eastern institute of technology celebrating student success · the eastern institute of technology...
TRANSCRIPT
EASTERN INSTITUTE OF TECHNOLOGY
Celebrating Student Success 2018
WelcomeThe Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome you to our Students’ Success Celebration. EIT has a long and successful history in tertiary education spanning over four decades and the Auckland campus is now in its fourth year of operation.
Today we are pleased to present our 2018 Auckland International Campus graduands and their work to our business partners and other guests. Our graduands are from both the Computing and Business Schools which sit in the Faculty of Commerce and Technology. Our students come to our Schools as professionals who are already experienced in their field of work. Their experience ranges from management, software development and web design, to testing, business analysis and networking.
This celebration marks their successful completion of Postgraduate Programmes either in IT or Applied Management and their return to the business environment either here in New Zealand or back in their home country.
We welcome all our guests and wish our graduands every success in their future endeavours.
Deputy Chief Executive: Mark Oldershaw
and
Head of the Computing and Business Schools: Rebekah Dinwoodie
Contents
Tardio Darwin Machine Learning and Cognitive Applications for New Zealand SMEs 1
Elizabeth Reyes Factors that Affect a User to Fall for a Phishing Email 3
Joel Sevilla SQL Standard –Not the Standard? 5
Jeanette Bautista Popular Platforms Used in Cybervetting For IT in New Zealand 7
Maria Victoria Alcantara Critical Analysis of a Strategic IT Plan for a Media Company 9
Reshma Begum IoT Based Smart Parking System 11
Vijay Krishnan Radhakrishnan Agile - Scrum Project Development at Intel 13
Gustavo Valverde Evaluating the Perception of Online Shopping Customers regarding Data Security in New Zealand 15
Lucas Barcellos Victoria A Review of the Agile Methodology 17
Yubing Shi Smart Attendance System 19
Mark San Agustin Exploring Urban Agriculture Smart Aquaponics 21
Pushpinder Kaur Case Study at Portbase Challenges in Transition from Waterfall to Scrum 23
Sheila Sara Prem Kumar Case Study of Adobe Premier Pro using Scrum and Waterfall methodologies 25
Devina Haridas Challenges in Transition from Waterfall to Scrum in Port Base, Netherland 27
Parth PancholiCase Study of Adobe Premier Pro using Scrum and Assessing Perception of Students Towards E-Learning at EIT
29
Dave Jigar BalkrishnaAuckland’s Android Smartphone Users’ Perception Regarding Security in Installation of Third-party Entertainment Applications
31
Geo Augustine Bio 33
Yan Chen In Absentia 33
Machine Learning and Cognitive Applications for New Zealand SMEs
Tardio Darwin: Email: [email protected] | Phone: 027 526 3699 | LinkedIn: www.linkedin.com/ln/darwinjerome | Website: http://darwin.tardio.info
Bio:I come from the software industry particularly in the game development production. My passion is software application development and anything about technology.
Additionally, my professional experience spans 12 years in the development of video games, mobile and enterprise application. My career track includes managing mobile app and web development teams from conceptualisation, prototyping to launch support. I have handled various development languages such as PHP/ MySQL, C++, Python, Javascript and Actionscript. I also have experience in handling both managed / dedicated server and cloud-based solutions particularly Amazon Web Services. My executive position has given me the opportunity to managed various talented and skilful employees during my career involving different trades; creative and engineering teams. Lastly, I also have been a consultant that assisted schools and academic institutions to establish their game development and design courses. Say hello!
Abstract:Machine Learning applications are ushering a paradigm shift in how enterprises conduct their operations. Technology giants such as Google, Amazon and Facebook are embattled in the new-age Artificial Intelligence arms race, investing huge amount of resources at an increasing pace. In addition, data scientists and IT engineers are constantly placing effort in optimizing and creating new algorithms that provide faster, efficient and secure machine learning services. All this leading to a broader impact in business operations and processes. This research proposal intends to answer fundamental questions on how machine learning can help New Zealand Small and Medium-scale Enterprises (SMEs) in business growth. It aims to study current trends and applications of ML algorithms. Furthermore, it identifies critical success factors in using machine learning enabled systems.
1
KiwiStore
1. This research aims to contribute to the advancement of theoretical understanding of Machine Learning applications. This represents a phenomenon deemed relevant to local businesses aiming to compete with their bigger competitors yet limited with resources.
2. This project will provide a holistic understanding of ML, by combining different fields of research, i.e. marketing, operations, IT and knowledge management
3. Having a pragmatic and cross-disciplinary approach, the project will have the potential to discover whole new theoretical openings in the AI/ML industry.
4. DEMOCRATISE ML, as investments on new technologies are always critical specially for companies with limited resources.
5. To COMMODITISE ML algorithms and services that will assist New Zealand SMEs to propel its economy forward.
RESEARCH OVERVIEW BACKGROUND RESEARCH FRAMEWORK SIGNIFICANCE
RESEARCH QUESTIONS
of New Zealand companiesare categorised as SMEs97%
SMEs also employ 29% of NZ workforce and generates 28% GDP share. Despite all these staggering contributions, SMEs are in dire need of support in various areas such as business growth, customer acquisition, revenue and financial evaluation, planning and cashflow, and operations related to decision making based on a given business data.
What are the benefits of Machine learning and Cognitive Applications for New Zealand SMEs?
How ML can support companies for business growth, mainly in the area of business development and customer acquisition?
What are the adoption strategies and implementation challenges of ML in business operations?
