You are on page 1of 10

1

INFOSYS.110 BUSINESS SYSTEMS:


DELIVERABLE 2: BUSINESS SECTION
2014

Name Samuel Craig Jefferies
NetID sjef992
Group Number: 514
Website Link:
Tutorial Details
Tutor: Day: Time:
Khushbu Tutor Saturday 230 pm
Time Spent on
Assignment:
22 hours Word Count: 1640

2


2
INFORMATION SYSTEMS DELIVERABLE 2
INTRODUCTION: In deliverable 1 our company sought to solve the problem of road
accidents .Our solution was a service that l ogged vehicle speeds and labelled them
legal or illegal based off their val ue .The illegal speeds would then be sent to the
proper authority to be fined. The idea was our service would get dangerous drivers
off the road , decreasing road accidents.

3. BUSINESS SECTION
3.1 Vision: Our Company seeks to be the key provider of information that contributes
to making the roads a safer place.
3.2 Industry Analysis:
Industry-The Information industry as our company is collecting information, adding value
to this information and then selling this as a service.Industry includes all firms that deal
primarily in the selling of information .
Force: High/Low: Justification:
Buyer power: Low
The primary buyers of information are businesses.
Johnson states information is the primary component
needed to react to changes in consumer behaviour and
facilitate organisational change,two the a businesses most
important objectives . (Johnson JD ,1996).Therefore
information is a necessary catalyst to fufill basic business
functions .As all businesses need to react to meet these
objectives all businesses require the product of this
industry.This gives buyers low power.
Supplier power: low
The suppliers to the information industry are software and
hardware companies . There are over 200 suppliers in the
industry giving suppliers little negotiating power due to
the abundance of competition . (Compinfo.ws,2014)

3


3
Threat of new entrants: low
Industry is capital intensive requiring expensive
equipment to capture the information and add value to it.
For example google spent 3.4 billion on its x86
servers(Robert MCMillan ,2012).The high level of costs
involved make it difficult for firms to enter the industry
,giving a little threat of new entrants.
Threat of substitutes: low
Information forms the building block of all decisions
.There is no substitute for information .Some companies
do not use market information when they create their
products such as Apple .Apple senior vice president stated
doesnt use market studies ,ie information to create its
products (Apple Insider , 2012).Companies can act with an
absence of information but not with a substitute.
Rivalry among existing
competitors:
low
The information industry is broad with different firms
occupying different corners of the industry.For example
some firms produce and sell information , some process
information and some collect information
(wikipedia,2014).Thus whilst there is a large number of
firms they do not directly compete giving low rivalry .
Overall attractiveness of the industry: Industry is attractive based off the 5 forces analysis
3.3 CUSTOMERS AND THEIR NEEDS
Our main customer would be government agencies, primarily the police force .The main
function of the police are to act as the main traffic law enforcement service (ljubo Zajc,
1996) .However police lack the manpower to carry out this function effectively. Therefore
they need a system in place that can solve this manpower problem, by automating the
process. Another function of police is to raise revenue for the government through ticketing
.To optimise this revenue stream the police need a system that can identify all speeders
ensuring no speeders slip through the cracks of the current system and all value is captured.
3.4 THE PRODUCT AND SERVICE
Our service satisfies these needs as ticketing is done automatically. Vehicles with the logging
software will construct a range of the vehicle speeds and if this is outside the legal limit it

4


4
will be sent to the police for ticketing. This enhances the effectiveness of the police to act
as the "main traffic law enforcement service"( ljubo Zajc ,1996). With the software in place
speeders no longer need to be "caught" as their speeds are logged and processed. This
means the system cannot be avoided, leading to an increase in the ticketing revenue
stream,thereby meeting both the polices needs .
3.5 Suppliers and Partners
Partners-Are partnered with the police as it is the companys vision is to be the key
information provider contributing to making the roads a safer place .The police are the
government body involved in this function .Therefore giving them access to our service
fufills the companies vision . Would also partner with automobile companies such as
Holden ,Ford and Toyota so they implement the speed logging software .This would place
the software with the industry leaders . This may lead to other cars manufacturers
emulating this decision , placing the logging software in cars across the industry .
Suppliers-A supplier would be Pico Technology as they specialise in data logging products, a
product neccessary for our service to function (Pico Technology,2014).Would also require
servers to analyse the logged speeds. These are supplied by Qunata computer the same
hardware company that is used by Google .Google is a market leader in the information
industry and their partnership with Qunata shows the reliability and desirability of this
supplier.



3.6 STRATEGY:
The service we provide ,the logging and classifying of speeds, is only useful for a very
specific function ,catching speeders.Thus there is no broad demand for the service as the
primary customers of the industry , corporations serving the profit motive, would not utilise
it .We would therefore be selling the service to the small niche who could make use of it to

5


5
fufill our vision, "making the roads a safer place".Thus our competitive scope is the narrow
market.
The costing strategy would be high cost .Our system will add high value to the niche it is
aimed at justifying a high costing strategy.The servers also require large amounts of
software and hardware incurring a high capital cost .Thus high cost costing will be required
to recover the costs of setting up the software .
The Overall strategy is therefore FOCUSED HIGH COST
3.7 Value Chain Activity: Making the Service
The most important value chain activity for this business is the primary value chain activity
of making the service .The service we are providing is the ability to identify illegal speeds
from vehicles so they can be ticketed. The primary way our business adds value is therefore
the way in which we take the vehilce speeds from the logging software and process them
so this information can be gleaned .The making of the service is how our business fufills our
vision statement of "making the roads a safer place".Furthermore it links to our strategy of
focused high cost as making the service involves the expensive processes which require
high cost costing.

