1
INFOSYS.110 BUSINESS SYSTEMS: DELIVERABLE 2: BUSINESS SECTION2014
Name Liang LuNet IQ 6596626Group Number: 326Website Link: http://infosys110group326.blogspot.co.nz/
Tutorial DetailsTutor: Day: Time:Nicholl Friday 11am
Time Spent on Assignment: 27 hours Word Count: 1638
2
SOFTWARE THAT PEOPLE CAN EASILY MAKE A PAYMENT
INTRODUCTION
With a developing technology, People’s life is limited. We are going to make a product,
which is to simplify the process of a payment online. Customers only spend few seconds on
doing payment with our product, the key is by scanning your fingerprint, voice or retina. it is
called ‘FVR’ payment system.
3. BUSINESS SECTION
3.1 Vision
To provide each payment online with the most advanced technology.
3.2 Industry Analysis: The FVR software Industry
Industry: The FVR software Industry. It is a process that how porter’s five forces model
attract the industry which is about supply, competitor, substitutes customers and other
elements of the FVR software market.
Force: High/Low: Justification:
Buyer power: High There are some standards, for example, reliable, low-
commission and effective. These payment methods get
through receiving credit and debit payments. PayPal is
doing quite well in the market but there are still 5 or
more alternative software which are Google wallet,
Amazon payments, DWOLLA, square, and brain-tree.
there more than 6 online payment companies are there.
(Hannah Clare,2012)
Supplier power: HighTo depend on big IT suppliers company, In 2012,
suppliers who worked for software company has
made 8.3 billion dollars; the figure represents
7.1% increase over 2011 revenue. There are 20
2
3
companies were earning over 3.5 million dollars
as a supplier in 2012, obviously, it can be so many
options to choice a supplier. (Bob T,2013)
Threat of new entrants: low A lower barrier to entry, to compare with
medicine industry, they are different because it is
more difficult to make a new product so the
medicine industry is high barriers to entry. it says
“virtually no barriers to entry” but to ensure that
to create a software by yourselves. (Timothy B,
2011)
Threat of substitutes: Low Absolutely. People only have few choices when
they are doing a payment, individuals would pay
with credit card or debit card if they do not have
cash, nowadays, people can make a deal with
trade-in too.( Dan M, 2000)
Rivalry among existing
competitors:
HighStudy on their competition, some of dominant
companies like Microsoft offers a lower price to
existing competitors, a product compatibility and
quality effects customers choices of buying a
software in terms of lots of similar products.
(Chuan H, 2009)
Overall attractiveness of the industry: A number of customers and enormously potential
value in the market. As well, it is a low barrier to go into the market, that meaning is
creating an relevant software instead of high inventory. Moreover, categories of threat of
substitutes are lower because there is only few ways to pay for such as cash, credit card and
goods exchanged.
3.3 Customers and Their Needs
Based on the research, some people like housewife, they would like to buy online because
they are busy, and sometimes, they do not have enough time to go to supermarket in their 3
4
working time, so they want to save time by online shopping, In another way, some of the
business leaders or top managers are busier than others, as well; they love private service
with advanced technology.
3.4 The Product and Service
The advantages of our product is fast, simplify and effective, it is incredible, Assuming that a
lady is doing cook and say ‘pay for the dress’ and it is all done, how cool it is! Our product
provides online tool which is to identify each customer, in the meanwhile, we have support
service that do backup in case of the system is not working.
3.5 Suppliers and Partners
For instance, Norton, ORACLE and SAP. Notoriously, ORACLE is good at maintenance;
oracle’s strategy does make sense for us, to build our accurate database and analytics
appliances. The SAP Company is working on software design, mobile product and “in-
memory” computing appliance which are relevant to develop our systems. Norton is vital to
protect our system and customers in security. We would like to work with Amazon and
eBay, that we can conduct a fusion in two-way between beginning and terminal to protect
and facilitate customers. All of private information is all going through the bank systems as
well.
3.6 Strategy: Differentiation
At the beginning of entering a software market, probably, there is a high cost for our firm
because of the building database, as well, it is operating in a complicated system that not a
maturity. But our product is face to individuals, enterprises and governments all over the
world. Certainly, we are paid service which is different from PayPal or other payment
companies. On the broad market, we would make a best price that can be accepted by most
of customers.
The overall strategy is therefore: differentiation of Porter’s Generic strategies.