CUSTOMER ENGAGEMENT
AI Chatbots
REVENUE GENERATION MARKET ANALYSIS
ML Analytics
WORLDVIEWPragmatic DESIGN
Grounded Theory
METHODSQuestions
Data CollectionAnalysis
Interpretation
BIG DATA ANALYSIS
Cloud AI/ML or MLaaS
Machine Learning applications are ushering a paradigm shift in how enterprises conduct their operations. Technology giants such as Google, Amazon and Facebook are embattled in the new-age Artificial Intelligence arms race, investing huge amount of resources at an increasing pace. In addition, data scientists and IT engineers are in constant effort in optimizing and creating new algorithms that provides faster, efficient and secure machine learning services.
All this leading to a broader impact in business operations and processes. This research proposal intends to answer fundamental questions on how machine learning can help New Zealand Small-Medium Enterprises (SMEs) in business growth. Study current trends and applications of ML algorithms. Furthermore, identify critical success factors in using machine learning enabled systems.
CUSTOMER RELATIONSHIP MANAGEMENT CUSTOMER ACQUISITION AND SUPPORT
Cognitive Applications
METHOD: Qualitative
SAMPLING: Purposive - heterogenous
INSTRUMENTS: Interview questions and unstructured questionnaires
SAMPLES: 30-50 participants in an New Zealand SME, primarily holding top positions such as CEO, CTO or any relative decision-making role. IT professionals and software engineering position will also be included.
DATA ANALYSIS: Framework Analysis Methodology
RISK ASSESSMENTFRAUD MANAGEMENT
ML Algorithms
MACHINELEARNING
A to
olb
ox o
f mac
hine
le
arning applications for business grow
th in New
Zealand
DARWIN JEROME TARDIOMachine Learning and Cognitive Applications for New Zealand SMEsITPG8.300 Research in Information [email protected] | http://darwin.tardio.info/research-work/
Copyright © 2018Eastern Institute of Technology, Auckland
Submitted to Dr. Dobrila Lopez, PhD
MACHINE LEARNING AND COGNITIVE APPLICATIONS FORNEW ZEALAND SMEs
2
Factors that Affect a User to Fall for a Phishing Email
Elizabeth Reyes:Email: [email protected] | Phone: 022 028 3907 | Linkedin: https://www.linkedin.com/in/reyes-elizabeth/
Bio:Elizabeth completed Electronics and Communications Engineering in Mapua University in Manila, Philippines. She worked as an Associate Engineer in Trend Micro and as a Telecommunications/Design Engineer in Manila Electric Company (MERALCO) before emigrating to Canada. She is a well-experienced Technical Support / IT Help Desk Analyst. Her most recent IT work experience was with Fujitsu Americas Inc. in Montreal, where she worked as a senior analyst in the email team and provided VIP phone support for Government of Alberta employees, and provided training to new email analysts.
Abstract:Phishing is defined as an act of getting personal information such as usernames, passwords, and credit card numbers. People do this for fraudulent activities or even for serious cases of identity theft. When it comes to health, as many people would say, prevention is better than cure. Same goes to the internet world. The researcher believes it would be beneficial to determine the reasons why users fall for phishing emails. Many researches on phishing attacks have been done yet there is just a little information on why users fall for phishing emails. Hence, the research question: What are the factors that affect a user to fall for a phishing email?
3
ITPG8.300 Combined Research Methods [Part B]
| Elizabeth Reyes | 2017003643 | Postgraduate Diploma in IT | EIT Auckland || Lecturer: Dr. Dobrila Lopez |
(Chawla and Chouhan, 2014)
Phishing Attack Procedure
Life Cycle of a Phishing Email
(Almomani, Gupta, Atawneh, Meulenberg, & Almomani, 2013)
BuyDomain
SpoofedSite
User submits infoto spoofed site
Send Bait(as Spam)
Stolen Info
User reads bait, clicks on link
Bait
Info
Info
EmailName
CreditCard #
(Jones, Towse, & Race, 2015)
Theoretical Influencesin Email Response Decision
Email Response Decision
Persuasive techniques
employed by the sender
Human computer interaction
Cognitive make-up of the user
Phisher
Victim Web Server
Compromise a host and installs a phish web site and mass-mailer
Victim user
Victim user
Victim user
Victim user
Sends out phishing email
Victim clicks a phishing URL
Phishing website is viewed
Victim submits information
Factors that Affect a User to Fall for a Phishing Email
Research Question
What are the factors that affect a user to fall for a phishing email?
Significance of the Research
▪ A study conducted by IBM found out that 70% ofcredentials are collected within the first hour of aphishing attack (D’Alfonso, 2017)
▪ To develop tools that would effectively combatphishing, it is important to first understand the reasonswhy users fall for them (Downs, Holbrook, & Cranor,2007)
▪ Studies by APWG (2009), Microsoft (2010), andSymantec (2010) shows that phishing attacks' mosttargeted industry is the financial industry (Choo, 2011)
Method and Sampling
Instrument▪ Recruitment Flyer / RAD Form▪ Questionnaire Design
Part 1. Demographic questionsPart 2. Perception of user’s knowledge on phishing emailsPart 3. Phishing or not phishing
Data Analysis
▪ Quantitative Method▪ Online Survey: Survey Monkey
▪ Convenience Sampling (minimum of 100 participants)
▪ Univariate Analysis▪ Frequency distribution
▪ Survey Monkey
Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE communications surveys & tutorials, 15(4), 2070-2090.
