GB310 Supplemental Learning Assessment

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Types of threats

1 Human Error/ Internal Employees: accidental or unintended problems caused by employees or un-employees. eg: an employee who misunderstands operating procedures accidentally deletes customer records; poorly written applications; physical accidents such as spilling water on a server. 2. Computer crime/ External attacks hackers who break into a system as the opening vignette as well as virus and works that infect computer systems.

4 Real-life Iot use cases proven to transform business

1 Rio Tinto Sensors 2.Bank of America Smart employee badge (to improve working efficiency) 3. Smart Beverage machine 4. Compology image-based container sensors help municipalities control costs and improve waste & recycling services in franchise systems

Three main parts of IoT

1 Things: Objects, machines, and other IoT devices that uses embedded sensors collect data "Almost everything can have an embedded sensor, which detect events or changes in environment, then send that data, through internet, to other connected things. Sometimes Iot things act on the data received." 2. Network/Connections: Wireless network that connects LoT devices "Internet connectivity unities lot devices and data. Most devices connect through Wi-fi. Security is essential for collected data, connected devices and the network that tie it all together. 3. System: Steaming analytics process data on the fly, cleaning it, then triggering actions if needed "Data streams flow non-stop from loT devices. Businesses should know where to collect all this big data, what to keep virus discard, and how to use it. IoT Analytics: reveals meaningful patterns in the data, in real time or after data is stored in a data center or the cloud"

Examples of internet of things companies using blockchain

1. Chronicled Location: San Francisco, California ● How they're using blockchain in IoT: Chronicled combines blockchain and IoT products to deliver an end-to-end supply chain solution. Focusing on the pharmaceutical and food supply industries, Chronicled uses IoT-enabled shipping containers and sensors to give real-time updates on shipping processes. 2.HYPR Location: New York, New York ● How they're using blockchain in IoT: HYPR uses decentralized networks to secure connected ATMs, cars, locks and homes. HYPR stores biometric logins on their blockchain, securing and decentralizing important information. The company's biometric security protocols include unique facial, eye, voice and palm recognition tools for IoT devices.

Change the process model

1. Eliminating non-value added steps the steps that lose value due to business change 2. Reducing activities time -click on Perform Research and open properties dia-log -click and drag across the Time Filed in the perform Research Properties Dialog to highlight it. -Type T(a, b, c). It takes at least a, usually b, sometimes c 3. Adding Resources: costly 4. Cross-training Personal: making better use existing staff is a better alternative for additional hiring 5. Reducing Entity Arrivals: decrease amount of work coming into the system.

Technical and Data Safeguards

1. Identification and Authorization: verifies the credentials of the individual seeking access to computer resources Includes: passwords, smart cards(PIN-Personal Identification Number), bio-metric authentication (personal characteristics, such as fingerprints, retinal scan, etc. ) ●To make technical safeguards stronger Two Factor Authentication (multifactor authentication): a password is used and the second authentication step is required-may be fingerprints or location eg. online banking send verify message Hashing: a scrambled series of characters generated from a string a text, a unique digital fingerprint used in identification procedures. eg. When you enter a PIN at an ATM, the ATM applies a hash function to your PIN to create a hash. This hash is compared to the stored value of your hash. One-way function: anyone who steals your digest cannot go backward and determine the right PIN to use that would generate hash New safeguards Way from smartphones: identify user speech or ask questions only the right user can answer.

Malware protection

1. Install antivirus and antispyware programs on computers. 2. Set up you anti0malware programs to scan your computer frequently 3. Upgrade malware definitions 4.Open email attachments only from know sources 5. Promptly install software updates from legitimate sources 6. Browse only in reputable Internet Neighborhoods. 7. Don't use questionable discussion boards.

How should organizations respond if safeguards failed

1. Organizations need to respond to incidents with an incident response plan. Employees should be aware of this plan in the event of an incident. 2. Centralized reporting allows the organization to determine if it is under a systematic attack or whether an incident is isolated. 3. Response to any incident should be fast. The longer an organization goes without responding, the greater the threat. If the organization is unprepared, it will fail to respond in a timely manner. 4. Finally, it's worth the time and effort to practice the plan to make sure the organization is well prepared and equipped for any incident. Must report data breaches ASAP!

