The information industry includes all firms that deal primarily in the selling of information. Suppliers to the industry are software and hardware companies giving suppliers little negotiating power due to the abundance of competition. Threat of new entrants: low information is capital intensive requiring expensive equipment to capture the information and add value to it.
The information industry includes all firms that deal primarily in the selling of information. Suppliers to the industry are software and hardware companies giving suppliers little negotiating power due to the abundance of competition. Threat of new entrants: low information is capital intensive requiring expensive equipment to capture the information and add value to it.
The information industry includes all firms that deal primarily in the selling of information. Suppliers to the industry are software and hardware companies giving suppliers little negotiating power due to the abundance of competition. Threat of new entrants: low information is capital intensive requiring expensive equipment to capture the information and add value to it.
Name Samuel Craig Jefferies NetID sjef992 Group Number: 514 Website Link: Tutorial Details Tutor: Day: Time: Khushbu Tutor Saturday 230 pm Time Spent on Assignment: 22 hours Word Count: 1640
2
2 INFORMATION SYSTEMS DELIVERABLE 2 INTRODUCTION: In deliverable 1 our company sought to solve the problem of road accidents .Our solution was a service that l ogged vehicle speeds and labelled them legal or illegal based off their val ue .The illegal speeds would then be sent to the proper authority to be fined. The idea was our service would get dangerous drivers off the road , decreasing road accidents.
3. BUSINESS SECTION 3.1 Vision: Our Company seeks to be the key provider of information that contributes to making the roads a safer place. 3.2 Industry Analysis: Industry-The Information industry as our company is collecting information, adding value to this information and then selling this as a service.Industry includes all firms that deal primarily in the selling of information . Force: High/Low: Justification: Buyer power: Low The primary buyers of information are businesses. Johnson states information is the primary component needed to react to changes in consumer behaviour and facilitate organisational change,two the a businesses most important objectives . (Johnson JD ,1996).Therefore information is a necessary catalyst to fufill basic business functions .As all businesses need to react to meet these objectives all businesses require the product of this industry.This gives buyers low power. Supplier power: low The suppliers to the information industry are software and hardware companies . There are over 200 suppliers in the industry giving suppliers little negotiating power due to the abundance of competition . (Compinfo.ws,2014)
3
3 Threat of new entrants: low Industry is capital intensive requiring expensive equipment to capture the information and add value to it. For example google spent 3.4 billion on its x86 servers(Robert MCMillan ,2012).The high level of costs involved make it difficult for firms to enter the industry ,giving a little threat of new entrants. Threat of substitutes: low Information forms the building block of all decisions .There is no substitute for information .Some companies do not use market information when they create their products such as Apple .Apple senior vice president stated doesnt use market studies ,ie information to create its products (Apple Insider , 2012).Companies can act with an absence of information but not with a substitute. Rivalry among existing competitors: low The information industry is broad with different firms occupying different corners of the industry.For example some firms produce and sell information , some process information and some collect information (wikipedia,2014).Thus whilst there is a large number of firms they do not directly compete giving low rivalry . Overall attractiveness of the industry: Industry is attractive based off the 5 forces analysis 3.3 CUSTOMERS AND THEIR NEEDS Our main customer would be government agencies, primarily the police force .The main function of the police are to act as the main traffic law enforcement service (ljubo Zajc, 1996) .However police lack the manpower to carry out this function effectively. Therefore they need a system in place that can solve this manpower problem, by automating the process. Another function of police is to raise revenue for the government through ticketing .To optimise this revenue stream the police need a system that can identify all speeders ensuring no speeders slip through the cracks of the current system and all value is captured. 3.4 THE PRODUCT AND SERVICE Our service satisfies these needs as ticketing is done automatically. Vehicles with the logging software will construct a range of the vehicle speeds and if this is outside the legal limit it
4
4 will be sent to the police for ticketing. This enhances the effectiveness of the police to act as the "main traffic law enforcement service"( ljubo Zajc ,1996). With the software in place speeders no longer need to be "caught" as their speeds are logged and processed. This means the system cannot be avoided, leading to an increase in the ticketing revenue stream,thereby meeting both the polices needs . 3.5 Suppliers and Partners Partners-Are partnered with the police as it is the companys vision is to be the key information provider contributing to making the roads a safer place .The police are the government body involved in this function .Therefore giving them access to our service fufills the companies vision . Would also partner with automobile companies such as Holden ,Ford and Toyota so they implement the speed logging software .This would place the software with the industry leaders . This may lead to other cars manufacturers emulating this decision , placing the logging software in cars across the industry . Suppliers-A supplier would be Pico Technology as they specialise in data logging products, a product neccessary for our service to function (Pico Technology,2014).Would also require servers to analyse the logged speeds. These are supplied by Qunata computer the same hardware company that is used by Google .Google is a market leader in the information industry and their partnership with Qunata shows the reliability and desirability of this supplier.
