Search for Cases

Case Details

Case Code: ITSY105
Case Length: 22 Pages
Period: 2014-2020
Pub Date: 2020
Teaching Note: Available
Price:Rs.500
Organization : Paytm
Industry :Financial Services
Countries : United States
Themes: Technology in Health Insurance/IT in Healthcare/Disruption/Health insurance
 
Business Strategy
Marketing
Finance
Human Resource Management
IT and Systems
Operations
Economics
Leadership & Entrepreneurship
Case Studies  

Paytm Employing Technologies and Tools to Fight Cyber Fraud

 

ABSTRACT

 
The case “Paytm Employing Technologies and Tools to Fight Cyber Fraud” discusses the technologies and tools employed by Paytm, one of India’s leading e-commerce and digital wallet companies. The case starts out by going into the reasons for the vulnerability of a digital payments company like Paytm to fraud. Though there are cyber laws in India to check fraud in digital payment systems, companies such as Paytm, continued to be easy targets of fraudsters. The case then provides an overview of the kind of frauds encountered by the customers of Paytm, the loss borne by them, and the various measures taken by Paytm to counter the frauds. Later, the case describes in detail the different tools and technologies like Data Encryption, Data Intrusion Detection Systems, and Artificial Intelligence that were adopted by Paytm to combat fraud. Vijay Shekhar Sharma (Sharma), Founder and CEO of Paytm, was confident that the security measures deployed by Paytm would be effective in combating cyber fraud. The question is, can Paytm maintain the same level of security in future considering the ever-shifting fraud landscape?
 
IT and Systems Case Studies | Case Study in Management, Operations, Strategies, IT and Systems, Case Studies
or
IT and Systems Case Studies Case Studies | Case Study in Management, Operations, Strategies, IT and Systems, Case Studies
or
PayPal (11 USD)

 

Issues

The case is structured to achieve the following teaching objectives:
  • Understand the issues and challenges involved in maintaining a secure management information system (MIS).
  • Recognize why systems are vulnerable and discover internet vulnerabilities.
  • Scrutinize the business value of providing efficient security.
  • Explore ways to establish a network of reliable and safe online transactions.
  • Discuss the tools available for detecting fraud and intruders in an organization’s systems.
Contents
INTRODUCTION
THE RISE OF PAYTM
THE LAWS TO FIGHT DIGITAL PAYMENT FRAUD IN INDIA
PAYTM CUSTOMERS IN TROUBLE
HOW PAYTM ADOPTED TECHNOLOGIES AND TOOLS TO FIGHT THE FRAUD
OTHER MEASURES TO PREVENT FRAUD
THE ROAD AHEAD
EXHIBITS

Keywords

Information Security; System Vulnerability And Abuse; Cyber Fraud; Technology in Financial Services; Financial Scams and Frauds; Fraudulent Practices in Financial Payments; Legal and Regulatory Requirements for Security; Business Value of Security; Advancements in Information Systems; Data Systems; Data Management; Firewalls; Intrusion Detection Systems; Identity Management and Authentication; Data Security

INTRODUCTION - Next Page>>