Criterion A –The issue and stakeholder(s)
(a) Describe one social/ethical concern related to the IT system.
In a process of buying biscuits wRith VISA credit card, there is some social issues. Firstly some credit card require annual charge which is paid per year, that is needed even we don’t pay anything with the card. Hence we have to pay money for just having those credit card. And another issue is leakage of some sensitive information from each side; consumer and credit-card’s companies. This issue happens when identification of credit card is stolen. At the time, sensitive data such as PIN number or password that are used for authentication is hacked. As a consequence, the credit card is forged and …show more content…
In a beginning of previous century, how to buy something is to use real money at the physical store. But then time has gone, people didn’t have to pay with money. They started to pay with their credit/trust and card called “credit card”. The card increasingly made shopping easier and easier. And with growth of internet, shopping on the internet is also growing. At the process of online shopping, mediator is needed to complete transfer of money between consumer and online shops. Credit card could be the mediator. They are transferring money between them. By a role of credit card online shopping is succeeded …show more content…
As a consequence of that, difficulty to do shopping will relatively harder and harder because we will have to pay money with real money, which means we cannot pay money later and we have to have enough money before buying something. Therefore, impact of social issue which is leakage of customer’s information is not effective and discourage motivation for customer on the internet as well as physical stores.
Criterion D – A solution to a problem arising from those IT system
(a) Evaluate one possible solution that addresses at least one problem identified in Criterion C.
As a solution for the social issue, we can say additional authentication which is biometric authentication. That is basically using personal finger print or (and) iris recognition. In those recognition system, biometric reader scans finger print or iris recognition and compares biometric authentication (data at later time) with biometric enrolment (primary data). Then those are matched each other and biometric readers response whether false (rejected) or true (authenticated). The way is actually better than just setting PIN number but biometric recognition need an equipment for it and never 100% accurate. Therefore, biometric recognition will not replace authentication perfectly but become a way to enhance