Screenshot 2023-06-11 at 8.43.20 AM
Screenshot 2023-06-11 at 8.43.20 AM
1. Business Process Automation (BPA) is the technology-enabled automation of activities or services that
accomplish a specific function and can be implemented for many different functions of company
activities, including sales, management, operations, supply chain, human resources, information
technology, etc.
2. In other words, BPA is the tactic a business uses to automate processes to operate efficiently and
effectively.
3. It consists of integrating applications and using software applications throughout the organization.
4. BPA is the tradition of analyzing, documenting, optimizing and then automating business processes.
1
Factors affecting BPA success: (1.15) Benefits of BPA: (1.16)
1. Quality & consistency
(Thanks C A Institute) 2. Time saving
1. Timeliness 3. Visibility
2. Confidentiality 4. Improved operational efficiency
3. Availability 5. Governance & Reliability
6. Reduced turnaround times
4. Integrity 7. Reduced costs
1. ERM may be defined as a process, affected by an entity’s Board of Directors, management and other
personnel
2. ERM is that every entity, whether for profit, not-for-profit, or a governmental body
3. All entities face uncertainty, and the challenge for management is to determine how much uncertainty
4. ERM provides a framework for management to effectively deal with uncertainty
5. ERM includes the methods and processes used by organizations to manage risks and seize
opportunities
2
Benefits of ERM: (1.26) Components of ERM: (1.27)
(Ca Most Important & Reasonable Course) 1. Management’s consideration that the cost of an
internal control does not exceed the expected
1. Control environment benefits to be derived
2. Monitoring of controls 2. The fact that most internal controls do not tend to
be directed at transactions of unusual nature. The
3. Information & communication potential for human error, such as, due to
4. Risk assessment carelessness, distraction, mistakes of
5. Control activities judgment and misunderstanding of
instructions.
3. The possibility of circumvention (fraud) of
internal controls through collusion with
employees or with parties outside the entity.
4. The possibility that a person responsible for
exercising an internal control could abuse that
responsibility, for example, a member of
management overriding an internal control.
5. Manipulations by management with respect to
transactions or estimates and judgements
required in the preparation of financial
statements.
3
The IT Act, 2000 (1.31)
This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws
have a major impact for e-businesses and the new economy in India.
It is important to understand what are the various perspectives of the IT Act, 2000 (as
amended in 2008) and what it offers.
The Act also aims to provide for the legal framework so that legal sanctity is accorded to all
electronic records and other activities carried out by electronic means.
The Act states that unless otherwise agreed, an acceptance of contract may be expressed by
electronic means of communication and the same shall have legal validity and enforceability.
4
key provisions of IT Act related to IT offences (1.34)
[Section 43] Penalty and compensation for damage to computer, computer system, etc.
(If any person without permission of the owner or any other person who is in-charge of a computer,
computer system or computer network) -
(a) accesses or secures access to such computer, computer system or computer network or
computer resource;
(b) downloads, copies or extracts any data, computer database or information from such
computer, computer system or computer network including information or data held or stored
in any removable storage medium;
(c) introduces or causes to be introduced any computer contaminant or computer virus into
any computer, computer system or computer network;
(d) damages or causes to be damaged any computer, computer system or computer network, data,
computer database or any other programmes residing in such computer, computer system or
computer network;
(e) disrupts or causes disruption of any computer, computer system or computer network;
(f) denies or causes the denial of access to any person authorized to access any computer,
computer system or computer network by any means;
(g) provides any assistance to any person to facilitate access to a computer, computer system or
computer network in contravention of the provisions of this Act, rules or regulations made
there under;
(h) charges the services availed of by a person to the account of another person by
tampering with or manipulating any computer, computer system, or computer network;
(i) destroys, deletes or alters any information residing in a computer resource or diminishes its
value or utility or affects it injuriously by any means;
(j) steal, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any
computer source code used for a computer resource with an intention to cause damage,
5
(Start from 1.36) [Section 66E] Punishment for violation of
privacy
[Section 43A] Compensation for failure to
protect data [Section 66F] Punishment for cyber terrorism
[Section 65] Tampering with Computer [Section 67] Punishment for publishing or
Source Documents transmitting obscene material in electronic
[Section 66] Computer Related Offences form
[Section 67A] Punishment for publishing or
[Section 66B] Punishment for dishonestly
transmitting of material containing sexually
receiving stolen computer resource or
explicit act, etc. in electronic form
communication device
[Section 67B] Punishment for publishing or
[Section 66C] Punishment for identity theft
transmitting of material depicting children in
[Section 66D] Punishment for cheating by sexually explicit act, etc. in electronic form
personation by using computer resource
(i) Explicit and implicit contracts between the company and the stakeholders for distribution of
responsibilities, rights, and rewards.
(ii) procedures for reconciling the sometimes-conflicting interests of stakeholders in accordance with their
duties, privileges, and roles, and
(iii) Procedures for proper supervision, control, and information-flows to serve as a system of checks-
and-balances.
