Uploaded by AMIR ASYRAF

IM2454ST2-GROUP 1-GROUP ASSIGNMENT

advertisement
FACULTY OF INFORMATION MANAGEMENT
PUNCAK PERDANA CAMPUS
IMS555 - DECISION THEORY
Topic – Emerging Technologies in Education
PREPARED BY:
GROUP MEMBERS
STUDENT ID
ADLAN FAIZ BIN AZMI
2020819558
NORADZREEN BINTI JEMAN
2020819752
MUHAMMAD AIMAN BIN RAZAK
2020847086
INTAN NUR SYARAFINA BINTI ROSLI
2020853084
PREPARED FOR:
DR NORA’AYU AHMAD UZIR
GROUP:
IM2454ST2
SUBMISSION DATE:
1 JULY 2022
ACKNOWLEDGEMENT
First and foremost, we would like to give our praise and gratitude to Allah S.W.T, in his
blessing and greatness, have blessed us with health and times to finish our assignment. We are
eternally grateful for His guidance and assistance in difficult time. We would like to thank Dr for
teaching us and guiding us toward the end of this assignment. Truly, with her persistence,
encouragement and devotion to ensuring us succeed, we were able to complete this assignment
to its fullest fulfillment. We would also like to show our appreciation to UiTM for giving us the
platform to learn more on the topic and course of Decision Theory. This knowledge and
opportunity are not wasted on us and we will continue to flourish and advance further with the
opportunity granted to us. We also like to dedicated our thanks to our parent and family, who
though thick and thin have continuously support us in hardship and slackness. Their deed doesn’t
go unnoticed. Not to forget, our friend and fellow classmate, who always there helping us with
student and support. Never tire to remind us on task and exercise needed to be finish for this
assignment. We wish them luck for the future. Finally, for those who have helps us but not name,
know that you are not forgotten. From the deepest part of our heart and soul, thank you to all.
Contents
1.0 Introduction ........................................................................................................................................... 1
2.0 Emerging Technologies in Education ............................................................................................... 2
2.1 Metaverse and VR/AR Technology .............................................................................................. 2
2.2 Automation........................................................................................................................................ 3
2.3 Digital Wallet..................................................................................................................................... 4
2.3.1 How A Digital Wallet Works .................................................................................................... 4
3.2 Types of Digital Wallet ................................................................................................................ 5
2.3.3 Examples of Digital Wallets .................................................................................................... 6
2.4 Biometric Recognition ..................................................................................................................... 6
2.4.1 Types of Biometric Recognitions ........................................................................................... 7
2.5 5G and IOT ....................................................................................................................................... 7
3.0 Swot Analysis ..................................................................................................................................... 10
4.0 Decision Matrix................................................................................................................................... 20
5.0 Strategy on The Execution ............................................................................................................... 23
5.1 What Technologies are Driving Digital Wallets ......................................................................... 23
5.2 Steps of Execution......................................................................................................................... 24
6.0 Conclusion .......................................................................................................................................... 25
References ................................................................................................................................................ 27
1.0 Introduction
Technology advancement has been a pursuit that humanity has continuously thrived upon.
Not a day goes by without humanity's desire to continuously uncover new mysteries and scientific
discoveries growing ever greater. Technology advancement stems from this desire. (Jack Turner
2022) in his article “The 7 Main Ways Technology Impacts Your Daily Life” In on Tech.co,
describe human and technology relationship have developed to the point that technology have
make live more easy and information more accessible, increasing productivity and connecting
people but it also detail how it can cause human problem down the line left unwatch and it usage
regulated. Another article on the topic “Positive Effects Of Technology - Making Everyday Life
Better” (Wardynski, 2020) explain how technology has a positive bearing on today's society and
community. The article brings forward the positives of technology today, like how it benefited
businesses by bringing forward better statistics, help promotion and advertisement become more
relevant and engaging, and how it makes life better with transportation and healthcare systems
today. However, most important of all, how it can be impactful toward our learning and education
sector.
In the article “Technology Advances Education”, The topic of the research is on
technology and education. Technology has always been responsible for pioneering advancement
even in education, inventions like calculators and photocopiers have completely revolutionized
the education world. Human education has always thrived on the cutting edge of technology.
Technology has advanced educational possibilities since the days of etching pictures on rock
walls to the present, when the majority of students carry multiple portable electronic gadgets with
them at all times. Technology's relevance in the classroom is more apparent than ever when
comparing where educational tools and approaches have come from to where they are heading
in the future. This assignment is created to bring to light the many new technologies that can and
have the chance to be in the education field with its implementation in education. Then, choose
among it the most effective one and elaborate on its implementation and rationalize our decision
with decision theory skill and tools.
1
2.0 Emerging Technologies in Education
There are plenty of examples of emerging technology that can be impactful in education.
Below are a few that are highlighted along with their strength, weakness, opportunity and threat
assessments.