Smart Contract

1. Pre-programmed contract The terms, rules and conditions of the agreement are established by all counter-parties and translated into code. 2. Chain of events If the event specified by the conditions occurs, then the code automatically executes 3. Execution and value transfer Once executed, the terms of the contract will automatically transfer the value to the relevant patterns. 4. Settlement The transfer of value to counter-parties will be recorded on the blockchain. ● Facilitated by Cryptocurrencies (Ethereum vs. Bitcoin) ● Define agreement rules, but also automatically enforce the obligations •If - Then Statement •If condition A exists, then perform function B •Automated & value moved across the blockchain in real-time •Processes that involve manual interaction between two parties

Cyberattack of Internet of things

1. Smart refrigerator hack exposes Gmail login credentials. 2. Researchers discovered Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices, including set-up boxs, smart home controllers and even software-defined area networking equipment. 3. New variant of Mirai botnet malware is targeting networ-attached storage devices. Mukashi botnet takes advantage of a known vulnerability-which uses are being urged to patch before their product is absused to take part in DDoS attacks. 4. Tens of thousands of cars were left exposed to thieves due to a hardcoded password. MyCar is one of the more advanced vehicle telematics systems, providing a wealth of useful controls. According to the MyCar website, users can use the MyCar mobile apps "to pre-warm your car's cabin in the winter, pre-cool it in the summer, lock and unlock your doors, arm and disarm your vehicle's security system, open your trunk, and even find your car in a parking lot." For these reasons, the hardcoded credentials left inside the two MyCar mobile apps were a huge security flaw.

Computer crimes and attacks

1.Pretexting: Someone deceives by pretending to be someone else Eg. telephoner caller who pretends to be from a credit card company and claims to be checking the validity of credit numbers. 2. Phishing: obtaining unauthorized data that uses protecting via email. Phisher pretends to be a legitimate company or individual that sends email request for confidential data. 3. Spoofing: another term for someone pretends to be someone else IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site. Email spoofing=Phishing Evil Twin access point: Wireless access point can be spoofed by similar-sounding access point that eavesdrop on an unsuspecting user who mis-recognize the evil twin point as the legitimate one. eg. Starbucks 4. Sniffing: a technique for intercepting computer communications. "Computers on a Lan transfer information to each other. These information can be sniffed, and rogue machines, using similar message can be added to the network without notice." Wired networks: Sniffing requires a physical connection to the network Wireless network: no requirement 5. Malware: a variety of software that damages or disables computers. (can be virus, worm, Trojan horse, adware, or ransomware, self-replicate) Ransomware: blocks access to computer until the victim pays money. (keep promise to be sustainable) 6. Brute force attack: trail-and-error method used to obtain password or a PIN (using automated software to create every possibles combinations) 7. Hijacking-session hijacking: hackers steals an encryption key client is using to access a secure site, and resume that key to impersonate the legitimate user. 8. Cross-site scripting(XSS): a technique used by criminals to infect target machines with malware. eg. the criminal posts a reply (along with the plaintext reply adds malicious code) to the discussion board and when you click it, the malicious invisible code downloaded into your machine. To prevent, a discussion board must be designed only to accept text. 9.Hacking: breaking into computers, servers, or networks to steal data such as customers lists, product data, etc..by individual hackers and hacker groups 10. SQL Injection attack: an attacker enter an SQL statement into a form on a web page in which a client is supposed to enter a name or other data. A well-designed application will make such injections ineffective.

Trade-offs for Information System secutiry

1.Risk and Cost Reducing risks always costs, and eliminating all risk would be expensive if possible. Risk: the chance of loss eg. The risk (likelihood of loss) is greater from hack than a virus. 2.Security and Freedom Securities measures would necessarily restrict users freedom eg. Online banking limits the amounts of transactions.