6
Chapter – 2 (Financial and accounting systems)
Front End & Back End (2.3)
Front End – It is part of the overall software which actually interacts with the user who
is using the software.
Back End – It is a part of the overall software which does not directly interact with the
user, but interact with Front End only.
Example:-
If a user wants to have some information from the system, i.e. Balance Sheet.
User will interact with Front End part of the software and request front end to generate
the report.
Front End will receive the instruction from user and pass it on to the back end.
Back End will process the data, generate the report and send it to the front end. Front
end will now display the information to user.
This is how the process gets completed each and every time.
Why separate front end and back end software? Why not only one? (2.4)
1
Installed Applications V/s Cloud-based Applications (2.5)
Installed Applications:
These are programs that are installed on the hard disc of the user’s computer.
Cloud Applications:
Web Applications are not installed on the hard disc of the user’s computer, and
are installed on a web server and accessed using a browser and internet
connection. As technology and net connectivity improved virtually, all web based
applications have moved to cloud based applications.
These days many organizations do not want to install Financial Applications on their
own IT infrastructure.
For many organizations, the thought process is that it is not their primary function to
operate complex IT systems and to have a dedicated IT team and hardware which
requires hiring highly skilled IT resources and to maintain the hardware and software
to run daily operations.
The costs may become prohibitive.
Thus, organizations increasingly are hosting their applications on Internet and outsource
the IT functions.
There are many methods through which this can be achieved. Most common among
them being SaaS – Software as a Service or IaaS – Infrastructure as a Service of
Cloud Computing.
2
Enterprise Resource Planning (ERP) Systems (2.8)
It is an overall business management system that caters need of all the people
connected with the organization. Every organization uses variety of resources in
achieving its organization goals.
ERP is an enterprise-wide information system designed to coordinate all the
resources, information, and activities needed to complete business processes
such as order fulfillment or billing.
Accounting and Finance function is considered as backbone for any business.
Hence Financial & Accounting Systems are an important and integral part of
ERP systems.
ERP system includes so many other functions also. An ERP system supports most of
the business system that maintains in a single database the data needed for a
variety of business functions such as- Manufacturing, Supply Chain Management,
Financials, Projects, Human Resources and Customer Relationship Management.
An ERP system is based on a common database and a modular software design.
The common database can allow every department of a business to store and
retrieve information in real-time.
The information should be reliable, accessible, and easily shared. The modular
software design should mean a business can select the modules they need, mix and
match modules from different vendors, and add new modules of their own to improve
business performance.
Ideally, the data for the various business functions are integrated. In practice the
ERP system may comprise a set of discrete applications, each maintaining a discrete
data store within one physical database.
Some of the well-known ERP Software in the market today include SAP, Oracle,
MFG Pro, and MS Axapta etc.
3
Benefits of an ERP System(2.10)
1. Reduction of lead-time
2. Reduction in Cycle Time
3. On-time Shipment
4. Reduced Quality Costs
5. Information integration
6. Better Customer Satisfaction
7. Improved Resource utilization
8. Better Analysis and Planning Capabilities
9. Improved information accuracy and decision-making capability
10. Use of Latest Technology
11. Improved Supplier Performance
12. Increased Flexibility
(Blood Pressure)
1. Business Process Reengineering (BPR)
2. Program Management
4
(D): Risks and corresponding Controls related to some other implementation issues (2.15)
5
ERP Modules
Financial Accounting Module (2.20)
6
Sales and Distribution Module (2.21)
Sales and Distribution is one of the most important modules. It has a high level of
integration complexity.
Sales and Distribution is used by organizations to support sales and distribution
activities of products and services, starting from enquiry to order and then
ending with delivery.
Sales and Distribution can monitor a plethora of activities that take place in an
organization such as - products enquires, quotation (pre-sales activities), placing
order, pricing, scheduling deliveries (sales activity), picking, packing, goods issue,
shipment of products to customers, delivery of products and billings.
In all these processes, multiple modules are involved such as - FA (Finance &
Accounting), CO (Controlling), MM (Material Management), PP (Production Planning),
LE (Logistics Execution), etc.; which shows the complexity of the integration involved.
7
4. Evaluation of Quotations
5. Purchase Order
6. Material Receipt
7. Issue of Material
8. Purchase Invoice
9. Payment to Vendor
Quality Management Module (2.26)
Quality Management (QM) Module helps in management of quality in productions
across processes in an organization.
This module helps an organization to accelerate their business by adopting a structured and
functional way of managing quality in different processes.
Quality Management module collaborates in procurement and sales, production, planning,
inspection, notification, control, audit management and so on.
