATA
In this report I have basically focused on secondary data analysis. This means the information of this
reporthasbeencollectedfromHumanResourceManual,Magazines,Websitesandtextbooksfromvarious
libraries.
TABULATION OF DATA
Descriptive research is undertaken to describe the situation, community, phenomena, outcome or
programme.
Themaingoalofthistypeofresearchistodescribethedataandcharacteristicsaboutwhatisbeing
studied.
It is contemporary, topical and time bound.
They are relatively more structured and require a formal, specific and systematic approach to
sampling,collectinginformation,collatingandtestingthedatatoverifytheresearchassumptions.Itis
largely of a diagnostic nature without establishing the causality of the relationship.
Various kinds of tables and charts are used to represent the survey findings andresult.Chartslikepie
diagram, bar diagram are used.
This diagram consists of a series of rectangular bars standing on a common base. The
length of the bars is proportional to their magnitude.
The comparison among the bars is based on lengths. There
are three types of bar diagram.
Under descriptive research design we know there are two types of methods are normally used they are:
For my analysis I have used the survey method. This method works by obtaining information
basedonquestioningofrespondents.Respondentsareaskedavarietyofquestionsregardingtheir
behavior, intentions, attitudes, awareness. Questions are basically asked either
verbally or in writing or both in same time. In this case I have decided to use the structured
questioner format and asked the questions both verbally and allowed them to write the answers.