FACULTY OF INFORMATION MANAGEMENT PUNCAK PERDANA CAMPUS IMS555 - DECISION THEORY Topic – Emerging Technologies in Education PREPARED BY: GROUP MEMBERS STUDENT ID ADLAN FAIZ BIN AZMI 2020819558 NORADZREEN BINTI JEMAN 2020819752 MUHAMMAD AIMAN BIN RAZAK 2020847086 INTAN NUR SYARAFINA BINTI ROSLI 2020853084 PREPARED FOR: DR NORA’AYU AHMAD UZIR GROUP: IM2454ST2 SUBMISSION DATE: 1 JULY 2022 ACKNOWLEDGEMENT First and foremost, we would like to give our praise and gratitude to Allah S.W.T, in his blessing and greatness, have blessed us with health and times to finish our assignment. We are eternally grateful for His guidance and assistance in difficult time. We would like to thank Dr for teaching us and guiding us toward the end of this assignment. Truly, with her persistence, encouragement and devotion to ensuring us succeed, we were able to complete this assignment to its fullest fulfillment. We would also like to show our appreciation to UiTM for giving us the platform to learn more on the topic and course of Decision Theory. This knowledge and opportunity are not wasted on us and we will continue to flourish and advance further with the opportunity granted to us. We also like to dedicated our thanks to our parent and family, who though thick and thin have continuously support us in hardship and slackness. Their deed doesn’t go unnoticed. Not to forget, our friend and fellow classmate, who always there helping us with student and support. Never tire to remind us on task and exercise needed to be finish for this assignment. We wish them luck for the future. Finally, for those who have helps us but not name, know that you are not forgotten. From the deepest part of our heart and soul, thank you to all. Contents 1.0 Introduction ........................................................................................................................................... 1 2.0 Emerging Technologies in Education ............................................................................................... 2 2.1 Metaverse and VR/AR Technology .............................................................................................. 2 2.2 Automation........................................................................................................................................ 3 2.3 Digital Wallet..................................................................................................................................... 4 2.3.1 How A Digital Wallet Works .................................................................................................... 4 3.2 Types of Digital Wallet ................................................................................................................ 5 2.3.3 Examples of Digital Wallets .................................................................................................... 6 2.4 Biometric Recognition ..................................................................................................................... 6 2.4.1 Types of Biometric Recognitions ........................................................................................... 7 2.5 5G and IOT ....................................................................................................................................... 7 3.0 Swot Analysis ..................................................................................................................................... 10 4.0 Decision Matrix................................................................................................................................... 20 5.0 Strategy on The Execution ............................................................................................................... 23 5.1 What Technologies are Driving Digital Wallets ......................................................................... 23 5.2 Steps of Execution......................................................................................................................... 24 6.0 Conclusion .......................................................................................................................................... 25 References ................................................................................................................................................ 27 1.0 Introduction Technology advancement has been a pursuit that humanity has continuously thrived upon. Not a day goes by without humanity's desire to continuously uncover new mysteries and scientific discoveries growing ever greater. Technology advancement stems from this desire. (Jack Turner 2022) in his article “The 7 Main Ways Technology Impacts Your Daily Life” In on Tech.co, describe human and technology relationship have developed to the point that technology have make live more easy and information more accessible, increasing productivity and connecting people but it also detail how it can cause human problem down the line left unwatch and it usage regulated. Another article on the topic “Positive Effects Of Technology - Making Everyday Life Better” (Wardynski, 2020) explain how technology has a positive bearing on today's society and community. The article brings forward the positives of technology today, like how it benefited businesses by bringing forward better statistics, help promotion and advertisement become more relevant and engaging, and how it makes life better with transportation and healthcare systems today. However, most important of all, how it can be impactful toward our learning and education sector. In the article “Technology Advances Education”, The topic of the research is on technology and education. Technology has always been responsible for pioneering advancement even in education, inventions like calculators and photocopiers have completely revolutionized the education world. Human education has always thrived on the cutting edge of technology. Technology has advanced educational possibilities since the days of etching pictures on rock walls to the present, when the majority of students carry multiple portable electronic gadgets with them at all times. Technology's relevance in the classroom is more apparent than ever when comparing where educational tools and approaches have come from to where they are heading in the future. This assignment is created to bring to light the many new technologies that can and have the chance to be in the education field with its implementation in education. Then, choose among it the most effective one and elaborate on its implementation and rationalize our decision with decision theory skill and tools. 