Quality Management Process (2.28)
1. Master data and standards are set for quality management
2. Set Quality Targets to be met
3. Quality management plan is prepared
4. Define how those quality targets will be measured
5. Take the actions needed to measure quality
6. Identify quality issues and improvements and changes to be made
7. In case of any change is needed in the product, change requests are sent
8. Report on the overall level of quality achieved
9. Quality is checked at multiple points, e.g. inwards of goods at warehouse, manufacturing,
procurement, returns
Process in Quality Management Module (2.27)
1. Quality Planning
2. Quality Control
3. Quality Assurance
4. Quality Improvement
Customer Relationship Management (CRM) (2.30)
Customer Relationship Management is a system which aims at improving the
relationship with existing customers, finding new prospective customers, and
winning back former customers.
This system can be brought into effect with software which helps in collecting,
organizing, and managing the customer information.
Information in the system can be accessed and entered by employees in different
departments, such as - sales, marketing, customer service, training, professional
development, performance management, human resource development, and
compensation.
Details on any customer contacts can also be stored in the system. The rationale
behind this approach is to improve services provided directly to customers and to
use the information in the system for targeted marketing.
CRM manages the enterprise’s relationship with its customers. This includes
determining who the high-value customers are and documenting what interactions
the customers have had with the enterprise.
Implementing a CRM strategy is advantageous to both small-scale and large-scale
business ventures.
8
Benefits of CRM module: (2.31)
( I M Boss Of IT/India)
1. Improve customer relations
2. Maximize up-selling and cross-selling
3. Better internal communication
4. Optimize marketing
5. Increase customer revenues
Plant Maintenance (PM) Module (2.28)
Plant Maintenance (PM) is a functional module which handles the maintaining of
equipment and enables efficient planning of production and generation schedules.
This application component provides us a comprehensive software solution for all
maintenance activities that are performed within a company.
It supports cost- efficient maintenance methods such as - risk-based maintenance or
preventive maintenance, and provides comprehensive outage planning and powerful
work order management.
Objectives of PM Module
(i) To achieve minimum breakdown and to keep the plant in good working condition at the lowest
possible cost.
(ii) To keep machines and other facilities in a condition that permits them to be used at their optimum
(profit making) capacity without any interruption or hindrance.
(iii) To ensure the availability of the machines, buildings and services required by other sections of
the factory for the performance of their functions at optimum return on investment whether this
investment be in material, machinery or personnel.
Process in Plant Maintenance
1. Equipment Master is a repository of the standard information that one needs related to a specific
piece of equipment.
2. Equipment/Plant Maintenance provides a variety of reports to help us to review and manage
information about our equipment and its maintenance.
3. Plant Maintenance (PM) Reports are used to review and manage information about preventive
maintenance schedules and service types within any maintenance organization.
9
Human Resource Module (2.23)
This module enhances the work process and data management within HR department of
enterprises.
Right from hiring a person to evaluating one’s performance, managing promotions,
compensations, handling payroll and other related activities of an HR is processed using
this module.
The most important objective of master data administration in Human Resources is to
enter employee-related data for administrative, time-recording, and payroll purposes.
Payroll and Personnel departments deal with Human Resource of the organization.
This department maintains total employee database. Wage and attendance related
information comes to this department. They also prepare wage sheet for workmen; handle
Provident Fund, ESI related formalities. This is perhaps the only module, which exchange
very few information with other modules.
Concerning manpower, its requirement and utilization is one of the major chunks of profit for
an organization. So, in this regard, every aspect of business transaction is taken care of by
defining the master shifts master, PF ESI (Employees’ State Insurance) master, leave,
holiday, loans, employee master, operations and sub- operations masters etc.
Usage of magnetic card or finger print recognition devices will help to improve the
attendance system and provide an overall security in terms of discarding proxy
attendance.
This module will also deal with the financial entries like advance or loan to employees.
From Holiday master provided with the module, the user could feed all possible holidays
at the beginning of a year, so leave related information can be automated. This module will
generate monthly wage sheet from which the salary payment can be made and respective
accounts will be updated.
10
Before a project is initiated, it is required that project goal is clearly defined and the
activities be structured.
The Project Manager has a task to ensure that these projects are executed within budget and
time and to ensure that resources are allocated to the project as per the requirement.
In Project System, each process has a defined set of tasks to be performed known as
process flow in Project Lifecycle. When a project request is received, a project is created and
it undergoes the following steps in project process flow / lifecycle.
Supply Chain Module (2.30)
A Supply Chain is a network of autonomous or semi-autonomous business entities
collectively responsible for procurement, manufacturing, and distribution activities associated
with one or more families of related products.
This module provides extensive functionality for logistics, manufacturing, planning, and
analytics involving the activities like inventory, supply chain planning, supplier scheduling, claim
processing, order entry, purchasing, etc.
In other words, a supply chain is a network of facilities that procure raw materials, transform
them into intermediate goods and then finished products, and then finally deliver the
products to customers through a distribution system or a chain.
You can optimize your supply chain for months in advance; streamline processes such as -
supply network, demand, and material requirement planning; create detailed scheduling; refine
production integration, and maximize transportation scheduling.
