Case Study Of Internet Of Things

Verified

Added on  2022/10/06

|14
|5545
|10
Assignment
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Example
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2
Document Page
Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
TITLE: DIFFERENCE BETWEEN SIMD AND MIMD
LINK: https://techdifferences.com/difference-between-simd-and-mimd.html
REFERENCES: Tech Differences. (2019). Difference between SIMD and MIMD (with
Comparison Chart) - Tech Differences. [online] Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html [Accessed 28
Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
The contrast between the SIMD and MIMD are depicted in the subsequent section:
1. Single Instruction multiple data streams or the SIMD is a category of parallel
architecture that is essentially a subset of the classification by the Flynn.
Multiple Instruction Multiple Data Stream or the MIMD incorporates the
computational systems equipped with multiple processing units (Tech
Differences 2019). Data streams and Instruction streams are also embedded
in their architecture.
2. In the event of SIMD architecture a single data is provided as the input
whereas multiple instructions are applied in the occasion of the MIMD
framework (Tech Differences 2019).
3. There is synchronization of the processing in the occasion of the SIMD
architecture. The execution of the processing operation is performed over a
single program. On the contrary, the asynchronous mechanism is deployed in
the event of MIMD framework (Tech Differences 2019).
4. The requirement for the memory allocation is higher in the event of MIMD
framework owing to the storage of the individual copy of the same. Whereas
there is the requirement for comparatively less memory allocation in the
occasion of the SIMD framework owing to the storage of single copy of the
documents and the programming prerequisites (Tech Differences 2019).
5. In terms of cost specifications, the SIMD architecture is of low budget when
indexed to the MIMD framework owing to the nominal and optimum demand
for the SIMD enabled devices like decoder (Tech Differences 2019). On the
other hand, the decoder requirement for the MIMD is only one which is
accountable for its comparatively higher cost.
6. In terms of proficiency and compatibility, MIMD is leading ahead of SIMD
architecture.
7. Complexities are encountered in terms of structural frameworks in MIMD.
However, SIMD has a comparatively simple architecture.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
3
Document Page
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Title: What is the difference between deadlock prevention and avoidance algorithms?
Link: https://www.ques10.com/p/3728/what-is-the-difference-between-deadlock-
preventi-1/
References: Ques10.com. (2019). What is the difference between deadlock
prevention and avoidance algorithms? . [online] Available at:
https://www.ques10.com/p/3728/what-is-the-difference-between-deadlock-preventi-1/
[Accessed 28 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
Deadlock avoidance:
1. This methodology performs a thorough check up of the state of the system to
assess the state of the system (Ques10.com 2019). The procurement of the
check u is performed on a pre-basis to ensure that whether the allocated
resource will be accountable for the generation of a condition that will
eventually facilitate the deadlock. In the event a deadlock is encountered, the
processor needs to wait.
2. The knowledge of all the future process facilitating requests of resource is a
contrasting aspect of the deadlock avoidance methodology (Ques10.com
2019).
3. The major advantage of the deadlock avoidance methodology is the dynamic
procurement of the methodology in due course of allocating the specific
resource to a process (Ques10.com 2019). No constraints are witnessed in
the resources or the processes. There is no associated underutilization or the
degradation of the system.
4. The major loophole of the methodology is the pre-requirement of the
resources for each process (Ques10.com 2019). The allocation of a fixed
number and quantity of resources is another drawback of this methodology.
There is no provision of detachment of the procedures in due course of
holding the resources.
5. This methodology prevents the potential attainment of the deadlock point by
permitting the four conditions to take place and adopt judicious decisions.
6. The algorithm deployed for this methodology is the bankers’ algorithm that
facilitates the graphical allocation of the resources (Ques10.com 2019).
7. There is no provision for the pre-emption.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
Title, Link and Reference:
Title: IoT in Agriculture: 5 Technology Use Cases for Smart Farming (and 4
Challenges to Consider)
Link: https://easternpeak.com/blog/iot-in-agriculture-5-technology-use-cases-for-
smart-farming-and-4-challenges-to-consider/
Reference: Aleksandrova, M. (2018). IoT in Agriculture: 5 Technology Use Cases for
Smart Farming (and 4 Challenges to Consider). [online] Eastern Peak. Available at:
https://easternpeak.com/blog/iot-in-agriculture-5-technology-use-cases-for-smart-
farming-and-4-challenges-to-consider/ [Accessed 28 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
IoT in smart farming:
1. The smart sensors deployed for the purpose of farming and agriculture are
capable of collecting the information in regards to the adverse weather
conditions, quality of the soil, progress of the growth of the crops, deployment
of the proper fertilizers based on the mineral deficit of the soil and finally the
health conditions of the cattle (Aleksandrova 2018). The information
gathered in due course of this methodology is deployed to keep a track and
record of the business indexed in terms of the attributes and the parameters
like proficiency of the equipment and the performance of the staff.