1 2.0 Emerging Technologies in Education There are plenty of examples of emerging technology that can be impactful in education. Below are a few that are highlighted along with their strength, weakness, opportunity and threat assessments. 2.1 Metaverse and VR/AR Technology Metaverse is a new technological trend that gained tracking recently, contributed to the fact that Mark Zuckerberg, owner of Facebook now named the company Meta. The new name reflects the company’s growing ambitions beyond social media. Facebook, now known as Meta, has adopted the new moniker, based on the sci-fi term metaverse, to describe its vision for working and playing in a virtual world. However, in all sense it is a form of VR (Virtual Reality) and AR (Augmented Reality) technology with a huge emphasis on integrating daily human life activities such as socializing and entertainment. VR/AR technology's main focus is to replicate the feeling and interaction that we have normally by living our lives in a virtual world and integrating our senses with the virtually generated world via tools and electronics such a VR headset and 360 motion tracking system to simulate movement. The only difference between this is that VR completely takes over your vision to give you the impression that you are somewhere else. Technologies such as The HTC Vive Cosmos, the PlayStation VR, the Oculus Quest, the Valve Index, and other headsets are known for doing this by being opaque, blocking out your surroundings when you wear them. Using LCD or OLED panels technology, virtual worlds are refracted by the lenses to fill your field of vision it displays in front of you, making it feels like you're there yourself. It can be a game, a 360-degree video, or just the virtual space of the platforms' interfaces. Visually, you're taken to wherever the headset wants you to go as the world you are in is replaced with a virtual one. VR technology doesn't merely replace your vision, it also can change your sense of touch and feeling completely. Six-degrees-of-freedom (6DOF) motion tracking is used by standalone VR headsets like the Quest 2 as well as tethered VR headsets like the Index and PS/VR is 2 equipped with electronic devices such as external sensors, cameras, or outward-facing camera that allowed you to move about in a virtual space with virtual hands using this along with 6DOF motion controllers. Even though this area is typically only a few square meters across, it is significantly more immersive than simply standing stationary and gazing in various directions. AR however unlike VR, which takes the place of your eyesight, augmented reality enhances it. The transparency of AR gadgets, such as the Microsoft HoloLens and numerous enterprise-level "smart glasses," allows you to see everything in front of you as if you were wearing a cheap pair of sunglasses. The technology is built to allow for unrestricted mobility while superimposing visuals over whatever you're looking at. The idea is expanded to mobile devices with AR apps and games, like Pokemon Go, which uses the camera on your phone to track your surroundings and display additional information on top of it. The way that this technology can change the education world is by bringing new opportunities for students of all levels the ability to experience something first hand without having to leave the circumference of their learning space. Students can experience what it is like witnessing first hand the eruption of a volcano and the effect of its cataclysmic event transpiring with the danger thanks to the usage of VR technology. Public gathering and meetup can be done in the digital world with the implementation of Metaverse into the learning sector, decreasing time and transportation needed for people to attend this getup. Not to mention inhumane or questionable acts in learning such as cutting a frog open can now be done with AR technology without having to endanger any unnecessary life of an innocent frog. Truly a technology that can be impactful in education with its wide range of capability and abilities. 2.2 Automation Even while automation technology is not new, it has advanced so much that, if used in education, it may have a significant influence. A significant portion of our modern environment is driven by automation. As involvement increases, business and economic sectors use automation to better deliver speedier experiences. The benefits of automation will undoubtedly be felt in the education industry by 2022. 3 Students have a better possibility of automatically obtaining lectures at predetermined intervals with automation. Digital scheduling is possible for lectures. Not to mention that automation makes it easier to apply artificial intelligence in better ways. 2.3 Digital Wallet An application for conducting financial transactions on mobile devices is known as a digital wallet (or electronic wallet). Your passwords and payment details are securely stored there. Instead than carrying your cards around, you may use these programmes to make purchases while shopping. You may use your smartphone to make purchases after entering and storing your credit card, debit card, or bank account information. In essence, digital wallets are financial software programmes that enable you store money, conduct transactions, and keep track of past purchases on mobile devices like phones and tablets. 