Professional Documents
Culture Documents
In Partial Fulfillment
Of the Course Requirement in
Information Management (MIS535M)
Submitted by:
Group 5
MANAMTAM, Cathleen Mae
OCAMPO, Teresa Paige
RELINGO, Julius Paulo
SOBERANO, Leira Angeli
TEJUCO, Angel
Submitted to:
Prof. Jeffrey Roxas
December 3, 2017
I. Background of the Company
In April 2008, AES seized the opportunity to enter the growing Philippine market
when it acquired a 600-megawatt thermal power plant in Zambales Province in Luzon. By
successfully rehabilitating the ten-year old Masinloc Power Plant, AES not only expanded its
footprint in Asia. It also demonstrated its deep local knowledge and distinctive operational
skills – honed from more than two decades of leadership in the global energy sector and
pioneering advances in many markets.
Upon AES takeover, the company implemented a holistic Rehabilitation Program at
the plant.
Mission
We are a global company with an empowered team. We safely and reliably provide
competitive energy to support socio-economic development in the Philippines
Values
AES people work round the clock each day to provide affordable and sustainable
power. The actions that we each take are guided by these core values:
a. Put safety first – We will always put safety first – for our people, contractors and
communities.
b. Act with integrity – We are honest, trustworthy and dependable. Integrity is at the
core of all we do – how we conduct ourselves and how we interact with one another and all
of our stakeholders.
c. Agility – We honor our commitments to our customers, teammates, communities,
owners, suppliers and partners, and we want our businesses, on the whole, to make a
positive contribution to society but at the same time we move quick to adopt the changing
environment and is a leader in growth.
d. Strive for excellence – We strive to be the best in all that we do and to perform at
world-class levels.
e. Have fun through work – We work because work can be fun, fulfilling and exciting.
We enjoy our work and appreciate the fun of being part of a team that is making a
difference. And when it stops being that way, we will change what or how we do things.
Plant Profile
Location: Masinloc, Zambales
Type of Plant: Coal-fired Power Plant
Type of Ownership: Independent Power Producer (IPP)
Installed Capacity (MW): 2
Unit 1 – 300 MW
Unit 2 – 300 MW
Company Profile
*CEO – Chief Executive Officer, COO – Chief Operating Officer, VP – Vice President, SVP – Senior Vice President, SBU –
Strategic Business Unit
III. Statement of the Problem
Existence of access controls are significant in an organization as it ensures security
and controls how users and systems communicate and interact with other systems and
resources. Access controls also allow organizations and businesses to restrict, monitor and
protect resource availability, integrity, and confidentiality. Traditionally, physical keys were
used by different businesses and organizations as a form of security system. However,
continuous influence and stronger presence of technology allowed for the introduction of
physical access cards.
The introduction of physical access cards or “proximity cards” or “proxy” cards,
known as smart cards, allowed employee access without the need to insert a tangible
material into a device reader. It is contactless which can be read by tapping on the
electronic reader. The card contains a microchip that contains the employee information.
The electronic device, once read by the system, logs the time in and time out activity of the
employee. One of identified advantages of deploying this type of security system is it allows
easier monitoring of employees’ whereabouts. In cases of emergencies and disasters, logs
can be automatically reviewed to determine who are missing and if there are employees still
trapped inside the facility.
However, there are also identified disadvantages in deploying physical access cards
in an organization. Continuous and long-term use of physical access cards will result to its
deterioration and can cause additional costs to the company. Another disadvantage of this
type of security system is it can be shared with or used by unauthorized individuals. The
company may face issues such as identify theft, loss, and collusion because of the tangible
and transferable device. The identified disadvantages pose a threat to businesses and
organizations which core operations are heavily reliant on or deals with confidential
information and sensitive data.
To address this problem, several organizations have transitioned into the biometric
technology. This technology records every individual’s unique and intrinsic traits and uses
this information for authentication. Biometric technology can recognize face, fingerprint,
signature, DNA or iris pattern which makes it more secured compared to physical access
cards. In this paper, the group aims to explore whether the above mentioned risks and
disadvantages can be eliminated and/or mitigated by the allowing AES to transition to
biometrics system. Apart from this, the group will also like to find out what are the other
advantages that a biometric system can offer to the business organization that we have
chosen.
V. Balanced Scorecard
There are different factors that affect the direction of AES. Such factors include:
1. Rise of distributed generation
2. Expansion of renewable energy
3. Energy-efficient technologies
4. Electric vehicles
5. Smart cities and smart homes
Huge electricity consumers including the construction companies, government
agencies, and other high megawatt consuming businesses are little by little switching
to renewable energy for sustainable growth.
Customers:
● Produce energy that benefits the customers
● Help customers reduce the environmental impact
● Help in uplifting the way of life of the customers the company serves
Business Processes:
● Improve operational efficiency and effectiveness
● Reducing environmental impact of the operations (gas emissions etc.)
● Research and development and advancement in technologies
VI. SWOT
In analyzing AES’ strengths and weaknesses, the group decided to look into it
through value chain analysis to have a better understanding of the firm’s internal activities.
On the other hand, we will be using the PESTEL framework to analyze and monitor the
macro-environmental factors which have an impact on the organization. The results of
which would be used to identify the threats and opportunities for AES.
