Name Leon Chan NetID Lcha510 Group Number: 41 Website Link: http://infosys1102014fcgroup41.blogspot.co.nz/ Tutorial Details Tutor: Day: Time: Nicholl Costa Monday 2pm Time Spent on Assignment: 12hours Word Count: 1648
2
2 IDENTIFICATION DEVICES LTD. INTRODUCTION The problem of human identification is a growing problem in the world today. Stolen IDs can lead to serious crimes because of identity theft and increasing numbers of illegal immigrants. IDs can be easily stolen or copied, which is a major drawback of the ID systems used today. A device where people are indexed through the use of fingerprint and eye scans adding to a global network would allow us to accurately identify people around the world and reduce identity theft and fraud. 3. BUSINESS SECTION 3.1 Vision To create a network of secure, legitimate identities using advanced finger and eye scans to correctly and accurately identify people from anywhere in the world. 3.2 Industry Analysis: Industry: Software/electronics industry. Force: High/Low: Justification: Buyer power: High There is an increasing number of devices which can provide both fingerpint and eye scanning capabilities such as modern smartphones and other electronics. The price of these electronics are also dropping making it easier for consumers to access these products. (Kelly S.M. 2014) Supplier power: Low There are many firms which provide the components for devices, as well as many firms to provide the services such as internet access and
3
3 wireless connectivity solutions. (Gulick 2014) Threat of new entrants: Low The startup costs are relatively high for electronics and software firms because of the time taken to develop software, as well as the high costs to start up an electronics firms due to the cost of the capital involved. (NYU school of law 2006) Threat of substitutes: Low There are not many options that can compete with ID with the same convenience such as fingerprint scans. There are few substitute products, for example drivers licences, and are easily stolen and account for over 13000 missing licences in the US alone. (FBI 2011) Rivalry among existing competitors: Low There are not many companies which provide devices or services which can provide identification information. There would only be relatively few alternatives such as passports and licences which compete with out product. (Beckford, 2014) Overall attractiveness of the industry: This industry is not very attractive. There is high buyer power, high levels of rivalry and high barriers to entry. This would not likely be attractive for new firms due to fierce competition in the industry. 3.3 Customers and Thei r Needs The target customers for our product would be governments around the world because the governments would be the ones who are the ones paying for our product. The government would need our device to be placed in centres where people go to renew their IDs, so our
4
4 product can collect and store the information and provide an accurate method if identifying people. They need a device which can accurately index both finger and eye prints simultaneously whilst being portable and easy to use for the people being indexed. Recent studies show that over 11 million people in the USA are victims of identity fraud annually. These statistics show the need for a more accurate identification system witch greater accuracy to reduce identify fraud from happening. (US Dept of Justice. NY times, 2013)
3.4 The Product and Service The device we provide which is both portable and functional. It has a high resolution fingerprint scanner, coupled with a high resolution eye-scanner. It would record the finger and eye scan data and transmit it database which will reduce the likelihood of identity theft by correctly linking a person with their finger and eye prints. This will reduce the reliance on ID cards and passports which can be easily stolen. The device would simultaneously scan the fingerprint and eye to ensure accuracy and reliability, ensuring greater legitimacy of a persons identity A mock-up is shown below.
3.5 Suppliers and Partners
5
5 Suppliers which can help us produce our product would include the companies which produce hardware components to build our products such as Samsung. Samsung can produce various parts such as screen panels as well as fingerprint sensors like those used in the galaxy S5. Software companies can also be suppliers because our device needs to run on an operating system. A company such as Google could provide our device with the software to run, for example a modified version on Android could be used. Partners for our company would include the NZ Government because we are implementing our device within Government organisations. There will be mutual benefit from this partnership, with the government achieving increased productivity and our company having a stable userbase. Another partner would be a telecommunications company such as vodafone or telecom because they would supply the network access our device would use to connect to the internet. The company would help provide support for our product around the world. 3.6 Strategy: Narrow-market differentiation Our device is only targeting a very small portion of the market. Its aim is only to reach the government stalls where people get indexed and is not intended for the broader market. Therefore, this product has a competitive scope for the narrow market. Our device aims to differentiate from other devices by being innovative and new. There will be a lot of innovation in our product which makes it high cost. This means our device is targeting a differentiation strategy with a high cost. The overall strategy is therefore Narrow-market differentiation strategy
3.7 Value Chain Activity: Technology Development (and R&D) The most important value chain activity for this business is Technology development (R&D).
