12
 1 INFOSYS.110 BUSINESS SYSTEMS: DELIVERABLE 2: BUSINESS SECTION 2014 Name Leon Chan NetID Lcha510 Group Number: 41 Website Link: http://infosys1102014fcgroup41.blogspot.co.nz/ Tutorial Details Tutor: Day: Time: Nicholl Costa Monday 2pm Time Spent on Assignment: 12hours Word Count: 1648

infosys d2 6694955

Embed Size (px)

DESCRIPTION

by leon chan 2014 s1 infosys110 D2

Citation preview

  • 5/25/2018 infosys d2 6694955

    1/12

    1

    INFOSYS.110 BUSINESS SYSTEMS:

    DELIVERABLE 2: BUSINESS SECTION

    2014

    Name Leon Chan

    NetID Lcha510

    Group Number: 41

    Website Link: http://infosys1102014fcgroup41.blogspot.co.nz/

    Tutorial DetailsTutor: Day: Time:

    Nicholl Costa Monday 2pm

    Time Spent on

    Assignment:12hours Word Count: 1648

  • 5/25/2018 infosys d2 6694955

    2/12

    2

    2

    IDENTIFICATION DEVICES LTD.

    INTRODUCTION

    The problem of human identification is a growing problem in the world today. Stolen IDs

    can lead to serious crimes because of identity theft and increasing numbers of illegal

    immigrants. IDs can be easily stolen or copied, which is a major drawback of the ID systems

    used today. A device where people are indexed through the use of fingerprint and eye scans

    adding to a global network would allow us to accurately identify people around the world

    and reduce identity theft and fraud.

    3. BUSINESS SECTION

    3.1 Vision

    To create a network of secure, legitimate identities using advanced finger and eye scans to

    correctly and accurately identify people from anywhere in the world.

    3.2 Industry Analysis:

    Industry: Software/electronics industry.

    Force: High/Low: Justification:

    Buyer power: High There is an increasing number of devices which

    can provide both fingerpint and eye scanning

    capabilities such as modern smartphones and

    other electronics. The price of these electronics

    are also dropping making it easier for consumers

    to access these products. (Kelly S.M. 2014)

    Supplier power: Low There are many firms which provide the

    components for devices, as well as many firms to

    provide the services such as internet access and

  • 5/25/2018 infosys d2 6694955

    3/12

    3

    3

    wireless connectivity solutions. (Gulick 2014)

    Threat of new entrants: Low The startup costs are relatively high for

    electronics and software firms because of the

    time taken to develop software, as well as the

    high costs to start up an electronics firms due to

    the cost of the capital involved. (NYU school of

    law 2006)

    Threat of substitutes: Low There are not many options that can compete

    with ID with the same convenience such as

    fingerprint scans. There are few substitute

    products, for example drivers licences, and are

    easily stolen and account for over 13000 missing

    licences in the US alone. (FBI 2011)

    Rivalry among existing

    competitors:

    Low There are not many companies which provide

    devices or services which can provide

    identification information. There would only be

    relatively few alternatives such as passports and

    licences which compete with out product.

    (Beckford, 2014)

    Overall attractiveness of the industry: This industry is not very attractive. There is high

    buyer power, high levels of rivalry and high barriers to entry. This would not likely be

    attractive for new firms due to fierce competition in the industry.

    3.3 Customers and Their Needs

    The target customers for our product would be governments around the world because the

    governments would be the ones who are the ones paying for our product. The government

    would need our device to be placed in centres where people go to renew their IDs, so our

  • 5/25/2018 infosys d2 6694955

    4/12

    4

    4

    product can collect and store the information and provide an accurate method if identifying

    people. They need a device which can accurately index both finger and eye prints

    simultaneously whilst being portable and easy to use for the people being indexed. Recent

    studies show that over 11 million people in the USA are victims of identity fraud annually.

    These statistics show the need for a more accurate identification system witch greater

    accuracy to reduce identify fraud from happening. (US Dept of Justice. NY times, 2013)

    3.4 The Product and Service

    The device we provide which is both portable and functional. It has a high resolution

    fingerprint scanner, coupled with a high resolution eye-scanner. It would record the finger

    and eye scan data and transmit it database which will reduce the likelihood of identity theft

    by correctly linking a person with their finger and eye prints. This will reduce the reliance on

    ID cards and passports which can be easily stolen. The device would simultaneously scan the

    fingerprint and eye to ensure accuracy and reliability, ensuring greater legitimacy of a

    persons identity A mock-up is shown below.

    3.5 Suppliers and Partners

  • 5/25/2018 infosys d2 6694955

    5/12

    5

    5

    Suppliers which can help us produce our product would include the companies which

    produce hardware components to build our products such as Samsung. Samsung can

    produce various parts such as screen panels as well as fingerprint sensors like those used in

    the galaxy S5.

    Software companies can also be suppliers because our device needs to run on an operating

    system. A company such as Google could provide our device with the software to run, for

    example a modified version on Android could be used.

    Partners for our company would include the NZ Government because we are implementing

    our device within Government organisations. There will be mutual benefit from this

    partnership, with the government achieving increased productivity and our company having

    a stable userbase.

    Another partner would be a telecommunications company such as vodafone or telecom

    because they would supply the network access our device would use to connect to the

    internet. The company would help provide support for our product around the world.

    3.6 Strategy: Narrow-market differentiation

    Our device is only targeting a very small portion of the market. Its aim is only to reach the

    government stalls where people get indexed and is not intended for the broader market.

    Therefore, this product has a competitive scope for the narrow market.

    Our device aims to differentiate from other devices by being innovative and new. There will

    be a lot of innovation in our product which makes it high cost. This means our device is

    targeting a differentiation strategy with a high cost.

    The overall strategy is therefore Narrow-market differentiation strategy

    3.7 Value Chain Activity: Technology Development (and R&D)

    The most important value chain activity for this business is Technology development (R&D).

  • 5/25/2018 infosys d2 6694955

    6/12

    6

    6

    Our product relies on being new and innovative in the market. We would rely on technology

    development to ensure our vision of being advanced is fu lfilled. Technology development

    would allow our product to differentiate itself in the market so our company can market

    and sell it to our consumers as innovative. This adds value because the users of the service

    will be more convenient, which makes identifying people more efficient.

    3.8 Business Processes

    3.8.1. USER INFORMATION VERIFICATION PROCESS The user data would first be entered

    into the device, which would then be searched against on a server. Once the user data has

    been found, it would need to be confirmed to make sure the data requested is actually the

    person in question. A decision would be made to check if the database matches the user. If

    its consistent, the information about that user is sent to the device, or re-request the

    information if it isnt consistent.

  • 5/25/2018 infosys d2 6694955

    7/12

    7

    7

    Start

    Enteruserdetails

    Senddatstoservers

    Searchforuserdataonserver

    database

    Doestheuserdatamatchentereduser

    data?No

    Requestuserdataagain

    Sendinformation

    todevicetoverifythepersons

    identity

    Yes

    Department

    System

    Informationreceivedbydevice

    end

  • 5/25/2018 infosys d2 6694955

    8/12

    8

    8

    3.8.2. CUSTOMER SUPPORT PROCESS We offer service after the sale. Customer support is

    very important for any company and is a major part of our product because we support our

    product as long as the customer pays for it. The process would be carried out in stages to

    ensure the complaint is handed quickly and efficiently.

    Start

    Complaint

    receivedfrom

    customer

    Sendproblemtorelevant

    department

    Searchforproblemon

    supportdatabase

    Isthereanexisting

    solution?

    Sendthesolutiontothecustomer

    Yes

    Debugprogramandfindafixtotheproblem

    No

    Testthesolutiontoensureitworks

    End

    DepartmentSystem

  • 5/25/2018 infosys d2 6694955

    9/12

    9

    9

    3.9 Functionalities

    3.9.1. USER INFORMATION VERIFICATION PROCESS

    Validating user information Sending information to database servers

    3.9.2. CUSTOMER SUPPORT PROCESS

    Receiving a complaint from a customer Issuing a fix for the problem

    3.10 Systems

    3.10.1. USER-DATA PROCESSING SYSTEM (DSS) A user-data processing system is required to

    process data about the user to the database and to ensure its authenticity. The user-data

    would need to be collected and checked against the database to ensure the user is

    accurately identified which is inline with the vision of our company. This would be classified

    as a decision support system because it determines if the user data matches the entered

    data on the device.

    3.10.2. INFORMATION SENDING SYSTEM (TPS) information sending systems can be used to

    send and receive information from the servers to our device when a persons identity needs

    to be verified. It collects the data and sends it when requests are sent to the system. This is

    necessary because we rely on a lot of user being transmitted to and from the device.

    3.10.3. COMPLAINT LOGGING SYSTEM (CRM) Our system needs a system to log customer

    complaints and make sure they are handled in a timely and efficient manner. This is an

    important component in our business because our goal is to provide an excellent product

    and support after the sale is crucial. This is a system where the customers interact with and

    can be classified as a CRM system.