Chawla, M., and Chouhan, S. S. (2014). A survey of phishing attack techniques. International journal of computer applications, 93(3), 32-35. DOI: 10.5120/16197-5460
Choo, K-K. R. (2011). Cyber threat landscape faced by financial and insurance industry. Australian Institute of Criminology, 408(2011). Retrieved from http://go.galegroup.com.ezproxy.eit.ac.nz/ps/i.do?ty=as&v=2.1&u=per_eit&it=DIourl&s=RELEVANCE&p=EAIM&qt=SN%7E0817-8542%7E%7ETI%7E%22Cyber+threat+landscape+faced%22%7E%7ESP%7E1%7E%7EIU%7E408&lm=DA%7E120110000&sw=w
D'Alfonso, S. (2017). Phishing attacks collect 70 percent of credentials within the first hour. Retrieved from https://securityintelligence.com/phishing-attacks-collect-70-percent-of-credentials-within-the-first-hour/
Downs, J. S., Holbrook, M., & Cranor, L. F. (2007). Behavioral response to phishing risk. Retrieved from https://docs.apwg.org/ecrimeresearch/2007/proceedings/p37_downs.pdf
Gréaux, S. (2016). How to spot a phish. Risk Management, 63(2), 12-13. Retrieved from http://ezproxy.eit.ac.nz/login?url=https://search-proquest-com.ezproxy.eit.ac.nz/docview/1784939468?accountid=39646
Jones, H. S., Towse, J. N., & Race, N. (2015). Susceptibility to email fraud: A review of psychological perspectives, data-collection methods, and ethical considerations. International Journal of Cyber Behavior, Psychology and Learning, 5(3), 13-29. DOI: 10.4018/IJCBPL.2015070102
Thakur, H., and Kaur, S. (2016). A survey paper on phishing detection. International journal of advanced research in computer science, 7(4), 64-68. Retrieved from www.ijarcs.info/index.php/Ijarcs/article/download/2706/2694
References
Phishing▪ The word "phishing" came from its homonym "fishing”, where the
phish scammers fish for information (Thakur and Kaur, 2016)▪ “Phishing” is an email-based attack on social media (Gréaux, 2016)
4
SQL Standard – Not the Standard?
Joel Sevilla: Email: [email protected] | Phone: 027 397 8183 | Linked-in: https://www.linkedin.com/in/jfcsevilla
Bio:I am a software developer with more than 10 years of professional experience in an open systems programming. Exposure in the industry facilitated strong database development skills required to analyze and code complex SQL Server and Oracle queries in conjunction with server-side scripting languages (C#, VB.Net and J2EE), SQL Server Reporting Services, and SQL Server Integration Services. My career started after passing a licensure exam (Electronics and Communications Engineering) in 2005, and a pre-employment development training in 2006. I then served as a software developer in BPI (Bank of the Philippine Islands, among the top 3 banks) and Deltek Systems (an American software solutions provider) 6 and 5 years, respectively.
Abstract:In 1983, IBM finally managed to complete a database management system after more than a decade of the technology’s conception by one of IBM’s own researcher. From the onset, people from the IT sector knew that SQL (Structured Query Language) is the database language of the future given IBM’s prestige as an industry leader at that time. Since then, SQL grew in fame and other players competed in the market with their own SQL implementation that resulted to various dialects of SQL. The International Organization for Standardization recognized the language as an international standard and has published specifications and revisions since 1986. As of this writing, not one DBMS provider has ever claimed full compliance to any of these revisions. This study aims to compare the degree of compliance as well as the quality of standards implementation in accordance to SQL-2011 specifications between these providers: Oracle, Microsoft, and PostgreSQL.
5
RESEARCH POSTER PRESENTATION DESIGN © 2012
www.PosterPresentations.com
Codd, E. F. (1970). A relational model of data for large shared data banks. Communications of the ACM, 13(6), 377-387. doi:10.1145/362384.362685
Codd, E. F. (1990). The relational model for database management: version 2: Addison-Wesley Longman Publishing Co., Inc.
ISO. (2013). Committee Draft ISO/IEC CD 9075-2. Retrieved May 27, 2018, from http://jtc1sc32.org/doc/N2301-2350/32N2311T-text_for_ballot-CD_9075-2.pdf
Kline, K., & Kline, D. (2001). SQL In a Nutshell: A Desktop Quick Reference (G. Estabrook Ed.). United States of America: O'Reilly & Associates, Inc.
Kreines, D. C. (2000). Oracle SQL: The Essential Reference (D. Russell & J. Gennick Eds.). United States of America: O'Reilly & Associates, Inc.
Microsoft. (2017). SQL Server Transact-SQL ISO/IEC 9075-2 Standards Support Document (pp. 259). Retrieved from https://sqlprotocoldoc.blob.core.windows.net/productionsqlarchives/MS-TSQLISO02/[MS-TSQLISO02].pdf
Nogueira, P. E., & Matias Jr, R. (2015, 6-9 Dec. 2015). A quantitative study on execution time variability in computing experiments. Paper presented at the 2015 Winter Simulation Conference (WSC), Huntington Beach, California, USA.
Nogueira, P. E., Matias Jr, R., & Vicente, E. (2014). An Experimental Study on Execution Time Variation in Computer Experiments. Paper presented at the 29th ACM Symposium On Applied Computing, Gyeongju, Korea.
PostgreSQL. (2018). PostgreSQL 10.4 Documentation (pp. 3352). Retrieved from https://www.postgresql.org/files/documentation/pdf/10/postgresql-10-A4.pdf
Roeser, M. B. (2017). Oracle Database SQL Language Reference, 12c Release 1 (12.1) (pp. 1920). Retrieved from https://docs.oracle.com/database/121/SQLRF/E41329-25.pdf
Sevilla, Joel Franco
Postgraduate Diploma in Information TechnologyEastern Institute of Technology – Auckland Campus
SQL Standard – Not the Standard?
