Infosys D2 Assignment Finished

12
INFOSYS.110 BUSINESS SYSTEMS: DELIVERABLE 2: BUSINESS SECTION 2014 Name Nicolas Arroyo NetID Narr462 Group Number: 41 Website Link: http:// infosys1102014fcgroup41.blogspot.co.nz/ Tutorial Details Tutor: Day: Time: Nicoll Oblitas- Costa Monday 2pm Time Spent on Assignment: 654 minutes Word Count: 1,650 Page 1

description

Infosys Assignment 2 (2014)

Transcript of Infosys D2 Assignment Finished

Page 1: Infosys D2 Assignment Finished

INFOSYS.110 BUSINESS SYSTEMS: DELIVERABLE 2: BUSINESS SECTION2014

Name Nicolas ArroyoNetID Narr462Group Number: 41Website Link: http://infosys1102014fcgroup41.blogspot.co.nz/

Tutorial DetailsTutor: Day: Time:Nicoll Oblitas-Costa Monday 2pm

Time Spent on Assignment:

654 minutes Word Count: 1,650

Page 1

Page 2: Infosys D2 Assignment Finished

IDENTITY THEFT INTRODUCTION

With well over 7 billions people in this world, and the only legal thing separating each

individual a piece of paper outlining details of your birth, or a passport that supposedly

contains personal information must be enough to frighten anyone. In this day & age, where

technology advancements are beyond our understanding and things that were once

considered impossible suddenly became the norm, is there any limit to what we may do

with this ability? As a result, these technological advancements and a lack of adaptation in

the individiual identification process, a global threat with well over 11,571,900 claims of

identity theft in a single year in the U.S alone has arisen. That is until our product arives,

with state of the art technology and the most advanced eye/fingerprint scanner in the

market, Identity theft is now a worry of the past.

3. BUSINESS SECTION

3.1 Vision

To provide a service of the highest possible quality that assures our users that by choosing

us, not only is their identity undisturbed and at peace from the rest of the world, but also

their mind.

3.2 Industry Analysis: Human Identification System

Industry: Individual Identification that is legally required for most daily activities in some

form. Goverments in most cases are the sole provider of this service/product.

Force: High/Low: Justification:

Buyer power: Low Due to the legality of the service and the strict requirement already established & set by the government, there are no close substitutes. Customers cannot look elsewhere & thefore have low buying power. (Citizens Advise Berou 2013)

Supplier power: High As there are no close substitutes to legal identification, providers (Gov) face no competition & have full control over business actions as it is a

Page 2

Page 3: Infosys D2 Assignment Finished

legal requirement for individuals in the “market” (Country) to own a form of identification.

Threat of new entrants: Low Due to the extremely high start up costs, time

taken to process vast numbers in terms of

population and individuals, apart from the

government, no business will be interested in such

a risk as there are low levels of return or profit

insentives in contrast to those costs involved.

(Citizens Advise Berou 2013)

Threat of substitutes: Low As a result of the low threat of new entrants and

the established processes set by ruling

Governments, there are no close substitutes to the

traditional passport and drivers licences. If other

modes of identification such as student I.D were to

be improved it could cause competition by other

providers. (Department of Justice, 2013)

Rivalry among existing

competitors:

Low differing departments that handle alternative

forms of identification are mainly branches of

governments, hey work towards the same goals

and have a similar purpose. (Department of

Justice, 2013)

Overall attractiveness of the industry: In an industry where there are few competitors and low threat of substitutes, there is no real incentive for private businesses to compete against an established system like a government, with relatively unlimited resources. Apart from that, the extensive reaserch & development costs associated with it are too risky for any private firm. There is a demand for a safer alternative from the traditional forms of identification which encompasses all factors and combines them to make it a afer & more convenient product for users, signaling that this is a potential industry to invest in.

3.3 Customers and Their Needs

In an ever-changing environment, where credit cards, electronic payments and other non face to face payments are on the rise (64.1 % of frauds reported in 2013 in US involved

Page 3

Page 4: Infosys D2 Assignment Finished

credit cards), distinguishing individuals is now essential. Identity fraud comes in many forms and electronically is just as costly as a physical theft. Customers should feel safe that not only their indentities but also their savings, reputation and overall safety is well looked after. Because everyone has a unique code embedded into their bodies i.e fingerprints & “eye-print” , the product we offer allows a much easier alternative where consumers are assured their identity is safe, as it becomes a part of them instead of a plastic/paper product that is easily lost, stolen or misplaced.

3.4 The Product and Service

The product is one of convenience and complete safety. Creating a product that people can understand and easily use, offering the fredom of travel, shoping and everyday use of identification literally in the fingertips of our customers. No longer will people have to worry about having to carry any physical form of identification such as passports and live with the fear of it being lost, stolen or simply outdated. Our products gives consumers a safer state of mine that their identty is safe and that it is with them 24/7, no matter where or what in the world they are doing.