2.3.1 How A Digital Wallet Works Digital wallets are programs created to make better use of the capabilities of mobile devices by facilitating access to financial goods and services. By safely and conveniently storing all of a consumer's payment information, digital wallets effectively do away with the need to carry a traditional wallet. Digital wallets transport payment information securely from our smartphone to a point of sale built to read the data and connect via these signals using a mobile device's wireless capabilities including Bluetooth, Wi-Fi, and magnetic signals. Currently, mobile devices and digital wallets employ the following technologies: • Quick response codes (QR codes) are matrix bar codes that may store data. To start a transaction, we utilize the camera on our device and the scanning feature of the wallet. • Near field communication (NFC): Using electromagnetic impulses, NFC enables two smart devices to connect and exchange data. To connect, two devices must be within around 4 centimeters (1 inch) of one another. 4 • Magnetic Secure Transmission (MST): The same technology that magnetic card readers use to read our card when it is swiped through a slot at a point of sale. This encrypted field is generated by the phone used and may be read by the point of sale. Our smartphone sends the card details we keep on hand and decide to use for a transaction to the point of sale terminal, which is linked to payment processors. The money is then channeled through the banks and credit card networks via the processors, gateways, acquirers, or any other third parties participating in credit and debit card transactions. 3.2 Types of Digital Wallet The three categories of digital wallets are as follows: 1. Closed Wallet A business that sells goods and/or services may create closed wallets for its clients. Users using closed wallets are only permitted to conduct transactions with the wallet's issuer using the money they have on hand. The wallets contain the money from cancellations, returns, or refunds. A closed wallet is something like Amazon Pay. 2. Semi-closed Wallet Users of a semi-closed wallet are able to conduct transactions at the businesses and places that are mentioned. The wallets may be used for both online and offline purchases, notwithstanding the limited coverage area of such wallets. To accept payments using mobile wallets, however, retailers must engage into agreements or contracts with the issuers. 3. Open Wallet Open wallets are issued by banks or institutions affiliated with banks. In addition to withdrawing money from banks and ATMs and transferring money, users of open wallets can use them for any transaction permitted by a semi-closed wallet. 5 2.3.3 Examples of Digital Wallets There are many different types of digital wallets. Some of the most well-known are listed below: • Touch n GO eWallet • Boost • GrabPay • ShopeePay • Setel • Bigpay • Samsung Pay • Razor Pay • Lazada Wallet 2.4 Biometric Recognition Biometric recognition is an information system that allows a person to be identified based on some of their most important physiological and behavioral traits. It is based on data acquisition hardware devices that include software components that allow, through mathematical algorithms, to execute data analysis and rebuild and recognize a person's identity. Because biometric qualities cannot be easily shared, forgotten, or copied, biometric recognition creates a tight link between a person and his identity. As a result, biometric recognition is intrinsically superior and more resistant to social engineering assaults like phishing than the two traditional techniques of recognition, namely passwords and tokens. Since biometric recognition necessitates the presence of the user at the time of authentication, it can dissuade users from filing false repudiation claims. Furthermore, only biometrics can provide negative identification functionality, which is used to determine whether a specific individual is truly enrolled in a system notwithstanding the user's denial. Biometric recognition has been generally acclaimed as a natural, dependable, and indispensable component of any identity management system as a result of these properties. Moreover, biometric technology is exploding in the education business with astounding applications and solutions. Fingerprint scanning, in particular, is one of the most often utilized verification methods in biometric identification. It is a faster, better, and more cost-effective way 6 for school administrators to keep track of students' presence, maintain correct student data, and create a safe environment for students, instructors, and staff. Academic integrity is being leveraged with the biometric biometrics, from corporate training to evaluation to identify verification during employee assessments. 2.4.1 Types of Biometric Recognitions a. Biometrics in Physical Form A person's biometric data is saved in a database using special devices (scanners, sensors, and other readers). This information, such as a fingerprint, is saved and converted into digital data by the system. The system then compares the new data to what is recorded in its database when the finger is placed back on the scanner. Finally, if there is a match, the system will either validate the person's identity and provide them access, or it will deny the request. With the help of built-in sensors powered by neural networks, modern smartphone cameras and video recorders can quickly distinguish faces. In this sense, the image serves as a means of identifying a person. b. Behavioural Biometric Recognition A recognition system that identifies a person based on dynamic or behavioural features is known as behavioural biometrics. Handwriting and signature dynamics, voice and speech rhythms, gesture recognition, electronic device usage characteristics such as typing speed, how a person holds a smartphone or tablet, and even how they walk are examples of these characteristics. This type is also known as passive biometrics because it does not require the active participation of the user in order to progress with the authentication procedure. These dynamic authentication systems are based on a person's behavioural traits. They assess a person's distinct behaviour and subconscious movements while performing any action. 