Data Analytics (2.32)
Data Analytics is the process of examining data sets to draw conclusions about the
information they contain, increasingly with the aid of specialized systems and
software.
Data analytics technologies and techniques are widely used in commercial industries to
enable organizations to make more-informed business decisions and by scientists
and researchers to verify or disprove scientific models, theories and hypotheses.
As a term, Data Analytics predominantly refers to an assortment of applications,
from basic Business Intelligence (BI), reporting and Online Analytical Processing
(OLAP) to various forms of advanced analytics.
People use data analytics specifically to mean advanced analytics, treating
Business Intelligence (BI) as a separate category.
Data Analytics initiatives can help businesses increase revenues, improve
operational efficiency, optimize marketing campaigns and customer service efforts,
respond more quickly to emerging market trends and gain a competitive edge over
rivals -- all with the goal of boosting business performance.
11
Application areas of Data Analytics (2.34)
1. Data Analytics initiatives support a wide variety of business uses For example, banks and
credit card companies analyse withdrawal and spending patterns to prevent fraud and identity
theft.
2. E-commerce companies and marketing services providers do click stream analysis to
identify website visitors who are more likely to buy a product or service based on navigation
and page-viewing patterns.
3. Mobile network operators examine customer data to forecast so they can take steps to prevent
defections to business rivals; to boost customer relationship management efforts. Other
companies also engage in CRM analytics to segment customers for marketing campaigns and
equip call centre workers with up-to-date information about callers.
4. Healthcare organizations mine patient data to evaluate the effectiveness of treatments for
cancer and other diseases.
12
Chapter – 3 (Information Systems and Its Components)
Hardware (3.5)
Hardware is the tangible portion of our computer systems; something we can touch and
see i.e. the physical components of technology.
It basically consists of devices that perform the functions of input, processing, data storage
and output activities of the computer.
Examples - Computers, keyboards, hard drives, iPads and flash drives etc.
1
(iii) Data Storage Devices (3.6)
(a) Primary Memory/Main Memory:
Also known as Main Memory or Internal Memory, it is directly accessed by the
processor using data bus.
It is volatile or non- volatile in nature and being small in storage capacity, hence
cannot be used to store data on a permanent basis.
Primary memory is mainly of two types – Random Access Memory (RAM) and
Read Only Memory (ROM)
Virtual Memory ( 3 . 1 0 )
Virtual Memory is an imaginary memory area supported by some operating
systems (for example, Windows) that combines computer’s RAM with temporary
space on the hard disk.
If a computer lacks in required size of RAM needed to run a program or
operation, Windows uses virtual memory to move data from RAM to a space called
a paging file.
Moving data to and from the paging file frees up RAM to complete its work. Thus,
Virtual memory is an allocation of hard disk space to help RAM.
differences between Primary Memory and Secondary Memory (RAM & Hard
Disk) (3.8)
1. Basic 2. Data 3.Volatility 4.Formation 5.Access Speed 6.Access 7.Size
8.Expense 9.Memory
2
(iv) Output Devices: (3.8)
Computer systems provide output to decision makers at all levels in an enterprise to
solve business problems.
The desired output may be in visual, audio or digital forms.
Output devices are devices through which system responds.
Visual output devices like, a display device visually conveys text, graphics, and video
information.
Information shown on a display device is called soft copy because the information exists
electronically and is displayed for a temporary period.
Display devices include CRT monitors, LCD monitors and displays, gas plasma monitors,
and televisions.
Some types of output are textual, graphical, tactile, audio, and video.
Textual output comprises of characters that are used to create words, sentences,
and paragraphs.
Graphical outputs are digital representations of non-text information such as
drawings, charts, photographs, and animation.
Tactile output such as raised line drawings may be useful for some
individuals who are blind.
Audio output is any music, speech, or any other sound.
Video output consists of images played back at speeds to provide the appearance
of full motion.
Most common examples of output devices are Speakers, Headphones, Screen (Monitor),
Printer, Voice output communication aid, Automotive navigation system, Video, Plotter,
Wireless etc.
Software (3.9)
Software is defined as a set of instructions that tell the hardware what to do. Software
is not tangible; it cannot be touched.
Software is created through the process of programming. When programmers create
software, what they are really doing is simply typing out lists of instructions that tell the
hardware what to execute.
Without software, the hardware would not be functional.
Software can be broadly divided into two categories: Operating Systems Software and
Application Software
3
Computer hardware with operating system can thus be viewed as an extended machine,
which is more powerful and easy to use.
Some prominent Operating systems used nowadays are Windows 7, Windows 8, Mac OS,
Linux, UNIX, etc.
All computing devices run an operating system. For personal computers, the most popular
operating systems are - Microsoft’s Windows, Apple’s OS X, and different versions of Linux.