To measure the degree of SQL standard conformance
To measure the quality of standard implementation
1970• Edgar F. Codd theorized and published
the first SQL concept
1979• Relational Software Inc. (RSI) released
Oracle version 1
1980• Relational Technology Inc. (RTI) was
established to compete using INGRES
1984• Informix Corporation released the first
version of their SQL
1985• IBM released the first version of DB2 for
mainframe
1986• The first SQL standard, ISO/IEC
9075:1986, was published
1987• Sybase Inc. released their SQL version
1989• PostgreSQL version 1 became available
to external users• The first revision of the SQL standard
was published
1993• Microsoft released SQL Server for
Windows NT
2011• The seventh revision of the SQL
standard was published
DBMS Provider
MicrosoftOraclePostgreSQL
Independent Variable
Feature Disposition
SupportedPartially Supported
Not Supported
Dependent Variable
InstrumentISO/IEC 9075:2011Compliance Reports
Average Execution
Times
Core StatementsProminent Statements
Dependent Variable
InstrumentsMicrosoft SSMSOracle SQL DeveloperPostgreSQL Query Tool
Feasible to investigate with the aid of compliance reports from database providers
Get accurate average execution time through 30 query runs
Aid developers understand different SQL implementations
Compare performance and invest time or money accordingly
Research Methodology - Experimentation
Proposed Outcome – Data Visualization
ConclusionIntroduction
Objectives
References
Contact
Dr. Dobrila LopezLecturer
• Eastern Institute of Technology• Auckland, New Zealand• [email protected]
Joel SevillaPresenter
6
Popular Platforms Used in Cybervetting For IT in New Zealand
Jeanette Bautista:E-mail: [email protected] | Phone: 027 532 0138 | Linkedin: https://www.linkedin.com/in/jeanettebautista/
Bio:I have more than a decade of experience in the IT industry. Some of my previous projects include training users for newly developed systems, as well as documenting and marketing software. My experience in dealing with people also helped me get projects outside the Philippines; in fact, I was a remote worker for almost six years, servicing manual software testing and mobile app testing. I also have experience in managing IT testing teams and development teams from different parts of the world. Our projects spanned Agile works for clients in the US, Australia and UK.
I also helped start up companies from the US and Australia in hiring local IT teams in the Philippines. In addition, I have experience in administration and SEO.
I have a strong passion and interest in marketing and managing interactions with people. I am a person who does not fear trying anything because I am always eager and have a passion to learn and accept challenges. I am very excited to learn more as an individual and a professional in this industry.
Abstract:Cybervetting through social media is now one of the most popular ways of screening and vetting job hopefuls, on a global scale. This proposal aims to discover the most popular social media platform used by Human Resources professionals, hiring managers, and recruiters in the Information Technology sector of New Zealand in their IT recruitment process. In addition, it hopes to find the most important criterion that organisations consider to make hiring decisions, as well as the other factors that are assessed to determine a potential employee’s suitability. Finally, it hopes to add to the literature on the topic and help establish a guide that both organisations and IT professionals can use, where successful recruitment is concerned. This proposal aims to explore the influence of social media on the hiring practices of human resource professionals in the IT industry in New Zealand.
7
cv
With the findings, IT job hopefuls will be able to draw
from an addition to the body of knowledge on the topic. This can help inform them on what constitutes ideal online behaviour for successful recruitment, as well as
guide them to accordingly streamline their social media
profiles to boost their chances at being hired.
POPULAR PLATFORMS USED IN
CYBERVETTING FOR IT IN NEW ZEALAND
Submitted by: Jeanette Bautista | [email protected]
Submitted to: Dr. Dobrilla Lopez
Guide HR professionals who will be conducting online background checks;
Add knowledge to emerging field narrowing down the research into the most popular social media websites used;
Serve as guide for hopefuls to define what are
the criteria that recruiters look for to impact their decision.
METHODOLOGY
Battis, S. A. (2016). A cross-sectional study of the impact
of social networking sites on organizational recruiting and
selection practices (Order No. 10254020). Retrieved
from ProQuest Dissertations & Theses Global.
(1857435907)
Berger, J. L. (2015). Cybervetting: A common
antecedents model (Order No. 3726707). Retrieved
from ProQuest Dissertations & Theses Global.
(1717823485)
Berkelaar, B. L. (2010). Cyber-vetting: Exploring the
implications of online information for career capital
and human capital decisions (Order No. 3444477).
Retrieved from ProQuest Dissertations & Theses
Global. (858608200)
QuantitativeSampling and Data
Collection
IT Hiring Managers
150 or Higher Target
Respondents
Online Questionnaire
1. What is the most commonly used social media site in cybervetting IT professionals in
New Zealand?2. What are the most significant factors in candidate information that hiring managers
consider when accessing social media websites for cybervetting?
SIGNIFICANCE
BACKGROUND
RESEARCH QUESTION
PROPOSED OUTCOME
CONCLUSION
ABSTRACT
This proposal aims to discover the most popular social
media platform used by Human Resources
professionals, hiring managers, and recruiters in the
Information Technology sector of New Zealand in their
IT recruitment process. The study will make use of a
voluntary online questionnaire on Social Media
Screening that will be emailed to HR and recruitment
managers and professionals, whose contact
information will be pulled from the database of the
Human Resource Institute of New Zealand (HRINZ),
which governs the industry in the country. Data from
respondents will be compiled with Survey Monkey, and
analysed with descriptive statistics. Once approved, it
will run for 14 weeks.