2.5 5G and IOT 5G and IoT, or the (Internet of Things) technology are innovations in wireless technology that go beyond that. It symbolizes a huge transformation in the mobile ecosystem, low latency, higher bandwidth, releasing a powerful combination of incredible speed, and improved power efficiency that will fuel billions of more connections over the next five years and transform our world. The fifth generation of mobile networks is 5G. Following 1G, 2G, 3G, and 4G networks, it 7 is a new international wireless standard. In order to connect practically everyone and everything together, including computers, objects, and gadgets, 5G enables a new type of network. IoT, or the Internet of Things, is a network of connected computing devices, mechanical and digital machinery, items, animals, or people that may exchange data across a network without requiring human-to-human or human-to-computer interaction. This will allow for the creation of whole new IoT applications, which will further the process of digital transformation for the benefit of businesses, customers, and society as a whole. The first mobile network to be built specifically to support IoT use cases is 5G. A variety of use cases were taken into account when developing 5G, and the standard offers capabilities to support a range of deployment situations. For example, massive mobile IoT. The widespread use of inexpensive, straightforward IoT devices, such sensors. These devices frequently transmit only a little amount of data, but for the use case to be applicable, affordability, energy efficiency, and reliable coverage can be important. Low cost devices with 10+ years of battery life and improved coverage, even underground and in distant regions, will be made possible by 5G large mobile IoT technologies. Then, it is for improved mobile broadband. More data is available with 5G. Today, it is frequently used for data streaming. IoT and improved mobile broadband are both important for personal communication. More data and speed are the main concerns here. 5G and IoT also is important for critical communication. The security and predictability of data are improved by 5G technology, which for example can be used in autonomous vehicles, or collaborative robots in industry 4.0. The priority here is on implementing quick and predictable service characteristics to enable quick decision-making by devices. The way that this technology can change education is by having the students participate in group interactive activities online, such as simulated field trips. Next, to deliver a reliable, superfast speeds and enhanced data capacity on a large scale are the main goals of 5G. When combined, these advantages can have a significant impact on remote learning environments and classrooms with digital equipment. For example, it can improved download speeds and the simple transfer of massive volumes of data might enable students to work remotely on challenging assignments like 3D designs in almost real-time. Setting up devices and getting student response always takes some time. Since all devices are connected through IoT, the deployment of a 5G private network with IoT, or 5G in schools, has gained attention among educators. This technology enables teachers to log in automatically as soon as they enter the classroom, automate daily administrative tasks, and 8 collect digital feedback from students. Other indoor use cases include things like vending machines, door locks, and lighting controls. This private network is significantly safer and is only used by educational institutions as it is not shared with outside parties. In order to offer lectures, seminars, and many other types of content while avoiding frequent call dropouts and focus changes, sufficient bandwidth is necessary. A number of game-changing applications are being developed in the education industry thanks to 5G and IoT. While the number of connected devices on smart campuses has been increasing steadily, the adoption of 5G will further increase the possibilities for IoT platforms. The network bandwidth provided by 5G will be far greater than that of present networks, which will be very helpful for accessing a variety of educational resources such instructional videos, applications, and photos. Additionally, 5G will encourage teacher-student cooperation through video conferencing and empower VR/AR technology to give students a more immersive learning environment. In order to explore new use cases and fully take advantage of 5G connection in the education sector, telcos will strengthen their partnerships with educational institutions and participants in the IoT ecosystem going forward. 