IoT Statistics

1.The Home IoT Market is Expected to Grow to $53.45 Billion by 2022 2.By 2024, the Global IoT Healthcare Market is Expected to Reach $140 Billion 3.Over 80 Percent of Industrial Manufacturing Companies Are Using or Planning to Use IoT Devices 4.Nine out of Ten Senior Executives in Technology, Media, and Telecom Companies Say IoT Growth is Critical to Their Business 5.Over 60 Percent of US Cities Are Investing in Smart City IoT Technology 6.By 2021, 80 Percent of Retailers Will Be Using IoT to Customize Store Visits

Benefits of Blockchain in IoT

1.The ability to secure data 2. Peer-to-peer Model: making payments and 3. executing contracts are easier

IoT Statistics

1.There Will be 41.6 Billion IoT Devices by 2025 (IDC) By 2020, 90% of Automobiles Will Be Connected to the Internet (PWC) 2.Every Second, Another 127 Devices Are Connected to The Internet 3.There Will Be 3.5 Billion Cellular IoT Connections by 2023 4.Companies Could Invest Up to $15 Trillion in IoT by 2025 (Business Insider Intelligence) 5.The Total Economic Impact of IoT Could Range Between $4 and $11 Trillion per Year by 2025 (McKinsey Global Institute) Even if self-driving vehicles aren't here yet, existing automobiles are increasingly incorporating IoT features. From sensors that transmit usage and mechanical condition data to manufacturers and dispatchers to internet connectivity that facilitates better GPS and driver comfort, today's vehicles offer as much connectivity as the modern home. Short-range IoT devices are expected to see the greatest increase, but wide-area and cellular internet-connected devices are forecast to grow at an annual rate of about 30 percent by the same year

Bottleneck

A facility, function, department, or resource whose capacity is less then the demand placed on it The bottleneck activity/resources will limit the overall capacity of a process (A process cannot operate faster than its bottleneck activity)

Firewall

A firewall is a computing device that prevents unauthorized access to parts of network.

utilization (used/total available)

A measure of how intensively a resource is being used to produce a good or a service A ratio of the amount of the resources used to the amount available

Process Model

A process model is a flow diagram with associated information for simulating process. Capture, improve and optimize processes -Easy process design and capture -data analysis-turn raw data into useful information -prove process changes with simulation -find the best solutions using evolutionary optimization -Capture, document and approve-control the improvement process ProcessModel helps identify and implement changes that will maximize performance 1. ProcessModel helps analyze mission-critical processes 2. process model allows you to experiment-risk free 3. process model helps you improve your actual operations

Types of Loss

Data Loss Software Loss Hardware Loss

Data Loss

Data Loss: a data loss occurs when a threat obtains data that is supposed to be protected-an unauthorized disclosure. 1. Human error(internal employees) when someone releases data in violation of policy. Eg. employees who unknowingly release proprietary data to competitors or to the media. Incorrect data modification Eg. incorrectly increasing a customer's discount; incorrectly modifying an employee's salary, earned days of vacation, or annual bonus; Placing incorrect information such as wrong price changes. 2. Criminal attacks (external)

Why Blockchain can better secure data?

Decentralized Distributed Ledger ● data is stored on various nodes all over the world ● no central authority - all nodes must approve and verify changes ● once stored, near impossible to change it ● all participants can see the history of stored blocks and transactions ● data is encrypted (need a key)

The only occupation eliminated by automation in the last 70 years?

Elevator operator

Objects

Entities: the items or people being processes eg. documents, customers, products, etc Activities: The tasks performed in entities such as assembly, document approval of customer cheak-out Resources: The agents used to perform activities eg. service personal, equipment

Connections

Entity Arrivals: What, when, where and in what quantities entities enter the system begin processing Entry arrivals are defined by connecting an entry to the activity or storage where it begins processing Multiple can be created Entity Routings: Define the processing flow for entries An entry routing is defined by connecting an activity or storage to the next activity or storage in the processing sequence An actives can have multiple input and output routings Resource Assignments: Define the use of resources in performing activities or moving entities. a resource assignment is defined by connecting a resource to either an activity or a routing depending on whether it is used for an activity or to make a move Multiple or alternative resources may be used for an activity or routing.

IS Security Threat/Loss Scenario

Examples

White-had Hacker

Good hacker, or ethical hacker who exposits computers systems or networks to identify security flows and make improvement recommendations.