Identify the list of factors that are considered by IT
recruiters in making hiring decisions;
Give significance in detailing the number of IT
companies in New Zealand that make use of social
media in cybervertting.
Cybervetting is a process by which employers make
use of online information for profiling or conducting
informal background checks on potential employees
(Battis, 2016; Berkelaar, 2010).
Studies say that 44% of applicants have lied about
work histories, 41% lied about their education, and
23% lied about licences (Berger, 2015).
Doing online background checks as supplements to
traditional background checks helps hiring
managers vet more data available through social
media.
After collecting the data from Survey Monkey, it will be
downloaded into a statistical software programme and
will be subsequently analysed with an SPSS tool.
Testing the difference between criterion will be
conducted with chi-square to see the comparison of
results. Descriptive statistics through frequency tables
and charts will be used to present the findings.
REFERENCES
8
Critical Analysis of a Strategic IT Plan for a Media Company
Maria Victoria Alcantara:Email: [email protected] | Phone: 021 0816 3036 | Linkedin: https://www.linkedin.com/in/mvl-alcantara-ctfl/
Bio:I am a graduate of University of the Philippines-Diliman and a Registered Nutritionist-Dietician turned IT professional. I started my IT journey by testing an Electronic Medical Records system in the Philippines and continued manual testing of insurance, payroll and other web applications. I gained my automation testing experience in Hewlett-Packard Philippines Corporation (now DXC Technology) using HP QTP and UFT tools and was trained in Shanghai, China for the SAP Global Supply Chain project. I am flexible as a part of the team or a sole tester of a project with experience in a Scrum and Kanban Agile environment. I hold a Foundation Level Certificate from the International Software Testing Qualifications Board (ISTQB) and a certificate in Software Engineering from the University of the Philippines Information Technology Development Center (UP ITDC). Aiming to be an automation tester, I participated in a Selenium + Robot Framework workshop and attended the 2017 Python Conference in the Philippines. I have also attended the Google Cloud OnBoard training last Feb 2018 in Auckland. With about 5 years of testing experience, I must say that the learning doesn’t stop and I am excited for more!
Abstract:A strategic IT plan aims to align the organisation’s business goals and objectives with its IT goals and objectives. Part of a strategic plan is to implement an IT project to maintain the global competitive advantage and increase the value of the organisation in response to the technological influence in the market. To become successful, an IT governance framework is utilised such as COBIT 5 that acts as a guide in governance and management of the IT investment. This report provides a proposal and critical analysis of the IT strategic plan for a media company.
9
Critical analysis of a strategic IT Plan for a Media CompanyEastern Institute of Technology, Auckland ITPG 8.200 Strategic IT Management
Information security, as defined by ISACA (Information Systems Audit and Control Association), is ensuring the CIA concept (confidentiality, integrity and the availability) of the information. Confidentiality is protecting the information from unauthorised access and disclosure. Integrity is ensuring that the information is free from improper modification or deletion and keeping its authenticity. Availability is ensuring the reliable access to the information whenever required. The group proposes the use of COBIT 5 for Information Security as it is intended for information security stakeholders such as CISO (Chief Information Security Officer), ISM (Information Security Managers), and other information security engineers, analysts or professionals. COBIT 5 for Information Security provides the framework, examples and guidance for IT governance and for the implementation of information security on any enterprise.
1. Provide a security architecture.2. Provide security awareness.3. Provide security assessments.4. Provide adequate incident response.5. Provide adequate protection against malware, attacks & intrusions.6. Provide monitoring and alert services for security related events.
COBIT 5 GOVERNANCE FRAMEWORKMEDIUM
International SuppliersNational Suppliers
HIGHSocial MediaNewspaper
Internet
HIGHNumerous Source
Better competitor services
LOWHigh Capital InvestmentExpensive License Fee
Customer Loyalty
HIGH
PORTER’S FIVE FORCES ANALYSIS
IT activities, projects or services must
contribute value to every organisation, which is why
an IT agenda must be aligned with clearly defined
business goals. Additionally, it should measure non-IT related
metrics that have a significant impact on the resulting processes,
systems, and results for the business. When business expectations are staked on
good IT management, alignment is successful and can bring about positive results to the business. The
BBC’s previous implementation of DMI gave rise to multiple issues that eventually translated to negative losses for the company. The authors proposed the use of COBIT 5 for the overall IT governance using modules on Information Security, Assurance and Performance Management as it provides the framework, examples, and guidance the management, implementation, quality and capability measurement of the IT system enforced in any enterprise. As BBC can be considered one of the major media companies worldwide, quality services are expected, more so, information security should be vastly guarded. Moreover, an improved IT framework using COBIT 5 was presented which covered all aspects of the organisation’s business and IT goals. The new framework aimed at BBC’s value creation by the interrelation of the IT objectives, enablers, scope, and the stakeholders as an improved model from the 2010 technology plan.
Porter's Five Forces provides an analytical framework for measuring the influence of industry structures on profit potential. It covers: bargaining power of buyers, the bargaining power of suppliers, the threat of new entrants, threats of substitute and services, and rivalry among existing competitors. Its risk to business are measured by force: High, Medium, and Low scores.
A proposed IT plan is presented and discussed based on COBIT 5 guidelines and utilising BBC’s 2010 Technology Framework. The proposed IT plan is based on COBIT 5’s end-to-end governance and management approach and its components.