2. Implementation of the IoT in smart farming has successfully mitigated the
risks and has gained access over the in-house procedures (Aleksandrova
2018). This capability of anticipating the upcoming output of the production
facilitates the business owner to plan for the enhanced production.
3. IoT has facilitated the management of the cost incurred after the production
and the maintenance purpose. This in turn has eventually reduced the
generation of the waste owing to the enhanced access over the production.
The capability to foresee the upcoming growth of the crops will eventually
facilitate the mitigation of the risks (Aleksandrova 2018).
4. The procedure of automation has led to the augmentation and the
enhancement in the efficiency of the business. The deployment of the smart
devices has enabled the automation of the multiple procedures over the cycle
of production, the particular citations of which are fertilization of the soil,
rendering proper irrigation facilities and the control of the pest (Aleksandrova
2018).
5. IoT implementation in the smart farming has brought about enhancement in
the quality of the production (Aleksandrova 2018). This has elevated the
standards of the quality of the crops, implemented through the automation.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
5
Document Page
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
Title, Link and Reference:
Title: What is The Difference Between IPv6 and IPv4?
Link: https://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html
Reference: Webopedia.com. (2019). What is The Difference Between IPv6 and
IPv4? - Webopedia.com. [online] Available at:
https://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html
[Accessed 28 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
IPv4:
1. In regards to version, IPv4 is the fourth revised version of the Internet
protocol (IP). IPv4 is deployed to fetch the purpose of identification of the
devices connected over a network. The connection is facilitated by the
addressing system (Webopedia.com 2019).The design specifications of IP is
such that Internet protocol is perfectly designed to serve the interconnected
systems that are packet-switched to serve the purpose of communication of
the computational systems.
2. At contemporary times, the most commonly used Internet Protocol for the
purpose of connecting the devices to the connectivity of the internet is the
IPv4 (Webopedia.com 2019). The schema deployed by the IPv4 is a 32 bit
address permitting a spectrum of 232 addresses over the platform of
approximately 4 billion addresses.
3. With the wide spread expansion of the internet, it is estimated and anticipated
that the number of unused addresses of IPv4 will eventually wipe out the
game consoles, the computing systems and the smartphones
(Webopedia.com 2019). All these devices act as a connecting medium to
connect the address to the internet.
Ipv6:
1. IPv6 is the successor of the ancestor version Ipv4 of the internet protocol.
2. IPv6 is also coined the Internet Protocol next generation (IPng)
(Webopedia.com 2019).
3. IPv6 is totally free from the hassles of the Network Address Translation.
4. IPv6 is capable of configuring the system automatically that are connected to
the internet (Webopedia.com 2019).
5. There is no further collisions between the private addresses of the
interconnected systems and the consoles.
6. IPv6 facilitates the enhanced multicast routing.
7. There is the provision for the elementary level header format
(Webopedia.com 2019).
8. Routing has become proficient and compatible with the advent of the IPv6.
9. The services offered by the IPv6 are Quality of service also coined the flow
labelling.
10. IPv6 has in-built embedded privacy support and integrated authentication
systems.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
6
Document Page
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 5
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
Title: IDENTITY AUTOMATION
Link: https://www.identityautomation.com/iam-platform/rapididentityidentity-access-
management/multi-factor-authentication/fingerprint-biometrics/
Authentication: Identity Automation. (2019). Fingerprint Biometric Authentication
Systems | Identity Automation. [online] Available at:
https://www.identityautomation.com/iam-platform/rapididentityidentity-access-
management/multi-factor-authentication/fingerprint-biometrics/ [Accessed 28 Sep.
2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
Fingerprint Biometrics:
1. The biometric authentication facilitated by the fingerprint biometrics, executes
its operations through the comparison of the finger print of the user with the
stored finger print (Identity Automation 2019).The validation is done by the
indexing parameters where the authenticity is validated through a match of
100 percent similarity index only.
2. This mode of authentication is unique owing to the fact that the finger print
varies from the individual to individual (Identity Automation 2019). This cannot
be easily replicated and hence the authenticity of this biometric procedure lies
in its uniqueness.
3. RapidIdentity MFA is directly responsible for the lifecycle of the finger print.
The operating mechanism is to capture the 3 or more fingerprints of the user
and generates the templates. Next step is the encryption of the fingerprint of
the user followed by the storage of the same in the MFA server and the
console (Identity Automation 2019). For ensuring the 100 percent privacy,
there is no provision for the storing of the image of the fingerprint. There is
only the creation of the template.
