Information Technology in Business

1. Introduction: (400 words)

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

a) Explain the term Biometrics and Authentication along-with the various type of applications of Biometrics and Authentication used today.

b) Explain how Biometrics and Authentication can improve business processes and performance.

2. Background: (400 words)

a) Discuss the historical development of the Biometrics and Authentication along with its advantages for the organisations.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

b) Compare the business environment before and after the implementation of Biometrics and Authentication.

3. Discussion Section. Based on the recommended Biometrics and Authentication applications answer the following: (400 words)

a) Identify and explain the functions of software applications using in business related to the Biometrics and Authentication.

b) Does the system require some specific hardware to implement it? Discuss the key functions of the additional IT hardware requirements. If your answer is no, justify the reason.

4. Recommendations: (200 words)

a) Provide a secure computing environment that ensures data privacy and integrity which mitigates cyber-security threats.

5. Include report summary: (400 words)

a) Discuss the role of Biometrics and Authentication in the economy of Oman.

b) Discuss the possible effect of the use of Biometrics and Authentication on Omani society.

6. Conclusion:

a) Conclusion indicating that the report objectives have been met. (200 words)

FACULTY OF BUSINESS AND MANAGEMENT STUDIES

UNDERGRADUATE BUSINESS PROGRAMME

ACADEMIC YEAR 2020-2021, 1st Semester

January – 2021

WRIT1

Programme Title: BMS, A&F, MM, BE, BIS

Module Title: Information Technology in Business

Module Code: GCO3000

Assessment Method: Report

Level: 3 Block: 1

Module Credits: 20 Weighting: 50%

Due Date: 24-Nov-2020, 9:00 PM Word Count: 2,000

Examiner(s): Mr. Aumir Shabbir & Mr. Jawad Tauheed

Date of Submission: November 24, 2020

Version: 1

Pg. 2 Version 1

Gulf College – Faculty of Business and Management Studies – In academic

Affiliation with CARDIFF SCHOOL OF MANAGEMENT

A. Written work

➢ A signed declaration that the work is your own (apart from otherwise referenced
acknowledgements) must be included after the reference page of your assignment

➢ Each page must be numbered.
➢ Where appropriate, a contents page, a list of tables/figures and a list of abbreviations

should precede your work.
➢ All referencing must adhere to School/Institutional requirements.
➢ A word count must be stated at the end of your work.
➢ Appendices should be kept to the minimum and be of direct relevance to the content of

your work.
➢ All tables and figures must be correctly numbered and labelled.

B. Other types of coursework/assignments

➢ Where coursework involves oral presentations, discussions, poster presentations, etc.,
specific instructions will be provided by your module leader/team.

———————————————————————————————————————————————

Rewrite below part just after the References of your assignment.

WORK DECLARATION

I, [Name of Student], hereby declare that the uploaded Report through Turnitin is my own work. I

affirm that this has been researched and completed in accordance with the college rules and

regulations on plagiarism.

I acknowledge the advice given by the module tutors on proper referencing to avoid plagiarism and

the rules on the academic unfair practice.

I acknowledge that I read and understand the plagiarism guide written at the end of this

assessment. Any academic misconduct will be handled according to the rules and regulations of the

university.

[Name of Student]

Pg. 3 Version 1

General instructions

Report must be submitted online through Turnitin before due date.

The only circumstance in which assignments can be uploaded late via Turnitin is if a Mitigating

Circumstances (MC) form is submitted at the same time. In these circumstances work may be

submitted within five (5) working days. Make sure to secure MC form and submit the same to the

concerned staff.

Write the number of words used, excluding references, at the end of your assignment. Provide the

list of sources you used at the last page of your assignment with proper label ‘References’. You may

include diagrams, figures etc. without word penalty. The number of words will be + or – 10% of the

total words allowed.

A work declaration must be included on the first page of your assignment. This ensures that you

prepare your work in good faith. Any form of collusion and/or academic unfair practice will be dealt

with according to the pertinent rules and regulations of the partner university. Please read carefully

the plagiarism guide.

Assessment Details and Guidelines to Students:

This Report comprises 50% of the total assessments’ marks. Make sure you reference (proper

Harvard Referencing should be observed) any sources you have used to complete this assessment.

Analytical skills. The reflection report enables the students to analyse and evaluate the benefits of

the different activities done in the class. This skill will eventually help them evaluate options

necessary to make decisions in the workplace.

Paragraph Format:

Font size
14pt for heading

12pt for body text

Font style
Arial

(applicable to the source code as well)

Length of the contents (without the diagrams)

2000 words

(include page numbers at the right-hand

bottom of each page)

In addition, the assessment will test the following learning outcomes:

1. Discuss the key functions of IT hardware and software and their application to business.

3. Discuss the role of Information Technology within business and its wider role within society.

Pg. 4 Version 1

Assessment Task

CASE STUDY: Use of Biometrics and Authentication in the Development of Business.