2.1 Metaverse and VR/AR Technology
Metaverse is a new technological trend that gained tracking recently, contributed to the
fact that Mark Zuckerberg, owner of Facebook now named the company Meta. The new name
reflects the company’s growing ambitions beyond social media. Facebook, now known as Meta,
has adopted the new moniker, based on the sci-fi term metaverse, to describe its vision for
working and playing in a virtual world.
However, in all sense it is a form of VR (Virtual Reality) and AR (Augmented Reality)
technology with a huge emphasis on integrating daily human life activities such as socializing and
entertainment. VR/AR technology's main focus is to replicate the feeling and interaction that we
have normally by living our lives in a virtual world and integrating our senses with the virtually
generated world via tools and electronics such a VR headset and 360 motion tracking system to
simulate movement.
The only difference between this is that VR completely takes over your vision to give you
the impression that you are somewhere else. Technologies such as The HTC Vive Cosmos, the
PlayStation VR, the Oculus Quest, the Valve Index, and other headsets are known for doing this
by being opaque, blocking out your surroundings when you wear them.
Using LCD or OLED panels technology, virtual worlds are refracted by the lenses to fill
your field of vision it displays in front of you, making it feels like you're there yourself. It can be a
game, a 360-degree video, or just the virtual space of the platforms' interfaces. Visually, you're
taken to wherever the headset wants you to go as the world you are in is replaced with a virtual
one.
VR technology doesn't merely replace your vision, it also can change your sense of touch
and feeling completely. Six-degrees-of-freedom (6DOF) motion tracking is used by standalone
VR headsets like the Quest 2 as well as tethered VR headsets like the Index and PS/VR is
2
equipped with electronic devices such as external sensors, cameras, or outward-facing camera
that allowed you to move about in a virtual space with virtual hands using this along with 6DOF
motion controllers. Even though this area is typically only a few square meters across, it is
significantly more immersive than simply standing stationary and gazing in various directions.
AR however unlike VR, which takes the place of your eyesight, augmented reality
enhances it. The transparency of AR gadgets, such as the Microsoft HoloLens and numerous
enterprise-level "smart glasses," allows you to see everything in front of you as if you were
wearing a cheap pair of sunglasses.
The technology is built to allow for unrestricted mobility while superimposing visuals over
whatever you're looking at. The idea is expanded to mobile devices with AR apps and games, like
Pokemon Go, which uses the camera on your phone to track your surroundings and display
additional information on top of it.
The way that this technology can change the education world is by bringing new
opportunities for students of all levels the ability to experience something first hand without having
to leave the circumference of their learning space. Students can experience what it is like
witnessing first hand the eruption of a volcano and the effect of its cataclysmic event transpiring
with the danger thanks to the usage of VR technology. Public gathering and meetup can be done
in the digital world with the implementation of Metaverse into the learning sector, decreasing time
and transportation needed for people to attend this getup. Not to mention inhumane or
questionable acts in learning such as cutting a frog open can now be done with AR technology
without having to endanger any unnecessary life of an innocent frog. Truly a technology that can
be impactful in education with its wide range of capability and abilities.
2.2 Automation
Even while automation technology is not new, it has advanced so much that, if used in
education, it may have a significant influence. A significant portion of our modern environment is
driven by automation. As involvement increases, business and economic sectors use automation
to better deliver speedier experiences. The benefits of automation will undoubtedly be felt in the
education industry by 2022.
3
Students have a better possibility of automatically obtaining lectures at predetermined
intervals with automation. Digital scheduling is possible for lectures. Not to mention that
automation makes it easier to apply artificial intelligence in better ways.
2.3 Digital Wallet
An application for conducting financial transactions on mobile devices is known as a digital
wallet (or electronic wallet). Your passwords and payment details are securely stored there.
Instead than carrying your cards around, you may use these programmes to make purchases
while shopping. You may use your smartphone to make purchases after entering and storing your
credit card, debit card, or bank account information.
In essence, digital wallets are financial software programmes that enable you store money,
conduct transactions, and keep track of past purchases on mobile devices like phones and
tablets.
2.3.1 How A Digital Wallet Works
Digital wallets are programs created to make better use of the capabilities of mobile
devices by facilitating access to financial goods and services. By safely and conveniently
storing all of a consumer's payment information, digital wallets effectively do away with
the need to carry a traditional wallet.
Digital wallets transport payment information securely from our smartphone to a
point of sale built to read the data and connect via these signals using a mobile device's
wireless capabilities including Bluetooth, Wi-Fi, and magnetic signals. Currently, mobile
devices and digital wallets employ the following technologies:
• Quick response codes (QR codes) are matrix bar codes that may store data. To
start a transaction, we utilize the camera on our device and the scanning feature of the
wallet.