4. For the authentication purpose, the enrolled user is required to swipe the
registered finger over the sensor. The sensor will then compare the swiped
finger print with the registered template. Once, 100 percent similarity index is
validated, the sensor grants the access to the user to successfully operate
the system (Identity Automation 2019).
5. Fingerprint biometrics authentication is considered to be among the popular
authentication methodologies.
6. This mode of identification is difficult to get decrypted and hence security is
rendered in this methodology.
7. This mode of authentication is user friendly.
8. This authentication system is free from the hassles of being forgotten.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
8
Document Page
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Title: The 18 biggest data breaches of the 21st century
Link: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-
21st-century.html
Reference: Armerding, T. (2019). The 18 biggest data breaches of the 21st century.
[online] CSO Online. Available at: https://www.csoonline.com/article/2130877/the-
biggest-data-breaches-of-the-21st-century.html [Accessed 28 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
Data Breach that took place in Yahoo:
Date of commencement: The security breach took place in the year of 2013-2014.
Impacted user profiles: The impacted users were approximately 3 billion user
accounts.
Overview of the data breach: On September 2016, the pioneer in the domain of
internet i.e. Yahoo had declared to undergo negotiations with the Verizon owing to
the fact that the organization was being compromised in the year of 2014 (Armerding
2019). The outcome of the data breach revealed the confidential information of the
registered users like the email ids, the real nomenclatures, cell phone numbers and
the date of birth of more than 500 million registered users. The passwords were
compromised, which was a major vulnerability of the framework of the Yahoo thereby
imposing risks and threats over its infrastructure (Armerding 2019). The hacking
became feasible since the encrypting algorithms deployed for the purpose of
ensuring safety of the organization, were decrypted through phishing activities. Even
the security answers were also replicated by the cyber predators. The impact was
devastating, adversely affecting the email accounts of more than 3 billion registered
users of the Yahoo (Armerding 2019). The direct impact of the breach was loss in the
revenue of the organization by approximately 350 million us dollars. The organization
was acquired by the Verizon at an optimum cost price of 4.48 billion us dollars, which
was way less than the core business valuation of the Yahoo. The business in the
domain of rendering world-wide internet services by the Yahoo was initiated in the
year of 1994 with an incurred cost of approximately 100 billion us dollars. After the
legal transfer of the internet business, the brand new nomenclature that was adopted
by the organization was Altaba, Inc.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
9
Document Page
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-
business. The resource, and your summary, should describe similarities and
difference between e-commerce and e-business.
Title, Link and Reference:
Title: Difference Between e-commerce and e-business
Link: https://keydifferences.com/difference-between-e-commerce-and-e-
business.html#targetText=Buying%20and%20Selling%20of%20goods,major
%20component%20of%20e%2Dbusiness.
Reference: S, S. (2015). Difference Between e-commerce and e-business (with
Example and Comparison Chart) - Key Differences. [online] Key Differences.
Available at: https://keydifferences.com/difference-between-e-commerce-and-e-
business.html#targetText=Buying%20and%20Selling%20of%20goods,major
%20component%20of%20e%2Dbusiness. [Accessed 29 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
Dissimilarities between e-commerce and e-business:
1. E-commerce refers to the trading of merchandise over the platform of the
internet. On the contrary, execution of the operations of the business over
the platform of internet is coined e-business (S 2015).
2. In terms of set theory, e-business is the superset and e-commerce is the
subset (S 2015).
3. In regards to the limitations encountered in due course of transaction of
capitals, e-commerce is a significant nomenclature (S 2015).
4. The promotional activities of the e-business takes place through the CRM,
websites and the ERP. However, the business operations of the e-
commerce is executed through the website (S 2015).
5. E-commerce incorporates the monetary transactions whereas on the other
hand, e-business is concerned with the allied activities as well.
<Provide a summary of around 200-300 words discussing what the resource is
about and why it is relevant to the task here>
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
Title, Link and Reference:
Title: ABAP custom code adaptation for SAP HANA – The efficient way
Link: https://blogs.sap.com/2016/04/22/abap-custom-code-adaption-for-sap-hana-
the-efficient-way/
References: Blogs.sap.com. (2016). ABAP custom code adaptation for SAP HANA –
The efficient way | SAP Blogs. [online] Available at:
https://blogs.sap.com/2016/04/22/abap-custom-code-adaption-for-sap-hana-the-
10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
efficient-way/ [Accessed 29 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
ABAP custom code adaption for SAP HANA:
1. ABAP code is capable of being executed in the platform of SAP HANA
(Blogs.sap.com 2016).
