This document outlines a proposal for a fingerprint recognition technology business to address the problem of rising motor vehicle thefts. It discusses the vision, industry analysis, customers and their needs, the fingerprint recognition product and service, suppliers and partners, broad differentiation strategy, procurement as the most important value chain activity, inventory ordering and supply sourcing business processes, and the need for an inventory management system. The goal is to provide superior motor vehicle security and safety for drivers through a personalized fingerprint system.
This document outlines a proposal for a fingerprint recognition technology business to address the problem of rising motor vehicle thefts. It discusses the vision, industry analysis, customers and their needs, the fingerprint recognition product and service, suppliers and partners, broad differentiation strategy, procurement as the most important value chain activity, inventory ordering and supply sourcing business processes, and the need for an inventory management system. The goal is to provide superior motor vehicle security and safety for drivers through a personalized fingerprint system.
This document outlines a proposal for a fingerprint recognition technology business to address the problem of rising motor vehicle thefts. It discusses the vision, industry analysis, customers and their needs, the fingerprint recognition product and service, suppliers and partners, broad differentiation strategy, procurement as the most important value chain activity, inventory ordering and supply sourcing business processes, and the need for an inventory management system. The goal is to provide superior motor vehicle security and safety for drivers through a personalized fingerprint system.
Name Donna Lee NetID dlee873 Group Number: 246 Website Link: http://infosys110group246.blogspot.co.nz/ Tutorial Details Tutor: Day: Time: Johnnie Wednesday 12pm Time Spent on Assignment: 30 hours Word Count: 1642
2
2 FINGERPRINT RECOGNITION TECHNOLOGY INTRODUCTION This proposal addresses the problem of rising motor vehicle thefts in New Zealand. There has been over 48,000 reported motor vehicle thefts in NZ over the past year according to New Zealand Police statistics. However, this issue is not simply restricted to New Zealand. According to Interpol statistics, there has been a reported 7.2 million reported stolen motor vehicles globally from the year 2012 to 2013, with NZ having the highest number of motor vehicle theft cases among other countries. Therefore, we have come up with fingerprint recognition technology specifically for motor vehicles to address the problem of poor security. 3. BUSINESS SECTION 3.1 Vision To provide motor vehicle security of superior standard and to guarantee the highest level of safety for motor vehicle owners in order to create a safer and secure world for drivers. 3.2 Industry Analysis: Motor Vehicle Security Industry Industry: Motor Vehicle Security Industry. Force: High/Low: Justification: Buyer power: Low There are few companies operating in the motor vehicle security industry but most have been operating for decades and across many countries. Existing companies are well-established among car owners. An example is Rapid Radio, New Zealand's premier car audio and security
3
3 specialist with over three decades in the business, installing the latest in sound and security equipment in Auckland since 1978. (Rapid Radio, 2006) Therefore, buyers have few choices in this industry. Supplier power: Low There is a range of suppliers for automotive products e.g. Mongoose Automotive Technologies offers a range of products distributed throughout NZ to over 300 authorised dealers. (Mongoose New Zealand Limited, 2014) Companies in this industry also outsource their products. E.g. AVS Car Security (2013) who sources stock from around the world according to quality and value from proven manufacturers. Hence, there is a wide range of suppliers in this industry locally and internationally. Threat of new entrants: Low A high level of expertise and broad knowledge in the IT field is required to start up a business in this industry. For example Autowatch NZ (2012) was established in 1985 by a group of engineers with a strong background in design and manufacture of military electronics. Therefore, it is difficult to enter this industry as few people are highly qualified and experienced in this sector. Threat of substitutes: Low Currently, there is a small number of leading motor vehicle security companies operating in
4
4 the New Zealand market. Hence, the availability of substitute products for motor vehicle security is low. Rivalry among existing competitors: Low There are a few companies in this industry, hence rivalry is low. However, due to rising numbers of car theft in recent years, there is a potential rise in start-up companies in this industry and an increasing need to serve the growing Australian and New Zealand markets (Autowatch NZ, 2012). Overall attractiveness of the industry: Although there are few motor vehicle security businesses in NZ, a high level of qualification, skills, expertise, knowledge and experience in security and IT systems is required in order to start up a business. Hence, there are high entry barriers to this industry which proves a low overall attractiveness. 3.3 Customers and Thei r Needs Car owners require safety. According to Automotive Security Systems Ltd (2012), Every day 56 cars are stolen in New Zealand, which builds on the issue of rising numbers of car thieves. Beside stealing cars, thieves also target items of high prices such as mag wheels and audio equipment (Warlocks, 2013). Hence, there is a growing need for car owners to have high quality security for their cars in order to prevent car theft rates from rising, especially in New Zealand. 3.4 The Product and Service The fingerprint recognition technology will bring motor vehicle security to the next level. Since this will be a personalized system, car owners can authorize certain fingerprints to access their car and to start the car. An optional linked security system can also be installed where unauthorized fingerprints will trigger an alert on the car owners smartphone. This provides value-added security to car owners.