Smart phones and tablets run operating systems as well, such as Apple’s iOS, Google Android,
Microsoft’s Windows Phone OS, and Research in Motion’s Blackberry OS.
4
Database Management Systems (DBMS): (3.11)
DBMS may be defined as software that aid in organizing, controlling and using the data
needed by the application programme.
They provide the facility to create and maintain a well-organized database.
These systems are primarily used to develop and analyze single-user databases and are not
meant to be shared across a network or Internet, but are instead installed on a device and
work with a single user at a time.
Various operations that can be performed on these files are as follows:
Adding new files to database,
Deleting existing files from database,
Inserting data in existing files,
Modifying data in existing files,
Deleting data in existing files, and
Retrieving or querying data from existing files.
Commercially available Data Base Management Systems are Oracle, MySQL, SQL Servers
and DB2 etc. DBMS packages generally provide an interface to view and change the design
of the database, create queries, and develop reports. Microsoft Access and Open Office Base
are examples of personal DBMS.
5
Big Data (3.13)
A new buzzword that has been capturing the attention of businesses lately is Big Data.
The term refers to such massively large data sets that conventional database tools do not
have the processing power to analyze them.
For example, Flipkart must process over millions of customer transactions every hour during
the Billion Day Sale.
Storing and analyzing that much data is beyond the power of traditional database-management
tools.
Understanding the best tools and techniques to manage and analyze these large data sets
is a problem that governments and businesses alike are trying to solve.
This is an interesting space to explore from a career perspective since everything is nothing more
than data. In fact, you and I are nothing more than data points in databases on various companies.
Some examples of industries that use big data analytics include - the hospitality industry, healthcare
companies, public service agencies, and retail businesses.
6
Data warehouse should be designed so that it meets the following criteria: (3.14)
1. It uses non-operational data
2. The data is time-variant
3. The data is standardized
There are two primary schools of thought when designing a data warehouse
The Bottom-Up Approach starts by creating small data warehouses, called data marts, to
solve specific business problems. As these data marts are created, they can be combined into a
larger data warehouse.
The Top-Down Approach suggests that we should start by creating an enterprise-wide data
warehouse and then, as specific business needs are identified, create smaller data marts from
the data warehouse.
7
Steps involved in the Data Mining process (3.16)
1. Data Integration
2. Data Selection
3. Data Cleaning
4. Data Transformation
5. Data Mining
6. Pattern Evaluation and Knowledge Presentation
7. Decisions / Use of Discovered Knowledge
8
Chapter – 4 (E-Commerce, M-Commerce and Emerging Technologies)
E-Commerce (4.2)
“Sale / Purchase of goods / services through electronic mode is e- commerce.”
This could include the use of technology in the form of Computers, Desktops, Mobile
Applications, etc.
E-Commerce is the process of doing business electronically. It refers to the use of technology to
enhance the processing of commercial transactions between a company, its customers and its
business partners.
In e-commerce, the buyers and sellers interact electronically using telecommunication
networks rather than through physical contact or exchange. It is a new way of conducting,
managing, and executing business transactions using computer and telecommunication networks.
It involves the automation of a variety of Business-To-Business (B2B), Business-To-Consumer
(B2C), Consumer-To-Consumer (C2C) and Consumer-To-Business (C2B) etc. through reliable
and secure connections.
Components of E-Commerce: (4.3)
1. User
2. E- Commerce vendors
1. Suppliers and supply chain management
2. Warehouse operations
3. Shipping and returns
4. E-Commerce catalogue and product display
5. Marketing and loyalty programs
6. Showroom and off line purchase
7. Different ordering method
8. Guarantees
9. Privacy policy
10. Security
3. Technology infrastructure
1. Computers, servers and database
2. Mobile apps
3. Digital library
4. Data interchange
4. Internet/network
5. Web portal
6. Payment gateway
1
As organizations consider making their digital presence compatible with mobile devices,
they must decide whether to build a mobile app.
It includes the following: (Functions)
Mobile store front modules are an integral part of m-commerce apps, where all
commodities and services are categorized and compiled in catalogs for customers to easily
browse through the items on sale and get essential information about the products.
Mobile ticketing module is an m-commerce app component that is closely linked to
promotional side of commercial business and enables vendors to attract customers by
distributing vouchers, coupons and tickets.
Mobile advertising and marketing module empowers merchants to leverage m-commerce
channels in order to manage its direct marketing campaigns, which are reported to be
very effective especially when targeted at younger representatives of digital information
consumers.
Mobile customer support and information module is a point of reference for information
about a particular retailer, its offerings and deals. The news about the company, current
discounts, shop locations and other information is either pushed to users’ m-
commerce apps or can be found in m-commerce app itself.
Mobile banking is inextricably linked to selling process via m- commerce apps,
because no purchase can be finalized without a payment. There are various options for
executing mobile payments, among which are direct mobile billing, payments via -
SMS, credit card payments through a familiar mobile web interface, and payments at
physical Point of Sale (POS) terminals with Near Field Communication (NFC) technology.
