Information Technology in Business
1. Introduction: (400 words)
a) Explain the term Biometrics and Authentication along-with the various type of applications of Biometrics and Authentication used today.
b) Explain how Biometrics and Authentication can improve business processes and performance.
2. Background: (400 words)
a) Discuss the historical development of the Biometrics and Authentication along with its advantages for the organisations.
b) Compare the business environment before and after the implementation of Biometrics and Authentication.
3. Discussion Section. Based on the recommended Biometrics and Authentication applications answer the following: (400 words)
a) Identify and explain the functions of software applications using in business related to the Biometrics and Authentication.
b) Does the system require some specific hardware to implement it? Discuss the key functions of the additional IT hardware requirements. If your answer is no, justify the reason.
4. Recommendations: (200 words)
a) Provide a secure computing environment that ensures data privacy and integrity which mitigates cyber-security threats.
5. Include report summary: (400 words)
a) Discuss the role of Biometrics and Authentication in the economy of Oman.
b) Discuss the possible effect of the use of Biometrics and Authentication on Omani society.
6. Conclusion:
a) Conclusion indicating that the report objectives have been met. (200 words)
FACULTY OF BUSINESS AND MANAGEMENT STUDIES
UNDERGRADUATE BUSINESS PROGRAMME
ACADEMIC YEAR 2020-2021, 1st Semester
January – 2021
WRIT1
Programme Title: BMS, A&F, MM, BE, BIS
Module Title: Information Technology in Business
Module Code: GCO3000
Assessment Method: Report
Level: 3 Block: 1
Module Credits: 20 Weighting: 50%
Due Date: 24-Nov-2020, 9:00 PM Word Count: 2,000
Examiner(s): Mr. Aumir Shabbir & Mr. Jawad Tauheed
Date of Submission: November 24, 2020
Version: 1
Pg. 2 Version 1
Gulf College – Faculty of Business and Management Studies – In academic
Affiliation with CARDIFF SCHOOL OF MANAGEMENT
A. Written work
➢ A signed declaration that the work is your own (apart from otherwise referenced
acknowledgements) must be included after the reference page of your assignment
➢ Each page must be numbered.
➢ Where appropriate, a contents page, a list of tables/figures and a list of abbreviations
should precede your work.
➢ All referencing must adhere to School/Institutional requirements.
➢ A word count must be stated at the end of your work.
➢ Appendices should be kept to the minimum and be of direct relevance to the content of
your work.
➢ All tables and figures must be correctly numbered and labelled.
B. Other types of coursework/assignments
➢ Where coursework involves oral presentations, discussions, poster presentations, etc.,
specific instructions will be provided by your module leader/team.
———————————————————————————————————————————————
Rewrite below part just after the References of your assignment.
WORK DECLARATION
I, [Name of Student], hereby declare that the uploaded Report through Turnitin is my own work. I
affirm that this has been researched and completed in accordance with the college rules and
regulations on plagiarism.
I acknowledge the advice given by the module tutors on proper referencing to avoid plagiarism and
the rules on the academic unfair practice.
I acknowledge that I read and understand the plagiarism guide written at the end of this
assessment. Any academic misconduct will be handled according to the rules and regulations of the
university.
[Name of Student]
Pg. 3 Version 1
General instructions
Report must be submitted online through Turnitin before due date.
The only circumstance in which assignments can be uploaded late via Turnitin is if a Mitigating
Circumstances (MC) form is submitted at the same time. In these circumstances work may be
submitted within five (5) working days. Make sure to secure MC form and submit the same to the
concerned staff.
Write the number of words used, excluding references, at the end of your assignment. Provide the
list of sources you used at the last page of your assignment with proper label ‘References’. You may
include diagrams, figures etc. without word penalty. The number of words will be + or – 10% of the
total words allowed.
A work declaration must be included on the first page of your assignment. This ensures that you
prepare your work in good faith. Any form of collusion and/or academic unfair practice will be dealt
with according to the pertinent rules and regulations of the partner university. Please read carefully
the plagiarism guide.
Assessment Details and Guidelines to Students:
This Report comprises 50% of the total assessments’ marks. Make sure you reference (proper
Harvard Referencing should be observed) any sources you have used to complete this assessment.
Analytical skills. The reflection report enables the students to analyse and evaluate the benefits of
the different activities done in the class. This skill will eventually help them evaluate options
necessary to make decisions in the workplace.
Paragraph Format:
Font size
14pt for heading
12pt for body text
Font style
Arial
(applicable to the source code as well)
Length of the contents (without the diagrams)
2000 words
(include page numbers at the right-hand
bottom of each page)
In addition, the assessment will test the following learning outcomes:
1. Discuss the key functions of IT hardware and software and their application to business.
3. Discuss the role of Information Technology within business and its wider role within society.
Pg. 4 Version 1
Assessment Task
CASE STUDY: Use of Biometrics and Authentication in the Development of Business.