Hardware and Infrastructure Loss

Human error: accidents eg. cleaning operations spilling liquids on hardware in an office building. Criminals: by terrorist events or Theft 1. Advanced Persistent Threat: a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded orgs such as government. eg. "Deep Panda" hacked Anthem healthcare data center and obtained Health care records of 80 million people.

Software Loss

Human errors: usually procedure problems Computer Criminals: 1. can launch a Denial-of-servies (Dos) attack in which a malicious hackers flood a Web server with millions bogus service request that so occupy the server Thai it cannot service legitimate requests. 2. Overflow attack: hackers presents malicious code to a computer's operating system or application that deliberately overflows the capability of the software. 3. Usurpation: an unauthorized control of some part of an IS. "occurs when criminals replace a legitimate user of software program with their own access or illegitimate software program to give the attacker unauthorized control of some part of the IS"

Block-chain security

IOTA connects IoT with secure data and value exchange. Tangle is an open, feeless and scalable distributed ledger, designed to support frictionless data and value transfer.

Risk Management

IT Security experts identify and assess risks and work with senior management about how to manage these risks. Four options 1. Accept: risk can be accepted and budged for 2. Avoid: risk can be avoided by not engaging in activities 3. Transfer to Cloud or with insurance: Cloud is a secure option. Advantages of the cloud: -Cloud vendors use current technology -they can afford to hire leading security experts -they remove physical access to the data -they require customers to simplify and streamline procedures 4. Mitigate with safeguards: Defensive safeguards must be layered "no master safeguards list can ensure complete protection" one way to organize safeguards layers is to select safeguards from each of the categories: technical, data, and human -Safeguards are costly and often restrictive expensive in terms of reducing work efficiency by making common tasks more difficult, adding labor expenses. Restrictive in terms of limiting employees behaviors An easy to remember safeguards is to arrange them based on the five components of an IS.

One good thing (Covid 19)

Innovation ● An increase in risk perception makes consumers more willing to pay for safety features. ● demand for new digital products, formats, and content will be intensified ● speed up automation and digitization investments and generate new products, services, and business models.

Internet of Things (IoT)

Network of physical objects—"things"—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.

Process flow diagram compoents

Object-the graphic shapes in the flowchart Connections-lines that connecting the graphic shapes A properties dialog displays the information for each object and connection

VR Data Visualization

Quickly uncover new insights with 3D data presentations.

VR for business

Safe place to experience that which would otherwise be expensive, risky, or dangerous • Expensive - • Risky - practicing surgery • Dangerous - hostage negotiations or recovery Apps exist for most sectors •Archaeology, Art, Architecture •Commerce, Office •Construction, Industrial Design •Education, Translation •Emergency Management, Disaster Recovery, Medical and Search and Rescue •Games, Sports, Entertainment, Tourism •Military •Navigation

security policy

Senior management must establish a company-wide security policy that states the organization's posture regarding data that is gathers about its customers, suppliers, and employees. At Minimum: 1. What sensitive data the organization will store how it will process that data 2. Whether data will be shared with other companies 3. How employees and others can obtain copies of data stored about them 4. How employees and others can request changes to inaccurate data 5. What employees can do with their own mobile devices at work 6. What non-business-related actions employees can take with employee-owned equipment.

StriVR Uses Virtual Reality To Train #NFL Quarterbacks

Sports Simluaters StriVR clients includes 24 different profession and college teams across four sports. It worked with 6 NFL teams. Also, VR-based swim training and Snowboard training.

Richie's plank experience (a game based on VR)

Test your fear of heights as you walk a plank off the edge of a skyscraper 80 stories high, fly through the city like a superhero, or try and make it through the Nightmare! Take the immersion to new heights with our Plank Cloning System that clones almost any real world plank into the virtual world

Capacity(Units/Time)

The capability of a worker, machine, work center, plant, or organization to produce output per time period

Cycle time(T/units)

The interval of time during which an event or set events is completed or the length of time that an entity remains in the simulation model

Efficiency (actual/expected)

The measure of the utilization of a capacity resources compared to best possible utilization Sometimes expressed as a ratio of actual output compared to expected output Value Added Time+Non-Value Added Time=Process Time Efficiency=Value Added Time/Process Time

Security Challenge

The single biggest challenge facing IS professions today ● A billion records are breached every year; attacks on prepaid debit cared netted hackers 5 million in a single month from five cards ● Attacks across baby monitors (???), Twitter accounts, servers, moving cars, hospital patients..etc.. ● The Director of National agency: cybercrime is leading to the greatest transfer of wealth in human history and caused a global cost of nearly 1 trillion a year.

IS Security Threat/Loss Scenario

Threat: a person or organization that seeks to obtain or alter data or other assets illegally, without owner's permission and often without the owner's knowledge; hackers for opening vignette Vulnerability: a weakness in the IS that provides an opportunity for threats to gain access to individual or organizational assets Safeguard: some measure that individuals or organizations take to block the threat from obtaining the assets. (controls limit behaviors of users and hackers to improve security) Target: the asset that is desired by the threat

Organizations respond to Security Threats

Three Security fundamentals: 1. Security Policy 2. Risk management 3. Defense

Considerations for business process improvements

Timing Interdependencies Variability

Human errors causes data loss

Two types of human errors 1.Inadvertent error: ● procedure problem: employees who place restricted data on Web sites that can be reached by the search engine might mistakenly publish proprietary or restricted data over the website ● Social Engineering occurs when employees are manipulated into divulging data or bypassing security on behalf of others. (Hackers or criminals, but employees unaware) 2. Deliberate error-sabotage: Disgruntled employees or those motivated by factors outside of the business can cause data loss. eg. Wiki Leaks

Oculus for Business

VR Simulate real-world business environment 1. VR can help training health-care workers. eg. surgery, which cannot be done in real environment. 2. VR for service company Train employees by putting them in different sceneios. Improving employees empathy and improve customers experience. 3. DHL: help employees going through simulated unit load process safely 4. xxonmobil (energy company) training workers to operate energy facilities safely and reliably by using simulated environment. Provide daily task training for workers dealing with under dangers environment through VR simulation. (save life)

Business Process

a sequence of activities for accomplishing a function

Virtual Reality in Medicine

researchers have now developed a technology that uses computed tomography data to generate a three-dimensional image in real time for use in a virtual environment. For example, doctors can use the latest generation of virtual reality glasses to interact in a three-dimensional space with a hip bone that requires surgery, zooming in on the bone, viewing it from any desired angle, adjusting the lighting angle, and switching between the 3D view and regular CT images

The state of VR

• Engages 2 senses - sight & hearing • Expensive • Sometimes awkward • Impressive...but relatively rudimentary. • Add a third sense...now your talking!

VR, AR, and MR

• VR - An interactive computer-generated experience taking place within a simulated environment • AR - A real-world environment enhanced (augmented) with computer-generated objects or information. • MR - The merging of real and virtual worlds to produce new environments where physical and digital objects co-exist and interact in real-time

Bain & Company's survey of executives worldwide

•Automation of business processes is rapidly scaling up, with fallout from the coronavirus likely accelerating adoption •Cost savings from automation roughly 20% over the past two years •Improved process quality and accuracy, reduced cycle times and improved compliance •Automation projects have not delivered the expected savings (44% of respondents) due to competing business priorities, insufficient resources or lack of skills.

VR/ AR in Manufacturing

•Complex Assembly •Maintenance •Expert Support Speeding up production VR is currently used by forward-thinking manufacturers to improve their approach to predictive analytics. While finding flaws in a product design could take weeks of analyzing data, interacting with the product digitally allows you to spot a design flaw in just a few minutes. The same process can be applied to a whole production line. By studying the production process in a virtual environment, manufacturers are able to detect bottlenecks and areas that need improvements. VR also eliminates the need of building actual full-scale models, which is very convenient in sectors such as aerospace manufacturing, where prototyping can be extremely expensive.

Key Takeaways

•Connecting everything opens up business opportunities - growth in new use cases •IoT security remains a challenge •Blockchain comes to the support of IoT for better security and privacy •Smart Contracts use Blockchain & Cryptocurrencies to securely automate contracts and move value in real-time

Augmented Reality

•Google Translate - Real-time translation of foreign language and symbols in your native language. •Wikitude - Location based app that adds digital information to the real view, as seen through your Smartphone camera North-AR based glass (acquired by google)

Focused beyond taking cost out of processes

•Improve the work and the workforce •Improve morale - take monotony out of the process •Improve customer experience •Enable employees to focus on higher value activities

Industries using Augmented Reality to reshape business

•Manufacturing •Education/Training •Healthcare •Marketing •Fashion •Travel •Navigation •Retail •Food & Beverage •Enterprises Boeing Patron Navigation

Cyber security provisions for consumer IoT

•No universal default passwords •Implement a means to manage reports of vulnerabilities •Keep software updated •Securely store credentials & security-sensitive data •Communicate securely •Apply software updates •Ensure that personal data is protected •Make systems resilient to outages •Examine system telemetry data •Make it easy for consumers to delete personal data •Make installation and maintenance of devices easy •Validate input data

Processes benefit from RPA

•Repetitive •Rule-based •Little to no variance •Require minimal human intervention

Intelligent Process Automation (IPA)

•Robotic Process Automation (RPA) - software bots •Smart Workflow •Machine Learning •Natural Language Generation •Cognitive Agents IPA mimics activities carried out by humans and, over time, learns to do them better.

Why VR and AR Are Slow to Take Off

● 3D design interface ● VR is missing two key technology elements for mass adoption ● convenience and control ● Smartphone competition 1. "Gartner expects it will take 5 to 10 years before these technologies reach a mature level. 2. Businesses already experiment with VR, but hesitate to fully commit. 3. On the other hand, customers are fascinated by the new entertainment possibilities, but do not want to invest in head-mounted displays (HMDs) as long as the offering is so small. This is going to change during the next five years."

Blockchain

● A blockchain is a shared ledger where transactions are permanently recorded by appending blocks ● The blockchain serves as a historical record of all transactions that ever occurred, from the genesis block to the latest block, hence the name blockchain.

Attended and Unattended RPA

● Attended RPA operates in real time on the desktop alongside users, emulating the users interaction with applications at the UI level. Triggered by the user or by system events. ●Unattended RPA operates independent of human interaction, running on remote servers Triggered by system events or scheduled.

Augmented Reality Predictions

● By 2020, 30% of large enterprises will adopt AR applications on mobile devices as part of their digital transformation strategy ● By 2021 25% of large businesses in mature markets will pilot and deploy mixed reality solutions (up from 1% in 2017) ● By 2022, AR will surpass VR as the key driver of HMD usage, with AR HMD representing 55% of unit sales (up from 5% in 2017) ● By 2022, AR market is expected to reach $117 billion

The impact of Covid 19 on digitalization

● Changes in digital and technology adoption are taking place about 25 times faster than before the pandemic, ● Executives' attitudes have shifted from using automation for cost reduction to gaining a competitive advantage

Legislation and Regulation on IoT

● Draft Code for Practice- Securing the internet of Things for Customers ETSI-Cyber Security for Consumer Internet of things ● States Take the lead on Securing IoT The California IoT Security Law is the first of its kind in the nation and pushes device manufactures to adopt cybersecurity standards during the product development and design stages where none have existed before. ● The U.S senate passed the internet of things (IoT) Cybersecurity improvement Act- desires at the National Institute of Standards and Technology to develop standards and guidelines for the federal government on the appropriate use and management by agencies of IoT devices owned or controlled by an agency and connected to IS owned or controlled by an agency. This Includes NIST developing minimal informational security requirements for managing cybersecurity risks associated with such devices.

Encryption

● Encryption is a process of transforming clear text into coded, unintelligible text for secure storage or communications. ● Key: a number used to encrypt the data. (named key because it locks and unlocks messages) ● Decoding (decrypting): a key is applied to coded message to recover the original text. Symmetric Encryption: the same key is used to encode and decode Asymmetric encryption: one key encodes the message, another decodes message Public/Private Key (a special form of asymmetric encryption): Each website has a public key for encoding messages and a private for decoding them.

Robert Rodriguez's THE LIMIT: A Virtual Reality Film

● Enter a new world of storytelling in this blockbuster "immersive cinema" experience from visionary filmmaker Robert Rodriguez (Sin City). ●As a rogue agent with a mysterious past, you enlist the help of enhanced super-assassin M-13 (Michelle Rodriguez) to retrieve your identity and strike against the deadly organization that created you.

The human element on automation

● Fears automation will result in significant job losses may be overblown (Mar 2018) - Organization for Economic Cooperation and Development (OECD) report ● 2013 Oxford University faculty predicted that ~47% of U.S. jobs were at high risk of being automated. ● Many jobs impacted; few jobs eliminated - many jobs can only be partially automated!

Best-practice companies overcome these execution barriers by

● Grounding automation in the corporate strategy and customer experience ● Devoting significant time to what comes after automation ● Actively managing automation as a tranformative change.

Virtual Reality (VR)

● Mobile headsets use smartphones as their viewing screens. They're easy to use and require little setup, but are hardly immersive. ● Computer headsets like the Oculus Rift and HTC Vive have been attached directly through wires on the desktop. The computing power and environmental sensors create an immersive experience.

Haptic suits

● Provides gov and public safety training based simulated dangers, high-stressed environment by using VR and biometric system (Haptic feedback system, motion capture system, climate control system) ●Allow accumulate experience without being exposed to real dangers environment.

PRA Value Proposition

● RPA does not require invasive integrations, changes to existing systems, or any/much change management. ● Relatively easy to develop and deploy bots. ● Bots run quickly and accurately.

RPA Market place

● RPA software market grew over 60% in 2018, making it the fastest-growing enterprise software segment. ● Global spending on RPA software •$2.4 billion in 2022 •$4 billion by 2025 •By 2023, there will be a 30% increase in the use of RPA for front-office functions (sales and customer experience). •By 2024, organizations will lower operational costs by 30% by combining hyperautomation technologies with redesigned operational processes.

Relive Reconnect Reinspire

● Relive Customized reminiscence therapy tools allow your residents to take a stroll down memory lane by revisiting their childhood home, wedding location or anywhere else from their past. ● Reconnect Provide opportunities for residents to virtually leave the four walls of their community to check off bucket list items and engage with the world in ways they never thought possible. ● Reinspire Create new friendships through the power of shared experience, all while providing unforgettable moments and stories that residents and their families will remember forever.

VR Design Reviews

● Remove physical limitations and save time reviewing designs. ● Iterate in VR before anything is built

Parting thoughts on automation

● Robotic Process Automation holds much promise ● Business process automation tools and techniques will evolve quickly, but don't forget the people part... Skills are scarce - RPA Architects & Developers, Bot Managers/Administrators, Consultants, business leaders in the know ● It should be in your business process improvement toolbox

VR in Healthcare

● Showing promise in cognitive and behavioral therapy ● Alternative to prescription drugs ● Exposure therapy, distraction therapy, neurofeedback ● VR experiences can be designed specifically for different conditions ● We have so much more to learn about the human mind In some hospitals, special VR goggles are being used to reduce patient stress and pain. With the goggles, patients can see the world beyond the four walls of hospitals, they can participate in an art studio, swim with whales and dolphins in the ocean, etc.

Technological Covid-19 measures

● Smart helmets equipped with AI-powered infrared cameras to detect pedestrians with fevers used in airports and on city streets ● Retailers have licensed Amazon's Just Walk Out technology - Amazon Go (started last March) ● Uber medics delivers subsidies for NHS staff ● While many restaurants are struggling to survive, Chipotle's digital investments paid off as it reported net sales increases of 7.8% in Q1 2020, same-store sales increases of 3.3%, and digital sales growth of 81% (representing 26% of sales). In March alone, digital sales grew a shocking 103% year over year and represented 38% of sales. ● Telemedicine: a distribution of health-related services and information via electronic information and telecommunication technologies. It allows long-distance patient and clinician contact, care, advice, reminders, education, intervention, monitoring, and remote admissions

Robotic Process Automation (RPA)

● Software robots (bots) mimic human interaction with computer applications in a non-invasive manner, e.g interacting directly with application's user interfaces, without any changes to them. ●They execute rules-based and repetitive transactional processes efficiently, accurately, and at scale. ● They can work across legacy enterprise systems and other technology platforms. ● Emerging Technology, but it's been around for 10 years!

VR-based marketing

● The Patrón Experience: Augmented Reality App Interactive Journey to Hacienda Patron Distillery to learn about the unique features and agings process of ultra premium Tequila ● Retail-Lowes: LIl 3D Lowe's is introducing LIL 3D, a proprietary, end-to-end 3D scanning system that brings together leading-edge machine learning and a state-of-the-art backend system. LIL 3D creates extremely high-quality 3D models and automatically converts them to suit channels from web browsers, to virtual reality headsets, and even 3D printers.

Information System Security

● The process of preventing unauthorized access to an IS or modification of its data. ● To be effective, Information System Security must address unavoidable trade-offs.

Top 10 Strategic Technology Trends for 2019

● Through 2028, conversational platforms, which change how users interact with the world, and technologies such as augmented reality (AR), mixed reality (MR) and virtual reality (VR), which change how users perceive the world, will lead to a new immersive experience. ● By 2022, 70% of enterprises will be experimenting with immersive technologies for consumer and enterprise use, and 25% will have deployed to production. ● Eventually, the technology and thinking will shift to a point where the experience will connect people with hundreds of edge devices ranging from computers to cars.

VR benefits employee training

● Train employees at scale and improve knowledge retention. ● Most have found that training in VR reduces the time to learn, decreases the number of trainee errors, increases the amount learned, and helps learners retain knowledge longer than traditional methods. 9% increase in learning accuracy with done in VR - Univ Maryland Recall and response times improved by 12%

The impact of Covid 19 on imports

● US goods imports contracted 11 per cent in the first eight months of the year compared with the same period last year, ● but imports of industrial robots rose 5 per cent, according to data from the US International Trade Commission.

3 Ways VR Is Changing The Film Industry

● VR is a story telling medium at rise ● Tribeca (Introduced by Tribeca Film Festival) immersive-a showcase of experience from across the world. ("the fact that a lot of larger film studio are now creating VR content that are not just marketing pieces, but fully realized standalone experiences will definitely help open the medium to the mainstream. ") ● VR headsets like HTC Vive and Oculus Rift offer virtual Theaters in which users can privately screen entertainment. ● Facebook space. AltsVR creates virtual experience that friends can share simultaneously, such as videos in stand-up comedy. "Virtual reality is not a supplement to the existing media, but it is a net form of mainstream entertainment." ● Virtual ads: Brand recall was at least eight times more effective and resulted in double intent on share. ● Hollywood studio are now turning to VR to immerse audiences in the worlds they create before heading to theaters. (tie-ins, Alien Covenant: IN Utero and Suicide Squad 360 use actors, sets and CGT assets from films for greater authenticity. ● Imax is partnered with AMC to offer VR Arcades inside movie pixels (shooting inside film story

Robotic Process Automation (PRA)

●A short-term fix to quickly automate high-volume and repetitive human tasks. (no complex integration and no change frequently) •Software bots •Designed to automate human tasks by emulating the same human transaction steps. •It uses a combination of user interface (UI) interaction or descriptor technologies to automate repetitive human tasks.

Virtual Reality in Travel and Hospitality

●Travel and Hospitality organizations are using VR technology to show destinations before booking. ●This is especially helpful for small and lesser known places or destinations. People can experience what's in store even before booking through visual and auditory stimuli (such as sea winds, aromas, ocean breezes and sound of seagulls).


Set pelajaran terkait

The Developing Person- Chapter 1 Quiz

View Set

Logic - The Syntax of Predicate Logic

View Set

Econ module 25, module 24 econ, module 23 econ, Module 21, Module 20 Econ, Economics Module 19, Econ test 3

View Set

337: Describe the mechanisms by which viruses cause cancer

View Set

The American Revolution-Section 2 Quiz

View Set

anatomy and physiology martini chapter 13

View Set