2
Payment Gateway (4.8)
In e-commerce, the major proportion of online payments is being performed based
on payment gateway technology.
Payment gateway represents the way e-commerce/m-commerce vendors collects
their payments.
It is a system of computer processes that authorizes, verifies, and accepts or declines
credit/debit card transactions on behalf of the merchant through secure Internet
connections.
The Payment gateway assures seller of receipt of payment from buyer of
goods/services from e-commerce vendors.
A payment gateway allows a secure connection directly between a website and a bank.
This direct connection between a website and bank facilitates direct placement of
payments on a website and straight deposit into a bank account.
Payment gateway is an application on an e-commerce website that allows the
website to link the client payment account with the website’s account. A payment
gateway is a server that is dedicated to linking websites and banks so that online credit
card transactions can be completed in real-time.
PayPal and World Pay are some of the most popular payment gateways.
3
DIGITAL PAYMENTS (4.10)
Digital Payment is a way of payment which is made through digital modes.
In digital payments, payer and payee both use digital modes to send and receive money.
It is also called electronic payment. No hard cash is involved in the digital payments.
All the transactions in digital payments are completed online. It is an instant and convenient
way to make payments.
New digital payment platforms such as UPI and IMPS are becoming increasingly popular.
Using these new platforms, banks have been scaling rapidly. Every Bank is impacted by new
digital disruptions, so new banking services and ways should be adapted to use various
digital channels to interact and provide services to customers.
4
4. Mobile Wallets:
A mobile wallet or e-wallet is a digital version of a physical or real-life wallet,
in which one can add money to purchase various goods and services (both online
and offline) and transfer money with this technology.
A mobile wallet is a type of virtual wallet service that can be used by
downloading an app on smartphone and registering for the service. It is the
digital version of physical wallet with more functionality. User can keep his/her
money in an E-wallet and use it when needed.
Mobile Wallets provide a convenient way for a user to make-in-store
payments and can be used that with merchants listed with the mobile wallet
service providers.
This eliminates the need to use credit/debit cards or remember the CVV
or 4-digit pin. Mobile wallets are frequently used to make payments at physical
shops/stores, recharge phone, online purchases, transfer money, and receive offers,
cash backs, and rewards.
There are mobile wallets like Paytm, Freecharge, Buddy, Mobikwik, State
bank buddy etc.
7. Mobile Banking:
It is a service provided by a bank or other financial institution that allows its
customers to conduct different types of financial transactions remotely using a
mobile device such as a mobile phone or tablet.
It uses software, usually called an app, provided by the banks or financial
institution for the purpose.
Each Bank provides its own mobile banking App for Android, Windows and
iOS mobile platform(s).
5
8. Crypto currency:
Cryptocurrency is a digital currency produced by a public network, rather
than any government, that uses cryptography to ensure that payments are
sent and received safely.
A cryptocurrency is a medium of exchange wherein records of individual coin
ownership are stored in a computerized database using strong cryptography.
The first cryptocurrency was Bitcoin which was launched in 2009.
The other digital currencies such as DigiCash utilizes a Trusted Third Party
approach in which a third party verifies and facilitates the transactions.
The other cryptocurrencies prevailing in the world today include Litecoin,
Peercoin, Namecoin, as well as Ethereum.
Cryptocurrency is completely decentralized, which means that there are no
servers involved and no central controlling authority.
Cryptocurrency is a digital money which does not involve any physical coin. Since it is
all online, the user can transfer cryptocurrency to someone online without going to the
bank.
9. e-Rupi:
Recently, the Government of India has launched a new mode of cashless and
contactless digital payment named e-Rupi based on UPI systems toensure seamless
transfer of benefits to the citizens in a “leak-proof” manner.
It is an e-voucher, which will be delivered to beneficiaries in the form of a QR
code and SMS-string-based voucher through which funds will be directly transferred
to their bank account.
These vouchers are person- and purpose-specific, meaning if they are released by
the government for the purpose of vaccination, for instance, then they can be redeemed
only for that.
This contactless e-RUPI is easy, safe, and secure as it keeps the details of the
beneficiaries completely confidential.
The entire transaction process through this voucher is relatively faster and at the
same time reliable, as the required amount is already stored in the voucher. Any
government agency and corporation can generate e-RUPI vouchers via their partner
banks.
6
2. Debits Cards:
Debit card, is also a small plastic card with a unique number linked
with bank account number.
It is required to have a bank account before getting debit card from
bank.
It enables cardholder to pay for his/her purchases directly through his/her
account.
The major difference between debit card and credit card is that in case of
payment through debit card, amount gets deducted from card’s bank
account immediately and there should be sufficient balance in bank
account for the transaction to get completed; whereas in case of credit card
there is no such compulsion.
3. Internet Banking:
In this mode, the customers log to his / her bank account and makes
payments.
