The company of Moo Milk Products (MMP) is one of the largest enterprises that deals with the trading of milk and milk products. The reputation of the company has improved gradually in the worldly market since its inception. With reference to the present conditions, it has been found that there has been a serious downfall in the percentage of sales in China due to the reason that the customers are experiencing some of the objectionable scenarios. These scenarios have crept up due to the adulteration of milk and the milk products performed by some of the corrupted personalities (Gatzert, Schmit & Kolb, 2016). They entailed in reusing the opened containers of the Moo baby formula and the milk powder and replaced them with adulterated products. The owner of the company Bill Buller has a profound knowledge in management and he is in desperation to increase the sales percentage in China. This will help the company to regain the customer trust and the market competence in the commercial market (Gatzert, 2015).
As Bill is one of the intelligent person, he was ready to resolve the issues as soon as possible with the help off the suggestions from his friend to invest on the facilities delivered by the Internet of Things or (IoT) (Wortmann & Flüchter, 2015). The solutions delivered by the Internet of Things will surely be able to mitigate the issues. This is the reason for which the company has consulted the expert team to provide them with a plan with which the company will be able to cope up with the situations (Gubbi et al., 2013). The Thin Film Tokens or TFT based on the concept of Internet of Things will be able to detect the originality of the product. This report is to assist the owner of the company with the solutions of Internet of Things using the Thin Film Tokens (TFT) with the Near Field Communication (NFC) capabilities (Zanella et al., 2014)
This section of the assignment is composed of three parts. They can be classified in the explanation of the need for change along with the opportunities, description of the proposal for the application of Internet of Things on the enterprise and the detailed structure of the cons and pros of getting hold of the services presented by the Internet of Things (Chandrakanth et al., 2014).
The need for the change of the traditional systems to be replaced by that of the solutions provided by the internet of things have been stated that are as follows:
Topic |
Solutions of internet of things in business. |
Theme |
Explanation of the need for change |
Element |
Implementing the Element |
||
Background |
Situation/Issue |
The situation is such that the company of the Milk Moo Products is a company, which holds a good reputation in the commercial market of China. At present, the company is facing a lot of trouble since the percentage of the sales has decreased substantially due to some of the objectionable activities from their side. Some of the employees within the system were involved in reusing the opened containers of the Moo baby formula along with the milk powder and replaced them with adulterated products. This unethical approach from their side made Bill Buller, the owner of the company to lose the trust of the customers. As there was no proper technology involved, the enterprise was unable to track the originality of the milk and the milk products. Applying the technology of Internet of Things the company expects to regain back the loss of percentage sales in China and all over the world (Da Xu, He & Li, 2014). |
|
Scope of evidence |
To mark the originality of the products, the company will be relying on the usage of the Internet of Things (Stankovic, 2014). The two technologies that will be used to implement the services of the Internet of Things are the Thin Film Tokens (TFT) or the Radio Frequency Identification (RFID) Tags along with the Near Field Communication (NFC) devices (Amendola et al., 2014). The TFTs will be placed on the tins of the milk powder or the milk packaging to confirm the originality of the products by the vendors and the users who will consume the products. On the other hand the NFC capabilities of the smart devices will allow the users and to drive out the valuable information of the TFT with the process of scanning (Whitmore, Agarwal & Da Xu, 2015). By this way, the originality of the product can be successfully determined and tracking will become relatively easier with the flow of the processes facilitated by the Internet of Things. |
||
Definition & explanation of the models that are intended to be used |
The two types of technologies that are intended to be used to in the system of facilitating the business processes for the Moo Milk Products are the technology of Radio Frequency Identification (RFID) and the Near Field Communication (NFC). The Radio Frequency Identification (RFID) is a technology that involves the encoding of digital data in RFID tags or the smart labels (Yang et al., 2014). These labels are captured with the help of the radio waves. The RFID tags will be placed on the edges of the milk tins after the manufacturing of the product. All the information regarding the same will be available through the help of those tags. It will be possible to detect out if there is a tampering of the product or if the product is not original. The NFC equipped devices will enable the registered users to study the valuable data from the RFID tag. The technology is based upon the framework of the magnetic induction field and functions at a radio field range of 13.56MHz. |
||