• Near field communication (NFC): Using electromagnetic impulses, NFC enables
two smart devices to connect and exchange data. To connect, two devices must be within
around 4 centimeters (1 inch) of one another.
4
• Magnetic Secure Transmission (MST): The same technology that magnetic card
readers use to read our card when it is swiped through a slot at a point of sale. This
encrypted field is generated by the phone used and may be read by the point of sale.
Our smartphone sends the card details we keep on hand and decide to use for a
transaction to the point of sale terminal, which is linked to payment processors. The money
is then channeled through the banks and credit card networks via the processors,
gateways, acquirers, or any other third parties participating in credit and debit card
transactions.
3.2 Types of Digital Wallet
The three categories of digital wallets are as follows:
1. Closed Wallet
A business that sells goods and/or services may create closed wallets for its
clients. Users using closed wallets are only permitted to conduct transactions with the
wallet's issuer using the money they have on hand. The wallets contain the money from
cancellations, returns, or refunds. A closed wallet is something like Amazon Pay.
2. Semi-closed Wallet
Users of a semi-closed wallet are able to conduct transactions at the businesses
and places that are mentioned. The wallets may be used for both online and offline
purchases, notwithstanding the limited coverage area of such wallets. To accept payments
using mobile wallets, however, retailers must engage into agreements or contracts with
the issuers.
3. Open Wallet
Open wallets are issued by banks or institutions affiliated with banks. In addition
to withdrawing money from banks and ATMs and transferring money, users of open
wallets can use them for any transaction permitted by a semi-closed wallet.
5
2.3.3 Examples of Digital Wallets
There are many different types of digital wallets. Some of the most well-known are listed
below:
•
Touch n GO eWallet
•
Boost
•
GrabPay
•
ShopeePay
•
Setel
•
Bigpay
•
Samsung Pay
•
Razor Pay
•
Lazada Wallet
2.4 Biometric Recognition
Biometric recognition is an information system that allows a person to be identified based
on some of their most important physiological and behavioral traits. It is based on data acquisition
hardware devices that include software components that allow, through mathematical algorithms,
to execute data analysis and rebuild and recognize a person's identity.
Because biometric qualities cannot be easily shared, forgotten, or copied, biometric
recognition creates a tight link between a person and his identity. As a result, biometric recognition
is intrinsically superior and more resistant to social engineering assaults like phishing than the
two traditional techniques of recognition, namely passwords and tokens. Since biometric
recognition necessitates the presence of the user at the time of authentication, it can dissuade
users from filing false repudiation claims. Furthermore, only biometrics can provide negative
identification functionality, which is used to determine whether a specific individual is truly enrolled
in a system notwithstanding the user's denial. Biometric recognition has been generally acclaimed
as a natural, dependable, and indispensable component of any identity management system as
a result of these properties.
Moreover, biometric technology is exploding in the education business with astounding
applications and solutions. Fingerprint scanning, in particular, is one of the most often utilized
verification methods in biometric identification. It is a faster, better, and more cost-effective way
6
for school administrators to keep track of students' presence, maintain correct student data, and
create a safe environment for students, instructors, and staff. Academic integrity is being
leveraged with the biometric biometrics, from corporate training to evaluation to identify
verification during employee assessments.
2.4.1 Types of Biometric Recognitions
a. Biometrics in Physical Form
A person's biometric data is saved in a database using special devices (scanners,
sensors, and other readers). This information, such as a fingerprint, is saved and converted into
digital data by the system. The system then compares the new data to what is recorded in its
database when the finger is placed back on the scanner. Finally, if there is a match, the system
will either validate the person's identity and provide them access, or it will deny the request. With
the help of built-in sensors powered by neural networks, modern smartphone cameras and video
recorders can quickly distinguish faces. In this sense, the image serves as a means of identifying
a person.
b. Behavioural Biometric Recognition
A recognition system that identifies a person based on dynamic or behavioural features is
known as behavioural biometrics. Handwriting and signature dynamics, voice and speech
rhythms, gesture recognition, electronic device usage characteristics such as typing speed, how
a person holds a smartphone or tablet, and even how they walk are examples of these
characteristics. This type is also known as passive biometrics because it does not require the
active participation of the user in order to progress with the authentication procedure. These
dynamic authentication systems are based on a person's behavioural traits. They assess a
person's distinct behaviour and subconscious movements while performing any action.
2.5 5G and IOT
5G and IoT, or the (Internet of Things) technology are innovations in wireless technology
that go beyond that. It symbolizes a huge transformation in the mobile ecosystem, low latency,
higher bandwidth, releasing a powerful combination of incredible speed, and improved power
efficiency that will fuel billions of more connections over the next five years and transform our
world. The fifth generation of mobile networks is 5G. Following 1G, 2G, 3G, and 4G networks, it
7
is a new international wireless standard. In order to connect practically everyone and everything
together, including computers, objects, and gadgets, 5G enables a new type of network. IoT, or
the Internet of Things, is a network of connected computing devices, mechanical and digital
machinery, items, animals, or people that may exchange data across a network without requiring
human-to-human or human-to-computer interaction.