6
6 Our product relies on being new and innovative in the market. We would rely on technology development to ensure our vision of being advanced is fulfilled. Technology development would allow our product to differentiate itself in the market so our company can market and sell it to our consumers as innovative. This adds value because the users of the service will be more convenient, which makes identifying people more efficient. 3.8 Business Processes 3.8.1. USER I NFORMATI ON VERI FI CATI ON PROCESS The user data would first be entered into the device, which would then be searched against on a server. Once the user data has been found, it would need to be confirmed to make sure the data requested is actually the person in question. A decision would be made to check if the database matches the user. If its consistent, the information about that user is sent to the device, or re-request the information if it isnt consistent.
7
7 Start Enteruserdetails Senddatsto servers Searchforuser dataonserver database Doestheuserdata matchentereduser data? No Requestuserdata again Sendinformation todevicetoverify thepersons identity Yes Department System Information receivedbydevice end
8
8
3.8.2. CUSTOMER SUPPORT PROCESS We offer service after the sale. Customer support is very important for any company and is a major part of our product because we support our product as long as the customer pays for it. The process would be carried out in stages to ensure the complaint is handed quickly and efficiently. Start Complaint receivedfrom customer Sendproblemto relevant department Searchfor problemon supportdatabase Istherean existing solution? Sendthesolution tothecustomer Yes Debugprogram andfindafixto theproblem No Testthesolution toensureitworks End Department System
9
9 3.9 Functionalities 3.9.1. USER I NFORMATI ON VERI FI CATI ON PROCESS Validating user information Sending information to database servers 3.9.2. CUSTOMER SUPPORT PROCESS Receiving a complaint from a customer Issuing a fix for the problem 3.10 Systems
3.10. 1. USER-DATA PROCESSING SYSTEM (DSS) A user-data processing system is required to process data about the user to the database and to ensure its authenticity. The user-data would need to be collected and checked against the database to ensure the user is accurately identified which is inline with the vision of our company. This would be classified as a decision support system because it determines if the user data matches the entered data on the device. 3.10. 2. INFORMATION SENDING SYSTEM (TPS) information sending systems can be used to send and receive information from the servers to our device when a persons identity needs to be verified. It collects the data and sends it when requests are sent to the system. This is necessary because we rely on a lot of user being transmitted to and from the device. 3.10. 3. COMPLAINT LOGGING SYSTEM (CRM) Our system needs a system to log customer complaints and make sure they are handled in a timely and efficient manner. This is an important component in our business because our goal is to provide an excellent product and support after the sale is crucial. This is a system where the customers interact with and can be classified as a CRM system.
10
10 3.11. Summary Table: Value Chain to Systems
Value Chain Activity Processes Functionalities Specific Information System(s) Broad Information System(s)
Technology Development (and R&D) 1. User information verification process 1. Validating user information.
2. Sending information to database servers. User-data processing system
Information sending system Decision support system
Transaction processing system 2. Customer support process 1. Receiving complaints from the customer.
2. Issuing a fix for a problem. Complaint logging system
Solution processing system Customer relationship management system
Customer relationship management system
11
11 CONCLUSION I believe that our product can be utilised to improve the world and reduce the problems with accurately identifying people around the world. The current system with physical ID media can be made more secure with the addition of fingerprint and eye scans. The new data being added to the system will improve the safety of the world and make the lives of people more convenient.
REFERENCES
1. Kelly S.M. UAE drones deliveries. (11 Feb 2014) Retrieved from : http://mashable.com/2014/02/10/uae-drones-deliveries/ 2. FBI (September 2011) License Plate Reader Technology Enhances the Identification, Recovery of Stolen Vehicles. Retrieved from : http://www.fbi.gov/about-us/cjis/cjis- link/september-2011/license-plate-reader-technology-enhances-the-identification- recovery-of-stolen-vehicles/
3. Statistic brain (18 July 2013) identity theft fraud statistics. Retrieved from : http://www.statisticbrain.com/identity-theft-fraud-statistics/ 4. NYU school of Law (November 2006) identity fraud statistics [electronic resource] theft fraud fpr. Retrieved from : http://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.p df
5. Eisenberg A. ( 28 December 2013) reading your palm for securitys sake. Retrieved from : http://www.nytimes.com/2013/12/29/business/reading-your-palm-for- securitys-sake.html?_r=0
6. Gulick G. (2009) Mobile fingerprint ID. Retrieved from : http://www.evidencemagazine.com/index.php?option=com_content&task=view&id =132 7. Beckford, N. (2014, March 28). What happens to lost and stolen passports? BBC News. Retrieved from http://www.bbc.com/news/magazine-26783486