Methodology for Analysis/Data collection |
The data collection process or the methodology of analysis of data will be performed with the help of the Automatic Identification and Data Capture (AIDC) techniques. The AIDC methods will automatically discover the projects, gather data about those objects and will enter the collected data into the computer systems with help of a very small amount or absolutely no intervention of the human beings. Information that will be collected from these devices will be transferred to one of the dedicated computers using a communication interface (Zhong et al., 2015). The data collected then can be stored in a database and can be retrieved from the databases according to the need of access. This way the detail of the milk products can be accessed by the management team the fraudulent activities can ceased while maintaining the quality of the products. The insights collected from the products will also enable the management team to be deterministic about the future events. |
||
Evidence |
Linkages and dependencies |
Application of the models |
The RFID models will consist of certain process modules. In the first step of the process model dairy level data collection process will be done. After the data collection process is over the time stamp of the process will start once the manufacturing session of the dairy products is over. The third module for the application model involves of the tracking of shipments into the receiving yards of the Moo Milk Product company (Yang et al., 2013). The next stage will include the unloading of the pallets and placement of them on the cooling tubes. After that stage is over, the dairy products with dedicated time stamps will be entering the cooling facility or the processing storage plant. Finally after all the stages of the processing models are completed, tracking of the individual bins pallets of the products or the cartons of the milks within the cooling facility or the processing plant will take place. After that, it will be out to the supply chain. |
Appropriate detail |
In accordance to the necessity of the Moo Milk Products company and to what the owner of the company wants, there are several applications of the RFID. The models discussed above will be required for the inventory management, tracking of the assets, tacking of the personnel, controlling access to the restricted areas, separate badging of the IDs of the dairy products, supply chain management or the logistics along with the counterfeit prevention. These are some of the ways through which the Moo Milk Products can be benefitted with the help of the modules as discussed in the above section of this proposal report. In addition to that, the scanning of the RFID tags with the help of the Near Field Communication capability attained devices will be advantageous for both the vendors and the registered users of the company. |
||
Interpretation |
Link to Situation/Issues & WIIFMs |
Clear analysis |
The background of the implementation of the services encapsulating the solutions of Internet of Things has been provided in this section. The background for this section has been divided into three subheadings which are the situations or issues, the scope of evidence and the definition & explanation of the models that are intended to be used. The next major heading of the following section is the Evidence that talks about the linkages and dependencies to the current state of the organisation. It is further divided into two other sections that are the application of the models and the appropriate detail of the models discussed. Finally, an overall analysis of the entire sections have been discussed. |
A detailed description of the proposal for the application of the internet of things on the enterprise has been provided in the following section.
Topic |
Solutions of internet of things in business. |
Theme |
Description of the proposal |
Element |
Implementing the Element |
||
Whole Picture View |
Explain Relationships |
Whole picture view |
Issue 1: One of the major issues for the application of the Internet of Things in the present sales is that the company at present is facing a decrease in percentage of sales of the milk and milk products in China. |
Issue 2: Another major issue is that the company is facing a lot of difficulties and is failing to retain its customers from all over the country. This poor retention of the customers has affected the percentage of sales of the whole enterprise. |
|||
Issue 3: The third major issue that is to be highlighted in the whole process of classifying the issues is that there are some unscrupulous people involved in the process of milk adulteration. They entailed in reusing of the opened containers of the milk formula and the milk powder to replace them with the inferior quality of the products. |
|||
Issue 4: All the above mentioned issues has led to the fact the reputation of the company has been hampered. The damage of the reputation has been caused and the owner of the company along with all others have been affected. |
The four issues mentioned in the above table can be can be aligned with the help of the two elements that is the element 2 and the element 3. The element 2 is based upon the overview of the enterprise architecture, the key elements present in the enterprise architecture and the effectiveness of the enterprise architecture in the functionality of the project. Element 3 on the other hand is based on the rough outline of the proposed implementation approach of the whole architecture.
