Free Essay

Effectiveness and Efficiency Mobile-Based Applications Provide to Capture Geolocation Data

In: Computers and Technology

Submitted By Dariostanley
Words 1672
Pages 7
Pennsylvania Correctional System Network Project
Daniel Stanley
Strayer University

Pennsylvania Correctional System Network Project

This proposal is for a data communication network to serve the Pennsylvania Correctional system. The Pennsylvania legislature recently approved funding sufficient to pay for the development of this proposal. Pending proposal acceptance by the Pennsylvania State Correctional Office of Technology (a department within the state Office of Corrections), funding will be sought to implement the proposal.
The proposed network is designed to serve the state Office of Corrections and two of its local district offices. The state office, located in Pennsylvania, contains five departments to be served by this network. Each correctional office contains four departments to be served. The Correctional facilities located in York, 50 miles from the state office. The Correctional facilities located in Harrisburg, about 75 miles from the state office. This network is for administrative purposes and is specifically designed to be independent of officers computing facilities.

Objectives of the Network

The network is designed to achieve several specific business/operational objectives: 1. Secure Service: The main objective of this network is to provide secure administrative computing service to the State Office and two districts. It is designed to be functionally and physically isolated from access by people not employed by Pennsylvania Correctional system so as to minimize the risk of unauthorized use. 2. Integration and Update: Presently there are many LANs in the Pennsylvania Correctional system, but much of the equipment is out of date, many of the LANs are incompatible with each other, and not connected in a system-wide network. This proposal describes a WAN that integrates and updates these LANs to support productive collaboration across the system. 3. Versatile Information Processing: The network will enable users to retrieve, process, and store ASCII and non-ASCII text, still graphics, audio, and video from any connected computer. 4. Collaboration: The network will combine the power and capabilities of diverse equipment across the state to provide a collaborative medium that helps users combine their skills regardless of their physical location. A network for this correctional community will enable people to share information and ideas easily so they can work more efficiently and productively. 5. Scalability: The design is scaleable so that more district offices can be added as funding becomes available without having to redo the installed network.

Intended Users

The primary users of the network at the state level will be the three administrators, three secretaries, ten members of the Deputies Department, eight members of the Human Resource Department, six members of the Finance/Accounting Department, and three members of the Computer Services Department. At the district level the primary users will be four administrators, four secretaries, four members of the Computer Services Department, sixteen members of the Human Resource Department, and two members of the Finance/Accounting Department. Contractors with clearances are secondary users of the network in that they will receive information produced on the network, but they will not directly use the network.
Data Types
The types of data served by the network will be reports, bulletins, accounting information, personnel profiles, and web pages. The majority of the data will be text (ASCII and non-ASCII), but there will be some still graphics and possibly a small amount of voice and video (primarily for PC-based teleconferencing). Data will be created and used at all end stations on the network. The data will be produced by software applications in Windows Server 2003, primarily Office 2010 Professional (Word, Excel, Access, PowerPoint, and Outlook). Other data sources to be supported on at least a limited basis will Windows Server 2003 Accessories (Paint, Notepad, etc.), NetMeeting. Note that the network will be not be accessible from outside. Numbers of Users and Priority Levels

At the state level, the users will be administrators, secretaries, and members of four departments. At the district levels, the users will be administrators, secretaries, and members of three departments. The maximum estimated number of users on the network at any given time is 100: 33 regular users in the State Office, 30 regular users in the North District Office, 30 regular users in the South District Office, and seven otherwise unanticipated users.