3.5 Suppliers and Partners

Because our target market is so large and demands high amounts of time and resources, we must form a partnership with an established organisation. Therefor national governments would be ideal. They have relatively unlimitted access to resources and departments which will allow our business to infiltrate a countries population with more ease. Because governments are not profit driven, we will be assured of delivering a good of the highest quality, not silmply with the greater returns.

3.6 Strategy: Generic Strategies

Our generic strategy consists of Michael Porters Cost Leadership Method. Our product as stated in the vision is targeted at a very broad market. Our business could be considered a high cost due to the technology involved. This would require a higher expenditure on behalf of the service provider not the consumer therefore a cheaper alternative to the current Passports/Drivers Licenses. However our competitive advantage comes in various forms e.g. Reliability, safety, convenience and desire from consumers to use new/ innovative technology. Because of our large potential market and powerful partnership with governments, our ability to benefit from economies of scales allows us to offer our service at the lowest possible price. This falls under the generic strategy previously mentioned.

3.7 Value Chain Activity: Support & Primary

Our Business falls into two main aspects of Porters Value Chain Model. Our support system consists in our ability to continually upgrade, update and improve our Technology & research areas. Because

Page 4

Page 5: Infosys D2 Assignment Finished

we provide an electronic service, it is vital that developers guarantee everything is as updated as possible and prevent things like lack of data space or hackers from breaking our databases as we deal with very important/invaluable information. The supporting value system of after sales support will be key as numerous enquiries; complaints will arise from launching our product. By providing a helpful support department, we are able to increase consumer satisfaction adding value to our product.

3.8 Business Processes: Production Trial Process

This process consists of the ordering process right through to the testing and researching process. It analyses the various stages & Departments our product must go within the trial methods in order to offer a good of the highest quality.

3.8.2 Business Processes: Quality Assurance Process

This process highlights the effect our product has on customers. It follows the different aspects

Page 5

Page 6: Infosys D2 Assignment Finished

involved with production and the actual use of the good. One of the stages involves sending the product to a testing group where the accuracy, reliability and any improvements are discovered and passed on to developers before good is finalised.

3.9 Functionalities

3.9.1. Production & Trial Process:

Test production processes and gives an insight into future problems or altercations that may arise from the production of the good.

Page 6

Page 7: Infosys D2 Assignment Finished

Experiments carried out & investigation on accuracy of individual’s profiles and any problems that may arise regarding general use.

3.9.2. Quality Assurance Process:

Will highlight any problems, risks and setbacks with the use of the actual product for individual use.

This process will be used as proof of effectiveness and for future reference e.g. evidence of success/failure when entering new markets/countries.

3.10 Systems

3.10.1 Information Systems:Are combination of factors that work together to deliver value. Combining people, technology, procedures and Data through the use of information systems is a crucial part of our success. Because we are an electronic firm, our ability to transfer data & information throughout all departments (Collaboration Systems) are necessary to meet our vision of providing a safe and reliable alternative to human identification.

3.10.2 Customer Service:To provide an excellent customer service system, it will not only add value to our product but also allow a relatively seamless transition into a new era of personal identification, in which a great deal of support will be needed as technology movements usually take time to adapt and understand.

3.10.3 Marketing & Sales Systems:Our ability to effectively market our product will have a major impact on success. Because current identification has people accustomed to its use, regular marketing and propaganda will be required in order to inform people of changes & prepare them.

Page 7

Page 8: Infosys D2 Assignment Finished

3.11 Summary Table: Value Chain to Systems

Value Chain Activity

Processes Functionalities Specific Information System(s)

Broad Information System(s)

Technology

&

Research

Development

1. Trial Process

2. Test Product for future problems in production/Trial process

3. Investigation into profile security & accuracy

Inventory Management System

Purchasing/Ordering System

Decision Making System

Transaction Processing System

1. Quality

Assurance

Process

1. Identification of potential problems from individual use.

2. Reaserch & studies into product for future reference & examples.

Workflow Management Systems

Accounting Systems

Customer Relations Systems

Conclusion

Overall, our vision is simple. To provide a good that will protect an individual’s existence. One can be assured that there is only one of you in the world. Through the use of technology and information systems, the days of fake passports are over. Humanity is now moving towards a more technically advanced era and we are right in the heart of this historic movement.

Page 8

Page 9: Infosys D2 Assignment Finished

Reference List:

Current World Population Clock, Unknown author (Real Time), Retrieved from:http://www.worldometers.info/world-population

U.S. Department of Justice, Javelin Strategy & Research ( 6.18.2013) Retrieved from:

http://www.statisticbrain.com/identity-theft-fraud-statistics/

Identity Theft, Citizens Advice Bureau (04 April 2013) Rights of Individuals, Retrieved from:http://www.cab.org.nz/vat/gl/roi/Pages/Identitytheft.aspx

Infosys 110, Business Systems course book (2014) Page 1-150

Types of information Systems Manuel Ardales (2009), Retrieved From:http://www.slideshare.net/mannyardales/types-of-information-systems

Note (Without reference list, assignment comes to 1,650 words exactly)

Page 9