The term Biometrics is commonly used today to refer to the authentication of a person by analysing
physical characteristics, such as fingerprints, or behavioral characteristics, such as signatures. Since
many physical and behavioral characteristics are unique to an individual, biometrics provides a
more reliable system of authentication than ID cards, keys, passwords, or other traditional systems.
Physical characteristics commonly used in biometric authentication include face, fingerprints,
handprints, eyes, and voice. Biometric authentication can be used to control the security of
computer networks, electronic commerce and banking transactions, and restricted areas in office
buildings and factories. It can help prevent fraud by verifying identities of voters and holders of
driver’s license or visas. In authentication, a sensor captures a digital image of the characteristic
being used to verify the user’s identity.
In this backdrop you are required to write a report to assess the benefits of Biometrics and
Authentication in business. The report should contain the following:
1. Introduction: (400 words)
a) Explain the term Biometrics and Authentication along-with the various type of applications
of Biometrics and Authentication used today.
b) Explain how Biometrics and Authentication can improve business processes and
performance.
2. Background: (400 words)
a) Discuss the historical development of the Biometrics and Authentication along with its
advantages for the organisations.
b) Compare the business environment before and after the implementation of Biometrics and
Authentication.
3. Discussion Section. Based on the recommended Biometrics and Authentication applications
answer the following: (400 words)
a) Identify and explain the functions of software applications using in business related to the
Biometrics and Authentication.
b) Does the system require some specific hardware to implement it? Discuss the key functions
of the additional IT hardware requirements. If your answer is no, justify the reason.
4. Recommendations: (200 words)
a) Provide a secure computing environment that ensures data privacy and integrity which
mitigates cyber-security threats.
5. Include report summary: (400 words)
a) Discuss the role of Biometrics and Authentication in the economy of Oman.
b) Discuss the possible effect of the use of Biometrics and Authentication on Omani society.
6. Conclusion:
a) Conclusion indicating that the report objectives have been met. (200 words)
References:
Provide a list of minimum eight (6) references from different sources including books, e-books,
online sources, newspapers, journals and publications using the proper Harvard referencing system.
***END OF ASSIGNMENT TASK***
Pg. 5 Version 1
GCO3000 – Information Technology in Business
AY: 2020-2021 / 1st Semester
Marking Scheme
Question
No.
Description
Marks
Allocated
1. Introduction (include all the required points)
a.
Explain the term Biometrics and Authentication along-with the various type of
applications of Biometrics and Authentication.
10
b.
Explain how Biometrics and Authentication can improve business processes and
performance.
10
2. Background (Knowledge and Analysis)
a.
Historical development of the Biometrics and Authentication along with its
advantages for the organisations.
10
b.
Compare the business environment before and after the implementation of
Biometrics and Authentication.
10
3. Discussion Section (Application)
a.
The key functions of software applications using in business related to the Biometrics
and Authentication.
10
b. Details of hardware requirements, if no hardware is required, justify the reason. 10
4. Recommendations
a.
Provide a secure computing environment that ensures data privacy and integrity
which mitigates cyber-security threats.
10
5. Report Summary
a. Discussion on the role of the Biometrics and Authentication in the economy of Oman. 10
b.
Discuss the possible effect of the use of Biometrics and Authentication on Omani
society.
10
6. Conclusion
a. Conclusion indicating that report objectives have been met. 10
TOTAL MARKS 100
Pg. 6 Version 1
Plagiarism
1. Plagiarism, which can be defined as using without acknowledgement another person’s words or
ideas and submitting them for assessment as though it were one’s own work, for instance by
copying, translating from one language to another or unacknowledged paraphrasing. Further
examples of plagiarism are given below:
Use of any quotation(s) from the published or unpublished work of other persons, whether
published in textbooks, articles, the Web, or in any other format, which quotations have not been
clearly identified as such by being placed in quotation marks and acknowledged.
Use of another person’s words or ideas that have been slightly changed or paraphrased to make it
look different from the original.
Summarising another person’s ideas, judgments, diagrams, figures, or computer programmes
without reference to that person in the text and the source in a bibliography or reference list.
Use of services of essay banks and/or any other agencies.
Use of unacknowledged material downloaded from the Internet.
Re-use of one’s own material except as authorised by the department.
2. Collusion, which can be defined as when work that has been undertaken by or with others is
submitted and passed off as solely as the work of one person. This also applies where the work of
one candidate is submitted in the name of another. Where this is done with the knowledge of the
originator both parties can be considered to be at fault.
3. Fabrication of data, making false claims to have carried out experiments, observations, interviews or
other forms of data collection and analysis, or acting dishonestly in any other way.
Plagiarism Detection Software (PDS) – Turnitin
As part of its commitment to quality and the maintenance of academic standards, the University reserves
the right to use Plagiarism Detection Software (PDS), including Turnitin. Such software makes no judgment
as to whether a piece of work has been plagiarised; it simply highlights sections of text that have been found
in other sources.
The use of plagiarism detection software fulfills two functions. The first is to enhance student learning (i.e. as
a developmental tool); the second is to guard against and identify unfair practice in assessment.
Further information and guidance can be found in the University’s policy on the Use of Plagiarism Detection
Software (Turnitin).