3.7 Value Chain Activity: storing, manufacturing and distribution
The essential value chain activity is to make the product or service, the FVR system is very 4
5
hard to create because it is based on enormous data and identification. After that, it would
be functional and programmed, thorough the advanced technology. Technology
development is the second significant factor, the specific job is like protecting customer’s
identification and prevent any internet attacks, at the same time, our business are focusing
on integrate all different information into specific data like analyzing people’s voice and
fingerprint. we would also ensure that distribute the right data to customers. In the
meantime, our e-business must conduct a strong connection with bank system which is to
linked with their accounts.
3.8 Business Processes
3.8.1. THE PLAN TO DESIGN PROCESS - Firstly, we need to hire amount of IT programmers,
project manager, and system analyst. There is a vital department which is human resource
department because it enables to make sure everyone is in the right position. From planning
to designing, our business can roughly distribute different tasks into specific projects, is
called resource integrating system, each project managers are in charge of specific goals,
and finally, doing a fusion with testing. If it is not matching, transfer to the primary step and
fix it.
5
6
REPLACE WITH BUSINESS PROCESS 1 MODEL
6
7
3.8.2. MARKETING CAMPAIGN PROCESS -
As we can learn from the below explanation, our business is focusing on any terminal online
payment so it is also possible to launch an app in mobile phone, an important process is a
marketing campaign process that we provide a free service and get the feedback to improve
our technology, after that, it asked for paid service and we provide full service to customers.
There is a system that making an interaction or communication directly between our IT
programmer and customers, it is called service supporting system.
REPLACE WITH BUSINESS PROCESS 2 MODEL
7
8
8
9
3.9 Functionalities
3.9.1. THE PLAN TO DESIGN PROCESS
To create the product To test the FVR system
3.9.2. MARKETING CAMPAIGN PROCESS
To display the product To improve the technology
3.10 Systems
3.10.1. DESIGN PROCESSING SYSTEM – Based on the above process, it is involved in specific
system which is design processing system On the broad, we called it is decision-support
system. It is relevant to how products are planned and designed, and goes through testing
with manufacturing data. The system is vital that a key for IT Company is to create a right
product which customers are really needs.
3.10.2. DATA DISTRIBUTING SYSTEM – Data and personal identification are stored in data
warehouse, the signal of order are made by customers on the internet with transaction
processing like receiving data, inventorying data and shipping data. We want it to be
effective and accurate so we also manage data and analyze them that are suitable for each
customer.
3.10.3. MAINTENANCE OPERATING SYSTEM – we should ensure these data are safety and
customers are always run in safety systems. We do renew and fix our data and system all
the time, processes like encrypting data, making a firewall and store information with bank
system.as well, it is a part of enterprise resource planning system as extended components.
9
10
3.11. Summary Table: Value Chain to Systems
Value Chain Activity
Processes Functionalities Specific Information System(s)
Broad Information System(s)
storing,
manufacturin
g and
distribution
1. THE PLAN TO DESIGN PROCESS
1. To create the product
2. To test the FVR system
Design processing system
Test processing system
Materials management System
Decision support system
2. MARKETING
CAMPAIGN
PROCESS
1. To display the product2. To improve the technology
Sales and Marketing system
Maintenance Operating system
collaborate system
Enterprise resource planning system
10
11
CONCLUSION
To sum up, our advanced online payment system will make online shopping a better way,
which disrupts a mass of useless process like input pin and account number. All service and
backup are supported by a database, IT programming, security system and human, in
different areas, e-business, order and deliver system are helping us to operate in the
launching period. To integrate information to be humanized data by technology and systems
is our aim.
REFERENCES
1. Hannah Clare (2012) 5 Online Payment Software Alternatives to PayPal. Retrieved from http://www.zeropaid.com/news/101489/5-online-payment-software-alternatives-paypal/
2. Bob T (2013) Top 20 SCM software suppliers, 2013 Place of publication: Modern Materials Handling, Retrieved from http://www.mmh.com/article/top_20_scm_software_suppliers_2013
3. Timothy B, (2011). Software Patents and Barriers to Entry, published by Forbes Retrieved from http://www.forbes.com/sites/timothylee/2011/12/22/software-patents-and-barriers-to-entry/
4. Dan M, (2000), Different ways of paying taxes. Source: Travel Weekly. 59.68 (Aug. 24, 2000): p23, Retrieve from COPYRIGHT 2000 North Star Travel Media, LLC
http://www.travelweekly.com/
5. Chuan H (2009). An investigation of the word-processing software market war in South Korea: A game-theoretic approach, Journal: Information & management [0378-7206] Tan, Chuan-Hoo yr.: 2010 vole: 47 issue: 2 pg.: 96 -101. Year: 2010, Volume: 47 Issue: 2, Start Page:96
11