Name Netid Group Number: Website Link: Tutorial Details Time Spent On Assignment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

1

INFOSYS.110 BUSINESS SYSTEMS:


DELIVERABLE 2: BUSINESS SECTION
2014

Name Antony Denis Quirk
NetID AQUI712
Group Number: 331
Website Link: http://infosys110group331.blogspot.co.nz/
Tutorial Details
Tutor: Day: Time:
Friday 11am
Time Spent on
Assignment:
15 hours Word Count: 1545

2


2
J.A.V. CO.
INTRODUCTION
Our simple, yet effective solution of providing software to both smartphones and laptops
that disable the device, but yet still taking photos of any faces it picks up, will discrourage
and provides food for thought to potentiol and current thieves that technology will assist
law enforcement in the prevention and capture of thieves. Our product uses previous
technology of being able to remotely disable devices, but it goes one step further and takes
photos and uploads using wireless or 3/4G data and thats what makes this such an
innovative idea.
3. BUSINESS SECTION
3.1 Vision
To provide ergonomic and innovative security solutions to the technology industry to
discourage thievery and protect society.
3.2 Industry Analysis: Technology Security Industry
Industry: Technology security Industry.
Force: High/Low: Justification:
Buyer power: High If buyers want to have a secure and stress free
phone they have various other options to choose
from. Since our idea builds on other ideas such as
being able to GPS track your device, buyers can
choose from various apps such as; track my
iphone, GPS Tracking pro, Real time GPS Tracker
and wheres my droid (Victor H, 2012).

3


3
Supplier power: High Since software programmers are scarce, they are
expensive to hire and demand a high salary. Since
no one currently in our compnay knows how to
write software, SoftwareIndeed.com (2014)
suggests that the average software programmers
earns approximately USD$79,000 per year.
Therefore to have a fulltime software
programmer inhouse would be expensive
concluding that supplier power is high.
Threat of new entrants: High Any high tech company would easily be able to
develop software similar to ours in an instant.
Companies such as Google (Android) or Apple
would be able to do this, and incorporate it into
their software without users having to specifically
download a seperate app, they would include it in
an update of the operating system.
Threat of substitutes: High Currently there is security software on IOS
operating systems that enables users to GPS track
their device and lock the device (Apple, 2014)
Called Find My IPhone. This is not to dissimilar
to our idea. This app is easy to access and
download from the App store. There are also
many security apps on the Google play Store that
are easily downloadable. Therfore threats of
substitutes for our product is high.
Rivalry among existing
competitors:
High When I searched Phone tracking into the
Google play store there are multiple apps

4


4
available for download for Android users (Google,
2014). This shows the high number of alternatives
available as well as the competition for market
share of this type of application.
Overall attractiveness of the industry: Due to high buyer power and high threat of
substitutes the overall attractiveness of this industry is low. Due to the high number of
substitutes and large technology company having such large market share, ie Apple, Google
(Android), It would be extremely hard to challenge them technologically, especially with the
high level of technology that our security system requires.
3.3 Customers and Thei r Needs
John Heggestuen (2013), found that 1 in every 5 people in the world own a smartphone. So
that is approximately 1.5 billion people that own a smartphone. It would be fair to say that
the vast majority of these people have heard of an experience of a lost smartphone or
worse have personally lost their device. This shows the demand for a product like ours.
Consumers want an easy to use, accessable application that can track their device so they
can easily report it to the authorities. However tracking in itself, at times is not enough. If a
theft has occurred it would be unwise to confront the alleged thief.
3.4 The Product and Service
Our products allows users to GPS track, lock and disable their devices from a any device with
an internet connection. A login would be made by the consumer and they can connect their
different device to this account whether they are IPads, Iphones, Imacs, Androids or HTCs.
While the device is locked and disabled from the alleged thief it takes photos using facial
recognition software and uploads it to online servers where the consumer can access these
through their login.
The main difference between our idea and other GPS tracking software is that it takes
photos of any faces it detects. This solves the problem of confronting alleged thieves when