All public sectors, large private sector banks allow net banking facilities to
their customers.
4. Smart Card:
Smart card is a prepaid card similar to credit card and debit card in
appearance, but it has a small microprocessor chip embedded in it.
It has capacity to store customer’s personal information such as
financial facts, private encryption keys, credit card information,
account information, and so on.
Smart cards combine the advantages of both debit card and credit card
and are available to anyone, regardless of credit ratings or income of
applicant of smart card. Moreover, these are not linked to any bank
account. For this reason, smart card holder is not mandated to have a
bank account.
It is also used to store money which is reduced as per usage.
Mondex and Visa Cash cards are examples of smart cards.
The smart card holder has to load money onto the card by paying cash
or through transfer from his/her bank account. After loading the money
onto the card, the cardholder can use the card to spend money up to the
limit of loaded amount in the same way as using a credit or debit card.
Once the loaded amount is spent, the cardholder may reload money onto
the card.
7
Advantages of digital payments: (4.14) Drawbacks/disadvantages of digital
payments: (4.15)
(Popat Lal is Weak in English, Drawing 1. Difficult for a Non- technical person
and Computer Environment ) 2. The risk of data theft
1. Pay or send money from anywhere 3. Overspending
4. Disputed transactions
2. Less risk 5. Increased business costs
3. Written records 6. The necessity of internet access
4. Easy and convenient
5. Discounts from taxes
6. Competitive advantage to business
7. Environment Friendly
Virtualization (4.15)
Virtualization means to create a virtual version of a device or resource, such as a
server, storage device, network or even an operating system where the framework divides
the resource into one or more execution environments.
Virtualization helps in cutting IT expenses, in enhancing security, and also in increasing
operational efficiency.
Virtualization refers to technologies designed to provide a layer of abstraction between
computer hardware systems and the software running on them. By providing a logical
view of computing resources, rather than a physical view;
Virtualization allows its’ users to manipulate their systems’ operating systems into thinking
that a group of servers is a single pool of computing resources and Conversely, allows its
users to run multiple operating systems simultaneously on a single machine.
8
In the ideal grid computing system, every resource is shared, turning a computer
network into a powerful supercomputer.
With the right user interface, accessing a grid computing system would look no different
than accessing a local machine’s resources.
Every authorized computer would have access to enormous processing power and
storage capacity.
Grid Computing is used for high throughput computing at a lower-cost. It has the
ability to accumulate the power of geographically scattered and heterogeneous
resources to form a cohesive resource for performing higher level computations.
9
cloud computing: (4.23)
“The Cloud” refers to applications, services, and data storage on the Internet.
These service providers rely on giant server farms and massive storage devices that are
connected via Internet protocols.
Cloud Computing is the use of these services by individuals and organizations. You probably
already use cloud computing in some forms.
For example, if you access your e-mail via your web browser, you are using a form of cloud
computing. If you use Google Drive’s applications, you are using cloud computing.
Cloud Computing:
Cloud Computing, simply means the use of computing resources as a service through networks,
typically the Internet.
The Internet is commonly visualized as clouds; hence the term “cloud computing” for
computation done through the Internet.
With Cloud Computing, users can access database resources via the Internet from anywhere,
for as long as they need, without worrying about any maintenance or management of
actual resources.
Besides these, databases in cloud may be highly dynamic and scalable. In fact, it is a very
independent platform in terms of computing.
Cloud Computing is both, a combination of software and hardware based computing
resources delivered as a networked service.
This model of IT enabled services enables anytime access to a shared pool of applications
and resources.
These applications and resources can be accessed using a simple front-end interface such
as a Web browser, and thus enabling users to access the resources from any client device
including notebooks, desktops and mobile devices.
The location of physical resources and devices being accessed are typically not known to the
end user. It also provides facilities for users to develop, deploy and manage their applications ‘on
the cloud’, which entails virtualization of resources that maintains and manages itself.
10
Drawbacks of Cloud Computing (4.26)
1. If Internet connection is lost, the link to the cloud and thereby to the data and
applications is lost.
2. Security is a major concern as entire working with data and applications depend on other
cloud vendors or providers.
3. Although Cloud computing supports scalability (ie. quickly scaling up and down
computing resources depending on the need), it does not permit the control on these
resources as these are not owned by the user or customer.
4. Depending on the cloud vendor or provide, customers may have to face restrictions on the
availability of applications, operating systems and infrastructure options.
5. Interoperability (ability of two or more applications that are required to support a business
need to work together by sharing data and other business-related resources) is an issue
wherein all the applications may not reside with a single cloud vendor and two vendors
may have applications that do not cooperate with each other.
11
Hybrid Cloud: (4.29)
This is a combination of both at least one private (internal) and at least one public (external)
cloud computing environments - usually, consisting of infrastructure, platforms and applications.
The usual method of using the hybrid cloud is to have a private cloud initially, and then for
additional resources, the public cloud is used.
