1

INFOSYS.110 BUSINESS SYSTEMS:
DELIVERABLE 2: BUSINESS SECTION
2014

Name Leon Chan
NetID Lcha510
Group Number: 41
Website Link: http://infosys1102014fcgroup41.blogspot.co.nz/
Tutorial Details
Tutor: Day: Time:
Nicholl Costa Monday 2pm
Time Spent on
Assignment:
12hours Word Count: 1648

2


2
IDENTIFICATION DEVICES LTD.
INTRODUCTION
The problem of human identification is a growing problem in the world today. Stolen ID’s
can lead to serious crimes because of identity theft and increasing numbers of illegal
immigrants. ID’s can be easily stolen or copied, which is a major drawback of the ID systems
used today. A device where people are indexed through the use of fingerprint and eye scans
adding to a global network would allow us to accurately identify people around the world
and reduce identity theft and fraud.
3. BUSINESS SECTION
3.1 Vision
To create a network of secure, legitimate identities using advanced finger and eye scans to
correctly and accurately identify people from anywhere in the world.
3.2 Industry Analysis:
Industry: Software/electronics industry.
Force: High/Low: Justification:
Buyer power: High There is an increasing number of devices which
can provide both fingerpint and eye scanning
capabilities such as modern smartphones and
other electronics. The price of these electronics
are also dropping making it easier for consumers
to access these products. (Kelly S.M. 2014)
Supplier power: Low There are many firms which provide the
components for devices, as well as many firms to
provide the services such as internet access and

3


3
wireless connectivity solutions. (Gulick 2014)
Threat of new entrants: Low The startup costs are relatively high for
electronics and software firms because of the
time taken to develop software, as well as the
high costs to start up an electronics firms due to
the cost of the capital involved. (NYU school of
law 2006)
Threat of substitutes: Low There are not many options that can compete
with ID with the same convenience such as
fingerprint scans. There are few substitute
products, for example driver’s licences, and are
easily stolen and account for over 13000 missing
licences in the US alone. (FBI 2011)
Rivalry among existing
competitors:
Low There are not many companies which provide
devices or services which can provide
identification information. There would only be
relatively few alternatives such as passports and
licences which compete with out product.
(Beckford, 2014)
Overall attractiveness of the industry: This industry is not very attractive. There is high
buyer power, high levels of rivalry and high barriers to entry. This would not likely be
attractive for new firms due to fierce competition in the industry.
3.3 Customers and Thei r Needs
The target customers for our product would be governments around the world because the
governments would be the ones who are the ones paying for our product. The government
would need our device to be placed in centres where people go to renew their ID’s, so our

4


4
product can collect and store the information and provide an accurate method if identifying
people. They need a device which can accurately index both finger and eye prints
simultaneously whilst being portable and easy to use for the people being indexed. Recent
studies show that over 11 million people in the USA are victims of identity fraud annually.
These statistics show the need for a more accurate identification system witch greater
accuracy to reduce identify fraud from happening. (US Dept of Justice. NY times, 2013)

3.4 The Product and Service
The device we provide which is both portable and functional. It has a high resolution
fingerprint scanner, coupled with a high resolution eye-scanner. It would record the finger
and eye scan data and transmit it database which will reduce the likelihood of identity theft
by correctly linking a person with their finger and eye prints. This will reduce the reliance on
ID cards and passports which can be easily stolen. The device would simultaneously scan the
fingerprint and eye to ensure accuracy and reliability, ensuring greater legitimacy of a
person’s identity A mock-up is shown below.

3.5 Suppliers and Partners

5


5
Suppliers which can help us produce our product would include the companies which
produce hardware components to build our products such as Samsung. Samsung can
produce various parts such as screen panels as well as fingerprint sensors like those used in
the galaxy S5.
Software companies can also be suppliers because our device needs to run on an operating
system. A company such as Google could provide our device with the software to run, for
example a modified version on Android could be used.
Partners for our company would include the NZ Government because we are implementing
our device within Government organisations. There will be mutual benefit from this
partnership, with the government achieving increased productivity and our company having
a stable userbase.
Another partner would be a telecommunications company such as vodafone or telecom
because they would supply the network access our device would use to connect to the
internet. The company would help provide support for our product around the world.
3.6 Strategy: Narrow-market differentiation
Our device is only targeting a very small portion of the market. Its aim is only to reach the
government stalls where people get indexed and is not intended for the broader market.
Therefore, this product has a competitive scope for the narrow market.
Our device aims to differentiate from other devices by being innovative and new. There will
be a lot of innovation in our product which makes it high cost. This means our device is
targeting a differentiation strategy with a high cost.
The overall strategy is therefore Narrow-market differentiation strategy

3.7 Value Chain Activity: Technology Development (and R&D)
The most important value chain activity for this business is Technology development (R&D).

