0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
31 visualizzazioni11 pagine
A problem that the world is facing today is that important and sensitive sites are not being highly secured. The solution we came up for this problem is to build a highly technical software that enables users to give a very strong identification set up before accessing personal information and making private transactions. This will be done through a simple installation of a software; the user will then set up their personal details, alongside this, a facial recognition and finger print system would be set up.
A problem that the world is facing today is that important and sensitive sites are not being highly secured. The solution we came up for this problem is to build a highly technical software that enables users to give a very strong identification set up before accessing personal information and making private transactions. This will be done through a simple installation of a software; the user will then set up their personal details, alongside this, a facial recognition and finger print system would be set up.
A problem that the world is facing today is that important and sensitive sites are not being highly secured. The solution we came up for this problem is to build a highly technical software that enables users to give a very strong identification set up before accessing personal information and making private transactions. This will be done through a simple installation of a software; the user will then set up their personal details, alongside this, a facial recognition and finger print system would be set up.
Name Sneha CA Saliya NetID ssal727 Group Number: 235 Website Link: http://delivarable01.blogspot.co.nz/2014/04/loading.html Tutorial Details Tutor: Day: Time: Johnnie Wednesdat 12pm Time Spent on Assignment: 23 hours Word Count: 1421
2
2 BIG PROBLEM OF IDENTITY THEFT INTRODUCTION A problem that the world is facing today which is big is that important and sensitive sites are not being highly secured. This is a problem, as this mean more illegal access to information is possible. This ultimately leads to misuse, destruction and manipulation of data. This will affect the welfare of an individual or the security of a business. The solution we came up for this problem is to build a highly technical software that enables users to give a very strong identification set up before accessing personal information and making private transactions. This will be done through a simple installation of a software; the user will then set up their personal details, alongside this, a facial recognition and finger print system would be set up. The process will only take place for allocated sites and transactions the user mentions during installation. This software will ensure that users get the maximum security so their information would not be misused 3. BUSINESS SECTION 3.1 Vision Our organization would like to accomplish the long-term goal of making the world a better place by reducing the big problem of stolen data and identities. This will be done through systems that will be used innovatively in our software to produce a product that is reliable, safe and easy to set up for the customers to use onsite that lowers the danger of data being misused and identities being stolen. This will create and experience for consumers world- wide to be comfortable with constructing important transactions online. 3.2 Industry Analysis: Queso Melted Cheese Industry The industry for our product would be the security software industry.
3
3 Force: High/Low: Justification: Buyer power: Low Buyer power is low when buyers do not have many choices of whom to buy from. (Baltzan, Lynch & Blakey, 2013) The buyer power for our product would be low as it is the only product that has been invented up to date that provides such a high level of security. Due to this reason, consumers would be satisfied with the reliability of this particular software and so be attracted to this product. In looking towards other sorts of software, Norton and AVG are commonly used by consumers worldwide to prevent hacking. But a system like ours is the only product that exists which helps protect sensitive information. Hence why we think that buyers would be more attracted to our product. Supplier power: High Supplier power is high when buyers have few choices of whom to buy from. As mentioned in the previous section, our software is the only product that provides high security therefore supplier power would be high. Threat of new entrants: High Threat of new entrants is high when it is easy for new competitors to enter the market. (Baltzan, Lynch & Blakey, 2013) Since our product is unique and technology is advancing each day it may not be long before another business creates another software that provides the same service to the
4
4 consumer and maybe even more. Therefore it is easier for new entrants to enter the market. Threat of substitutes: Low Threat of substitute is low when there are few alternatives for the consumers to choose from. (Baltzan, Lynch & Blakey, 2013) An equivalent substitute cannot be found for our software. Hence why threat of substitute is low. However there are products that offer solutions for the same problem but without much complexity. Rivalry among existing competitors: Low Rivalry among existing competitors is low when competition is more complacent. (Baltzan, Lynch & Blakey, 2013) As mentioned above there are not many substitutes for our product so there is not much competition. This means that there is not much competition amongst rivalries as the existing products are different, offering services that is of a different form of what we are offering. Overall attractiveness of the industry: From the information provided in the table above of the Porters Five Forces Model, it can be evaluated that the overall attractiveness of this industry is high. 3.3 Customers and Thei r Needs The target group of customers for our product are individuals above the age of 18 and big organizations. Individuals above the age of 18 have the needs of securing their personal data and transactions, which can include of money transfers and exchanging information online. (Orfano, 2010) Our business is also targeting big organizations that require in protecting client base and highly confidential financial information such as banks. (Orfano,
5
5 2010) Both these target markets require the ability to highly secure information so others without authority cannot access their information. 3.4 The Product and Service It can be believed that our product meets the needs of individuals above the age of 18 and big organizations, since our software allows the ability to customize the security. By only the owner having the power to access this information with the systems of fingerprint and facial recognition. Therefore our product clearly meets the requirements of the audience we are targeting. 3.5 Suppliers and Partners To construct our software, we will need suppliers that will be willing to supply good modern devices to illustrate the product and applications and other software for building our software. Modern devices will be needed to bring our software to a good quality and present it well. Applications will be required as a base to help build the software. Potential partners needed to create our product are a supplier of devices such as; Apple or Windows. Having suppliers as a partner, we can work together to sell our product with the devices sold. Coming together with these suppliers will also lift our business. Another partner needed to create our software are organizations themselves. When organizations start using our product, our company and those companies can work together to i deliver this software throughout the public, working as a form of promotion. 3.6 Strategy: Differentiation The generic strategy that will be used by our business is Differentiation. Our product is reaching out to a large market segment. We are willing to deliver a faultless product to our customers with high technology, which has a reliable system resulting in high costs. Therefore Differentiation is counted as our strategy as it reflects the broad scope of our market and the high cost of our system.