This will allow for the creation of whole new IoT applications, which will further the process
of digital transformation for the benefit of businesses, customers, and society as a whole. The first
mobile network to be built specifically to support IoT use cases is 5G. A variety of use cases were
taken into account when developing 5G, and the standard offers capabilities to support a range
of deployment situations. For example, massive mobile IoT. The widespread use of inexpensive,
straightforward IoT devices, such sensors. These devices frequently transmit only a little amount
of data, but for the use case to be applicable, affordability, energy efficiency, and reliable coverage
can be important. Low cost devices with 10+ years of battery life and improved coverage, even
underground and in distant regions, will be made possible by 5G large mobile IoT technologies.
Then, it is for improved mobile broadband. More data is available with 5G. Today, it is frequently
used for data streaming. IoT and improved mobile broadband are both important for personal
communication. More data and speed are the main concerns here. 5G and IoT also is important
for critical communication. The security and predictability of data are improved by 5G technology,
which for example can be used in autonomous vehicles, or collaborative robots in industry 4.0.
The priority here is on implementing quick and predictable service characteristics to enable quick
decision-making by devices.
The way that this technology can change education is by having the students participate
in group interactive activities online, such as simulated field trips. Next, to deliver a reliable, superfast speeds and enhanced data capacity on a large scale are the main goals of 5G. When
combined, these advantages can have a significant impact on remote learning environments and
classrooms with digital equipment. For example, it can improved download speeds and the simple
transfer of massive volumes of data might enable students to work remotely on challenging
assignments like 3D designs in almost real-time.
Setting up devices and getting student response always takes some time. Since all
devices are connected through IoT, the deployment of a 5G private network with IoT, or 5G in
schools, has gained attention among educators. This technology enables teachers to log in
automatically as soon as they enter the classroom, automate daily administrative tasks, and
8
collect digital feedback from students. Other indoor use cases include things like vending
machines, door locks, and lighting controls. This private network is significantly safer and is only
used by educational institutions as it is not shared with outside parties. In order to offer lectures,
seminars, and many other types of content while avoiding frequent call dropouts and focus
changes, sufficient bandwidth is necessary.
A number of game-changing applications are being developed in the education industry
thanks to 5G and IoT. While the number of connected devices on smart campuses has been
increasing steadily, the adoption of 5G will further increase the possibilities for IoT platforms. The
network bandwidth provided by 5G will be far greater than that of present networks, which will be
very helpful for accessing a variety of educational resources such instructional videos,
applications, and photos. Additionally, 5G will encourage teacher-student cooperation through
video conferencing and empower VR/AR technology to give students a more immersive learning
environment. In order to explore new use cases and fully take advantage of 5G connection in the
education sector, telcos will strengthen their partnerships with educational institutions and
participants in the IoT ecosystem going forward.
9
3.0 Swot Analysis
Metaverse And Vr/Ar Technology
S-STRENGTH
Versatile
•
Can be used in all occasion and experience.
•
Can replicate event and incident without posing any danger the
user.
Ease of Use
W- WEAKNESS
•
Most technology are very well optimize for ease of use
•
Most technology are well documented in how to use
Expensive
•
Most of the device and electronic are price very highly especially for
3rd World country,
Hard to find
•
In most part of the world, many of the more versatile technology and
equipment are quite rare and uncommon especially for 3rd world
country
New Technology
•
Most AR/VR technology and concept especially Metaverse is
relatively new, causing trust issues and liability problems in in
implementation.
OOPPORTUNITY
Online conferences and class
•
Make online classes and conferences more engaging and exciting
with VR/AR technology
Promote Engagement
10
•
New technology means more people would likely join the
bandwagon, increasing it usage and expert in subject matter
More usage in the Future
•
As more people start to use the technology, more development and
research will be made
•
It versatile nature open possibility of it usage in many field especially
education and entertainment
T- THREAT
Damage and Harm
•
Technology and equipment can be quite fragile and can sustain
damage if no cared for adeptquately.
Lack of Marketability and Development
•
True especially for Metaverse as the subject just started to expand
futher, not alot of application and development.
•
Making some usage very limitated.
Automation
S-STRENGTH
Increase Management Efficiency
•
Important benefit of Automation is automated system management,
decreasing time and energy usage in menial task such as answer
checking, material preparation and even class planning.
Increase Output by Student
•
Automation can be use to move people and material around more
easily
•
People be able to learn more as menial task like walking, preparing
food and looking up material and event date become autonomous.
W- WEAKNESS
Expensive
11
•
Cost of integrating automation is syllabus and infrastructure can be
quite high, most likely only form of automation to be widely used is
autonomous management system.