Three priority levels will be supported: management (top priority), user (medium priority), and background (low priority). Note that these designations do not correspond to administrative levels in the Pennsylvania Correctional system; rather, they are network service levels. Network management processes will receive top-priority service; most network processes will receive medium-priority service; a few processes (e.g., e-mail transfers, backup, etc.) will be given low-priority service. It should be noted that network management will usually consume a small amount of the available bandwidth; this means that management and user processes will usually enjoy identical support. Background processes will also usually receive more than adequate service, but they will be delayed as needed to maintain support for management and user services. The network is to be transparent to the users. Thus, remotely executed applications, file transfers, and so forth should ideally appear to operate as quickly as processes executed within an end-station. Interviews with users to ascertain their needs and expectations indicate that an average throughput of 20 mbps per user within each LAN and 10 mbps per user between LANs will more than support the needed performance in most cases (teleconferencing being the possible exception).
Storage Requirements
Storage requirements need to be large enough to store all Deputies, administrators and contractors data. Interviews and observations of users’ present and anticipated storage requirements indicate that each user will need an average of 100 MB of server space (in addition to secondary storage on local PCs); the maximum estimated server-side storage requirement per user is about 1 GB. Additionally, the network operating system will occupy about 500 MB on each LAN server. Taking price-performance issues into account, each PC will have a minimum storage capacity of 10 GB, each LAN server will have a minimum storage capacity of 20 GB. A main data server in the State Office will have a 36 GB capacity.
Security Requirements A firewall will be used so unauthorized users will be restricted. Part of the security will be Users accounts and passwords that will give limited access. There will be different access capabilities for network managers and users. Interviews with users and observation of LAN use at the three locations yielded data on hourly average and peak loads from January to March, 2012. The data indicate that the highest average traffic volume will occur from 8:00 a.m. to 6:00 p.m., Monday through Friday. The peak network traffic volume is expected at two times during the day: 8:00 a.m. to 12:00 noon and 3:00 p.m. to 5:00 p.m. At night and on weekends the network traffic is minimal except for the daily backups of the PCs to the LAN servers in the districts and several batch data transfers anticipated from the districts to the State Office.

CORRECTIONAL OFFICES HIGH-LEVEL NETWORK DESIGN

Top-Level Network Diagram | North District |

South District |

State Office |

State Correctional Network |

Internet |

DS-2
(6.5 Mbps) |

DS-2
(6.5 Mbps) |

DS-2
(6.5 Mbps) |

|
-------------------------------------------------

Correctional State Office Network Diagram(LAN cabling is 100BaseT CAT5) | State Correctional Network |

To District Offices |

DS-2 lines |

Network PrinterHP 8150N |

|

Etherfast 24-port
10/100 Switch |

HP LH 3000File & Print Server for Student/School Data |

Server 36GB |

Cisco 2621 |

Router |

HP LH 3000File & Print Server for State Office internal LAN |

Server |

State OfficeAdministrationLAN |

State OfficeCurriculumLAN |

State OfficeFinance/AccountingLAN |

State OfficeHuman ResourcesLAN |

State OfficeComputer ServicesLAN |

FAX |

IntelliFax-4750 |

|

Correctional State Office Network Sub-DiagramAdministration LAN | Etherfast 8-port
10/100 Mbps Hub |

(LAN cabling is 100BaseT CAT5) |

Network PrinterHP 8150N |

Etherfast 24-port 10/100 Switch |

|

Correctional State Office Network Sub-DiagramFinance/Accounting LAN | Etherfast 8-port
10/100 Mbps Hub |

(LAN cabling is 100BaseT CAT5) |

Etherfast 24-port 10/100 Switch |

|

Correctional State Office Network Sub-DiagramTraining module LAN | Etherfast 12 Port
10/100 Mbps Hub |

Etherfast 24-port 10/100 Switch |

(LAN cabling is 100BaseT CAT5) |

|

Correctional State Office Network Sub-DiagramHuman Resources LAN | (LAN cabling is 100BaseT CAT5) |

Etherfast 12 Port
10/100Mbps Hub |

Etherfast 24-port 10/100 Switch |

|

Correctional State Office Network Sub-DiagramComputer Services LAN | Etherfast 8-port
10/100Mbps Hub |

(LAN cabling is 100BaseT CAT5) |

Etherfast 24-port 10/100 Switch |

|
-------------------------------------------------

North District Network Diagram(LAN cabling is 100BaseT CAT5) | To State Office |

DS-2 |

Network PrinterHP 8150N |

|

Etherfast 24-port
10/100 Switch |

HP LH 3000File & Print Server for Student Data |

Server |

HP LH 3000File & Print Server for District internal LAN |

Server |

DistrictAdministrationLAN |

DistrictFinance/Accounting& Computer ServicesLAN |

DistrictHuman ResourcesLAN |

FAX |

IntelliFax-4750 |

|

Router |

Cisco 2621 |

|

North District Network Sub-DiagramAdministration LAN | (LAN Cabling is 100BaseT CAT5) |

Etherfast 12 Port
10/100Mbps Hub |

Etherfast 24-port 10/100 Switch |

|

North District Network Sub-DiagramFinance/Accounting & Computer Services LAN | Etherfast 8-port
10/100 Mbps Hub |

(LAN Cabling is 100BaseT CAT5) |

Etherfast 24-port 10/100 Switch |

|

North District Network Sub-DiagramHuman Resources LAN | Etherfast 20 Port
10/100 mbps Hub |