The utilisation of COBIT 5 framework in strategic IT planning has been proven as an effective approach given the number of
successful case studies in this area. Several success stories were also researched from various
industries and organisational types such as in the government, IT Consulting,
education, automotive industry, and in the financial services. Given its
characteristics of flexibility and compatibility to various
industries, has made COBIT 5 an ideal approach to IT
Governance for organisations today. It
does not only a c c o m m o d a t e customisation to meet the o r g a n i s a t i o n a l requirements, but also encourages it.
Student Researchers:Maria Victoria Alcantara | [email protected] Bautista | [email protected] Reyes | [email protected] Jerome Tardio | [email protected]
Dr. Dobrila Lopez, PhdAcademic Supervisor
[email protected] Institute of Technology, Auckland
Copyright © 2018
The British Broadcasting Company (BBC) as a media organisation, acknowledges technology as central to their business process as they move toward the digital era. The company is positioned to ride with the technological advances and adapt fast since it requires changes that may affect competitiveness, market demands from the business, and behavioural changes from its customers.
IT projects are successful when it is aligned well with the business goals and objectives. Management and delivery of the IT project as
expected provides credibility to the IT organisation and its leadership structure. This report paper presents the critical analysis of the
authors on BBC’s IT strategic plan. Arising from their failed digital transformation project, a Cloud storage solution is
proposed within this case study wherein the governance and management guidelines are
based on COBIT 5 framework. The high-level details of the project are indicated in
this business case report.
STRATEGIC I.T. PLAN
ABSTRACTA strategic IT plan aims to align the organisation’s business goals and objectives with its IT goals and objectives. Part of a strategic plan is to implement an IT project to maintain the global competitive advantage and increase the value of the organisation in response to the technological influence in the market. To become successful, an IT governance framework is utilised such as COBIT 5 that acts as a guide in governance and management of the IT investment. The case study report provides a proposal and critical analysis of the IT strategic plan for a media company.
10
IoT Based Smart Parking System
Reshma Begum:Email: [email protected] | Phone: 020 4144 3389 | LinkedIn: https://www.linkedin.com/in/reshma-begum-629a7858/
Bio:I have completed my Bachelor of Technology from Jawaharlal Nehru Technological University, India. To further enhance my skill set and to gain international exposure, I have decided to pursue the Post Graduate Diploma in Information Technology at Eastern Institute of Technology. I found my passion towards software engineering while participating in a Hackathon. I bring in 3+ years of experience as a software engineer in the IT industry. I worked as a vendor for Microsoft as a level 3 Application Support engineer and SQL Server DBA. Being a Microsoft Azure Infrastructure certified professional, I hold experience in supporting Azure applications. My skills include: .Net, SQL server, ADO.NET, C, C#, ASP.NET, Microsoft Azure. A vast experience in high-volume environments with strong analytical, communication and organizational abilities helped me to be able to thrive in fast-paced and challenging roles.
Abstract:With the evolution of the Internet of Things (IoT), the concept of smart cities is rising and has gained popularity. Commuters in urban cities face difficulties in finding a free parking space due to the lack of notification process and lack of autonomous parking systems. This causes drivers to make multiple rounds to find a parking spot which causes discomfort and wastes time and fuel, leading to increase in greenhouse gases. With IoT, the troubles of traffic congestion, restricted parking space, and road safety are being addressed. The poster presents a proposal for a cloud enabled Intelligent parking system that helps users in searching for a parking lot and reserving a parking slot through a client side mobile application.
11
www.postersession.com www.postersession.com
IoT Based Smart Parking System
Prepared by Reshma Begum Eastern Institute of Technology, ITPG8.600
Supervised by Samuel Ekundayo
Smart Parking System •Provides nearest parking slot information •Reserve parking space before reaching the destination •Guides users to nearest parking slot
Smart Home •Smart Temperature Control •Optimized Energy use
Industrial •Quality Control
Automotive •Vehicle auto diagnosis •Autonomous Cars •Smart Parking
Agriculture •Crop Management •Soil Analysis
Military •Situational Awareness •Threat Analysis
Medical •Optimized Patient Care •Wearable Fitness Devices
Environmental •Forest Fire Detection •Species tracking
Retail •Inventory Control •Focused Marketing
Internet of Things •Connects physical and virtual things •Enables communication between things over the internet. •IoT app’s monitor, detect problems, communicate and resolve issues without any human intervention
Integrating Internet of Things and cloud •Cloud acts as an intermediate between things & applications •Increased storage Capacity & Computation •High availability •Interoperability & Scalability
Raspberry Pi: Enables communication between cloud and mobile app. 26 GPIO pins
Parking Sensors: Infrared sensors- detect the presence of a car Pressure sensors- detect arrival & exit of a car from the parking lot
Cloud server: Acts as a database. MQTT server hosted on cloud. Records parking related information
Current Parking System •Manual search for vacant space •More time, effort •Increased traffic congestion
Mobile Application: For users to interact with the system. Book slots & pay parking fee
Display Unit: Red and green LED lights represent the status of the parking space
This system enables users to book their slots from remote location and users are provided with real-time information of empty parking spaces. The system enhances the parking facilities thereby improving the quality of life.
Architecture
Applications of IoT
12
Agile - Scrum Project Development at Intel
Vijay Krishnan Radhakrishnan:Email: [email protected] | Phone: 027 505 8385 | LinkedIn: www.linkedin.com/in/vijay-krishnan-radhakrishnan-366999106
Bio:My experience covers a hands-on experience in: implementing, upgrading, training and supporting Enterprise Resource Planning System throughout various Business processes and the ability to pick up bespoke systems quickly. I was a Customer Service Representative with experience in handling US Clients and closing settlements. I possess well-developed leadership, interpersonal, analytical and organisational skills. I am able to communicate complex concepts to stakeholders. My technical skills includes: SQL Server Management studio, SQL queries, SharePoint, proficient in UML Diagrams and MS Office.