Ristricted Usage
•
Can be quite restricted to only the main reason of the automation
creation in example a Robotic Hand can only be use to grab thing,
OOPPORTUNITY
Introduce Better Method in Management
•
Increase way to make task more manageable.
•
Decrease need of human interaction in system
•
Make sorting and data recall task more easy
Open New Window of Approaches
•
Open to new way for student to conduct classes, where student learn
how to make autonomous system,
how to understand automation more deeply
•
Enable access to diffcult or dangerous task such as conducting an
experiment regarding easily combustable material, dangerous
animal and fragile material.
T- THREAT
Delicate Nature
•
Some autonomous system are substantial to tempering of their
system. Unauthorized or educated tempering may lead to
disfunction within the system
Intrigue Machinery
•
Most automation machine and tools are quite intrique making it hard
to manage or require extra care in it management.
Digital Wallet
S-STRENGTH
•
Utilizing a digital wallet reduces the amount of financial and personal
information you need to carry with you throughout the day, which is
one of its key benefits. There is no risk of a card slipping out of your
wallet or of leaving your card in the ATM slot if everything is stored
12
in your digital wallet, therefore you no longer need to carry physical
cards or a wallet. Furthermore, you cannot misplace your entire
wallet.
•
A bank account at a bank with a physical branch is not necessary for
using a digital wallet. Instead, you may deposit your money in an
online-only bank, which enables greater financial inclusion by
providing underbanked and unbanked populations with access to
financial services.
W-
•
WEAKNESS
If you use a digital wallet from a supplier that hasn't been screened
or doesn't have a solid reputation, security can become a problem.
You run the danger of providing someone else access to your funds
if your phone isn't password-protected. It's also possible that some
of the neighbourhood stores you love to patronise may not yet have
a point of sale that uses this technology.
•
Users could also run across this circumstance. For instance,
consumers frequently use Boost as their electronic wallet, but when
they visit a certain business to make a purchase, this store does not
accept Boost and instead accepts alternative payment methods. The
user in this situation finds it to be highly inconvenient. The consumer
will lessen their dependency on your goods and move to signing up
for other distinct businesses' payment methods if they do not have
cash on them and have an urgent need.
O-
•
OPPORTUNITY
By 2025, the number of unique users of digital wallets is expected to
increase from 2.6 billion to 4.4 billion, according to UK-based Juniper
Research. China and India are predicted to account for over 70% of
all digital wallet transactions, leaving markets like the UK and the US
behind in terms of adoption.
•
"Digital wallets have been most effective in countries where card
penetration has been low but mobile phone use is high," says John
Mitchell of payment technology firm Episode Six. Digital wallet
13
businesses have prospered as a result of people switching from cash
to mobile wallets in places like Southeast Asia.
•
Alternative kinds of digital currency are already being swiftly
embraced, with cryptocurrencies being the most in demand. Future
digital wallets will offer on-demand and frictionless access to these
alternative digital assets in addition to storing and enabling payment
transactions. Better yet, they will let you to carry out financial
transactions utilising these many payment sources in addition to just
keeping these monies.
T- THREAT
Impersonation
•
Impersonation happens when a fraudster obtains information and
then assumes the identity of a legitimate user to complete a
transaction using the password and account information they have
obtained.
SIM Swapping
•
SIM swaps happen when scammers first get the user's information
and use it to block the user's SIM card for a mobile phone. They then
use that information to visit the retail location of the mobile provider
with false identification documentation to obtain a replacement SIM
card. The cell provider unblocks the real SIM card that had been
blocked and deactivates it. They then provide the fraudster a new
SIM, who uses the stolen data to create one-time passwords.
. Man-in-the-middle attack and Phishing
•
When a user types in his credit card number or bank account
number, sophisticated threats like Man-in-the-Browser or Man-inthe-Middle attacks read the payment data from the Internet browser
and intercept the transaction. E-wallet accounts are vulnerable to
14
fraud since phishing attempts are used to acquire users' login
information and personal data.
Malware attacks
•
The security of user money has been jeopardised by malware
assaults on applications. An attacker can introduce malware to target
the app and gather information from his phone to utilise it for
malicious purposes.
Biometric Recognition
S-STRENGTH
High security
•
Since biometric traits cannot be guessed or stolen, biometric
systems provide a higher level of security than traditional methods
of authentication.
User experience is convenient and fast
•
Placing a finger on a scanner and instantly unlocking an account
is faster than typing a long password with several special
characters.
Non-transferable
•
Biometric authentication necessitates the presence of its input
during authorization. A physical biometric cannot be transferred or
shared digitally.
15
W-WEAKNESS
Costs
•
Biometric devices are more expensive than other types of
standard security measures. The total expenses of biometric
software, devices, programmers, servers, and other related
equipment are substantial.
Delay
•
Some biometric devices take longer than expected, resulting in a
long line of workers waiting to be enrolled at major corporations.
