Sei sulla pagina 1di 11

1

INFOSYS.110 BUSINESS SYSTEMS:


DELIVERABLE 2: BUSINESS SECTION
2014

Name Sneha CA Saliya
NetID ssal727
Group Number: 235
Website Link: http://delivarable01.blogspot.co.nz/2014/04/loading.html
Tutorial Details
Tutor: Day: Time:
Johnnie Wednesdat 12pm
Time Spent on
Assignment:
23 hours Word Count: 1421

2


2
BIG PROBLEM OF IDENTITY THEFT
INTRODUCTION
A problem that the world is facing today which is big is that important and sensitive sites are
not being highly secured. This is a problem, as this mean more illegal access to information
is possible. This ultimately leads to misuse, destruction and manipulation of data. This will
affect the welfare of an individual or the security of a business. The solution we came up for
this problem is to build a highly technical software that enables users to give a very strong
identification set up before accessing personal information and making private transactions.
This will be done through a simple installation of a software; the user will then set up their
personal details, alongside this, a facial recognition and finger print system would be set up.
The process will only take place for allocated sites and transactions the user mentions
during installation. This software will ensure that users get the maximum security so their
information would not be misused
3. BUSINESS SECTION
3.1 Vision
Our organization would like to accomplish the long-term goal of making the world a better
place by reducing the big problem of stolen data and identities. This will be done through
systems that will be used innovatively in our software to produce a product that is reliable,
safe and easy to set up for the customers to use onsite that lowers the danger of data being
misused and identities being stolen. This will create and experience for consumers world-
wide to be comfortable with constructing important transactions online.
3.2 Industry Analysis: Queso Melted Cheese Industry
The industry for our product would be the security software industry.


3


3
Force: High/Low: Justification:
Buyer power: Low Buyer power is low when buyers do not have
many choices of whom to buy from. (Baltzan,
Lynch & Blakey, 2013) The buyer power for our
product would be low as it is the only product
that has been invented up to date that provides
such a high level of security. Due to this reason,
consumers would be satisfied with the reliability
of this particular software and so be attracted to
this product. In looking towards other sorts of
software, Norton and AVG are commonly used by
consumers worldwide to prevent hacking. But a
system like ours is the only product that exists
which helps protect sensitive information. Hence
why we think that buyers would be more
attracted to our product.
Supplier power: High Supplier power is high when buyers have few
choices of whom to buy from. As mentioned in
the previous section, our software is the only
product that provides high security therefore
supplier power would be high.
Threat of new entrants: High Threat of new entrants is high when it is easy for
new competitors to enter the market. (Baltzan,
Lynch & Blakey, 2013) Since our product is unique
and technology is advancing each day it may not
be long before another business creates another
software that provides the same service to the

4


4
consumer and maybe even more. Therefore it is
easier for new entrants to enter the market.
Threat of substitutes: Low Threat of substitute is low when there are few
alternatives for the consumers to choose from.
(Baltzan, Lynch & Blakey, 2013) An equivalent
substitute cannot be found for our software.
Hence why threat of substitute is low. However
there are products that offer solutions for the
same problem but without much complexity.
Rivalry among existing
competitors:
Low Rivalry among existing competitors is low when
competition is more complacent. (Baltzan, Lynch
& Blakey, 2013) As mentioned above there are
not many substitutes for our product so there is
not much competition. This means that there is
not much competition amongst rivalries as the
existing products are different, offering services
that is of a different form of what we are offering.
Overall attractiveness of the industry: From the information provided in the table above of
the Porters Five Forces Model, it can be evaluated that the overall attractiveness of this
industry is high.
3.3 Customers and Thei r Needs
The target group of customers for our product are individuals above the age of 18 and big
organizations. Individuals above the age of 18 have the needs of securing their personal
data and transactions, which can include of money transfers and exchanging information
online. (Orfano, 2010) Our business is also targeting big organizations that require in
protecting client base and highly confidential financial information such as banks. (Orfano,

5


5
2010) Both these target markets require the ability to highly secure information so others
without authority cannot access their information.
3.4 The Product and Service
It can be believed that our product meets the needs of individuals above the age of 18 and
big organizations, since our software allows the ability to customize the security. By only the
owner having the power to access this information with the systems of fingerprint and facial
recognition. Therefore our product clearly meets the requirements of the audience we are
targeting.
3.5 Suppliers and Partners
To construct our software, we will need suppliers that will be willing to supply good modern
devices to illustrate the product and applications and other software for building our
software. Modern devices will be needed to bring our software to a good quality and
present it well. Applications will be required as a base to help build the software. Potential
partners needed to create our product are a supplier of devices such as; Apple or Windows.
Having suppliers as a partner, we can work together to sell our product with the devices
sold. Coming together with these suppliers will also lift our business. Another partner
needed to create our software are organizations themselves. When organizations start
using our product, our company and those companies can work together to i deliver this
software throughout the public, working as a form of promotion.
3.6 Strategy: Differentiation
The generic strategy that will be used by our business is Differentiation. Our product is
reaching out to a large market segment. We are willing to deliver a faultless product to our
customers with high technology, which has a reliable system resulting in high costs.
Therefore Differentiation is counted as our strategy as it reflects the broad scope of our
market and the high cost of our system.