Abstract:Development of quality software with low cost and time is the goal of software industries. Project management methodologies provide a platform for managing the activities and functionalities performed during the project life cycle. Knowledge areas and their repositories are the key aspects which help the team to manage the project. The poster provides some insights on the case study on Intel where Scrum was implemented in phases. Explanation of Waterfall and Scrum methodologies are given with an image explaining the process followed. A comparison triangle is included for both methodologies to differentiate the usage of aspects like time, cost and scope. The poster highlights a comparison with two project management methodologies in terms of knowledge repositories for all the PMBOK knowledge areas.
13
www.postersession.comwww.postersession.com
Agile - Scrum Project Development at IntelITPG8.100 Advanced IT Project Management
Vijay Krishnan Radhakrishnan - 2017003074Submitted to: Dr. Kay Fielden
A long history in fabrication and manufacturing has resulted in a strong waterfall culture at Intel, embraced widely as the best path to success. A Scrum Odyssey case – implementing
Scrum with Danube Technologies, Inc. as Scrum education and coaching vendor.
Use six sigma methods
Project charter
Gantt Chart
Project Manager plans stakeholder
management
Formal Document Plan
Procurement Documents
Stakeholder Map based on
Influence and Interest
Informal in both strategic and tactical level
Contracts
Project Status Report monitors Project Cost with
Earned Value Metrics
Project Manager acquires, develops
and maintains Project team
Formal Documentation
Quality Assurance is involved in all stages with
automation tools
ScrumMaster involves customers
with project team to maintain
cost
Creates cross-functional
teams
Face to face communication in
Scrum meetings
Product owner prioritises product
backlog to manage scope
Sprint manage time in Scrum
Project Manager maintains technical documentation for development plan
ScrumMaster has minimal
documentation
Use six sigma methods
Project charter
Gantt Chart
Waterfall ScrumPM AreasCase StudyA Scrum Odyssey at Intel - Oregon and Pacific (OAP) Product Development Engineering (PDE) team required to implement Scrum and Agile across the various sites of the organisation, used a test program running Automated Test Equipment (ATE) to prevent the usage of industry standards and Off-the-shelf software validation solutions. The need to implement Scrum augmented when most of the work was development of pre-silicon infrastructure and readiness of work. Danube Technologies, Inc was chosen as the Scrum education and coaching vendor. After training, the management and participants agreed to implement Scrum principles as per the book and practice for three months. Group and team leads functioned as the product owners for the seven teams, while the author worked as the ScrumMaster.
WaterfallWaterfall – is a heavyweight software development methodology with Plan, Design, Development, Testing and Deployment as phases to be followed in a sequential order. The Waterfall approach is simple to use, clearly defines stages, and is easy to manage tasks. Waterfall approach has disadvantages like no working software is produced until late during life cycle, not a good model for long ongoing and complex projects and cannot accommodate any changing requirements which leads to problems like customer satisfaction, time management and no profit.
ScrumScrum – is an Agile software development methodology with an incremental process of developing sprints. Scrum provides customer satisfaction, increases quality and is time efficient. Scrum has many advantages like helping company in saving time and cost, constant feedback makes it easier to cope with changes and identifying issues well in advance helps in resolving them quickly. The disadvantages to be considered are tasks should be well defined or may lead to increase in project cost and time, needs lot of commitment and experience of team members.
14
A Review of the Agile Methodology
Lucas Barcellos Victoria:Email: [email protected] | Phone: 027 511 0073 | Linkedin: https://www.linkedin.com/in/lucasvictoria/
Bio:I have 9 years of IT experience, with solid experience in applications support, customer and stakeholders relationship, ERP systems support, Business analysis, Incident and Project Management. My skills are both technical and business focused, I’m able to translate technical language in a simplified way to explain all issues to everyone. I have a lot of knowledge and experience about the ITIL framework and ticketing systems. I have experience with PL/SQL and can create a lot of useful scripts to solve problems or create complex processes directly in the databases. I’m used to solve problems quickly and under pressure, being able to develop the best solution in a small time frame when needed. When not working I like to Cook (I can do a really good Brazilian barbecue and have barista skills) and play Videogames.
Abstract:A project manager should know all the advantages and disadvantages of any management method before choosing the correct one for each project. Currently Agile methods are a trend in the system development industry, as many companies are switching from more traditional methods to Agile, mainly the Scrum Methodology. The Agile philosophy was created from the dissatisfaction from more traditional project management methods, such as Waterfall, in a meeting made by developers in 2001, with the idea of being more flexible with changes and making client active part of the development. There are many studies about Agile explaining its benefits and its success, as it reduce development costs, accommodate changes easier than traditional methods and increases the Client satisfaction by making him part of the development and showing the development with prototypes. Even with all its benefits it can lead to problems like a never ending scope by always changing project requirements and organization communication problems. The objective of this research is to gather information about how the Agile methods are being conducted in New Zealand currently, and to identify its gaps and drawbacks to suggest improvements for them, adding more knowledge to the Agile Community.