In these circumstances, people have difficulty scanning the
biometric device on a daily basis. It is difficult for a person to go
through a biometric verification system every day before entering
a school, office, or other location.
Scanning Difficulty
•
Some biometric modalities, such as iris scanning, may experience
scanning challenges. It happens for a variety of reasons, including
eyelashes, eyelids, lenses, and corneal reflections. Iris scanning
may be less reliable for these reasons.
OOPPORTUNITY
Biometric combines with smart cards
•
Combining biometrics with smart cards refers to dual-technology
cards that include a smart chip. These hybrid cards serve as both
smart cards and proximity cards. This classification enables
companies that currently utilise proximity-based access control to
16
include biometric security and limit card issuance to individuals
who have access to the biometrically guarded area.
Usability and simplicity
•
Two key aspects that have allowed for the widespread
implementation of voice assistants and smart home systems They
are systems that, when applied and extended to the entire
residential environment, can also prohibit entry to rooms and are
remotely operated in a very simple way with an app.
T-THREAT
False positives and inaccuracy
•
Future biometric fingerprint authentication will only use sections of
the prints to authenticate identity, making it faster and more
accurate. In 2018, a New York University research team developed
an Artificial Intelligence engine that was capable of fraudulently
cracking fingerprint authentication with a success rate of 20% by
correlating similarities of partial prints to full biometric data.
Data breaches
•
Businesses and governments that collect and store users’ personal
data are under constant threat from hackers. Because biometric
data is irreplaceable, organizations need to treat sensitive
biometric data with increased security and caution – something
that’s expensive and technically difficult in order to stay ahead of
fraud advancements. If a password or pin is compromised, there’s
always the possibility of changing it.
5G and IOT Technology
17
S- STRENGTH
Greater performance
•
Up to 20 GB/s of download speed, which is 200 times faster than
existing 4G technology
•
Transmission rates also can reach 15 or 20 Gbps. We can access
data, programs, and distant apps completely directly and without
having to wait as its ability to have a better speed
Greater number of connected devices
•
With 5G, there will be numbers of devices linked to the network per
square kilometer, which is a large increase in connectivity options.
Ease of access
•
It is easy to access as many people have internet and devices that
can connected them to 5G
W- WEAKNESS
High cost
•
Developing infrastructure needs high cost.
Difficulty to access
•
Majority of the old devices would not be competent to 5G, so, all of
them need to be replaced with new one
Obstacle can effect connectivity
•
5G connectivity's range is limited by how far frequency waves can
go. This problem is made worse by the fact that physical obstructions
like trees, towers, walls, and buildings interfere with the 5G
frequency. The obtrusions will disrupt, interfere with, or absorb the
high-frequency signals.
OOPPORTUNITY
Boost development of future technology
•
Enable connected homes
•
Enable connected vehicles
•
Enable smart traffic lights
•
Enable banking transaction
18
•
Enable virtual reality of online shopping
Serve several logical networks
•
To satisfy the needs of various customers, an Internet service
provider may provide a variety of services with varying performance
characteristics such as download speed, latency, or download use
limitations via the same physical network.
T-THREATS
Security issues
•
It is now very important to safeguard and secure IoT devices, as their
usage is quickly growing in both public and private spaces
•
Typical security techniques like public-key encryption and spreadrange processes cannot be implemented by all points because the
majority of devices that operate at the sensor/actual layer of an IoT
framework have limited computing power and storage capacity.
19
4.0 Decision Matrix
Problem: Choosing Technology to Execute In Education
Step 1 – Identify Alternative (Alt)
Alt 1
- Metaverse and VR/AR Technology
Alt 2
- Automation
Alt 3
- Biometric
Alt 3
- E-Wallet
Alt 4
- 5G and IOT
Step 2 – Identify State of Nature
1. Cost
2. Accessibility
3. Functionality
4. Durability
5. Convenience/User Friendly
Step 3 – Assign Weight to State of Nature
Cost
5
Accessibility
4
Functionality
3
Durability
2
20
Convenience/User Friendly 1
Step 4 – Design Scoring System (for Alternative)
1- Least Important
2- Slightly Important
3- Important
4- Very Important
5- Most Important
Step 5 – Rate Alternatives
1- Low
2- Medium
3- High
Utility
State
of Weight Automation Metaverse
Nature
and Biometric E-
VR/AR
5G
Wallet
IOT
Cost
5
1
1
1
3
1
Accessibility
4
1
1
1
3
2
Functionality
3
3
3
2
1
3
AND
21
Durability
2
4
3
3
3
2
Convenience
1
2
1
3
2
3
Step 6 – Total the Score
State
of Weight Automation Metaverse
Nature
and Biometric E-
VR/AR
5G
Wallet
IOT
Cost
5
5
5
5
15
5
Accessibility
4
4
4
4
12
8
Functionality
3
9
9
6
3
9
Durability
2
8
6
6
6
4
Convenience
1
2
1
3
2
3
28
25
24
38
29
Total
AND
The Decision Is E-Wallet = 38 (Highest Number)
22
5.0 Strategy on The Execution
What innovations will significantly change how we live in the upcoming ten years? The
most popular among them is mobile payment, which is primarily split into remote payment and
near-field payment (NFC). Remote payments, such as those made for online shopping and ticket
purchases, allow customers to access the bank's website or the client using a mobile device. The
process of using a mobile phone to swipe a card to rent a car or make a purchase is referred to
as near-field payment.