6
6 3.7 Value Chain Activity: Marketing and Selling The most important Value Chain Activity that links to our business vision is Marketing and Selling. This concentrates mostly on servicing selling our product to people to reduce threat to hacking. So we have to focus on getting our product out with the public for this to decrease. This is why we have to market our software well in order to grab the attention of the customers in order to meet our vision. 3.8 Business Processes 3.8.1. PRODUCT ORDERING PROCESS - This is a significant process in the value chain as it is in a stage where the business has to satisfy the customer expectations. This step focuses on delivering the product to the customers without any faults. We need the product to be delivered to the customer in a way where we wont be harmed.
7
7
3.8.2. PRODUCT INSTALLATION PROCESS - This stage is an equally crucial process in the value chain as it is in a stage where the process of using the software by the customer has to protect the reputation of the company. This process focuses on the installation of the software onto the device and problems encountered in this process. Start Order Generated by Customer Order Submitted Order Received Check is Software is available Send invoice Yes Order not available No End Receive Payment Send Customer Software Yes End Ask customer to check payment No
8
8
Start Receive Product Inquire about the product to Company No Install product onto Device Yes Enter Personal Information Set Password Set Fingerprint Scan Set Facial Recognition Insert the applications of where the product is used Finish Installation of Product Check is Product is Working No End Yes
9
9 3.9 Functionalities 3.9.1. PRODUCT ORDERING PROCESS Availability of software Check for payment 3.9.2. PRODUCT INSTALLATION PROCESS Receiving inquiries Generate Fingerprint 3.10 Systems
3.10. 1. QUALI TY MANAGEMENT SYSTEM - This system ensures optimal execution within the product order and installation process, in order to execute the functionality of many using the product to reduce the threat of identity theft. Checking for the product to be sent best condition as well the quality of payments and other transactions to be maintained. This will aid meeting the vision of our business. 3.10. 2. PAYMENT PROCESS SYSTEM - The payment processing system allows the customer to have a pleasant process of providing confidential information for the purchase. This process has to be reliable and maintain the good health of the business. 3.10. 3. CUSTOMER MANAGEMENT SYSTEM - It is another crucial system for our business to manage the customer base. This is due to he reason of our vision statement is based upon our target market willing to purchase our product to reduce data manipulation. So in this process a good experience throughout has to be given in order to win-over the market.
10
10 3.11. Summary Table: Value Chain to Systems
Value Chain Activity Processes Functionalities Specific Information System(s) Broad Information System(s)
Marketing and Selling 1. Product Ordering Process 1. Availability of Software
2. Check for Payment Customer Management System
Payment Processing System Transaction processing system
Transaction processing system
2. Product Installation Process 1. Receiving Inquiries
2. Generate Fingerprints Customer Management System
Quality Management System Transaction processing system
Decision Support System
11
11 CONCLUSION A big problem that the world is facing today is that important and sensitive sites are not being highly secured. This problem leads to data destruction and manipulation, ultimately resulting in identity theft. The solution we came up for this problem has a high tech system which enables users to give a very strong identification set up before accessing important information and transactions. Information Systems and Technology is equally very important in the process of making our software a successful product. Since applications and its systems are evaluated and used in creating and delivering this software.
REFERENCES
1. Baltzan, P., Lynch, K., & Blakey, P. (2011). Business Driven Information Systems. (2 nd
ed.). Australia.
2. Orfano,. F. (2010). Computer Hacking and its Affect on Individuals, Organizations, and Society. Retrieved from: http://www.brighthub.com/computing/smb- security/articles/63719.aspx
3. Gish,. W. (n.d.). The Effects of Computer Hacking on an Organization. Houston Chronicle. Retrieved from: http://smallbusiness.chron.com/effects-computer- hacking-organization-17975.html
S.110 Business Systems: Deliverable 2: Business Section 2014 Name Marthalena Heather Netid Group Number: Website Link: Tutorial Details Tutor: Day: Time: Time Spent On Assignment: Word Count: 1641