5
5 3.5 Suppliers and Partners Internet service providers enable our company to display our product(s) and handle transactions online and allows for online communication with customers and other suppliers. Since some products or components of our product will be outsourced, having an internet service provider is mandatory in order to facilitate communication and ordering processes between our business and potential suppliers. Vehicle security companies such as AVS security and Autowatch NZ are potential partners for our company. They manufacture and outsource a wide range of vehicle security products. We aim to source inventory and share IT knowledge and skills with other companies in the automotive industry to come up with the ideal product for our customers.
3.6 Strategy: Broad Differenti ation Our business will be targeting a broad market of motor vehicle owners in NZ. Auckland, in particular, is known as the city of cars, due to a large proportion of car owners. The fingerprint recognition technology can be used for any motor vehicle. The technology will be highly priced as compared to current motor vehicle security systems e.g. motor vehicle locks and alarm systems. A range of prices will also be provided. Our differentiation is top standard safety and we price our products to target a huge, stratified audience which are vehicle owners. The overall strategy is therefore Broad Differentiation. 3.7 Value Chain Activity: Procurement The most important value chain activity for this business is Procurement. Our business is looking at outsourcing products and services and finding stock of the highest quality, which relates to our vision. We are targeting a broad audience and our products are of high cost. Hence, it is important that we find reliable suppliers who are able to deliver products and services of top-level standard so that it is worth the price customers pay for. In
6
6 addition, we will be able to co-create value since the fingerprint recognition technology is personalized and programmed to customers preferences. 3.8 Business Processes 3.8.1. INVENTORY ORDERING PROCESS In relation to procurement, it is important to ensure that supplier orders are always smoothly carried out. The process starts with submission of a purchase order followed by receipt and processing of the order. Once the order is processed, the raw materials will then be shipped. When the raw materials are received and stored, the supplier issues an invoice which is then followed by payment. Once the payment is complete, the process concludes with whether or not a new order needs to be placed. If not, the process is finished and if a new order needs to be placed, it brings us back to the first step, submitting a purchase order.
INVENTORY ORDERING PROCESS MODEL
7
7 Start Submit purchase order Receive and process order Ship raw materials Receive and store raw materials Receive invoice Payment of invoice New order? End Inventory management system Warehouse Yes No
3.8.2. SUPPLY SOURCING PROCESS It is important that our business uses a good procurement outsourcing strategy. This process ensures that the right suppliers are selected. It starts off with assessing the vehicle security supplier market. It is mandatory to
8
8 set up a supplier survey to evaluate potential suppliers. The next step is to build a sourcing strategy which is suitable for our business. This is done based on selection criteria that our business will draw up. This is then followed by the selection of suppliers and finalization. SUPPLY SOURCING PROCESS MODEL Start Assess supplier market Survey suppliers Build sourcing strategy Selection of suppliers Finalize supplier? End Supply chain benchmarking system Yes No Purchasing department
9
9 3.9 Functionalities 3.9.1. INVENTORY ORDERING PROCESS Create and submit orders Reporting activities e.g. inventory reports, order reports, invoicing reports 3.9.2. SUPPLY SOURCING PROCESS Collect and gather supplier information Communicate with potential suppliers 3.10 Systems
3.10. 1. INVENTORY MANAGEMENT SYSTEM Usually an IT-based system which supports the inventory ordering process. It simplifies the process and is easy to operate. Besides managing and processing orders, the system can be used to record and store information such as inventory levels, order reports, sales data, customer particulars and delivery information. Inventory management systems are commonly used to avoid product overstock and outages (Inventory management software, 2014). It also organizes inventory data and reduces costs through efficient inventory storage and preventing excess inventory on hand. 3.10. 2. ORDER PROCESSI NG SYSTEM This system ensures a smooth flow from sales quote to confirmed order, successful order to order fulfillment, and prompt invoicing to payment (NetSuite Inc., 2014). It consists of order submissions, order processing, shipping of raw materials, receipt of raw materials, and receipt and payment of invoices. Hence it supports the functionalities and inventory ordering process. The system is important as it supports the various procedures associated with procurement. 3.10. 3. SUPPLY CHAIN BENCHMARKING SYSTEM This system compares our business performance with our competitors and other businesses so as to gauge our position in the market and help us to improve our strategy. This helps our business analyze and understand our operational practices and gain competitive advantage. For example, the system could analyze the supply sourcing processes in place and improve it by changing supplier criteria to help identify the right suppliers. This also ensures better and more efficent communication with current and potential suppliers due to increased industry knowledge.