3.6 STRATEGY: The service we provide ,the logging and classifying of speeds, is only useful for a very specific function ,catching speeders.Thus there is no broad demand for the service as the primary customers of the industry , corporations serving the profit motive, would not utilise it .We would therefore be selling the service to the small niche who could make use of it to
5
5 fufill our vision, "making the roads a safer place".Thus our competitive scope is the narrow market. The costing strategy would be high cost .Our system will add high value to the niche it is aimed at justifying a high costing strategy.The servers also require large amounts of software and hardware incurring a high capital cost .Thus high cost costing will be required to recover the costs of setting up the software . The Overall strategy is therefore FOCUSED HIGH COST 3.7 Value Chain Activity: Making the Service The most important value chain activity for this business is the primary value chain activity of making the service .The service we are providing is the ability to identify illegal speeds from vehicles so they can be ticketed. The primary way our business adds value is therefore the way in which we take the vehilce speeds from the logging software and process them so this information can be gleaned .The making of the service is how our business fufills our vision statement of "making the roads a safer place".Furthermore it links to our strategy of focused high cost as making the service involves the expensive processes which require high cost costing.
3.8 Business Processes 3.8.1.
6
6
SPEED CLASSI FI CATI ON PROCESS - The process of speeds being analysed and classed as "legal, potentially illegal and illegal" based on their numerical value. Illegal speeds ,by this system are classed as speeds that fall outside the range 20 -110 km.This system enables speeds that are potentially harmful to society to be classified as "illegal" which will ultimately lead to the person being ticketed and demerited. This supports the value chain activity of making the service because this process is taking the raw data(the speeds) and adding value by classifying the speeds ,enabling illegal speeds to be identified. START Display numerical value of speed ranges Between 20 and 110? YES NO Tag as Potentially illegal Decontruct range to show all individual speeds END Information technology department Information technology department Speed Analysis System Speed identification system END Tag as Legal Singular speeds above 110 marked illegal
7
7 3.8.2. SPEED AMALGAMATI ON PROCESS- The process of single speeds from a vehicle being sent to a server and grouped with other speeds from the same vehicle.The grouped speeds from the same vehicle are then turned into a range to be analysed by the speed classification process.
START Singular vehicle speeds logged by software Singular speeds sent to a server Lowest speed and highest speed identified Range constructed Vehicle identification system Speed amalgamation system END Information technology department Information technology department Information technology department Information technology department
8
8 3.9 Functionalities 3.9.1. SPEED CLASSIFI CATION PROCESS Term data "legal","potentially illegal"and "illegal"based off the speed value . Analyse the ranges of speeds to find potentially illegal values. 3.9.2. SPEED AMALGAMATI ON PROCESS Ensures only speeds from the same vehicle are grouped together in the speeds range . Amalgamate speeds from a vehicle into ranges for analysis. 3.10 Systems
3.10. 1 VEHICLE IDENTI FI CATION SYSTEM - Groups singular speeds from the same vehicle together allowing a speed range to be constructed .It does this by identifying the vehicle that was the source of the speeds eg by the license plate.This enables speeds from the same vehicle to be amalgamated , ensuring vehicles are not fined for speeds they did not log.This ensures that the information provided to make the roads a safer place is accurate,linking to the vision. 3.10. 2. SPEED ANALYSI S SYSTEM- This system analyses the ranges of speeds allowing them to be classed as either "Legal ", "potentially illegal " based off their numerical value. fufilling this functionalisty .This helps to fufill the vision of the company as classing speeds is the first step to further processes which allows vehicles with illegal speed ranges to be caught.This will remove them from the road leaving the " roads and society a safer place ". 3.10. ILLEGAL SPEED IDENTI FI CATGION PROCESS-This is the process of deconstructing speed ranges that have been classed "potentially illegal .This enables "illegal" speed values to be found as single speeds can be identified.This links with the vision as by identifyi ng speed values it enable action to be taken against those identified e.g. by ticketing. Thus the company is making the road a safer place providing an information service .
9
9 3.11. Summary Table: Value Chain to Systems
Value Chain Activity Processes Functionalities Specific Information System(s) Broad Information System(s) Making the service 1. speed classificati on process 2. Term data "legal","potentially illegal"and "illegal"based off the speed . 3. find illegal values. Speed Analysis system
speed identification system Decision support system
Decision support system 4. Speed amalgam ation process 5. Amalgamate speeds from a vehicle into ranges for analysis. 6. Ensures only speeds from the same vehicle are grouped together in the speeds range . Vehicle Identification System
speed range management system Collaboration system
Decision support system
10
10 CONCLUSION Our Business seeks to make the roads a safer place by logging speeds and using this data to identify vehicles on the road that are hitting illegal speeds . IT collects the data , sorts the data and then passes on the illegal speeds to the concerned authority eg the police . Without IT this business could not function. REFERENCES
1. John Koetsier( october 28 ,2013) Apples 171billion :Amazing and amazingly forgetablehttp://venturebeat.com/2013/10/28/apples-170-billion-2013-amazing- and-amazingly-forgettable/ 2. English Dictionary . (not given ). Information industryhttp://www.collinsdictionary.com/dictionary/english/information-industry 3. Johnson JD(1996). Information Seeking Quorum Books Connecticut, http://gunston.gmu.edu/healthscience/740/RoleOfInformationInOrga nizations.asp?E=0 4. Wikipedia, the information industry http://en.wikipedia.org/wiki/Information_industry 5. Apple insider july 31 2012 "Apple doesnt rely on market research" http://appleinsider.com/articles/12/07/31/apple_doesnt_rely_on_market_research _says_marketing_chief_phil_schiller 6. Compinfo.ws , lists firms that supple hardware and software http://www.compinfo- center.com/cmanuf.htm over 300 listed. 7. Pico Technology "data Acquisition products " , http://www.picotech.com/data.html