2. Mandatory amendments are required to be implemented in the code to get rid
of regression (Blogs.sap.com 2016).
3. Exploitation of the SAP HANA code is implemented through the utilization of
the procedures of the SQL script and the usage of the services of the core
data. All these account for the speeding up of the processes of the custom
code (Blogs.sap.com 2016).
4. Static code checking tools are deployed by the platform of ABAP that
essentially incorporate the test cockpit and the code inspector
(Blogs.sap.com 2016).
5. For the purpose of the migration of the SAP HANA, innovative and brand new
static checking are deployed. These checking tools are embedded inside the
code inspector (Blogs.sap.com 2016).
6. For the purpose of the monitoring of the business performance of the ABAP,
the runtime tools are provided by the ABAP platform.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
11
Document Page
Week 9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference:
Title: How to Boost App Development With RAD Framework
Link: https://kissflow.com/rad/rapid-application-development-framework-to-boost-
app-development/
Reference: Kissflow. (2018). Rapid Application Development Framework: Stop Slow
Development. [online] Available at: https://kissflow.com/rad/rapid-application-
development-framework-to-boost-app-development/ [Accessed 28 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
RAD infrastructure is an array of functions, libraries, reusable objects and classes, on
the basis of the methodology deployed for the purpose of development of the rapid
application. The methodology deployed by the RAD infrastructure is time saving. The
methodology is also organized and the development is implemented in the line of
streamline. Kissflow makes the utilization of the RAD methods to accelerate the
application development process.
1. Kissflow enables the execution of the complex codes in optimum time span.
The prerequisite is the creation of an application and then allocating the
required elements to the application (Kissflow 2018).
2. In the event the user is deploying multiple applications in the workplace, the
Kissflow will proactively participate in the integration of the concerned
applications. This reduces the hassles of data transfer. No constraints are
witnessed in the event of compatibility (Kissflow 2018).
3. Visual modelling is a contrasting aspect of the Kissflow methodology owing
to the fact that the application is designed by the user. This helps in the
anticipation of the upcoming roles and the logic, prior to the creation of the
application (Kissflow 2018). This eventually helps in the assessment of the
loopholes and demerits embedded within the framework of the RAD
infrastructure.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
Title: 10 Reasons why your IT system implementation failed
Link: https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-
failed/
Reference: Kurleto, M. (2015). 10 Reasons why your new IT system implementation
failed – Software House That Helps You Innovate - Neoteric. [online] Software House
That Helps You Innovate - Neoteric. Available at: https://neoteric.eu/blog/10-reasons-
12
Document Page
why-your-new-it-system-implementation-failed/ [Accessed 28 Sep. 2019].
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary:
The reasons behind the failure of the implementation of the Information
Systems in an organization:
1. Lack of establishment of the measurable targets is responsible for the failure
of the implementation of the IS in an organization. The goals that are required
to be accomplished in due course of the procurement of the business of an
organization are:
To diminish the costs incurred after the customer support by a
percentage of 5 percent. This can be harnessed through the
implementation of the brand new support channels. This can also be
witnessed through the support rendered by the agents in regards to
customer information (Kurleto 2015).
To witness and encounter increment in the returning rate of the
customer and also experience revenue generated per customer. This
can be achieved through the lead generation based on the previous
history of sales (Kurleto 2015).
The cost incurred after the purchase needs to be diminished by 10
percent. This was made feasible through the facilitation of the
electronic auctions in case of significant orders (Kurleto 2015).
2. The employees should be granted with the rights that would eventually equip
them with the potentials to define their customised requirements in a clarified
manner (Kurleto 2015). The prerequisite for the successful progress of any
business is the feedback of the customers that eventually help the
organization to overcome their drawbacks and loopholes and set up their
objectives accordingly, aligned in the line of correspondence to the
customised requirements of the clients.
3. FIT ANALYSIS or GAP ANALYSIS is deployed to reveal the positive aspects
of a product. For the successful implementation of the GAP ANALYSIS
specifically designed to serve the sole purpose of generating feedback, the
underlying steps are taken:
Generation of high graded requirements that are in alignment to the
procedures of the business (Kurleto 2015).
Utter necessity for the preparation of the business related case
studies that in turn evaluates the procedure the requirements that are
specific to the domain (Kurleto 2015).
The vendors are required to be pleaded with the motivation to portray
the role of the product in the solving of the concerned business cases.
<Provide a summary of around 200-300 words discussing what the resource is about
and why it is relevant to the task here>
13

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]