In addition to operators and device manufacturers, established industries like banks and
credit card firms have been interested in the possibilities of mobile payments. Consumers find
that mobile payments save them time and effort, and there is more possibility to reach prospective
customers with promotions and promotional messages thanks to mobile payment networks.
5.1 What Technologies are Driving Digital Wallets
A digital core is the foundation of a digital wallet and serves as the foundation for the
banking industry's digital revolution. The platforms and tools that a company employs to transition
into a digital firm are referred to as its "digital core" in its simplest form. It may then interface with
digital wallets and payment platforms via open APIs, enabling them to provide front-end
advantages to customers.
The world's top developers can use these technologies to build services and apps that
interact and integrate more easily, according to John Mitchell, co-founder and CEO of Episode
Six. These technologies are what are causing the industry to evolve and providing answers for
apps that are more user-friendly.
The management of digital wallets by individuals and organisations will change as a result
of smart ledgers, or block chain. The smart ledger will open up a whole new world for digital
wallets by providing a mechanism to track, store, and transfer alternative digital assets.
Customers will experience a better-integrated digital payment model on a single platform when
this is combined with readily customizable, API-accessible wallet management solutions.
In fact, one of the most fiercely debated areas in the use of digital wallets is the emergence
of crypto currencies. Almost the past ten years, trading in these virtual currencies has gradually
23
expanded; for instance, the price of Bitcoin climbed from $1 in 2011 to over $42,000 today. And
there is still data that points to the potential for future expansion of crypto currency.
5.2 Steps of Execution
Three scenarios are provided for how students can use this digital wallet in their daily activities in
order to impose this technology on them at school. These are as follows:
1. The administration of the school or campus may require—or at the very least,
encourage—the use of a digital wallet designed specifically for school-related transactions
wherever possible. Any transaction, for example, the purchase of food or the payment of fees,
may fall under the purview of this digital wallet.
2. Through the use of this digital wallet technology, a merit system may also be built. One
instructor just needs to use the digital wallet technology when they wish to reward their students.
The instructor has the option of adding money to the student's digital wallet or even adding
vouchers that may be used at any café or canteen on the school or college grounds.
3. The payment of summonses is another admirable behavior that frequently occurs in
the school or campus environment and is represented by this digital wallet. The authorities on
campus may summon students, especially those who have a tendency to breach the rules.
Therefore, rather of paying the summons with cash, students can do so by using their digital
wallet. Discounts may also be applied to students who pay their summons using a designated
digital wallet in order to promote the usage of digital wallets among students.
24
6.0 Conclusion
In a nutshell, the ability of digital wallet to considerably speed up and enhance the entire
processes associated to collecting payments in schools is significant. The ability to provide
payment information once and then simply link it during a secure user authentication process
such as entering a PIN, scanning a fingerprint, or increasingly in the future, other biometric
authentication methods is really improving user experience and decreasing any problems in
making purchases while maintaining a sufficient level of security.
In general, even while using an electronic wallet offers many advantages, it can
sometimes be difficult for people. The use of an e-wallet has a number of disadvantages that may
cause people problems. First and foremost, the factor that affect the inconvenience of e-wallets
is a dependency on a device. This is due to the fact that when a user's mobile phone experiences
technical issues, such as system malfunction, device power failures, or simply runs out of battery,
they must use the standard method of payment, but some customers did not even have their
wallet with them because they did not anticipate this scenario. As a result, the transaction could
not be completed. One restriction that digital wallet makers have not yet solved and that e-wallet
customers are not in control of is device reliance.
Since e-wallet users do not necessarily need to carry a purse, personal information about
them would be made public if their cashless transaction devices such as smartphones and tablets
were stolen or lost. This creates a security issue because all of the users' private information is
stored on these devices. If the users don't have a password or PIN for their e-wallet app, the
criminal is able to use it and cause financial harm. But owners can stop the burglar by calling the
e-wallet support center as soon as they become aware that their device has missing and asking
them to quickly freeze the e-wallet account to prevent the invasion from happening.
Despite the fact that e-commerce is already widespread in many countries, the
transformation rate of e-wallet payment systems is still viewed as slow and difficult. Therefore,
increased targeted marketing is necessary for the development of the digital payment business.