6


6
3.7 Value Chain Activity: Marketing and Selling
The most important Value Chain Activity that links to our business vision is Marketing and
Selling. This concentrates mostly on servicing selling our product to people to reduce threat
to hacking. So we have to focus on getting our product out with the public for this to
decrease. This is why we have to market our software well in order to grab the attention of
the customers in order to meet our vision.
3.8 Business Processes
3.8.1. PRODUCT ORDERING PROCESS - This is a significant process in the value chain as it is in
a stage where the business has to satisfy the customer expectations. This step focuses on
delivering the product to the customers without any faults. We need the product to be
delivered to the customer in a way where we wont be harmed.


7


7

















3.8.2. PRODUCT INSTALLATION PROCESS - This stage is an equally crucial process in the value
chain as it is in a stage where the process of using the software by the customer has to
protect the reputation of the company. This process focuses on the installation of the
software onto the device and problems encountered in this process.
Start
Order Generated by
Customer
Order Submitted
Order Received
Check is
Software is
available
Send invoice Yes
Order not available
No
End
Receive
Payment
Send Customer
Software
Yes
End
Ask customer to
check payment
No

8


8


Start
Receive Product
Inquire about the
product to
Company
No
Install product onto
Device
Yes
Enter Personal
Information
Set Password Set Fingerprint Scan
Set Facial
Recognition
Insert the
applications of
where the product
is used
Finish Installation of
Product
Check is Product
is Working
No
End
Yes

9


9
3.9 Functionalities
3.9.1. PRODUCT ORDERING PROCESS
Availability of software
Check for payment
3.9.2. PRODUCT INSTALLATION PROCESS
Receiving inquiries
Generate Fingerprint
3.10 Systems

3.10. 1. QUALI TY MANAGEMENT SYSTEM - This system ensures optimal execution within the
product order and installation process, in order to execute the functionality of many using
the product to reduce the threat of identity theft. Checking for the product to be sent best
condition as well the quality of payments and other transactions to be maintained. This will
aid meeting the vision of our business.
3.10. 2. PAYMENT PROCESS SYSTEM - The payment processing system allows the customer to
have a pleasant process of providing confidential information for the purchase. This process
has to be reliable and maintain the good health of the business.
3.10. 3. CUSTOMER MANAGEMENT SYSTEM - It is another crucial system for our business to
manage the customer base. This is due to he reason of our vision statement is based upon
our target market willing to purchase our product to reduce data manipulation. So in this
process a good experience throughout has to be given in order to win-over the market.

10


10
3.11. Summary Table: Value Chain to Systems

Value Chain
Activity
Processes Functionalities Specific Information
System(s)
Broad Information
System(s)

Marketing
and Selling
1. Product
Ordering
Process
1. Availability of Software

2. Check for Payment
Customer Management
System

Payment Processing System
Transaction processing
system

Transaction processing
system

2. Product
Installation
Process
1. Receiving Inquiries

2. Generate Fingerprints
Customer Management
System


Quality Management System
Transaction processing
system


Decision Support System

11

11
CONCLUSION
A big problem that the world is facing today is that important and sensitive sites are not
being highly secured. This problem leads to data destruction and manipulation, ultimately
resulting in identity theft. The solution we came up for this problem has a high tech system
which enables users to give a very strong identification set up before accessing important
information and transactions. Information Systems and Technology is equally very
important in the process of making our software a successful product. Since applications
and its systems are evaluated and used in creating and delivering this software.

REFERENCES

1. Baltzan, P., Lynch, K., & Blakey, P. (2011). Business Driven Information Systems. (2
nd

ed.). Australia.

2. Orfano,. F. (2010). Computer Hacking and its Affect on Individuals, Organizations,
and Society. Retrieved from: http://www.brighthub.com/computing/smb-
security/articles/63719.aspx

3. Gish,. W. (n.d.). The Effects of Computer Hacking on an Organization. Houston
Chronicle. Retrieved from: http://smallbusiness.chron.com/effects-computer-
hacking-organization-17975.html

Potrebbero piacerti anche