9 3.0 Swot Analysis Metaverse And Vr/Ar Technology S-STRENGTH Versatile • Can be used in all occasion and experience. • Can replicate event and incident without posing any danger the user. Ease of Use W- WEAKNESS • Most technology are very well optimize for ease of use • Most technology are well documented in how to use Expensive • Most of the device and electronic are price very highly especially for 3rd World country, Hard to find • In most part of the world, many of the more versatile technology and equipment are quite rare and uncommon especially for 3rd world country New Technology • Most AR/VR technology and concept especially Metaverse is relatively new, causing trust issues and liability problems in in implementation. OOPPORTUNITY Online conferences and class • Make online classes and conferences more engaging and exciting with VR/AR technology Promote Engagement 10 • New technology means more people would likely join the bandwagon, increasing it usage and expert in subject matter More usage in the Future • As more people start to use the technology, more development and research will be made • It versatile nature open possibility of it usage in many field especially education and entertainment T- THREAT Damage and Harm • Technology and equipment can be quite fragile and can sustain damage if no cared for adeptquately. Lack of Marketability and Development • True especially for Metaverse as the subject just started to expand futher, not alot of application and development. • Making some usage very limitated. Automation S-STRENGTH Increase Management Efficiency • Important benefit of Automation is automated system management, decreasing time and energy usage in menial task such as answer checking, material preparation and even class planning. Increase Output by Student • Automation can be use to move people and material around more easily • People be able to learn more as menial task like walking, preparing food and looking up material and event date become autonomous. W- WEAKNESS Expensive 11 • Cost of integrating automation is syllabus and infrastructure can be quite high, most likely only form of automation to be widely used is autonomous management system. Ristricted Usage • Can be quite restricted to only the main reason of the automation creation in example a Robotic Hand can only be use to grab thing, OOPPORTUNITY Introduce Better Method in Management • Increase way to make task more manageable. • Decrease need of human interaction in system • Make sorting and data recall task more easy Open New Window of Approaches • Open to new way for student to conduct classes, where student learn how to make autonomous system, how to understand automation more deeply • Enable access to diffcult or dangerous task such as conducting an experiment regarding easily combustable material, dangerous animal and fragile material. T- THREAT Delicate Nature • Some autonomous system are substantial to tempering of their system. Unauthorized or educated tempering may lead to disfunction within the system Intrigue Machinery • Most automation machine and tools are quite intrique making it hard to manage or require extra care in it management. Digital Wallet S-STRENGTH • Utilizing a digital wallet reduces the amount of financial and personal information you need to carry with you throughout the day, which is one of its key benefits. There is no risk of a card slipping out of your wallet or of leaving your card in the ATM slot if everything is stored 12 in your digital wallet, therefore you no longer need to carry physical cards or a wallet. Furthermore, you cannot misplace your entire wallet. • A bank account at a bank with a physical branch is not necessary for using a digital wallet. Instead, you may deposit your money in an online-only bank, which enables greater financial inclusion by providing underbanked and unbanked populations with access to financial services. W- • WEAKNESS If you use a digital wallet from a supplier that hasn't been screened or doesn't have a solid reputation, security can become a problem. You run the danger of providing someone else access to your funds if your phone isn't password-protected. It's also possible that some of the neighbourhood stores you love to patronise may not yet have a point of sale that uses this technology. • Users could also run across this circumstance. For instance, consumers frequently use Boost as their electronic wallet, but when they visit a certain business to make a purchase, this store does not accept Boost and instead accepts alternative payment methods. The user in this situation finds it to be highly inconvenient. The consumer will lessen their dependency on your goods and move to signing up for other distinct businesses' payment methods if they do not have cash on them and have an urgent need. O- • OPPORTUNITY By 2025, the number of unique users of digital wallets is expected to increase from 2.6 billion to 4.4 billion, according to UK-based Juniper Research. China and India are predicted to account for over 70% of all digital wallet transactions, leaving markets like the UK and the US behind in terms of adoption. • "Digital wallets have been most effective in countries where card penetration has been low but mobile phone use is high," says John Mitchell of payment technology firm Episode Six. Digital wallet 13 businesses have prospered as a result of people switching from cash to mobile wallets in places like Southeast Asia. • Alternative kinds of digital currency are already being swiftly embraced, with cryptocurrencies being the most in demand. Future digital wallets will offer on-demand and frictionless access to these alternative digital assets in addition to storing and enabling payment transactions. Better yet, they will let you to carry out financial transactions utilising these many payment sources in addition to just keeping these monies. T- THREAT Impersonation • Impersonation happens when a fraudster obtains information and then assumes the identity of a legitimate user to complete a transaction using the password and account information they have obtained. SIM Swapping • SIM swaps happen when scammers first get the user's information and use it to block the user's SIM card for a mobile phone. They then use that information to visit the retail location of the mobile provider with false identification documentation to obtain a replacement SIM card. The cell