Discuss About The International Applied Information Systems.
Problem Description: The first problem can be that the user may not withdraw funds even if the balance amount is more than selected fund. The transaction history may not be printed out. The transaction may end before disposing the cash resulting in incorrectly removing fund from user account. A receipt for the transaction may not be printed. Because of the broke link between the ATM and Bank server, a transaction from one bank account to another will be rejected. Another major problem of the product can be that the ATM may not recognize various cards from other banks. The system may suffer from various technical difficulties like card reader malfunctioning, damage in the cash dispenser and many more.
Possible Business Benefits: The main business profit can be achieved by advertising other organizations’ services. The ATM can advertise various services at the home page before the user enters card into the card reader. The advertisements can also be done after the cash is dispensed. The ATM can ask the user if he/she need other assistance of continue transaction. In this page the advertisements can be shown. Another way of making profit is promoting business. The ATM machines can have a promotional section at the bottom or top of the interface. In this section, the user will be seeing the other services that the organization provides. The ATM machine can ask the user to seek service from the organization and have few interaction buttons that will force the user to see the promotional message.
Stakeholder and User Descriptions: The stakeholders of the organization are ATM user, the banks, government, raw materials provider, technicians and the development team.
ATM User: These kind of stakeholders are external users. They insert card into the system and carry out desired operations in the ATM. The user also uses the ATM machines for transferring the cash from their accounts to another recipient.
Banks: The banks are generally provide the ATM services to the customers. The user must have a card that is related to a bank account for accessing the ATM functions.
Government: The government defines the rules and regulations on the ATM services. Various countries and states have different rules on fund transfer, security pin of ATM card and many more. The ATM must be designed by following these legislations.
Product Overview: The system that will be generated within the project will be able to carry out the processes of the users. The users can only choose among the options that are available to them. The final product will be connected to the Bank Server to fetch the account related data of the user. The product will accept 4 or 6 pin ATM cards and provide various accesses to the account. The user can execute various transactions through the system.
The ATM system will be providing various functionality to the users. The list of functionalities provided by the ATM system are as following.
The system provides all the generic functions that an ATM system provides. Allowing a single user to access the ATM function at one time allows the system to prevent functional errors. The system also generate reports for business purposes which support of the profit of the ATM system owner. The system functionality provide all functions that is required to be within it.
The resources that are required for the ATM system are as following.
The risks of the system can be fraudster attempt to tamper the ATM card reader, using duplicate ATMs and data theft.
Tampering Card Reader: The fraudster may insert a plastic film within the ATM card reader so that the plastic film can hold of the card. In this situation, the machine cannot expel the card. The victim may not understand that the card reader has been tampered with. A fraudster will appear as a genuine card holder and suggest the victim to input the pin. In this case, the user will leave the ATM and the fraudster will retrieve the card use the pin code to get money. This risk is more severe as the victim remains completely in the dark about the fraud. The fraudsters uses the device called skimmers which is consisting of tiny cameras and devices to capture the bank account information.
Using Duplicate ATM: The use of the duplicate ATMs. A software is used in this case. This software records the password that the user type into the system. The fraudsters create duplicate cards and use the recorded pin to withdraw fund from that account. This frauds are generally done by one or more insider in collaboration with the organization which is issuing the card.
Data Theft: The data theft is a crucial risk of the ATM system. The cyber criminal can access the link between the ATM system and the bank server to read the data flowing from both ends. This way the cybercriminal can access the bank account details, card details and password of the ATM. The criminal can also access all the transactions done from that machine.
Risk Prevention: The user can enable the phone number or email notification. This way the user will be able to monitor every transaction made from the account. The ATM system will be always under surveillance and equipped with various sensors to inform bank if any fraudster will access the system for some fraud.
The outcome of the project will be a fully secure and functional ATM system. This system will be equipped with all the resources that an ATM system must have. The system can be accessed by touching in the screen. The reports will be generated for the owner of the system. An operating system will be installed within the ATM machine. This operating system will be controlling all the processes of the system and store the temporary data into the database. The operating system will collect the input from the user as the card will be inserted, keyboard and touch screen. The system will process those inputs and respond to user request. The system will be in need of assistance from time to time. For this purpose, a technician will be appointed to maintain the system. The data which will be incorporated into the system is small. The storage system for sorting operating system and the database will be different.
References
Ahlan, A. R., Kartiwi, M., & Sukmana, H. T. (2015). Influences of the input factors towards success of an information system project. TELKOMNIKA (Telecommunication Computing Electronics and Control), 13(2), 686-693.
Cascetta, E., Carteni, A., Pagliara, F., & Montanino, M. (2015). A new look at planning and designing transportation systems: A decision-making model based on cognitive rationality, stakeholder engagement and quantitative methods. Transport policy, 38, 27-39.
Gardi, A., Sabatini, R., Ramasamy, S., & Marino, M. (2015). Automated ATM system for 4-dimensional trajectory based operations. In AIAC16: 16th Australian International Aerospace Congress (p. 190). Engineers Australia.
Kay, J. E., Deser, C., Phillips, A., Mai, A., Hannay, C., Strand, G., … & Holland, M. (2015). The Community Earth System Model (CESM) large ensemble project: A community resource for studying climate change in the presence of internal climate variability. Bulletin of the American Meteorological Society, 96(8), 1333-1349.
Kerzner, H., & Kerzner, H. R. (2017). Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.
Kulkarni, R., Madki, M., & Mapari, T. (2016). CARD-LESS ATM SYSTEM. International Education and Research Journal, 2(4).
Kumar, B., & Murarka, A. (2016). Reliability Assessment of ATM with Redundant Central Unit.
Osseiran, A., Boccardi, F., Braun, V., Kusume, K., Marsch, P., Maternia, M., … & Tullberg, H. (2014). Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine, 52(5), 26-35.
Rhmann, W., & Saxena, V. (2016). Test Case Generation from UML Sequence Diagram for Aadhaar Card Number based ATM System. International Journal of Applied Information Systems (IJAIS), 11(4).
Schwalbe, K. (2015). Information technology project management. Cengage Learning.
Zanin, M., Perez, D., Chatterjee, K., Kolovos, D. S., Paige, R. F., Horst, A., & Rumpe, B. (2014). On demand data analysis and filtering for inaccurate flight trajectories. arXiv preprint arXiv:1409.2304.
Zhang, Z. (2016). Camera calibration: a personal retrospective.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download