Element 2
The overview of the enterprise architecture involves the usage of the architecture revolves around the storage of the information about the originality of the milk and the milk products. This architecture is entirely based on the Radio Frequency Identification (RFID) technology that is composed of the active and the passive RFID components. Further, the architecture within the enterprise will have a provision for the interpretation of the data using the devices equipped with the Near Field Communication (NFC) capabilities (Rose et al., 2015). Through the NFC technology embedded in an application, the registered users will get the opportunity to develop the knowledge about the originality of the products and also the history of the products. The application in addition will have the opportunity to store enough information about the insights of the customers to enable push marketing and promotion of the products.
Key elements of the Enterprise Architecture and their importance
The new Enterprise Architecture of the entire working system will be composed of all the above and in addition will be including the RFID technology along with the involvement of the application that is based upon the development of a particular application that will involve the capabilities of the Near Field Communication (Chaimae & Rahal, 2015). The two main components of the architecture will involve an Enterprise Operational Data Store and a RFID transaction data store. The first data store will be involving all the valuable information about the product history from the details of the cow to the final purchasing of the product. The second database will be involving all the information of the transactions of the products ranging from the price and the customer details. There will be two Web Application servers. The first application server will be involving Enterprise Resource Planning Application components and the other server will be involving the Application Components for the RFID data. The application components of the RFID will help the enterprise to monitor and control the quality of the products while the ERP Application components will be helpful in increasing the percentage of sales. A web server will be involved that will be entitled with the all the web services that will necessary for all the authentic users of the dairy company (Sharma et al, 2013). The web server will guarded with the help of firewalls to put an end to the fraudulent activities over the internet.
The new part of the architecture will be integrated into the existing enterprise architecture to formulate the needs and meet the client requirements. The OSI layers involved in the system are as follows:
7 – Applications & Interfaces involving NFC capabilities
6 – Syntactic representations and transformation of data from RFID tags
5 – Coordination of connection & Interaction – managing & synchronisation of the flow in data.
4 – Certifies end-to-end transfer of data(assembling of the data packets)
3 – Routes & relays data units and also manages the flow of control
2 – Node to Node data transfer in the within network – Ensures integrity of data
1 – Restricts and encrypts the bits into the physical medium which are electrical, mechanical and procedural
Element 3
Element |
Implementing the Element |
|
Outline Sequence |
Scope the sequence |
The scope of the sequence involves the process flow of the rough outline of the proposed implementation approach of the whole architecture (Coskun, Ozdenizci & 2013). It will start with the capturing of data for the management, then data will be captured through the logistics train but the data will not be linked into the product. Then the marketing process of the milk products will start and will finish at the handover of the products to the users |
Overview of the sequence |
Start Point: Capturing of data for the management that involves detail of the cow to the process of packaging. |
|
Stage 1: The MMP canning factory will be tested with the help of reading information from the TFT or RFID equipped tags fitted on the edges of the containers. This reading of the information will be facilitated with help of the concept of Internet of Things. Previously the system lacked the surveillance procedure but in future will be integrated with the technological models of the system. |
||
Stage 2: The logistics train will be integrated in this stage. After the packaging of the containers are completed, the containers will be transferred to the logistic train from where the provenance of the user will be tested. |
||
Stage 3: After that, the development of the mobile application will take place and the NFC will be embedded into the application (Nagashree, Rao & Aswini, 2014). |
||
Stage 4: The final stage of this process will involve the marketing of the products with the help of the marketing systems in social medial and awareness programmes. |
||
End Point: Marketing of the products to the registered users who are facilitated with the mobile application that involves tracking of the insights. |
||
Overview of the outcome |
It is evident from the outline sequence that the process flow will be a long term process and it will be aiming at increasing the percentage of sales, attracting new customers, improving the quality of the products and the restoring the company reputation. |
