You are on page 1of 13

1

INFOSYS.110 BUSINESS SYSTEMS:
DELIVERABLE 2: BUSINESS SECTION
2014

Name Mohd Zulfikar Mohd Alias
NetID moh257
Group Number: 308
Website Link: http://infosys1102014s1group308.blogspot.co.nz/p/d2moh257.html
Tutorial Details
Tutor: Day: Time:
Yvonne Hong Thursday 11am
Time Spent on
Assignment:
26 Hours Word Count: 1649

2


2
CYBERBULLYING IS INCREASING
INTRODUCTION
1 in 5 New Zealand high school student experience cyberbullying (Cyberbullying: advice …
n.d.) and only 1 in 10 will inform their parents (Cyber Bullying Statistics, n.d.). This makes
the children vulnerable to be cyberbullied and risk of developing personality disorder
(Morey, 1988) as 80% use cellphone regularly which is a medium for cyberbullying (11 Facts
…, n.d.). Cyberbullying can happen anytime and anywhere (Maldonado, 2014). Therefore,
app that could detect threat of cyberbullying likely to solve this problem.
3. BUSINESS SECTION
3.1 Vision
To be the company that provides protection to our children and safe environment while
growing up
3.2 Industry Analysis: Child Protection Application Industry
Industry: Child Protection Application Industry
Force: High/Low: Justification:
Buyer power: High There is only few organisation that are working
on this industry such as “child youth and family
organisation” but there is many mobile
application that exist to help child who is being
cyberbullied (Florsheim, 2014), therefore buyer
power is high because many choices to buy from
Supplier power: High There is many Software developer as there is
quite a lot of mobile application for cyberbullying,
one example is “Stop!t” application to counter

3


3
cyberbullying (The Movement – STOPit., 2014),
therefore supplier power is high because only
software developer are able to understand and
make a good application
Threat of new entrants: Low For this industry it is Low because it is not easy to
enter this industry, it require experts in the
subject (bullying) and required capital to build an
app. The subject might be less interesting thus
discouraging new entrants.
Threat of substitutes: Low The only alternatives is Counselling and Advise
given by Child Protection Organisations such as
“child youth and family organisation”, therefore
threat of substitute is low.
Rivalry among existing
competitors:
High Many mobile app in the market to monitor
children social activity (Florsheim, 2014) available
through the apps store such as “stop!t” or “Cyber
Bullying”, therefore rivalry among existing
competitors is considerably high
Overall attractiveness of the industry:
Child Protection Application Industry is a noble industry as it protect childrens from being
cyberbullied. Entrance into this industry would be competitive as there is many similar
application in the app store currently which buyer could choose from range of choices, yet it
is profitable if solution overcome the problem fully. Threat of new entrants into this industry
is considerably low as the subject require extensive knowledge about the problem by
developer. Substitute for this industry is only by child protection organisations which give

4


4
advise to the victims. Therefore entering this industry without further knowledge or good
solution is not a good idea as it is very competitive.

3.3 Customers and Thei r Needs
The customer would be parents with children to teenager, as nearly 43% of teen are being
cyberbullied (11 Facts …, n.d.). making it a serious problem which could lead into low self
esteem or suicide (McNamee, 2014). According to a study, 9 in 10 teen who have been
cyberbullied will not inform their parents or authority about their problem (Cyber Bullying
Statistics, n.d.), therefore this product satisfies parents need by sending alert which will
inform parents about what is happening in their child social life or even inform the authority
depending on the severity of what is happening. This would reduce the increasing number
of child being cyberbullied in the future. Thus parent needs are attended as they are inform
and understand what troubles their child.

3.4 The Product and Service
The product is a mobile application that is availabe from Apple App Store, it help parents to
identify if their child is being cyberbullied by forwarding possibly threat texts or images to
the parent from the child device, which is what other application out there lack of
(Florsheim, 2014). Message sent by the bullies will undergone a filtering process before
releasing it by scanning and recognizing each word and compare it to the word that is
embedded in the application, if the amount of possibly threat message is low than 25% the
message will be release to the receiver (child), 26% to 55% the message will still be release
but a copy will be send to the parent, and if more than 55% then the system will divert the
message to the parent or the authority depending on the severity of the content. It also has
the function to block the bullies, preventing further communication to bullies. Thus satisfies
customer (parent) needs as their child is protected from cyberbullying.


