Preview

Octopus System in the Education Sector

Satisfactory Essays
Open Document
Open Document
260 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Octopus System in the Education Sector
In our group’s case study report, we will examine the use of Octopus system in the education sector. Octopus system is a widely used e-Commerce technology in Hong Kong, covering a variety of industries including transportation, retail, restaurants, and more.

Tsung Tsin Primary School is the main focus of this case study. The school uses the Octopus system extensively, integrating into student and staff information, attendance, educational activities, payment, and communications. We will look at how using the system can help achieve the school’s missions.

In order to describe the business case, we will analyze the benefits of adopting the Octopus system in an educational environment, comparing with the traditional methods of performing similar processes. The feedback from Tsung Tsin Primary School has been very positive; however there are associated costs, risks, and challenges. In our case study, we will also discover the potential or existing issues with the implementation and maintenance of the systems.

With personal identification store in the Octopus cards and the server, we also have concerns regarding to the security and privacy of the system. We will analyze the current security measures and suggest changes to enhance the protection.

Finally, we will provide recommendations for extending and further improving the use of Octopus and other e-Commerce technologies in Tsung Tsin Primary School. We will also look at the feasibility of adopting the Octopus system in other types of educational institutes.

Reference :

You May Also Find These Documents Helpful

  • Better Essays

    For example areas of concern need to be addressed such as customer information and the security features. Another area of importance is the new system needs to follow compliance such as PCI-DSS (Payment Card Industry Data Security Standard). In addition, the security standards for information technology must be put in place. Lastly, the document will address ethical responsibility to Kudler’s when implementing the new system.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Systems are “a group of interacting, interrelated, or interdependent elements forming a complex whole” (Systems, n.d., Definition). Systems describe healthcare, schools, computers, and a person. The systems are either open or closed. Closed systems are inoperable to function with others third party products and open systems are designed to allow third party products to plug in or interoperate with the system. Neither system interacts with the environment. Open systems consist of three characteristics; purpose, functions, and structure (Englebardt and Nelson, 2002). Systems can have more than one purpose based on the needs of the user. Functions that the system will need to carry out need to be identified for the system to achieve its purpose. The “systems are structured in ways that allow them to perform their functions” (Englebardt & Nelson, 2002, p.6). The two types of models used to conceptualize the structure of a system; hierarchical and web (Englebardt & Nelson, 2002). Some examples of system applications are; institution wide, specialty support, documentation, administrations, operations, expert, stand alone…

    • 2548 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Unit 3 information systems

    • 9477 Words
    • 32 Pages

    As an ICT teacher and Head of Department for Sir John Cass Secondary School, I will provide you with the opportunity to investigate and gain an insight into an actual organisation, how we use information and the information systems used to help with decision-making.…

    • 9477 Words
    • 32 Pages
    Better Essays
  • Better Essays

    References: Brown, C. V., Daniel D., Jeffrey H., Wainright M., and William P. Managing Information Technology for DeVry University, 7th Edition. Pearson Learning Solutions. VitalBook file (p. 506 - 515)…

    • 1202 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    According to a survey conducted in November 2005, eSchool News has found that educators nationwide have been struggling to balance administrative responsibilities and the need for them to spend more time in the classroom, in order to help students achieve higher standards. One of the answers to the No Child Left Behind era dilemma are the sophisticated software packages, designed to automate critical front and back office functions. These tools will enable educators to concentrate on their core-responsibilities: helping every single child reach her full potential, thanks to a more efficient learning environment. The applications range from student data-tracking, payroll, library management, bus routing, food-service management, to special education planning, tracking, and reporting.…

    • 2591 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Valuing Project Achieve

    • 1733 Words
    • 7 Pages

    Project Achieve hopes to differentiate itself from its competitors via its emphasis on a completely web-based product and its founder’s knowledge of schools and teachers, its two main competitive advantages. As the first mover amongst entirely web-based products, Project Achieve hopes to gain significant market share before imitations of its products appear. Being entirely web-based, the system was created in a standardized manner to allow numerous schools to have the capability to use the system and get support simultaneously. In short, the firm’s products are especially scalable. The company will also collect tremendous amounts of information on students, creating yet another potential revenue stream from advertisers and content providers. Potentially, Project Achieve could evolve into the nerve center for schools. With high switching costs, such a position could be attractive to content providers and other potential acquirers.…

    • 1733 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    ➢ Augmented security: The reliable rejection of imposters, who might attempt to gain access either by stealing or forging cards or by guessing or fraudulently obtaining passwords, becomes possible.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Satzinger, J. W., Jackson, R.B. and Burd, S. D. (2004): Systems Analysis and Design in a Changing World, 3rd Edition: Thomson Learning Course Technology…

    • 1797 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The Supply Chain Concept

    • 1636 Words
    • 7 Pages

    Schneider, G. (2004). Electronic commerce: The second wave. 5th eds. Boston, MA: Course Technology. Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary/content/eReader.h on June 11, 2005.…

    • 1636 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The Biometric System

    • 5133 Words
    • 21 Pages

    A brief background of biometric and biometric security systems will provide a greater understanding of the concept of network security. Biometrics is defined as the unique (personal) physical/logical characteristics or traits of human body [Jain, 2004]. These characteristics and traits are used to identify each human. Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person 's unique identification (ID), such as: retinal, iris, fingerprint, palm print and DNA. Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock [Jain, 2006].…

    • 5133 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Types of Learning

    • 3009 Words
    • 13 Pages

    To cite this document: Udo Bleimann, (2004),"Atlantis University:a new pedagogical approach beyond e-learning", Campus-Wide Information Systems, Vol. 21 Iss: 5 pp. 191 - 195 Permanent link to this document: http://dx.doi.org/10.1108/10650740410567536 Downloaded on: 07-11-2012 References: This document contains references to 11 other documents Citations: This document has been cited by 4 other documents To copy this document: permissions@emeraldinsight.com This document has been downloaded 694 times since 2005. *…

    • 3009 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Palm Vein Technology

    • 256 Words
    • 2 Pages

    a challenge. To help deal with this growing problem, Fujitsu has developed a unique biometric security technology that puts access in the palm of your hand and no one else's.. In all these applications, the key to securing your assets and data will be in the palm of your hand. The new technology has many potential applications such as an ultra secure system for ATMs and banking transactions, server log in system, an authorization system for front doors, schools, hospital wards, storage areas, and high security areas in airports, and even facilitating library lending, doing away with the age-old library card…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pdpo in Hong Kong

    • 1723 Words
    • 7 Pages

    Due to the public uproar over the sale by the Octopus Card management company of the personal data of millions of its clients to business partners through current technologies, a great portion of the amendments have targeted with this specific types of transfer of personal data and implemented stricter control regarding the sale…

    • 1723 Words
    • 7 Pages
    Powerful Essays