provider unblocks the real SIM card that had been blocked and deactivates it. They then provide the fraudster a new SIM, who uses the stolen data to create one-time passwords. . Man-in-the-middle attack and Phishing • When a user types in his credit card number or bank account number, sophisticated threats like Man-in-the-Browser or Man-inthe-Middle attacks read the payment data from the Internet browser and intercept the transaction. E-wallet accounts are vulnerable to 14 fraud since phishing attempts are used to acquire users' login information and personal data. Malware attacks • The security of user money has been jeopardised by malware assaults on applications. An attacker can introduce malware to target the app and gather information from his phone to utilise it for malicious purposes. Biometric Recognition S-STRENGTH High security • Since biometric traits cannot be guessed or stolen, biometric systems provide a higher level of security than traditional methods of authentication. User experience is convenient and fast • Placing a finger on a scanner and instantly unlocking an account is faster than typing a long password with several special characters. Non-transferable • Biometric authentication necessitates the presence of its input during authorization. A physical biometric cannot be transferred or shared digitally. 15 W-WEAKNESS Costs • Biometric devices are more expensive than other types of standard security measures. The total expenses of biometric software, devices, programmers, servers, and other related equipment are substantial. Delay • Some biometric devices take longer than expected, resulting in a long line of workers waiting to be enrolled at major corporations. In these circumstances, people have difficulty scanning the biometric device on a daily basis. It is difficult for a person to go through a biometric verification system every day before entering a school, office, or other location. Scanning Difficulty • Some biometric modalities, such as iris scanning, may experience scanning challenges. It happens for a variety of reasons, including eyelashes, eyelids, lenses, and corneal reflections. Iris scanning may be less reliable for these reasons. OOPPORTUNITY Biometric combines with smart cards • Combining biometrics with smart cards refers to dual-technology cards that include a smart chip. These hybrid cards serve as both smart cards and proximity cards. This classification enables companies that currently utilise proximity-based access control to 16 include biometric security and limit card issuance to individuals who have access to the biometrically guarded area. Usability and simplicity • Two key aspects that have allowed for the widespread implementation of voice assistants and smart home systems They are systems that, when applied and extended to the entire residential environment, can also prohibit entry to rooms and are remotely operated in a very simple way with an app. T-THREAT False positives and inaccuracy • Future biometric fingerprint authentication will only use sections of the prints to authenticate identity, making it faster and more accurate. In 2018, a New York University research team developed an Artificial Intelligence engine that was capable of fraudulently cracking fingerprint authentication with a success rate of 20% by correlating similarities of partial prints to full biometric data. Data breaches • Businesses and governments that collect and store users’ personal data are under constant threat from hackers. Because biometric data is irreplaceable, organizations need to treat sensitive biometric data with increased security and caution – something that’s expensive and technically difficult in order to stay ahead of fraud advancements. If a password or pin is compromised, there’s always the possibility of changing it. 5G and IOT Technology 17 S- STRENGTH Greater performance • Up to 20 GB/s of download speed, which is 200 times faster than existing 4G technology • Transmission rates also can reach 15 or 20 Gbps. We can access data, programs, and distant apps completely directly and without having to wait as its ability to have a better speed Greater number of connected devices • With 5G, there will be numbers of devices linked to the network per square kilometer, which is a large increase in connectivity options. Ease of access • It is easy to access as many people have internet and devices that can connected them to 5G W- WEAKNESS High cost • Developing infrastructure needs high cost. Difficulty to access • Majority of the old devices would not be competent to 5G, so, all of them need to be replaced with new one Obstacle can effect connectivity • 5G connectivity's range is limited by how far frequency waves can go. This problem is made worse by the fact that physical obstructions like trees, towers, walls, and buildings interfere with the 5G frequency. The obtrusions will disrupt, interfere with, or absorb the high-frequency signals. OOPPORTUNITY Boost development of future technology • Enable connected homes • Enable connected vehicles • Enable smart traffic lights • Enable banking transaction 18 • Enable virtual reality of online shopping Serve several logical networks • To satisfy the needs of various customers, an Internet service provider may provide a variety of services with varying performance characteristics such as download speed, latency, or download use limitations via the same physical network. T-THREATS Security issues • It is now very important to safeguard and secure IoT devices, as their usage is quickly growing in both public and private spaces • Typical security techniques like public-key encryption and spreadrange processes cannot be implemented by all points because the majority of devices that operate at the sensor/actual layer of an IoT framework have limited computing power and storage capacity. 