3.8 Business Processes
3.8.1.








6


6

SPEED CLASSI FI CATI ON PROCESS - The process of speeds being analysed and classed as "legal,
potentially illegal and illegal" based on their numerical value. Illegal speeds ,by this system are classed as
speeds that fall outside the range 20 -110 km.This system enables speeds that are potentially harmful to
society to be classified as "illegal" which will ultimately lead to the person being ticketed and demerited. This
supports the value chain activity of making the service because this process is taking the raw data(the
speeds) and adding value by classifying the speeds ,enabling illegal speeds to be identified.
START
Display numerical
value of speed
ranges
Between 20 and
110?
YES
NO
Tag as Potentially
illegal
Decontruct range to
show all individual
speeds
END
Information technology department
Information technology department
Speed Analysis
System
Speed identification
system
END Tag as Legal
Singular speeds
above 110 marked
illegal



7


7
3.8.2. SPEED AMALGAMATI ON PROCESS- The process of single speeds from a vehicle being
sent to a server and grouped with other speeds from the same vehicle.The grouped speeds
from the same vehicle are then turned into a range to be analysed by the speed
classification process.


START
Singular vehicle
speeds logged by
software
Singular speeds sent
to a server
Lowest speed and
highest speed
identified
Range constructed
Vehicle
identification
system
Speed
amalgamation
system
END
Information technology department
Information technology department
Information technology department
Information technology department

8


8
3.9 Functionalities
3.9.1. SPEED CLASSIFI CATION PROCESS
Term data "legal","potentially illegal"and "illegal"based off the speed value .
Analyse the ranges of speeds to find potentially illegal values.
3.9.2. SPEED AMALGAMATI ON PROCESS
Ensures only speeds from the same vehicle are grouped together in the
speeds range .
Amalgamate speeds from a vehicle into ranges for analysis.
3.10 Systems

3.10. 1 VEHICLE IDENTI FI CATION SYSTEM - Groups singular speeds from the same vehicle
together allowing a speed range to be constructed .It does this by identifying the vehicle
that was the source of the speeds eg by the license plate.This enables speeds from the same
vehicle to be amalgamated , ensuring vehicles are not fined for speeds they did not log.This
ensures that the information provided to make the roads a safer place is accurate,linking to
the vision.
3.10. 2. SPEED ANALYSI S SYSTEM- This system analyses the ranges of speeds allowing them to
be classed as either "Legal ", "potentially illegal " based off their numerical value. fufilling
this functionalisty .This helps to fufill the vision of the company as classing speeds is the first
step to further processes which allows vehicles with illegal speed ranges to be caught.This
will remove them from the road leaving the " roads and society a safer place ".
3.10. ILLEGAL SPEED IDENTI FI CATGION PROCESS-This is the process of deconstructing
speed ranges that have been classed "potentially illegal .This enables "illegal"
speed values to be found as single speeds can be identified.This links with the
vision as by identifyi ng speed values it enable action to be taken against those
identified e.g. by ticketing. Thus the company is making the road a safer place
providing an information service .


9


9
3.11. Summary Table: Value Chain to Systems

Value Chain
Activity
Processes Functionalities Specific Information
System(s)
Broad Information
System(s)
Making the
service
1. speed
classificati
on
process
2. Term data "legal","potentially illegal"and
"illegal"based off the speed .
3. find illegal values.
Speed Analysis system

speed identification system
Decision support system

Decision support system
4. Speed
amalgam
ation
process
5. Amalgamate speeds from a vehicle into
ranges for analysis.
6. Ensures only speeds from the same
vehicle are grouped together in the
speeds range .
Vehicle Identification System


speed range management
system
Collaboration system


Decision support system

10

10
CONCLUSION
Our Business seeks to make the roads a safer place by logging speeds and using this data to
identify vehicles on the road that are hitting illegal speeds . IT collects the data , sorts the
data and then passes on the illegal speeds to the concerned authority eg the police .
Without IT this business could not function.
REFERENCES

1. John Koetsier( october 28 ,2013) Apples 171billion :Amazing and amazingly
forgetablehttp://venturebeat.com/2013/10/28/apples-170-billion-2013-amazing-
and-amazingly-forgettable/
2. English Dictionary . (not given ). Information
industryhttp://www.collinsdictionary.com/dictionary/english/information-industry
3. Johnson JD(1996). Information Seeking Quorum Books
Connecticut, http://gunston.gmu.edu/healthscience/740/RoleOfInformationInOrga
nizations.asp?E=0
4. Wikipedia, the information industry
http://en.wikipedia.org/wiki/Information_industry
5. Apple insider july 31 2012 "Apple doesnt rely on market research"
http://appleinsider.com/articles/12/07/31/apple_doesnt_rely_on_market_research
_says_marketing_chief_phil_schiller
6. Compinfo.ws , lists firms that supple hardware and software http://www.compinfo-
center.com/cmanuf.htm over 300 listed.
7. Pico Technology "data Acquisition products " , http://www.picotech.com/data.html

You might also like