Summary of the system to be developed
E-Matric Card System is also known as the electronic matric card system. This system is the system that making the ID card of the students and staff through online. It was the advance system that being provide by the administration of the university. This system happen when new students and staff enter the university for the first time or because of some cases such as the card has being lost or broken. To use this system, they required to enter their id card and password at their own portal of the university that has been created early before can use this system. After they login at the portal, they can re-check their detail from the name, matric number, programme, and etc. that will be include in their matric card. Then, they need to insert their own photo to be place in front of the matric card and then submit to the university system which will be sending to the technology department to produce the matric card. If they submit the information on the working hour, they can directly get the matric card at the technology department and if not, they need to wait on the next day to get the matric card.
Problem description for each problem that will include the scenario at the organization, the issues as a result of the situation, and the needs of the organization to help solve the issues.
The problem that happens when developing this system is the picture of the students and staff that want to use is unable to take because of online system itself. It was the limitation to the users because the picture needs to provide by them by their self. This will make the unsystematically management compare to the manual one which the users will be taken the picture when they make the matric car...
... middle of paper ...
... their turn. Other than that, the advantage of this system is more systematic where when they want to make the matric card using this system, they will need to fill up and re-check the information that stated at the university portal which more systematic compare to the manual one. Lastly, the advantage of this system is avoids duplication where when they using this system, the information will be automatically updated the information from all of the branches of the university so that the information that have is same.
APPENDIX
STUDENT
Student ID *
Student Name
Student Course
Student Address
Student IC
Student Password
MATRIC CARD
Student ID
Staff ID
Faculty
Programme
Campus
Intake
ID *
Make
STAFF
Staff ID *
Staff Name
Matric ID
LOGIN
Student ID
Staff ID
Password *
Login
Login
Question 1: Using NJIT as an example, explain how its organizational structure influences how work is organized, how people and groups communicate, and how decisions are made?
In order to separate the people from the problem more easily, the stakeholders and each of their problems are provided in the table below.
Defining the problem begins with understanding how the actors are inclined to act and how the actors could interact. It also identifies tensions of the current conditions and the end-state. The problem statement explains how the operational variables will resist change and how areas of action can transform existing conditions to the desired end-state.
In today’s world, we can say that the main danger to privacy, security for people who lives in free democratic societies can come from the system that will create and apply supposedly very high tech national ID card.
What appears to be the issue (of concern, problem, challenge, or opportunity) and its significance for the organization? How does it relate to the theme of the workshop?
Technology has affected everyone’s life so people are now more reliable on technology for different purposes i.e. teacher and student communicate online with each other which is enhanced as distance education (on-line ...
The team needs to establish a policy and procedure which would be a step toward an organizational structure. This process will be a framework that defines formal reporting relationships between the different levels of management. For example, the guidelines can be used as a protocol of the process managers needs to follow to assist their employees through the change process. The team also needs to provide in house trainings for all departments so employees can be aware and implement the new changes. The training will increase skill level and improve staff productivity.
A problem can be defined as subject of concern between what is desired and what an actual situation is there, which makes it difficult to achieve a desired goal, purpose. A solution of a problem is an act performed in order to reduce the effects of the current situation and which gives direction to accomplish the goal or objective.
Biometrics is defined as the unique physical characteristics or traits of human body (Jain, 2004). These characteristics and traits are used to identify each human in. Every details of the human body which differs from one human to other will be used as unique biometric data to serve as that person's unique identification in terms of retinal, iris, fingerprint, palm print and DNA. Biometric systems will collect and store this data in order to use it for verify personal identity. The combination of biometric data systems and biometric identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users to accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock (Jain, 2006).
Define the current situation - break down problem into component parts, identify major problem areas, develop a target improvement goal
First you need to identify the organization’s internal and external resources, organization’s strengths and weaknesses as compared to its competitors and the opportunities it has for better utilization of resources.
The concept of Student Information Management System (SIMS) is one that continues to elicit mixed reactions. Its application appears limited by a number of factors. Whitley, Gal, and Kjaergaard (2014) connotes that SIMS faces challenges in acceptability due to the kind of information being stored, personal identification information being stored in the system and the identity of people accessing this information. Ngoma (2009) explores the level of success student information system, a subset of SIMS. Findings from Ngoma’s expedition indicate that many institutions tend to have a negative attitude towards implementation of such projects. Their evaluation mechanism on application of this technology is tied to the level of improvement of the institution especially student performance (Sun & Benton 2008; Chong 2014).
Identity cards vary, from passports to health cards to driver licenses. Each play a different role, one will be used to travel another used when individuals seek care and another simply to drive around town. Identity cards serve as a form of surveillance to insure the wellbeing within a country against danger. This brings me to say, is monitoring an individual’s life going to insure their safety? Forms of identification can offer security, freedom as well as accessibility to North American citizens. Although, scenarios such as identity theft can cause individuals to think otherwise. The topics discussed in this essay is, the use of identification allows basic rights to North American citizens. Monitoring insures security within countries as
3. Analysis of the current organization and reporting structure by evaluating its strengths and weaknesses.
For the past 20 years, consumers have used some form of electronic commerce. As explained by González (2001) , ...a smart card can generally be defined as a plastic card with dimensions similar to traditional credit/debit cards, into which an electronic device has been incorporated to allow information storage. Frequently, it also has an integrated circuit with data processing capacity. Smart cards are normally separated into two categories: memory cards and microprocessor cards, commonly named smart cards for their capability to do data processing and the sophisticated algorithms embedded in them (isaca.org).