6


6
Our product relies on being new and innovative in the market. We would rely on technology
development to ensure our vision of being “advanced” is fulfilled. Technology development
would allow our product to differentiate itself in the market so our company can market
and sell it to our consumers as innovative. This adds value because the users of the service
will be more convenient, which makes identifying people more efficient.
3.8 Business Processes
3.8.1. USER I NFORMATI ON VERI FI CATI ON PROCESS – The user data would first be entered
into the device, which would then be searched against on a server. Once the user data has
been found, it would need to be confirmed to make sure the data requested is actually the
person in question. A decision would be made to check if the database matches the user. If
its consistent, the information about that user is sent to the device, or re-request the
information if it isn’t consistent.











7


7
Start
Enteruserdetails
Senddatsto
servers
Searchforuser
dataonserver
database
Doestheuserdata
matchentereduser
data?
No
Requestuserdata
again
Sendinformation
todevicetoverify
thepersons
identity
Yes
Department
System
Information
receivedbydevice
end


8


8

3.8.2. CUSTOMER SUPPORT PROCESS – We offer service after the sale. Customer support is
very important for any company and is a major part of our product because we support our
product as long as the customer pays for it. The process would be carried out in stages to
ensure the complaint is handed quickly and efficiently.
Start
Complaint
receivedfrom
customer
Sendproblemto
relevant
department
Searchfor
problemon
supportdatabase
Istherean
existing
solution?
Sendthesolution
tothecustomer
Yes
Debugprogram
andfindafixto
theproblem
No
Testthesolution
toensureitworks
End
Department
System



9


9
3.9 Functionalities
3.9.1. USER I NFORMATI ON VERI FI CATI ON PROCESS
 Validating user information
 Sending information to database servers
3.9.2. CUSTOMER SUPPORT PROCESS
 Receiving a complaint from a customer
 Issuing a fix for the problem
3.10 Systems

3.10. 1. USER-DATA PROCESSING SYSTEM (DSS) – A user-data processing system is required to
process data about the user to the database and to ensure its authenticity. The user-data
would need to be collected and checked against the database to ensure the user is
accurately identified which is inline with the vision of our company. This would be classified
as a decision support system because it determines if the user data matches the entered
data on the device.
3.10. 2. INFORMATION SENDING SYSTEM (TPS) – information sending systems can be used to
send and receive information from the servers to our device when a person’s identity needs
to be verified. It collects the data and sends it when requests are sent to the system. This is
necessary because we rely on a lot of user being transmitted to and from the device.
3.10. 3. COMPLAINT LOGGING SYSTEM (CRM) –Our system needs a system to log customer
complaints and make sure they are handled in a timely and efficient manner. This is an
important component in our business because our goal is to provide an excellent product
and support after the sale is crucial. This is a system where the customers interact with and
can be classified as a CRM system.

10


10
3.11. Summary Table: Value Chain to Systems

Value Chain
Activity
Processes Functionalities Specific Information
System(s)
Broad Information
System(s)

Technology
Development
(and R&D)
1. User
information
verification
process
1. Validating user information.

2. Sending information to database servers.
User-data processing system

Information sending system
Decision support system

Transaction processing
system
2. Customer
support
process
1. Receiving complaints from the customer.

2. Issuing a fix for a problem.
Complaint logging system


Solution processing system
Customer relationship
management system

Customer relationship
management system


11

11
CONCLUSION
I believe that our product can be utilised to improve the world and reduce the problems
with accurately identifying people around the world. The current system with physical ID
media can be made more secure with the addition of fingerprint and eye scans. The new
data being added to the system will improve the safety of the world and make the lives of
people more convenient.

REFERENCES



1. Kelly S.M. UAE drones deliveries. (11 Feb 2014) Retrieved from :
http://mashable.com/2014/02/10/uae-drones-deliveries/
2. FBI (September 2011) License Plate Reader Technology Enhances the Identification,
Recovery of Stolen Vehicles. Retrieved from : http://www.fbi.gov/about-us/cjis/cjis-
link/september-2011/license-plate-reader-technology-enhances-the-identification-
recovery-of-stolen-vehicles/

3. Statistic brain (18 July 2013) identity theft fraud statistics. Retrieved from :
http://www.statisticbrain.com/identity-theft-fraud-statistics/
4. NYU school of Law (November 2006) identity fraud statistics [electronic resource]
theft fraud fpr. Retrieved from :
http://www.brennancenter.org/sites/default/files/legacy/d/download_file_39242.p
df

5. Eisenberg A. ( 28 December 2013) reading your palm for security’s sake. Retrieved
from : http://www.nytimes.com/2013/12/29/business/reading-your-palm-for-
securitys-sake.html?_r=0

6. Gulick G. (2009) Mobile fingerprint ID. Retrieved from :
http://www.evidencemagazine.com/index.php?option=com_content&task=view&id
=132
7. Beckford, N. (2014, March 28). What happens to lost and stolen passports? BBC
News. Retrieved from http://www.bbc.com/news/magazine-26783486


12

12