10
10 3.11. Summary Table: Value Chain to Systems
Value Chain Activity Processes Functionalities Specific Information System(s) Broad Information System(s)
Procurement 1. Inventory ordering process 1. Create and submit orders
2. Reporting activities Inventory management system
Order processing system Supply Chain Management System
Transaction Processing System 2. Supply sourcing process 1. Collect and gather supplier information
2. Communicate with potential suppliers Supply chain benchmarking system
Decision Support System
Supply Chain Management System
11
11 CONCLUSION The fingerprint recognition technology is an efficient way of providing motor vehicle owners with the safety and security they need. Upon analyzing the motor vehicle industry and identifying our customers, their needs, potential suppliers and partners, we derived a Broad Differentiation strategy. We have identified inventory ordering and supply sourcing as our two key business processes relating to procurement. The use of inventory management systems, order processing systems and supply chain benchmarking systems is beneficial to our business as it maximizes overall productivity and ensures top quality products. REFERENCES
1. Rapid Radio (n.d.). Rapid - car audio, stereos, alarms, speakers, installs. Retrieved May 23, 2014, from http://www.rapidradio.co.nz/ 2. Warlocks (n.d.). WARLOCKS - Car Alarms, Immobilisers, Car Audio and much more. Retrieved May 23, 2014, from http://www.warlocks.co.nz/about- warlocks.htm 3. Mongoose New Zealand Limited (n.d.). Mongoose New Zealand - Automotive Technologies - Home. Retrieved May 23, 2014, from http://www.mongoose.co.nz/ 4. AVS Car Security (n.d.). About us - AVS Car Security - 0800 438 862. Retrieved May 24, 2014, from http://avscarsecurity.com/about-avs/ 5. Autowatch NZ (n.d.). About Us | Autowatch Car Alarm Installers | Nationwide 0800 862862. Retrieved May 24, 2014, from http://www.autowatch.co.nz/About+Us.html 6. Automotive Security Systems (n.d.). Automotive Security Systems. Retrieved May 23, 2014, from http://www.caralarm.co.nz 7. Polymathic Computer Corporation (n.d.). Inventory/Order Entry. Retrieved May 25, 2014, from http://www.polymathic.com/polysoft/oebpi.htm 8. Supply Management (n.d.). The seven stages of a sourcing strategy | Supply Management. Retrieved May 25, 2014, from http://www.supplymanagement.com/resources/2011/the-seven-stages-of- a-sourcing-strategy 9. Inventory management software - Wikipedia, the free encyclopedia. (n.d.). Retrieved May 25, 2014, from http://en.wikipedia.org/wiki/Inventory_management_software 10. NetSuite Inc. (n.d.). Order Management, Order Fulfillment, Order Processing, Billing Management, Order Fulfillment Software - NetSuite. Retrieved May 25, 2014, from http://www.netsuite.com/portal/products/netsuite/erp/order.shtml
E2788-11 Standard Specification For Use of Expanded Shale, Clay and Slate (ESCS) As A Mineral Component in The Growing Media and The Drainage Layer For Vegetative (Green) Roof Systems