5


5
you have already GPS tracked your device. This makes the polices job easy in who to target,
and prosecution even easier.
3.5 Suppliers and Partners
Key partners for this to be a commercial success would be Apple and Android. If we could
partner with these operating systems there would be no need to design login systems for
the consumer because both The Apple App store and the Google Play store have logins. If
these partnerships were successful there would be no need for the software to be externally
downloadable. It could be already built in to the IOS and/or Android software. These
companies (Apple and Google) are partners because J.A.V. Co would be working with, rather
than for them.
Other suppliers would be the programmers that design and code the software, and the
inputs such as a lost smartphone.
3.6 Strategy: Cost Leadership
Since smartphones are so popular globally, the focus is industry wide. The recent popularity
with smartphones haslead to a massive increase in complimentary goods ranging from
smartphone cases to applications. Our idea is part of this complimentary smartphone
market. Our idea aims to be as low cost to the consumer as possible.
The overall strategy is therefore Cost Leadership.
3.7 Value Chain Activity: Delivery and success of photos taken
The most important value chain activity for this business is Delivery and success of photos
taken
This is what differentiates our product from other substitutes. The ease of use of the
software is important and the ease of photos automatically being uploaded to servers for
users to access.
3.8 Business Processes

6


6
3.8.1. DEVICE INFORMATI ON GATHERING PROCESS This process outlines the steps users
take using our software to recover information about both their device and the alleged
thief.

7


7
Device information gathering process

3.8.2. INFORMATION SENDING PROCESS This is where the information gathered is given to
the Police. Tips and hints would be given to the users while they are logged into their
account on how to do this and what to say to police when giving the information to them.
Information Sending Process


8


8
3.9 Functionalities
3.9.1. DEVICE INFORMATI ON GATHERING PROCESS
GPS tracking function
Remote device locking function
3.9.2. INFORMATI ON SENDING PROCESS
Information giving function

3.10 Systems

3.10. 1. GLOBAL POSI TIONING SYSTEM (GPS)- This system is how the devices is tracked and
located. It uses satellite navigation to locate and pinpoint positions of any device that has a
GPS navigation device in it. This will be used when a device has been stolen and the location
of the stolen device is given to users to hand to police to make recovery of devices faster
and easier.
3.10. 2. DEVI CE INFORMATI ON SYSTEM When a user logs onto their account when they have
lost or had their device stolen, they are given information about their device and options.
This information includes the GPS location and any photos it has taken. The options include
are whether the user wants to lock and/or disable the device so it cannot be used.
3.10. 3. TRANSACTION PROCESSING SYSTEM If the application is to be downloaded via the
Apple App store, or the Google Play store, There needs to be a Processing system for the
user to pay for the App. Both of these App stores have built in processing systems where
royalties are deposited straight into the neccesary bank accounts. But if a user wants to
download it from the JAV Co website there will neeed to be neccesary credit card payment
systems in place to make it easy for the customer.

9


9
3.11. Summary Table: Value Chain to Systems

Value Chain
Activity
Processes Functionalities Specific Information
System(s)
Broad Information
System(s)

User
execution
1. Device
information
Gathering
system
1. GPS Tracking function

2. Remote device locking function
Programming system Decision support sytem
2. Information
sending Process
1. Information Giving function Information System Executive information
system

10

10
CONCLUSION
In conclusion our application builds on existing technologies, but provides users with an
easy to use innovative security feature that will benefit society greatly. The knowledge and
understanding that devices are secure will definitely deter potentiol thieves and will reduce
the high number of devices being taken.

REFERENCES

1. Software Programmer Salary | Indeed.com, 2014, Retrieved from
http://www.indeed.com/salary/Software-Programmer.html
2. Victor H., 2012, Best free GPS tracking apps for Android, Retrieved from
http://www.phonearena.com/news/Best-free-GPS-tracking-apps-for-
Android_id31437#5-Wheres-My-Droid
3. Apple. (2014). Apple Icloud All your content on all your devices. Retrieved from
http://www.apple.com/nz/icloud/find-my-iphone.html?cid=wwa-nz-kwg-features-
com
4. Google. (2014) Phone Tracking Android Apps on Google Play. Retrieved from
https://play.google.com/store/search?q=phone%20tracking&c=apps
5. Heggestuen, J. (2013), One In Every 5 People In The World Own A Smartphone, One
In Every 17 Own A Tablet, http://www.businessinsider.com.au/smartphone-and-
tablet-penetration-2013-10
6. Vincent, J. (2014). First mandatory smartphone 'kill switch' law passed in the US.
TheIndependent, Retrieved from http://www.independent.co.uk/life-style/gadgets-
and-tech/first-mandatory-smartphone-kill-switch-law-passed-in-the-us-
9374753.html

You might also like