Etherfast 24-port 10/100 Switch |

(LAN Cabling is 100baseT CAT5) |

|
-------------------------------------------------

South District Network Diagram(LAN cabling is 100BaseT CAT5) | To State Office |

DS-2 |

Network PrinterHP 8150N |

|

Etherfast 24-port
10/100 Switch |

HP LH 3000File & Print Server for Student Data |

Server |

HP LH 3000File & Print Server for District internal LAN |

Server |

DistrictAdministrationLAN |

DistrictFinance/Accounting& Computer ServicesLAN |

DistrictHuman ResourcesLAN |

FAX |

IntelliFax-4750 |

|

Router |

Cisco 2621 |

|

South District Network Sub-DiagramAdministration LAN | (LAN Cabling is 100baseT CAT5) |

Etherfast 12 Port
10/100Mbps Hub |

Etherfast 24-port 10/100 Switch |

|

South District Network Sub-DiagramFinance/Accounting & Computer Services LAN | Etherfast 8-port
10/100 Mbps Hub |

(LAN Cabling is 100BaseT CAT5) |

Etherfast 24-port 10/100 Switch |

|

South District Network Sub-DiagramHuman Resources LAN | Etherfast 20 Port
10/100 Mbps Hub |

Etherfast 24-port 10/100 Switch |

(LAN Cabling is 100baseT CAT5) |

|

DETAILED DESIGN DOCUMENTATION…...

Similar Documents

Premium Essay

Mobile Computing & Social Networks

...Paper: Mobile Computing & Social Networks Week 10: Mobile Computing & Social Networks Professor Gregory Hart Information System Decision-Making CIS500 September 9, 2012 Abstract In my paper I will talk about Mobile Computing and Social Networks and how they all work. I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Examine the challenges of developing applications that run on mobile devices because of the small screen size. Describe the methods that can be used to decide which platform to support, i. e., iPhone, iPad, Windows Phone, or Android. I will also talk about Mobile applications require high availability because end users need to have continuous access to IT and IS systems. I will discuss ways of providing high availability. Finally I will discuss mobile devices are subjected to hacking at a higher rate that non-mobile devices and discuss methods of making mobile devices more secure. Table of Contents Abstract ………………………………………………………………………………....... 2 Contents ………………………………………………………………………………….. 3 Effectiveness & Efficiency mobile-based applications to capture Geolocation data ……. 4 Benefits realized by consumers to access their own data via mobile......

Words: 2905 - Pages: 12

Premium Essay

Mobile Computing and Social Networking

...Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to......

Words: 3603 - Pages: 15

Premium Essay

Mobile Phone Application

...Mobile Phone Application: MHelpdesk MHelpdesk mobile is an application that I personally use which is a mobile version of the ticketing system used to keep track of requests and transactions for my clients. MHelpdesk mobile is an app that helps mange work orders, invoices, service and repairs on the iPhone, iPad, and any Android 2.0+ device. The whole purpose of MHelpdesk is to have online secure software where a small to medium size business can create tickets when a call or email comes in from a customer and assign this ticket to any available technician. Create a service ticket, track it’s progress, record notes, then invoice your customer. It works on your smart phone, laptop or desktop The application can be used with Google Calendar which then synchronizes with my mobile device advising me when the next appointment is scheduled an hour or two prior to the actual time scheduled. From experience I was using previously Quickbooks online which was a free service and also had a mobile application as well but wasn’t always functional when needed. Since I currently am the only employee in the business, I manage what would be considered every department within an organization such as the sales, marketing, accounting, etc. Quickbooks online pretty much did what I needed which is have a list of customers and send them an invoice after work was performed. Unfortunately, they only allowed a maximum of five customers in which was fine in starting a business from the ground up,......

Words: 1437 - Pages: 6

Premium Essay

Mobile Application Security

...SECURING A MOBILE WORLD Introduction Today’s smartphones and tablets are more than communication devices. They are hip-mounted personal computers, with more memory and processing power than your laptop of just a few years ago. They are an integrated part of our lives… personal and professional. The information they provide is so vital that the Army is piloting their use as standard field issue to every soldier, complete with combat-focused applications [1]. However, smartphones and tablets raise new security issues. They are more likely to be lost or stolen, exposing sensitive data. Malware risks are increased because they connect to the Internet directly rather than from behind corporate firewalls and intrusion-protection systems. Security of mobile devices focuses on controlling access through the use of device locks and hardware data encryption. While this may be sufficient for individual users, it is insufficient for defense needs. Many documented examples exist of hacking of the device lock, as well as defeats of the hardware-level encryption. Once the device is unlocked, there is generally unfettered access to all apps and their associated data. Military applications require additional application-level access controls to provide data security. Unfortunately, there are gaps in the application-level security model of the two predominant mobile operating systems: iOS from Apple and Google Android. Our ongoing research1 looks to address these gaps by developing......