Strengths Weaknesses
Opportunities Threats
Once an employee is hired, Human Resources Department (HR) will prepare the
details needed in order to create the ID and prepare the access card.
Currently, access cards are being ordered from the manufacturer. Once the access
cards are received by the IT department, they will program the access card to include the
details of the employee.
D. Request for Temporary ID/Access Card Process Flow (for IDs/Access cards
left at home)
For employees or company personnel who left their identification or access
cards at home, AES has implemented a policy wherein they need to sign a form
requesting for a temporary badge. This form is available at the company’s lobby area
and can be requested from the guard on duty. After the form has been completed,
the employee needs to submit it to the Administration Office to get a temporary
badge. At the end of the day, the employee needs to surrender the badge to guard
on duty.
Special Features: ● High speed and stability •Work codes are available to
● New generation fully allow users to input clocking
sealed, waterproof and reasons.
dustproof fingerprint • Short message display on
sensor screen to broadcast company
● User name display and information to users.
human voice prompt • Private short message
● Real Time data transfer and display intended for particular
● WEB online tracking users.
● Optional access controller • Local language greetings and
for separate type secure display available.
access control 6-digit work • TCP/IP, RS232 and RS485 to
code, 15 groups, 32 time connect to PC.
zones, 30 bell schedulers • USB port available to ease
and 50 short messages data transfer. • Multi-readers
managed by powerful TCMS
V2 software.
To fully implement the biometric system, the proposed layout plan below should be
followed by AES. We have indicated different types of layout plans depending on what will
work best for the organization.
Proposed Layout Plan
B. To-be Process Flows
As you can see above, the system architecture for the biometric system will consist
of a computer (server, client), a fingerprint reader, and a webcam device connected in the
network. The fingerprint reader would be installed in the client computer and used to
register and capture the fingerprint image of the employee. The database component is
situated at the server computer and used as the repository of data (login & logout,
fingerprint image) pertaining to the employees. The webcam device is used to capture an
image of the employee in the registration module, and to monitor the users in using the
fingerprint reader and the system.
When the employees place a finger on the fingerprint reader, the device captures
the fingerprint image and matches it sequentially on the different fingerprint images stored
in the database. Once a match is found, the searching and matching of images automatically
stops. Otherwise, a message prompted on screen informing that no match was found. In
recording the employee’s attendance, the system provides a security features when using
the fingerprint reader, a high resolution camera was attached to the client computer and
used to capture the images of the users.
Through the system, the employee can easily perform the recording of attendance
(arrival and departure) in the DTR required by the administrators every end of the month.
The daily attendance of the employee is recorded correctly by the system by pressing one
finger in the fingerprint reader. The payroll of the employees is provided or generated on
time by the company. The administrator can provide quality of service to the employees by
adopting biometric technology and payroll system in the company or institution. The system
generates the daily time record DTR which computes the tardy and under time of an
employee, automates income tax deduction, and manages refunds, allowances, and
deductions. Thus, the submission of the DTR of an employee and preparing of payroll makes
easy, fast, and, accurate.
In addition, implementation of the biometric system will eliminate problems related
to lost or stolen identification or access cards. It will also eliminate the process of requesting
for a temporary access card when the employee left it at home or somewhere else. Overall,
this system would help AES to save on costs associated with replacement of lost and stolen
cards and having extra temporary access cards for left access cards. It will also allow
company’s Human Resources individuals to focus other significant tasks which will help the
organization and employees to achieve personal and company’s overall goals.
C. Costing and Financials
The comparative analysis of the two products under consideration is as follows:
Risk management is a very important aspect of any project. Risks can never be
eliminated but it may be mitigated with proper planning, execution and monitoring. As
defined is the process of identifying, analyzing and then responding to any risks that arises
over the life cycle of a project to help the project remain on track and meet its goal.
A crucial part of the risk management is being aware of potential hazards.
Technology and systems implementations are full of risks. The types of system
implementation are end user involvement, requirements definition and project scope,
getting the business rules, process documentation and training materials, system interfaces
and integration, data conversion, user acceptance of change, benefits attainment and
process measurement.
Thus, these risks should be managed accordingly to ensure that success of the
system implementation.
To avoid risk there are several steps that must be undertaken, the model based risk
assessment methodology is a good framework that can be used in this proposal.
Risk Management process- it is important for the company to determine the risks
involved in the implementation of the project. In this part, several processes will be
determined such as steps on how data could be transmitted from the biometrics machine to
the main server. In this process also, it is determined here the possible threats upon
implementation, such delays on data transmission or problems when it comes to availability
of electricity.
System documentation and framework- one of the best ways to avoid risk is by
proper documentation, in this part, the team should ensure documentation from the start
of the process until the end. With this, if a problem occur in a specific part of the process,
the team could easily determine as to where in the process they should focus on. The
documentation could also be the way to check and enhance processes that need to be
improved.
Integrated Risk Management and Development Process- in this part, it is not the
concerned IT team or group that should take measure on the possible problems that this
project might encounter. It should be a responsibility of all the employees in the
organization. Risk management doesn’t rely only in the risk management people but also to
everyone.
Platform for tool inclusion based on data integration- whatever information and data
gathered from the several processes involved must be integrated to one report or one
system. With this, future problems that the proposed system might encounter could be
avoided. The tool can be used by the proponents to easily prevent system problems.