Figure 3: IoT management process flow
(Source: Internet)
Topic |
Solutions of internet of things in business. |
Theme |
Discussion of the Cons and Pros in relation to the risk management |
Element |
Implementing the Element |
|||
Whole Picture View |
Explanation of the Relationships |
Whole picture view |
Privacy Issues: The privacy issues in the implementation of Internet of Things in the system may include data breach (Kim et al., 2015). |
|
Security Issues: The security issue in the implementation approach may involve data thefts and hacking of the user systems. |
||||
TFT Control and Security Issues: These are the issues that are involved with the handling of the TFTs or the RFID tags. It also talks about the security issues involved in the installation of those tags (Bajaj, 2014). |
||||
Intellectual Property Control: This is one of those issues that involves the management of the online services and licensing of the agreements (Sadgrove, 2016). |
||||
Description of the Issues |
Focussed Groupings |
1 |
Introduction/overview of the Grouping |
The privacy issues for the implementation of the idea of the internet of things in the system are ample. The risks associated with the privacy of the customers may include reselling of the personal information (Grosse-Puppendahl et al., 2014). These risks can be mitigated with the help of the formation of dedicated risk management plan. The risks involved in this process may be have a very high impact which could be mitigated by the strict surveillance offered by IoT (Aarnio, 2013). |
Description of the appropriate aspects |
||||
Description of the outcomes/effects (Link to WIIFMs A/R) |
||||
2 |
Introduction/overview of the Grouping |
The security issues of the system may also include the involvement of the several risks. The risks associated may affect the databases, communications, application level, and procedural mechanism (Plos et al., 2013). The threats may include data thefts and silent hacking. The impact level of this risk is also very high and could be mitigated with the help of effective firewall and antivirus software. |
||
Description of the appropriate aspects |
||||
Description of the outcomes/effects (Link to WIIFMs A/R) |
||||
3 |
Introduction/overview of the Grouping |
The TFT or RFID tag Control and security issues of the system may also include the involvement of the several risks. The risk associated may include the tampering and replication of those tags. The impact for the risk may range from medium to low. The tampering of the tags can be mitigated with the help of the strict surveillance of the system through effective tools of IoT. The replication process can be mitigated with the help of the effective encryption techniques. |
||
Description of the appropriate aspects |
||||
Description of the outcomes/effects (Link to WIIFMs A/R) |
||||
4 |
Introduction/overview of the Grouping |
Intellectual property Control is one of those issues that are involved between the QM and the MMP. The QM will be efficient enough to control and maintain the IPs but this process will be facilitated once there is a proper investment of the process from the end of the MMP. The licensing agreement will be done with the help of installation of new certificates at regular intervals. This would finally serve as the beneficial for the process of implementation of the services. The impact of this issue is low. |
||
Description of the appropriate aspects |
||||
Description of the outcomes/effects (Link to WIIFMs A/R) |
||||
Overview of Relationships |
Reinforcing the whole picture view |
In the above section, the different issues relating to the management of the risks have been discussed. The issues included the privacy issues, the security issues, TFT control and Security Issues and Intellectual Property Control (Marcelino-Sádaba et al., 2014). |
Conclusion
From the whole proposal report it can be concluded the owner of the company Mr. Bill Buller and the company of the Moo Milk Products had a good reputation in the China market. However, the reputation of the company was damaged and the percentage of the sales has decreased. The whole scenario happened due to the fact that few of the employees of the company have been related to some of the unscrupulous activities about reusing the containers and replacing the products with the inferior quality.
This report provides a detailed description of the ways through which the concept of Internet of Things can be applied in the system. At first, the overview of the proposal has been depicted. Then an explanation of the need of change of the entire system has been provided including the background, evidence and the interpretation. After that the description of the proposal has been presented with the inclusion of the whole picture view, description of the issues along with the architectural model for the implementation. Finally, the detail of the cons and pros relating to the risk management procedure has been provided.
Aarnio, T. (2013). Near Field Communication.
Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of things journal, 1(2), 144-152.