Words: 4009 - Pages: 17

Free Essay

Mobile Applications

...There are many great web and mobile applications available to users or many different platforms. Google Maps is a versatile application that is easy to use and full of great features. Google Maps is a web mapping service created by Google. There are numerous applications that can interact with Google Maps. This application is has changed the way society finds their way around the world. Google created Google Maps to help users find their way. Sherwin (2010), "Google Maps is the most well-known map service on the net offering a basic street maps, terrain maps, satellite images and hybrid view which is a combination of the street maps and satellite images” (para. 3). Google works with a private company, Tele Atlas, to drive their Google Maps application. Tele Atlas is a world leader in navigation and location based services. The maps produced by Tele Atlas have been known to be very accurate. Tele Atlas has been praised for mapping extremely rural areas and the terrain (Sherwin, 2010). Working with Tele Atlas ensures that Google Maps is both accurate and reliable. While the browser version of Google Maps is great, the mobile version is where it really shines. There are many tools available for use on the Android and iOS platforms. One helpful tool is the Place Pin on the Map feature. According to "Quick Tips On Using Google Maps For iPhone" (2012), you can "simply press and hold any location on the map. Tap the resulting info sheet for additional options such as saving the......

Words: 789 - Pages: 4

Premium Essay

Mobile Computing. Social Networking

...Term Paper Mobile Computing and Social Networks Emanuel Hampton - Student CIS 500 - Information Systems for Decision Making Dr. Ringhand - Professor June 13, 2013 I. Introduction. There are thousands of applications that have been developed for mobile devices which perform a myriad of tasks and processes. In the beginning most of these applications were games. Business later joined the mobile revolution and developed their own business based applications to run on these mobile devices. Many mobile business applications can now streamline business processes, reduce operational processing times and provide better customer service. The mobile revolution has forced many industries to reengineer their business processes to accommodate the many mobile devices. In order for a business to remain competitive within their particular industry they must engage the mobile platform. In fact today, the customers demand and expect that these applications be available for their use. For this final term paper I have been asked to: (1) Assess the effectiveness and efficiency of mobile-based applications especially those which utilize GPS to capture information vice a desktop PC. (2) Evaluate the benefits afforded to the customer from mobile applications. (3) Examine the challenges of developers to design mobile applications to meet the various mobile devices specifications especially their many screen formats. (4) Describe methodologies to use to select the mobile......

Words: 3789 - Pages: 16

Premium Essay

Efficiency and Effectiveness

...Difference Between Efficiency and Effectiveness Efficiency refers to doing things in a right manner. Scientifically, it is defined as the output to input ratio and focuses on getting the maximum output with minimum resources. Effectiveness, on the other hand, refers to doing the right things. It constantly measures if the actual output meets the desired output. “Effectiveness” is also getting the right things done. This is where the efficiency is different than effectiveness. With efficiency, is to get the task done faster, easier, or better way. But with effectiveness, there always an initial question as to “what to do”? We need this measure for marketing activities and business processes since it helps us see when we are minimising resources or time needed to complete a process, i.e. we are keeping our costs low. In digital marketing, for example, efficiency involves increasing conversion rates and reducing costs of acquisition. It is still used in many large organisations and can still be used to today to help translate vision and strategy into objectives and then, through measurement, assessing whether the strategy and its implementation are successful. I’m a firm believer in shopping around for the best deal and I commend organizations that do so.  My goal is to bust this myth open and expose the fact that focusing solely on efficiency is no longer sufficient to remain competitive in today’s business world.  Corporate executives need to ask if their event portfolio......