5


5
3.5 Suppliers and Partners
A potential suppliers for this application would be software developer such as “Supplier
Apps” as they develop the software and make sure it is compatible with the phone and easy
to understand. The second potential suppliers would be a child protection organisation such
as “child youth family organisation” which will provide guides on the appropriateness for
the children at certain age to view or receive as texts, they will also provides information on
types of threat and the different between a threat and a normal text to ensure less false
alarm, the organisation will be paid for their information. Third supplier which is vital for the
application to work is a Language expert such as Grammarian and Lexicographer, these
supplier will provide words, phrases, tone and style that is usually used as threat which will
be embedded into the system for the system to recognize.
A potential partner would be the “App Store” such as Apple App Store and Adroid App
Store as this is where it will be release for the customer to obtain it. Second potential
partner would be the Government particularly the school as this is where bullying start
whether it is physically or vitually, therefore partnering with school will educate the children
and discouraging cyberbullying as children are more aware of the consequences and will
alert teacher if they are being bullied, which will make parents confidence sending their
child to school.

3.6 Strategy: Focused Low Cost
This application is targeted to children and teen who have been cyberbullied and to parents
that is worried their child might be cyberbullied therefore it is targeted to narrow market as
the nature of its function does not serve everyone in the market. This application aim to
partner with school to protect children from being cyberbullied, therefore it must be
marketed at lower cost to attract parents interest and support.
The overall strategy is therefore Focused low cost


6


6
3.7 Value Chain Activity: Service after sales
The most important value chain activity for this business is Service after sales.
It is important that the customer needs is attended regularly, the information about the
customer is updated at regular basis in the database to ensure customer are always
protected from the bullies therefore the vision of the company is fulfil in this manner.
Another important part is to ensure the application did not crash, by hiring expert. The
business aim to continuously provide protection which is affordable, thus business strategy
is focused low cost.
















7


7
3.8 Business Processes
3.8.1. DATA WAREHOUSE PROCESS: Data from customer device is important as it contain
information about the child and information about the bullies action when he interract. This
information is use to set the appropriateness content receive by the child. These data need
to be sorted into correct categories for easy future reference. Therefore service after sale is
an important value chain activity and it also support the business vision as it will provide
protection againts the bully.



8


8
3.8.2. CUSTOMER FEEDBACK PROCESS: Customer feedback process is important as it inform
any problems that occur while using the application. This allows maintenance department
to identify and solve the problems therefore the application is able to serve the customer
needs fully. This will provide safe environment to the children which satisfies the business
vision.






9


9
3.9 Functionalities
3.9.1. DATA WAREHOUSE PROCESS
 Stores data receives from customer
 Revise and made changes to customer data
3.9.2. CUSTOMER FEEDBACK PROCESS
 To analyze customer feedback
 To combine customer information and their feedback

3.10 Systems

3.10. 1. DATA STORAGE SYSTEMS: This helps the process by analyzing the data receive from
the user phone and categories the data into appropriate group. The data received is stored
in the right group in the data storage department as future reference and back up file. Thus
user information is safe in the data storage and the company is able to protect the user at
all time which support the company’s vision.

3.10. 2. CUSTOMER FEEDBACK SYSTEMS: This helps the process by combining the data from
customer suggestion and their information from the data warehouse and analyze the data
before sending it to the maintenance department. It is important as it will help to
understand the customer needs better therefore improves the usability of the application.

3.10. 3. DATA UPDATE SYSTEMS: This system will update the customer information that is
stored in the data storage department which was analyze by customer feedback system, this
will create new option in the application based on customer needs, therefore the user is
always protected againt the cyberbully.