To increase customer acceptance, stores and software vendors should promote e-wallets more
widely. It has been shown that targeted wallet promotion combined with education can increase
the use of cashless transactions. E-wallet providers and dealers should collaborate on marketing
initiatives to create effective methods that will increase user adoption. Additionally, for better
management in this digital age, e-wallet developers and suppliers should concentrate on
25
managing communications, social network information, upgrading information technology
platforms, and client classification systems.
Students often appreciate digital wallets as being a very excellent, good technology.
Additionally, e-wallets are regarded as being outstanding, innovative, and modern, and mostly
the students also recommend the concept of e-wallets. As a result, e-wallets have the potential
to be widely known and implemented by students.
26
References
IQUII. (2018, March 8). Biometric Recognition: definition, challenge and opportunities of biometric
recognition
systems.
Retrieved
June
27,
2022,
from
Medium
website:
https://medium.com/iquii/biometric-recognition-definition-challenge-and-opportunities-ofbiometric-recognition-systems-d063c7b58209
5G and IOT - a white paper on 5G rollout for the IOT. Telenor IoT. (2022, June 15). Retrieved
June 28, 2022, from https://iot.telenor.com/iot-insights/5g-and-iot/
5G
and
IOT
in
2022.
Thales
Group.
(n.d.).
Retrieved
June
28,
2022,
from
https://www.thalesgroup.com/en/markets/digital-identity-andsecurity/iot/resources/innovation-technology/5G-iot
5G and IOT: Ushering in a new era - ericsson. (n.d.). Retrieved June 27, 2022, from
https://www.ericsson.com/en/about-us/company-facts/ericssonworldwide/india/authored-articles/5g-and-iot-ushering-in-a-new-era
5G and its impact on the internet of things - stardust testing. (n.d.). Retrieved June 27, 2022, from
https://www2.stardust-testing.com/en/5g-and-impact-on-iots
A. (2022, March 8). 7 Emerging Technologies That Will Reshape Education in 2022. AxiomQ
Ventures.
Retrieved
June
16,
2022,
from
https://axiomq.com/blog/7-emerging-
technologies-that-will-reshape-education-in-2022/
Biometric Identification is On the Rise in Education Sector. (2019, September 13). Retrieved June
25, 2022, from Shuftipro.com website: https://shuftipro.com/blog/biometric-identificationis-on-the-rise-in-education-sector/
Clere, A. (2022, May 12). What technologies are driving the digital wallet trend? FinTech
Magazine.
https://fintechmagazine.com/digital-payments/what-is-driving-the-digital-
wallet-revolution
Corporate Finance Institute. (2020, September 12). Digital wallet - Overview, significance,
examples,
types.
https://corporatefinanceinstitute.com/resources/knowledge/other/digital-wallet/
Greenwald, W. (2021, March 31). Augmented Reality (AR) vs. Virtual Reality (VR): What’s the
Difference?
PCMAG.
Retrieved
June
16,
2022,
https://www.pcmag.com/news/augmented-reality-ar-vs-virtual-reality-vr-whats-thedifference
from
Hand, B. (2018, February 25). Biometrics In Schools: 4 Ways Biometric Data Can Be Used To
Enhance Learning. Retrieved June 30, 2022, from eLearning Industry website:
https://elearningindustry.com/biometrics-in-schools-data-enhance-learning-4-ways
Jirik, P. (2021, September 9). 5 Popular Types of Biometric Authentication: Pros and Cons.
Retrieved
June
26,
2022,
from
PHONEXIA
Speech
Technologies
website:
https://www.phonexia.com/blog/5-popular-types-of-biometric-authentication-pros-andcons/
Julia Juremi, Mohamad Firduas Che Abdul Rani, & Cheng Ma, (2020), THE APPLICATION OF
ELECTRONIC WALLET IN APU CAMPUS. palArcg’s Journal of Archaeology of
Egypt/Egyptology,
17(7),
8592-9610.
Retrieved
from
https://archives.palarch.nl/index.php/jae/article/view/3656
Kagan,
J.
(2022,
April
10).
What
is
a
digital
wallet?
Investopedia.
https://www.investopedia.com/terms/d/digital-wallet.asp
Securing e-wallets. (n.d.). Vikaspedia : Landing Page. https://vikaspedia.in/e-governance/digitalpayment/tips-for-securing-your-digital-payments/securing-e-wallets
The New Opportunities For Biometrics. (2022). Retrieved June 27, 2022, from Varinsights.com
website: https://www.varinsights.com/doc/the-new-opportunities-for-biometrics-0001
Yadav, I. (2021, November 8). Why Mark Zuckerberg changed Facebook’s name to “Meta.”
TechGig. Retrieved June 16, 2022, from https://content.techgig.com/technology/whymark-zuckerberg-changed-facebooks-name-to-meta/articleshow/87353504.cms
Download