Words: 408 - Pages: 2

Free Essay

Mobile Applications

...Mobile Applications Chris Capone CIS/207 25 February 2013 Professor Suder A current web tool used in today’s cyber world of information called a “Widget” is a program that broadcasts or embeds itself into web pages, blogs, and startup pages. These tools, usually in the form of an advertisements also can items such as clocks, news flashes, or Weather forecast that post on the website for personal settings or pop up as a portion of the page. Widget creation come in the form of JavaScript, DHTML, and Adobe flash, typically coded into a small part of the web page by an end user. Google uses widgets out of most of the popular Internet sites because of its large search engine capabilities. For example, when a search is conducted to find local restaurants in a particular area, a map appears to reveal those locations in the surrounding area selected by the user. When the mouse is hovered over one of those locations, a widget appears describing information about the business, the address, phone number, and reviews of the restaurant. If the business has its own web page, the link to this particular business will also be displayed. Below is an example of this type of widget; One of the top Web widgets listed on Yola’s Top...

Words: 726 - Pages: 3

Premium Essay

Mobile Computing and Social Networks Term Paper

...Mobile Computing and Social Networks. Abstract Mobile computing has rapidly evolved for the last two decades with the use of wireless technology making the location irrelevant and increasing the opportunities for business to streamline business processes, reduce operational processing times and provide better customer service. Mobile revolution has also forced many industries to reengineer their business processes to accommodate the many mobile devices. Mobile computing and social networks are part of the daily lives of millions of Americans. 42% of American adults own a mobile and tablet computing device. “Additional research shows that about three quarters of U.S. adults are online, with about 66% of them using social networking sites” (Brenner, 2012). Specific methods for how IT departments and mobile app developers and designers can decide on supporting different mobile platforms like the Apple iPhone, Apple iPad, Windows Phone, or Android supported smartphones and tablets will be discussed. Other topics addressed in this paper include the issue of “high availability” for mobile app users’ Based on these considerations organizations and businesses are nowadays focusing on the implementation of these applications, while replacing their desktop platforms to the mobile devices (Shih, et.al. n.d). “On the other hand, it is also observed that, these applications may also enhance various risks and vulnerabilities,...

Words: 4537 - Pages: 19

Premium Essay

Mobile Application Based Sustainable Irrigation Water Usage Decision Support System: an Intelligent Sensor Cloud Approach

...Mobile Application Based Sustainable Irrigation Water Usage Decision Support System: An Intelligent Sensor CLOUD Approach Cecil Li Claire D'Este Ritaban Dutta Corné Kloppers Ahsan Morshed Auro Almeida Aruneema Das Jagannath Aryal Commonwealth Scientific and Industrial Research Organisation (CSIRO), Hobart, Australia 7001 Abstract— In this paper a novel data integration approach based on three environmental Sensors – Model Networks (including the Bureau of Meteorology-SILO database, Australian Cosmic Ray Sensor Network database (CosmOz), and Australian Water Availability Project (AWAP) database) has been proposed to estimate ground water balance and average water availability. An unsupervised machine learning based clustering technique (Dynamic Linear Discriminant Analysis (D-LDA)) has been applied for extracting knowledge from the large integrated database. The Commonwealth Scientific and Industrial Research Organisation (CSIRO) Sensor CLOUD computing infrastructure has been used extensively to process big data integration and the machine learning based decision support system. An analytical outcome from the Sensor CLOUD is presented as dynamic web based knowledge recommendation service using JSON file format. An intelligent ANDROID based mobile application has been developed, capable of automatically communicating with the Sensor CLOUD to get the most recent daily irrigation, water requirement for a chosen location and display the status in a user friendly traffic light...

Words: 2205 - Pages: 9

Free Essay

The Effectiveness Comparison Between Mobile Based Learning Technology with Face-to-Face as a Teaching Method of Accounting Information System Critique

...‘The effectiveness comparison between mobile based learning technology with face-to-face as a teaching method of Accounting Information System’, Global Conference and Finance Proceedings, Volume 9, Number 1. Authors conducted a study on the mobile-based teaching method to test if it will improve the student’s performance not only in technical skills but also in personal skills in learning Accounting Information System. The study was an exploratory research to develop a mobile learning application of Accounting Information Systems and test on the AIS mobile learning application made using the quasi-experimental research design. A pre-test exam was conducted where 50 accounting students who have completed Accounting Information Systems (AIS) courses were provided 20 randomly selected multiple-choice questions from 30 available questions with topic of data warehouse. The research result showed that before the student use mobile technology, their performance was not as expected. This pre-test result will then be compared with their exam score after taking advantage of the mobile learning application program which is still not published to date. The study reveals that the education system until now is mostly done by traditional face-to-face between students and educators with a shift in learning paradigm from conventional to sophisticated learning using technology. The development of ICT had clearly improved the education method in classrooms. On the other hand, Mobile......