19 4.0 Decision Matrix Problem: Choosing Technology to Execute In Education Step 1 – Identify Alternative (Alt) Alt 1 - Metaverse and VR/AR Technology Alt 2 - Automation Alt 3 - Biometric Alt 3 - E-Wallet Alt 4 - 5G and IOT Step 2 – Identify State of Nature 1. Cost 2. Accessibility 3. Functionality 4. Durability 5. Convenience/User Friendly Step 3 – Assign Weight to State of Nature Cost 5 Accessibility 4 Functionality 3 Durability 2 20 Convenience/User Friendly 1 Step 4 – Design Scoring System (for Alternative) 1- Least Important 2- Slightly Important 3- Important 4- Very Important 5- Most Important Step 5 – Rate Alternatives 1- Low 2- Medium 3- High Utility State of Weight Automation Metaverse Nature and Biometric E- VR/AR 5G Wallet IOT Cost 5 1 1 1 3 1 Accessibility 4 1 1 1 3 2 Functionality 3 3 3 2 1 3 AND 21 Durability 2 4 3 3 3 2 Convenience 1 2 1 3 2 3 Step 6 – Total the Score State of Weight Automation Metaverse Nature and Biometric E- VR/AR 5G Wallet IOT Cost 5 5 5 5 15 5 Accessibility 4 4 4 4 12 8 Functionality 3 9 9 6 3 9 Durability 2 8 6 6 6 4 Convenience 1 2 1 3 2 3 28 25 24 38 29 Total AND The Decision Is E-Wallet = 38 (Highest Number) 22 5.0 Strategy on The Execution What innovations will significantly change how we live in the upcoming ten years? The most popular among them is mobile payment, which is primarily split into remote payment and near-field payment (NFC). Remote payments, such as those made for online shopping and ticket purchases, allow customers to access the bank's website or the client using a mobile device. The process of using a mobile phone to swipe a card to rent a car or make a purchase is referred to as near-field payment. In addition to operators and device manufacturers, established industries like banks and credit card firms have been interested in the possibilities of mobile payments. Consumers find that mobile payments save them time and effort, and there is more possibility to reach prospective customers with promotions and promotional messages thanks to mobile payment networks. 5.1 What Technologies are Driving Digital Wallets A digital core is the foundation of a digital wallet and serves as the foundation for the banking industry's digital revolution. The platforms and tools that a company employs to transition into a digital firm are referred to as its "digital core" in its simplest form. It may then interface with digital wallets and payment platforms via open APIs, enabling them to provide front-end advantages to customers. The world's top developers can use these technologies to build services and apps that interact and integrate more easily, according to John Mitchell, co-founder and CEO of Episode Six. These technologies are what are causing the industry to evolve and providing answers for apps that are more user-friendly. The management of digital wallets by individuals and organisations will change as a result of smart ledgers, or block chain. The smart ledger will open up a whole new world for digital wallets by providing a mechanism to track, store, and transfer alternative digital assets. Customers will experience a better-integrated digital payment model on a single platform when this is combined with readily customizable, API-accessible wallet management solutions. In fact, one of the most fiercely debated areas in the use of digital wallets is the emergence of crypto currencies. Almost the past ten years, trading in these virtual currencies has gradually 23 expanded; for instance, the price of Bitcoin climbed from $1 in 2011 to over $42,000 today. And there is still data that points to the potential for future expansion of crypto currency. 5.2 Steps of Execution Three scenarios are provided for how students can use this digital wallet in their daily activities in order to impose this technology on them at school. These are as follows: 1. The administration of the school or campus may require—or at the very least, encourage—the use of a digital wallet designed specifically for school-related transactions wherever possible. Any transaction, for example, the purchase of food or the payment of fees, may fall under the purview of this digital wallet. 2. Through the use of this digital wallet technology, a merit system may also be built. One instructor just needs to use the digital wallet technology when they wish to reward their students. The instructor has the option of adding money to the student's digital wallet or even adding vouchers that may be used at any café or canteen on the school or college grounds. 3. The payment of summonses is another admirable behavior that frequently occurs in the school or campus environment and is represented by this digital wallet. The authorities on campus may summon students, especially those who have a tendency to breach the rules. Therefore, rather of paying the summons with cash, students can do so by using their digital wallet. Discounts may also be applied to students who pay their summons using a designated digital wallet in order to promote the usage of digital wallets among students. 