  • 5/25/2018 infosys d2 6694955

    10/12

    10

    10

    3.11. Summary Table: Value Chain to Systems

    Value Chain

    Activity

    Processes Functionalities Specific Information

    System(s)

    Broad Information

    System(s)

    Technology

    Development

    (and R&D)

    1. Userinformation

    verification

    process

    1. Validating user information.2. Sending information to database servers.

    User-data processing system

    Information sending system

    Decision support system

    Transaction processing

    system2. Customer

    support

    process

    1. Receiving complaints from the customer.2. Issuing a fix for a problem.

    Complaint logging system

    Solution processing system

    Customer relationship

    management system

    Customer relationship

    management system

  • 5/25/2018 infosys d2 6694955

    11/12

    11

    11

    CONCLUSION

    I believe that our product can be utilised to improve the world and reduce the problems

    with accurately identifying people around the world. The current system with physical ID

    media can be made more secure with the addition of fingerprint and eye scans. The new

    data being added to the system will improve the safety of the world and make the lives of

    people more convenient.

    REFERENCES

    1. Kelly S.M. UAE drones deliveries. (11 Feb 2014) Retrieved from :http://mashable.com/2014/02/10/uae-drones-deliveries/

    2. FBI (September 2011) License Plate Reader Technology Enhances the Identification,Recovery of Stolen Vehicles. Retrieved from :http://www.fbi.gov/about-us/cjis/cjis-

    link/september-2011/license-plate-reader-technology-enhances-the-identification-

    recovery-of-stolen-vehicles/

    3. Statistic brain (18 July 2013) identity theft fraud statistics. Retrieved from :http://www.statisticbrain.com/identity-theft-fraud-statistics/

    4. NYU school of Law (November 2006) identity fraud statistics [electronic resource]theft fraud fpr.Retrieved from :

    http://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.p

    df

    5. Eisenberg A. ( 28 December 2013) reading your palm for securitys sake. Retrievedfrom :http://www.nytimes.com/2013/12/29/business/reading-your-palm-for-

    securitys-sake.html?_r=0

    6. Gulick G. (2009) Mobile fingerprint ID. Retrieved from :http://www.evidencemagazine.com/index.php?option=com_content&task=view&id

    =132

    7. Beckford, N. (2014, March 28). What happens to lost and stolen passports? BBCNews. Retrieved fromhttp://www.bbc.com/news/magazine-26783486

    http://mashable.com/2014/02/10/uae-drones-deliveries/http://mashable.com/2014/02/10/uae-drones-deliveries/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://www.statisticbrain.com/identity-theft-fraud-statistics/http://www.statisticbrain.com/identity-theft-fraud-statistics/http://www.statisticbrain.com/identity-theft-fraud-statistics/http://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.pdfhttp://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.pdfhttp://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.pdfhttp://www.nytimes.com/2013/12/29/business/reading-your-palm-for-securitys-sake.html?_r=0http://www.nytimes.com/2013/12/29/business/reading-your-palm-for-securitys-sake.html?_r=0http://www.nytimes.com/2013/12/29/business/reading-your-palm-for-securitys-sake.html?_r=0http://www.nytimes.com/2013/12/29/business/reading-your-palm-for-securitys-sake.html?_r=0http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=132http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=132http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=132http://www.bbc.com/news/magazine-26783486http://www.bbc.com/news/magazine-26783486http://www.bbc.com/news/magazine-26783486http://www.bbc.com/news/magazine-26783486http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=132http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=132http://www.nytimes.com/2013/12/29/business/reading-your-palm-for-securitys-sake.html?_r=0http://www.nytimes.com/2013/12/29/business/reading-your-palm-for-securitys-sake.html?_r=0http://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.pdfhttp://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.pdfhttp://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.pdfhttp://www.statisticbrain.com/identity-theft-fraud-statistics/http://www.statisticbrain.com/identity-theft-fraud-statistics/http://www.statisticbrain.com/identity-theft-fraud-statistics/http://www.statisticbrain.com/identity-theft-fraud-statistics/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://www.fbi.gov/about-us/cjis/cjis-link/september-2011/license-plate-reader-technology-enhances-the-identification-recovery-of-stolen-vehicles/http://mashable.com/2014/02/10/uae-drones-deliveries/
  • 5/25/2018 infosys d2 6694955

    12/12

    12

    12