Words: 1329 - Pages: 6

Premium Essay

Mobile Computing and Social Networking

... Mobile Computing and Social Networking CIS 500 Info System Decision-Making With the advancement in technological innovations, users have migrated from desktop to smartphones. These smartphones provides a significant number of features than a desktop, which requires better hardware requirements and processor usage for running software and applications. While in comparison to desktop applications, smartphones requires less memory storage and processor requirements for running mobile applications, which can run on low powered handheld devices. Within a few years mobile users have increased at very high rate because of their features such as portability, rich graphical interface and support for media formats with high-quality resolution graphics. Most popular smartphone operating systems that are used on the smartphones are Android, iOS, Blackberry, and Windows. There are numerous advantages of mobile applications in which a user can perform most of their tasks with ease and flexibility. These smartphones have several features that support for E-Mails, text messaging and video conferencing with users who are residing far away. The reason for using smartphones is the availability of a large number of applications in which business organizations can also offer their services and performs their business processes. There are thousands of applications available from online application (app/apps) market for individuals such as educational......

Words: 3167 - Pages: 13

Premium Essay

Mobile Application Development Strategy

...STRATEGY PAPER: Mobile Application Development Mobile Application Development Strategy Document No: Strategic Initiative: Coverage: Classification:  RTC 01 Version : 1.0 Increasing customer loyalty base and enhancing customer reach through Mobile application Retail SBU Strategic Date Last 17.11.2014 Changed: Strategic High Value: Time Frame: Priority: Long Term High 1.0.Corporate/Business Vision: We are the most admired global energy company leveraging talent and technology. We are the first choice of customers, always We exploit profitable growth opportunities outside energy  2.0.Description of Strategic Initiative: Consumers are spending more time on their apps than ever before. Over the past half-decade, the proliferation of mobile devices has transformed us into an app-driven society, presenting marketers with new opportunities to connect with consumers by creating more interesting and sophisticated apps to command their attention. Mobility offers tremendous opportunities for every business unit in the enterprise. From optimizing processes to real-time collaboration, improved customer experiences to increased revenues, the benefits are big—but so are the challenges. Cisco recently published statistics that demonstrate how user demand is driving every enterprise down the mobile route whether they like it or not. Version 1.0 Page 1 STRATEGY PAPER: Mobile Application Development This explosive growth......

Words: 4889 - Pages: 20

Premium Essay

Mobile Application Data Collection

...Mobile Application Data Collection CIS/207 In the deployment of mobile applications, data collection is essential in promoting operational effectiveness and gathering information for marketing products to consumers. Our application will collect data from our users as disclosed in the end user license agreement. The application will feed this data into corporate systems that allow us to analyze the information for improved performance and tailoring experiences for customers. Essential data collected in the mobile application will consist of identity markers and payment information. The user will be required to set up an account with us and complete a form filled template to collect information. Identity markers consists of the user name, actual name, password, street address, zip code, gender and age. Optional identifying information will include date of birth, anniversary date and special event dates for the customer. Payment information will contain the user credit card number, expiration date, three digit security code and billing address data. The mobile application will collect information regarding market conditions for the individual user to allow promotion of items and special pricing for customers based on usage and preferences. The application will collect information regarding customer purchase history, including items bought, items frequently purchased together, and preferred store location. The application will......

Words: 575 - Pages: 3

Premium Essay

Data Capture

... 11.1 Data Capture Lecturer: Deepak Gautam Email: gautamd@wolverhamptoncollege.ac.uk Room: 120, Wulfrun Campus Telephone: 01902 821133 Overview of Data Capture The process of collecting data in a form suitable for use in an information system is termed data capture. For example, before an electricity board can charge a customer for the use of electricity, the customer’s meter must be read and recorded, or captured, on a suitable form. The data must then be transferred into the computer system by means of an input device appropriate to the method of data capture. Sometimes the data capture form is directly readable by an input device, as, for example, in the case of mark sensitive forms which can be read by optical mark readers (OMRs). On other occasions, the data on the form must be first transferred to a suitable medium by a data entry person using a key-to-storage device. Sometimes the data to be captured is pre-recorded on an item to be sold, as with bar codes, so that a data recording form is not required at all, but in many instances, some sort of data capture form is required. The design of such forms is of great importance, since the clearer and more concise the form, the less chance there is of inaccurate data being recorded. Frequently it is necessary to use questionnaires or observation sheets to collect data for statistical purposes, and again the quality of the design of these data capture forms......

Words: 2378 - Pages: 10