The hybrid cloud can be regarded as a private cloud extended to the public cloud and aims at
utilizing the power of the public cloud by retaining the properties of the private cloud.
The organization may perform non-critical activities using public clouds while the critical
activities may be performed using private cloud.
It is typically offered in either of two ways.
A vendor has a private cloud and forms a partnership with a public cloud provider or
A public cloud provider forms a partnership/franchise with a vendor that provides
private cloud platforms.
12
Characteristics of hybrid cloud: (4.29) Characteristics of community cloud: (4.30)
1. Scalable 1. Collaborative and distributive maintenance
2. Partially secure 2. Partially secure
3. Stringent service level agreement(SLA) 3. Cost effective
4. Complex cloud management
Advantages of community cloud:
Advantages of hybrid cloud: 1. It allows establishing a low cost private
1. Highly scalable and gives the power of cloud
both public and private 2. Collaborative work on the cloud
2. Provide better security then the public 3. Sharing of responsibilities among the
cloud organizations
4. Better security then the public cloud
Limitation of hybrid cloud:
1. Security features are not good as private Limitation of community cloud:
2. Complex to manage 1. Autonomy of the organization is lost
2. Security features are not good as private
3. It is not suitable in the cases where there is
no collaboration
13
Cloud computing service model:
(A) Infrastructure as a Service (IaaS): (4.31)
IaaS, a hardware-level service, provides computing resources such as - processing
power, memory, storage, and networks for cloud users to run their application on-
demand.
This allows users to maximize the utilization of computing capacities without
having to own and manage their own resources.
The end-users or IT architects will use the infrastructure resources in the form of
Virtual machines (VMs) and design virtual infrastructure, network load balancers etc.,
based on their needs.
The IT architects need not maintain the physical servers as it is maintained by the
service providers.
Examples of IaaS providers include Amazon Web Services (AWS), Google Compute
Engine, OpenStack and Eucalyptus.
14
Characteristics of IaaS: (4.31) Issues Related to Cloud Computing (4.35)
1. Web access to the resources 1. Threshold Policy
2. Centralized management 2. Interoperability
3. Elasticity and dynamic scaling 3. Hidden Costs
4. Shared infrastructure 4. Unexpected Behaviour
5. Metered services 5. Security Issues
6. Legal Issues
7. Software Development in Cloud
8. Bugs in Large-Scale Distributed Systems
15
Working of Mobile Computing (4.38)
The user enters or access data using the application on hand-held computing device.
Using one of several connecting technologies, the new data are transmitted from hand-
held to site’s information system where files are updated and the new data are accessible to
other system user.
Now both systems (hand-held and site’s computer) have the same information and are
in sync.
The process work the same way starting from the other direction.
16
For example:
(i) Washing machines with Wi-Fi networking capabilities can connect themselves to home
Wi-Fi. Once these machines are so connected, they can be controlled through machine
manufacturer mobile APP from anywhere in the world.
(ii) India’s living legend of cricket appearing in an Advertisement for water purifier informs
that, the water purifier is Wi-Fi enabled. When the purifying agents deplete in the
machine, it connects to home Wi-Fi and informs the service agents of the company.
Risk: (4.43)
1. Risk to product manufacturer
2. Risk to user of these products
3. Technology risk
4. Environmental risk due to technology
17
Chapter – 5 (Core Banking System (CBS))
Core banking services (5.4)
1. Acceptance of deposit
2. Granting of advances
3. Remittances
Demand drafts (DD)
Mail Transfer (MT)
Electronic Funds Transfer (EFT)
Real Time Gross Settlement (RTGS)
National Electronic Funds Transfer (NEFT)
Immediate Payment Service (IMPS)
4. Collection
5. Clearing
ECS Credit
ECS Debit
6. Letters of credit and guarantees
7. Credit card
8. Debit card
1
• BaNCS: A customer-centric business model which offers simplified operations
comprising loans, deposits, wealth management, digital channels and risk and
compliance components.
• BankMate: A full-scale Banking solution which is a scalable, integrated e- banking
systems that meets the deployment requirements in traditional and non-traditional
banking environments. It enables communication through any touch point to provide
full access to provide complete range of banking services with anytime, anywhere
paradigm.
Some key aspects in-built into architecture of a CBS are as follows (5.12)
2. Customer centric: Through a holistic core banking architecture, this enables banks
to target customers with the right offers at the right time with the right channel to
increase profitability.
3. Regulatory compliance: This holds the compliance in case bank is complex and
expensive. CBS has built-in and regularly updated regulatory platform which
will ensure compliance by providing periodic regulatory and compliance reports
required for the day to day operations of the bank..
2
Risk associated with CBS (5.12)
1. Operational Risk
2. Credit Risk
3. Market Risk
4. Strategic Risk
3
Stages of Money Laundering (5.31)
(IPL)
1. Placement
2. Layering
3. Integration