Preview

Octopus System in the Education Sector

Satisfactory Essays
Open Document
Open Document
260 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Octopus System in the Education Sector
In our group’s case study report, we will examine the use of Octopus system in the education sector. Octopus system is a widely used e-Commerce technology in Hong Kong, covering a variety of industries including transportation, retail, restaurants, and more.

Tsung Tsin Primary School is the main focus of this case study. The school uses the Octopus system extensively, integrating into student and staff information, attendance, educational activities, payment, and communications. We will look at how using the system can help achieve the school’s missions.

In order to describe the business case, we will analyze the benefits of adopting the Octopus system in an educational environment, comparing with the traditional methods of performing similar processes. The feedback from Tsung Tsin Primary School has been very positive; however there are associated costs, risks, and challenges. In our case study, we will also discover the potential or existing issues with the implementation and maintenance of the systems.

With personal identification store in the Octopus cards and the server, we also have concerns regarding to the security and privacy of the system. We will analyze the current security measures and suggest changes to enhance the protection.

Finally, we will provide recommendations for extending and further improving the use of Octopus and other e-Commerce technologies in Tsung Tsin Primary School. We will also look at the feasibility of adopting the Octopus system in other types of educational institutes.

Reference :

You May Also Find These Documents Helpful

  • Better Essays

    For example areas of concern need to be addressed such as customer information and the security features. Another area of importance is the new system needs to follow compliance such as PCI-DSS (Payment Card Industry Data Security Standard). In addition, the security standards for information technology must be put in place. Lastly, the document will address ethical responsibility to Kudler’s when implementing the new system.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Final Project

    • 957 Words
    • 4 Pages

    GeekGuru, Inc. was created to exceed business expectations by introducing information technology. The Learning Management Systems is one division of services provided by the company where employees are outsourced to train clients and their employees to use software developing tools and business analytical tools successfully. To do this project, I will seek resources onsite and also research the software they use to launch their Learning Management Systems. To find written resources, I will make a list of the most used software used then research on those separately to create my research report.…

    • 957 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Systems are “a group of interacting, interrelated, or interdependent elements forming a complex whole” (Systems, n.d., Definition). Systems describe healthcare, schools, computers, and a person. The systems are either open or closed. Closed systems are inoperable to function with others third party products and open systems are designed to allow third party products to plug in or interoperate with the system. Neither system interacts with the environment. Open systems consist of three characteristics; purpose, functions, and structure (Englebardt and Nelson, 2002). Systems can have more than one purpose based on the needs of the user. Functions that the system will need to carry out need to be identified for the system to achieve its purpose. The “systems are structured in ways that allow them to perform their functions” (Englebardt & Nelson, 2002, p.6). The two types of models used to conceptualize the structure of a system; hierarchical and web (Englebardt & Nelson, 2002). Some examples of system applications are; institution wide, specialty support, documentation, administrations, operations, expert, stand alone…

    • 2548 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Unit 3 information systems

    • 9477 Words
    • 32 Pages

    As an ICT teacher and Head of Department for Sir John Cass Secondary School, I will provide you with the opportunity to investigate and gain an insight into an actual organisation, how we use information and the information systems used to help with decision-making.…

    • 9477 Words
    • 32 Pages
    Better Essays
  • Good Essays

    Jefferson County School System (JCSS) is one of the largest school systems in the US. It provides education for about 10,000 students and consists of fourteen elementary schools, two middle schools, and two high schools. In 1976, the school system purchased and implemented the DEC PDP 11/34 computer that helped to develop the student management applications, financial applications, and other student management applications. Today, the JCSS owns four Dell servers running on UNIX and everything is connected via a high-speed TCP/IP network. All the applications were developed by David Meyer, a director of data processing, and his two programmers. Once the current JCSS superintended of school retired, Dr. Harvey Greene was hired. Dr. Greene wanted to replace the existing build in-house software with a purchased system. Meyer, who didn`t agree with this decision leaves the JCSS and being replaced by Carol Andrews, the new Director for Data Processing (Brown, Dehayes, Hoffer, Martin, & Perkins, 2012).…

    • 955 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Brown, C. V., Daniel D., Jeffrey H., Wainright M., and William P. Managing Information Technology for DeVry University, 7th Edition. Pearson Learning Solutions. VitalBook file (p. 506 - 515)…

    • 1202 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    According to a survey conducted in November 2005, eSchool News has found that educators nationwide have been struggling to balance administrative responsibilities and the need for them to spend more time in the classroom, in order to help students achieve higher standards. One of the answers to the No Child Left Behind era dilemma are the sophisticated software packages, designed to automate critical front and back office functions. These tools will enable educators to concentrate on their core-responsibilities: helping every single child reach her full potential, thanks to a more efficient learning environment. The applications range from student data-tracking, payroll, library management, bus routing, food-service management, to special education planning, tracking, and reporting.…

    • 2591 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    ➢ Augmented security: The reliable rejection of imposters, who might attempt to gain access either by stealing or forging cards or by guessing or fraudulently obtaining passwords, becomes possible.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Letter of Reccomendation

    • 302 Words
    • 2 Pages

    Organized and diligent, Ruth quickly learned technology systems and software that were unfamiliar to her when she first started with the public school system, and she also attended seminars offered through the company. She is pursuing a master’s degree in business through evening classes at Highline Community College.…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Palm Vein Technology

    • 256 Words
    • 2 Pages

    a challenge. To help deal with this growing problem, Fujitsu has developed a unique biometric security technology that puts access in the palm of your hand and no one else's.. In all these applications, the key to securing your assets and data will be in the palm of your hand. The new technology has many potential applications such as an ultra secure system for ATMs and banking transactions, server log in system, an authorization system for front doors, schools, hospital wards, storage areas, and high security areas in airports, and even facilitating library lending, doing away with the age-old library card…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Biometric System

    • 5133 Words
    • 21 Pages

    A brief background of biometric and biometric security systems will provide a greater understanding of the concept of network security. Biometrics is defined as the unique (personal) physical/logical characteristics or traits of human body [Jain, 2004]. These characteristics and traits are used to identify each human. Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person 's unique identification (ID), such as: retinal, iris, fingerprint, palm print and DNA. Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock [Jain, 2006].…

    • 5133 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Pdpo in Hong Kong

    • 1723 Words
    • 7 Pages

    Due to the public uproar over the sale by the Octopus Card management company of the personal data of millions of its clients to business partners through current technologies, a great portion of the amendments have targeted with this specific types of transfer of personal data and implemented stricter control regarding the sale…

    • 1723 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Types of Learning

    • 3009 Words
    • 13 Pages

    To cite this document: Udo Bleimann, (2004),"Atlantis University:a new pedagogical approach beyond e-learning", Campus-Wide Information Systems, Vol. 21 Iss: 5 pp. 191 - 195 Permanent link to this document: http://dx.doi.org/10.1108/10650740410567536 Downloaded on: 07-11-2012 References: This document contains references to 11 other documents Citations: This document has been cited by 4 other documents To copy this document: permissions@emeraldinsight.com This document has been downloaded 694 times since 2005. *…

    • 3009 Words
    • 13 Pages
    Powerful Essays