10


10
3.11. Summary Table: Value Chain to Systems

Value Chain
Activity
Processes Functionalities Specific Information
System(s)
Broad Information
System(s)

Service
after sales
1. Data warehouse
process

1. Stores data receives from customer

2. Revise and made changes to customer
data

Data storage system

Data Update System
Transaction processing
system
2. Customer
Feedback Process
1. To analyze customer feedback

2. To combine customer information and
their feedback
Customer feedback system Decision Support System

11

11
CONCLUSION
In conclusion, this mobile application would improves the children experience while growing
up, it will even prevent the development of personality disorder such as low self-esteem and
antisocial which has increased in the past few years (Morey, 1988). Technology continue to
improve our lifetyle (Luftman, 2004) for instance it has improves customer satisfaction by
able to monitor childrens communication such as this application. Therefore it would make
the world a better place to live again.

REFERENCES

References

1. 11 Facts About Cyber Bullying. (n.d.). Retrieved from Do something.org:
https://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying

2. Bailey, A. (2013, February 24). Cyber-bullying blamed for death. The New Zealand
Herald. Retrieved from
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10867322


3. Cyber Bullying Statistics. (n.d.). - Bullying Statistics. Retrieved from
http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html

4. Cyberbullying: advice for young people, parents and teacher. (n.d.). Retrieved from
NetSafe: http://www.netsafe.org.nz/cyberbullying-advice-for-young-people-parents-
and-teachers/

5. Dealing with Cyberbullying. (n.d.). Retrieved from Helpguide.org:
http://www.helpguide.org/mental/cyber-bullying.htm

6. Florsheim, L. (2014, February 5). Can This Smartphone App Stop Cyberbullying?. New
Republic. Retrieved May 20, 2014, from

12

12
http://www.newrepublic.com/article/116488/stopit-cyberbullying-smartphone-app-
faces-test-new-jersey-schools

7. Hinduja, S. & Patchin, J. W. (2010). Bullying, Cyberbullying, and Suicide. Archives of
Suicide Research, 14(3), 206-221. Retrieved from:
http://www.cyberbullying.us/cyberbullying_and_suicide_research_fact_sheet.pdf

8. Interactive. (2007). Teens and Cyberbullying. National Crime Prevention Council, 1.
Retrieved May 24, 2014, from
http://www.ncpc.org/resources/files/pdf/bullying/Teens%20and%20Cyberbullying%20R
esearch%20Study.pdf

9. Luftman, J. (2004). Key Issues for IT Executives. University of Minnesota, 4(2)(MIS
Quarterly Executives, 4(2)), 269-285. Retrieved May 29, 2013, from
http://www.qualified-audit-
partners.be/user_files/ITforBoards/GVIT_Stevens_Institute_of_Technology-
Luftman_Jerry_Key_Issues_for_IT_Executives_2004_2004.pdf

10. Maldonado, M. (2014). Suicidal Ideation & Cyberbullying. Psych Central. Retrieved on
May 25, 2014, from http://psychcentral.com/blog/archives/2014/03/22/suicidal-
ideation-cyberbullying/

11. McNamee, D. (2014, March 11). "Cyberbullying 'causes suicidal thoughts in kids more
than traditional bullying'." Medical News Today. Retrieved
from http://www.medicalnewstoday.com/articles/273788.

12. Morey, L. C. (1988). Personality disorders in DSM-III and DSM-III-R: Convergence,
coverage, and internal consistency.. The American Journal of Psychiatry, 145(5), 573-
577. Retrieved from: http://psycnet.apa.org/psycinfo/1988-26719-001

13. Research - Cyberbullying Research Center. (n.d.). Cyberbullying Research Center.
Retrieved May 23, 2014, from http://cyberbullying.us/research/

13

13

14. The Movement - STOPit. (2014). STOPit. Retrieved May 25, 2014, from
http://stopitcyberbully.com/the-movement/

15. What is cyberbullying. (n.d.). Retrieved from stopbullying.gov:
http://www.stopbullying.gov/cyberbullying/what-is-it/index.html

16. Why do people bully. (n.d.). Retrieved from Bullying Statistics:
http://www.bullyingstatistics.org/content/why-do-people-bully.html