The term Biometrics is commonly used today to refer to the authentication of a person by analysing

physical characteristics, such as fingerprints, or behavioral characteristics, such as signatures. Since

many physical and behavioral characteristics are unique to an individual, biometrics provides a

more reliable system of authentication than ID cards, keys, passwords, or other traditional systems.

Physical characteristics commonly used in biometric authentication include face, fingerprints,

handprints, eyes, and voice. Biometric authentication can be used to control the security of

computer networks, electronic commerce and banking transactions, and restricted areas in office

buildings and factories. It can help prevent fraud by verifying identities of voters and holders of

driver’s license or visas. In authentication, a sensor captures a digital image of the characteristic

being used to verify the user’s identity.

In this backdrop you are required to write a report to assess the benefits of Biometrics and

Authentication in business. The report should contain the following:

1. Introduction: (400 words)
a) Explain the term Biometrics and Authentication along-with the various type of applications

of Biometrics and Authentication used today.
b) Explain how Biometrics and Authentication can improve business processes and

performance.
2. Background: (400 words)

a) Discuss the historical development of the Biometrics and Authentication along with its
advantages for the organisations.

b) Compare the business environment before and after the implementation of Biometrics and
Authentication.

3. Discussion Section. Based on the recommended Biometrics and Authentication applications
answer the following: (400 words)
a) Identify and explain the functions of software applications using in business related to the

Biometrics and Authentication.
b) Does the system require some specific hardware to implement it? Discuss the key functions

of the additional IT hardware requirements. If your answer is no, justify the reason.
4. Recommendations: (200 words)

a) Provide a secure computing environment that ensures data privacy and integrity which
mitigates cyber-security threats.

5. Include report summary: (400 words)
a) Discuss the role of Biometrics and Authentication in the economy of Oman.
b) Discuss the possible effect of the use of Biometrics and Authentication on Omani society.

6. Conclusion:
a) Conclusion indicating that the report objectives have been met. (200 words)

References:

Provide a list of minimum eight (6) references from different sources including books, e-books,
online sources, newspapers, journals and publications using the proper Harvard referencing system.

***END OF ASSIGNMENT TASK***

Pg. 5 Version 1

GCO3000 – Information Technology in Business
AY: 2020-2021 / 1st Semester

Marking Scheme
Question

No.
Description

Marks

Allocated

1. Introduction (include all the required points)

a.
Explain the term Biometrics and Authentication along-with the various type of
applications of Biometrics and Authentication.

10

b.
Explain how Biometrics and Authentication can improve business processes and
performance.

10

2. Background (Knowledge and Analysis)

a.
Historical development of the Biometrics and Authentication along with its
advantages for the organisations.

10

b.
Compare the business environment before and after the implementation of
Biometrics and Authentication.

10

3. Discussion Section (Application)

a.
The key functions of software applications using in business related to the Biometrics
and Authentication.

10

b. Details of hardware requirements, if no hardware is required, justify the reason. 10

4. Recommendations

a.
Provide a secure computing environment that ensures data privacy and integrity
which mitigates cyber-security threats.

10

5. Report Summary

a. Discussion on the role of the Biometrics and Authentication in the economy of Oman. 10

b.
Discuss the possible effect of the use of Biometrics and Authentication on Omani
society.

10

6. Conclusion

a. Conclusion indicating that report objectives have been met. 10

TOTAL MARKS 100

Pg. 6 Version 1

Plagiarism

1. Plagiarism, which can be defined as using without acknowledgement another person’s words or
ideas and submitting them for assessment as though it were one’s own work, for instance by
copying, translating from one language to another or unacknowledged paraphrasing. Further
examples of plagiarism are given below:

Use of any quotation(s) from the published or unpublished work of other persons, whether
published in textbooks, articles, the Web, or in any other format, which quotations have not been
clearly identified as such by being placed in quotation marks and acknowledged.

Use of another person’s words or ideas that have been slightly changed or paraphrased to make it
look different from the original.

Summarising another person’s ideas, judgments, diagrams, figures, or computer programmes
without reference to that person in the text and the source in a bibliography or reference list.

Use of services of essay banks and/or any other agencies.

Use of unacknowledged material downloaded from the Internet.

Re-use of one’s own material except as authorised by the department.

2. Collusion, which can be defined as when work that has been undertaken by or with others is

submitted and passed off as solely as the work of one person. This also applies where the work of

one candidate is submitted in the name of another. Where this is done with the knowledge of the

originator both parties can be considered to be at fault.

3. Fabrication of data, making false claims to have carried out experiments, observations, interviews or

other forms of data collection and analysis, or acting dishonestly in any other way.

Plagiarism Detection Software (PDS) – Turnitin

As part of its commitment to quality and the maintenance of academic standards, the University reserves
the right to use Plagiarism Detection Software (PDS), including Turnitin. Such software makes no judgment
as to whether a piece of work has been plagiarised; it simply highlights sections of text that have been found
in other sources.

The use of plagiarism detection software fulfills two functions. The first is to enhance student learning (i.e. as
a developmental tool); the second is to guard against and identify unfair practice in assessment.

Further information and guidance can be found in the University’s policy on the Use of Plagiarism Detection

Software (Turnitin).

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP