Vous êtes sur la page 1sur 5

Kimberly Rankin

System Analysis and Design

Section #1

Instructor: Dr. Eustache Placide

6.3 Executive Summary The Lacrimal Biometric System is a security device that uses a unique body fluid, (lacrimal meaning tears) as authentication for entrance access. This device is much suited for large organizations with multiple employees. Unlike other biometric systems this device comes equipped with a dispenser to house and dispense individually wrapped sterile specimen swabs. Business organizations as well as home owners seem to be spending more money on security systems to protect their property and families. There are other biometric systems on the market, but ours is a unique one in that it is totally impossible for someone to falsify another persons body chemistry. The most common biometric system is the finger print. Technology is on the increase and so is the expertise of the criminal mind that will have no difficulty lifting a finger print. In the business world the majority of customers are somewhat satisfied with their security system; but they are still seeking avenues to gain tighter security. Our product is designed to give peace of mind to our customers knowing that your security system will not be violated. There will be no fear from hold up robberies or killings. When the System is installed at the entrance of an organization; each individual will gain the comfort of knowing that their identity is secured. It is expected that this security device will gain favor in the marketing industry. With this in mind our company is expecting an increase in retail sales which would generate an income of approximately $20.000 by the year 2014. With this expectation we will be looking at a larger customer base and increase staff. The Lacrimal Biometric system can be easily integrated into any security system. It is so designed that if you already have a system, it can be incorporated in your system making it a dual one.
[Type text] Page 49

Kimberly Rankin

System Analysis and Design

Section #1

Instructor: Dr. Eustache Placide

6.4 Total Costs/ Benefit Analysis Year Manufacturing Cost 1 $42,300 2 3 4 5 Operating Cost 83,680 83,680 83,680 83,680 83,680 Security Benefit 144,000 144,000 144,000 144,000 Total Benefits 144,000 144,000 144,000 144,000 Total Cost 125,980 125,980 125,980 125,980 125,980 Net Benefit 18,920 18,920 18,920 18,920

It would not be feasible to manufacture only I product and prepare a Total Cost/Benefit analysis, therefore we anticipate producing 60 devices over a 1 year period. (NB The numbers are assumptions) Manufacturing Cost: - (to complete 1 device) Biometric system $450.00 Software 150.00 Swab dispenser 80.00 Sterile swabs (100) per. pk.) 25.00 Instillation $705.00 Operational Cost:Laborers Utility Insurance Advertisement Selling Price $ 900.00 300.00 160.00 50.00 300.00 $1,710.00

$60,480.00 12,000.00 10,000.00 1,200.00 $83,680.00

60 Devices @ $705.00 = $42,300.00 Manufacturing cost Operational cost Total cost $ 42,300.00 83,680.00 $125,980.00

[Type text] Page 50a

Kimberly Rankin

System Analysis and Design

Section #1

Instructor: Dr. Eustache Placide

60 devices @ $1,710 =

Selling price

$102,600.00

To find out the security benefit we first need to know how much a company would pay for security for 1 year in opposed to buying one of our devices.

Companies pay 60 security guards @ $200.00 per. month = $ 12 ,000.00 0ver a 1 year period $ 144,000.00 The difference between the total cost and the total benefits is the net benefit.

6.5 Feasibility Analysis Matrix NOTE: This matrix is a Excel document that is to itself on this website.

[Type text] Page 50b

Kimberly Rankin

System Analysis and Design

Section #1

Instructor: Dr. Eustache Placide

6.6 System Solution The problem that I found with the ISONAS system is relatively easy to correct The system is indeed secure but as mentioned before if carefully planned the system could be breached, thus my decision to incorporate the barometric system. There could have been other solutions like the company purchasing another security system but that would incur more expenses for the company. It is much easier to purchase a system that could be incorporated in their existing system. Due to the many features and makeup of the ISONAS system there wasnt much more that could be done in the area of making the system more secure. The only way the system could be breached is if an employee lost his/her key fob. This may seem like a small matter but it could lead to dire consequences. Each fob key has a different code, but there is nothing to tell if the right person is using it.

That is my reason for introducing the Lacrimal Biometric System. The name biometric, suggest some element of the body is being used. In this case the teas of an employee will be used to verify authentication. The ISONAS System already has the capability of being breached so it is only reasonable to make the system dual with another system that was incapable of being breached. It is virtually impossible for anyone to acquire a tear sample from another person unless it is given directly to them. It should also be noted that once the sample is taken and applied to the system, the swab cannot be used again. What will happen is that to get a sample the employee will place their hand under the dispenser which will be sensitized by that action. A small, sterile, individually wrapped swab will be dispensed in their hand. After removing the wrapper from the swab, the employee
[Type text] Page 52a

Kimberly Rankin

System Analysis and Design

Section #1

Instructor: Dr. Eustache Placide

will place the swab at the outer cantus of the eye and blink. Enough tears will be collected on the swab for analysis. The swab is then place into a small slot in the system where it will be analyzed and matched with the employees data already installed in the ISONAS System. The important thing is that each employees serial number on the key fob and their tear analysis will be used for entrance exit. None is used without the other. The result form the DNA will be analyzed and converted into a code which will be incorporated in ISONAS data base. What makes this dual system so unique is that one can be breached and one cannot; therefore the security capabilities are much tighter.

[Type text] Page 52b

Vous aimerez peut-être aussi