Bajaj, C. (2014). Near Field Communication. International Journal of Advanced Research in Computer Science and Software Engineering, Department of Computer Science & Engineering, Ambedkar Institute of Advanced Communication Technologies and Research, Delhi, India, 4(8).
Chaimae, E., & Rahal, R. (2015). NEW WAY OF PASSIVE RFID DEPLOYMENT FOR SMART GRID. Journal of Theoretical & Applied Information Technology, 82(1).
Chandrakanth, S., Venkatesh, K., Uma Mahesh, J., & Naganjaneyulu, K. V. (2014). Internet of things. International Journal of Innovations & Advancement in Computer Science, 3(8), 16-20.
Coskun, V., Ozdenizci, B., & Ok, K. (2013). A survey on near field communication (NFC) technology. Wireless personal communications, 71(3), 2259-2294.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233-2243.
Gatzert, N. (2015). The impact of corporate reputation and reputation damaging events on financial performance: Empirical evidence from the literature. European Management Journal, 33(6), 485-499.
Gatzert, N., Schmit, J. T., & Kolb, A. (2016). Assessing the risks of insuring reputation risk. Journal of Risk and Insurance, 83(3), 641-679.
Grosse-Puppendahl, T., Herber, S., Wimmer, R., Englert, F., Beck, S., von Wilmsdorff, J., … & Kuijper, A. (2014, September). Capacitive near-field communication for ubiquitous interaction and perception. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 231-242). ACM.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Kim, J., Banks, A., Xie, Z., Heo, S. Y., Gutruf, P., Lee, J. W., … & Choi, J. (2015). Miniaturized Flexible Electronic Systems With Wireless Power and Near?Field Communication Capabilities. Advanced Functional Materials, 25(30), 4761-4767.
Marcelino-Sádaba, S., Pérez-Ezcurdia, A., Lazcano, A. M. E., & Villanueva, P. (2014). Project risk management methodology for small firms. International journal of project management, 32(2), 327-340.
Nagashree, R. N., Rao, V., & Aswini, N. (2014). Near field communication. IJ Wireless and Microwave Technologies, 4(2), 20-30.
Plos, T., Hutter, M., Feldhofer, M., Stiglic, M., & Cavaliere, F. (2013). Security-enabled near-field communication tag with flexible architecture supporting asymmetric cryptography. IEEE transactions on very large scale integration (VLSI) systems, 21(11), 1965-1974.
Rose, D. P., Ratterman, M. E., Griffin, D. K., Hou, L., Kelley-Loughnane, N., Naik, R. R., … & Heikenfeld, J. C. (2015). Adhesive RFID sensor patch for monitoring of sweat electrolytes. IEEE Transactions on Biomedical Engineering, 62(6), 1457-1465.
Sadgrove, K. (2016). The complete guide to business risk management. Routledge.
Sharma, V., Gusain, P. R. E. E. T. I., & Kumar, P. (2013). Near field communication. Department of Computer Science & Engineering Tula’s Institute, The Engineering and Management College, Dehradun, Uttarakhand, 248001.
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9.
Wang, L., Da Xu, L., Bi, Z., & Xu, Y. (2014). Data cleaning for RFID and WSN integration. IEEE Trans. Industrial Informatics, 10(1), 408-418.
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261-274.
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems Engineering, 57(3), 221-224.
Yang, L., Chen, Y., Li, X. Y., Xiao, C., Li, M., & Liu, Y. (2014, September). Tagoram: Real-time tracking of mobile RFID tags to high precision using COTS devices. In Proceedings of the 20th annual international conference on Mobile computing and networking (pp. 237-248). ACM.
Yang, P., Wu, W., Moniri, M., & Chibelushi, C. C. (2013). Efficient object localization using sparsely distributed passive RFID tags. IEEE transactions on industrial electronics, 60(12), 5914-5924.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things journal, 1(1), 22-32.
Zhong, R. Y., Huang, G. Q., Lan, S., Dai, Q. Y., Chen, X., & Zhang, T. (2015). A big data approach for logistics trajectory discovery from RFID-enabled production data. International Journal of Production Economics, 165, 260-272.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download