24 6.0 Conclusion In a nutshell, the ability of digital wallet to considerably speed up and enhance the entire processes associated to collecting payments in schools is significant. The ability to provide payment information once and then simply link it during a secure user authentication process such as entering a PIN, scanning a fingerprint, or increasingly in the future, other biometric authentication methods is really improving user experience and decreasing any problems in making purchases while maintaining a sufficient level of security. In general, even while using an electronic wallet offers many advantages, it can sometimes be difficult for people. The use of an e-wallet has a number of disadvantages that may cause people problems. First and foremost, the factor that affect the inconvenience of e-wallets is a dependency on a device. This is due to the fact that when a user's mobile phone experiences technical issues, such as system malfunction, device power failures, or simply runs out of battery, they must use the standard method of payment, but some customers did not even have their wallet with them because they did not anticipate this scenario. As a result, the transaction could not be completed. One restriction that digital wallet makers have not yet solved and that e-wallet customers are not in control of is device reliance. Since e-wallet users do not necessarily need to carry a purse, personal information about them would be made public if their cashless transaction devices such as smartphones and tablets were stolen or lost. This creates a security issue because all of the users' private information is stored on these devices. If the users don't have a password or PIN for their e-wallet app, the criminal is able to use it and cause financial harm. But owners can stop the burglar by calling the e-wallet support center as soon as they become aware that their device has missing and asking them to quickly freeze the e-wallet account to prevent the invasion from happening. Despite the fact that e-commerce is already widespread in many countries, the transformation rate of e-wallet payment systems is still viewed as slow and difficult. Therefore, increased targeted marketing is necessary for the development of the digital payment business. To increase customer acceptance, stores and software vendors should promote e-wallets more widely. It has been shown that targeted wallet promotion combined with education can increase the use of cashless transactions. E-wallet providers and dealers should collaborate on marketing initiatives to create effective methods that will increase user adoption. Additionally, for better management in this digital age, e-wallet developers and suppliers should concentrate on 25 managing communications, social network information, upgrading information technology platforms, and client classification systems. Students often appreciate digital wallets as being a very excellent, good technology. Additionally, e-wallets are regarded as being outstanding, innovative, and modern, and mostly the students also recommend the concept of e-wallets. As a result, e-wallets have the potential to be widely known and implemented by students. 26 References IQUII. (2018, March 8). Biometric Recognition: definition, challenge and opportunities of biometric recognition systems. Retrieved June 27, 2022, from Medium website: https://medium.com/iquii/biometric-recognition-definition-challenge-and-opportunities-ofbiometric-recognition-systems-d063c7b58209 5G and IOT - a white paper on 5G rollout for the IOT. Telenor IoT. (2022, June 15). Retrieved June 28, 2022, from https://iot.telenor.com/iot-insights/5g-and-iot/ 5G and IOT in 2022. Thales Group. (n.d.). Retrieved June 28, 2022, from https://www.thalesgroup.com/en/markets/digital-identity-andsecurity/iot/resources/innovation-technology/5G-iot 5G and IOT: Ushering in a new era - ericsson. (n.d.). Retrieved June 27, 2022, from https://www.ericsson.com/en/about-us/company-facts/ericssonworldwide/india/authored-articles/5g-and-iot-ushering-in-a-new-era 5G and its impact on the internet of things - stardust testing. (n.d.). Retrieved June 27, 2022, from https://www2.stardust-testing.com/en/5g-and-impact-on-iots A. (2022, March 8). 7 Emerging Technologies That Will Reshape Education in 2022. AxiomQ Ventures. Retrieved June 16, 2022, from https://axiomq.com/blog/7-emerging- technologies-that-will-reshape-education-in-2022/ Biometric Identification is On the Rise in Education Sector. (2019, September 13). Retrieved June 25, 2022, from Shuftipro.com website: https://shuftipro.com/blog/biometric-identificationis-on-the-rise-in-education-sector/ Clere, A. (2022, May 12). What technologies are driving the digital wallet trend? FinTech Magazine. https://fintechmagazine.com/digital-payments/what-is-driving-the-digital- wallet-revolution Corporate Finance Institute. (2020, September 12). Digital wallet - Overview, significance, examples, types. https://corporatefinanceinstitute.com/resources/knowledge/other/digital-wallet/ Greenwald, W. (2021, March 31). Augmented Reality (AR) vs. Virtual Reality (VR): What’s the Difference? PCMAG. Retrieved June 16, 2022, https://www.pcmag.com/news/augmented-reality-ar-vs-virtual-reality-vr-whats-thedifference from Hand, B. (2018, February 25). Biometrics In Schools: 4 Ways Biometric Data Can Be Used To Enhance Learning. Retrieved June 30, 2022, from eLearning Industry website: https://elearningindustry.com/biometrics-in-schools-data-enhance-learning-4-ways Jirik, P. (2021, September 9). 5 Popular Types of Biometric Authentication: Pros and Cons. Retrieved June 26, 2022, from PHONEXIA Speech Technologies website: https://www.phonexia.com/blog/5-popular-types-of-biometric-authentication-pros-andcons/ Julia Juremi, Mohamad Firduas Che Abdul Rani, & Cheng Ma, (2020), THE APPLICATION OF ELECTRONIC WALLET IN APU CAMPUS. palArcg’s Journal of Archaeology of Egypt/Egyptology, 17(7), 8592-9610. Retrieved from https://archives.palarch.nl/index.php/jae/article/view/3656 Kagan, J. (2022, April 10). What is a digital wallet? Investopedia. https://www.investopedia.com/terms/d/digital-wallet.asp Securing e-wallets. (n.d.). Vikaspedia : Landing Page. https://vikaspedia.in/e-governance/digitalpayment/tips-for-securing-your-digital-payments/securing-e-wallets The New Opportunities For Biometrics. (2022). Retrieved June 27, 2022, from Varinsights.com website: https://www.varinsights.com/doc/the-new-opportunities-for-biometrics-0001 Yadav, I. (2021, November 8). Why Mark Zuckerberg changed Facebook’s name to “Meta.” TechGig. Retrieved June 16, 2022, from https://content.techgig.com/technology/whymark-zuckerberg-changed-facebooks-name-to-meta/articleshow/87353504.cms