15
A Review of the Agile MethodologyPost Graduate Diploma in IT – Auckland, New Zealand
Lucas Barcellos Victoria – [email protected] Dr Dobrilla Lopez – [email protected]
The Agile manifesto was created from dissatisfaction from system developers towards traditional
development methods.Their focus was to agilize processes, reduce costs,
promote flexibility to accomodate changes
Poor change management can lead to a never ending project
Agile requires full embracement of the organizationSprint interruptions from clients, management and
external areasOpportunity for Improvement!
Qualitative approach to understand individual experiences
Semi-structured interviews built around research questions to allow adaption Recorded interviewsGather testimonies of diverse roles from different
Scrum teams to obtain feedback from scrum teams to learn with their experiences
Capture perception of how scrum is being implemented by teams through interviews to obtain feedback for improvements and find common issues
between different teams to draw conclusions.Research literature to support findings
Review current practices as done in the creation of the Agile Manifesto 17 years ago
Add knowledge to help IT professional to better understand Agile methodlogies
To help improve current Agile practices
Alase, A. (2017). The Interpretative Phenomenological Analysis (IPA): A Guide to a Good Qualitative Research Approach. International Journal of Education & Literacy Studies, 5(2). Azanha, A., Argoud, A. R. T. T., Camargo Junior, J. B. d., & Antoniolli, P. D. (2017). Agile project management with Scrum. International Journal of Managing Projects in Business, 10(1), 121-142. Beck, K., Beedle, M., van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., . . . Sutherland, J. (2001). The Agile Manifesto. Retrieved from http://agilemanifesto.org/Gonçalves, E. F., Drumond, G. M., & Méxas, M. P. (2017). Evaluation Of Pmbok And Scrum Practices For Software Development In The Vision Of Specialists. Independent Journal of Management & Production, 8(5), 569-582. doi:http://dx.doi.org/10.14807/ijmp.v8i5.598Hayat, M., & Qureshi, M. R. J. (2015). Measuring the Effect of CMMI Quality Standard on Agile Scrum Model. International Journal of Information Engineering and Electronic Business, 7(6), 46-52. doi:http://dx.doi.org/10.5815/ijieeb.2015.06.07Ozieranska, A., Kuchta, D., Skomra, A., & Rola, P. (2016). The critical factors of Scrum implementation in IT project - the case study. Journal of Economics & Management, 25, 79-96. doi:http://dx.doi.org/10.22367/jem.2016.25.06Tanner, M., & Mackinnon, A. (2015). Sources of Interruptions Experienced During a Scrum Sprint. Electronic Journal of Information Systems Evaluation, 18(1), 3-18.
The Agile methodology has increased project delivery speed and increased clients satisfaction, but it’s still not perfect and have some issues, this brings
an opportunity for improvement. The objective of this research is to search for common issues to later
research literature for their solution. For future work Implement the suggestions found during this research on
real projects to measure effectiveness
What can be done to mitigate these drawbacks?
What are the drawbacks of the Scrum Agile Development Methods?
What is the current perception of the Scrum Agile Development Methods by New Zealand
development teams?
To obtain information about how current Agile practices are being implemented.
To identify potential gaps with Agile practices
.To measure the effectiveness of current Agile
practices.
To develop improvements within current Agile practices.
Introduction
Problem Statement
Study Design
Data Analysis
Proposed Outcomes
References
Conclusion
Research Questions
Research Objectives
16
Smart Attendance System
Yubing Shi:Email: [email protected] | Phone: 027 458 4385 | Linkedin: https://www.linkedin.com/in/yubing-shi/
Bio:I am a highly motivated and results-oriented software developer with 4 years of relevant experience in coordination and development. I got my Bachelor of Engineering degree majoring in Computer Science and Technology in 2012 in China, then worked for 4 years in Dalian Shengli Tech which is a partner company of RICOH. I have experience in web development, desktop development as well as printer software (Xlet) development. Experienced in Java, C#, Javascript, Python3, and databases such as MySQL and SQL Server. I have just finished the study for my Postgraduate Diploma in Information Technology at EIT Auckland. A team player who takes the initiative to complete tasks with the highest quality in order to surpass the expectations of clients.
Abstract:The poster presents a QR code-based attendance management system, with the adoption of QR code technology, mobile technology, facial recognition technology and indoor positioning technology, the system addressed some attendance management system problems.
Both the accuracy and efficiency of the attendance check process can be improved with the use of the presented system.
17
Smart Attendance SystemITPG8.600Advancedmobileandwirelesstechnologies
Author:YubingShiSubmittedto:SamuelEkundayo
IntroductionTaking students’ attendance by university instructors duringeach class is a time-consuming process especially whenclasses are big.
Some faculty policies require this task to be performed bythe instructor in each lecture. In other words, out of the totalhours that are assigned to a given course, which is typicallyforty-five hours per semester, up to eight hours may be lostto perform this process that usually takes around tenminutes per lecture.
This study proposed a QR Code based student attendancesystem, combined with the indoor positioning technologyand Amazon Rekognition facial comparison service, thesystem can not only prevent the unauthorizedattendance registrationbut also save thelecturer’s timefrom the attendancecheck process.
Real-time Attendance
ITPG8.600Advancedmobileandwirelesstechnologies– Week13
SteveRogers
2017003020 PTonyStark
2917003021 B Bruce Banner
2017003022 P
Thor Odinson
2017003023 P 2017003024 LNatashaRomanoff Peter Parker
2017003025 A
Present Absent Late Alert
While the students scanning the QR code, thelecturer can check the real-time attendance online.
There are 4 status, Present (green), Absent (red), Late(brown) and Alert (yellow).
The status will be “Alert” when the student failed thefacial check or location check.
The lecturer can change the status of each student.
The System consists ofa mobile app installed on
students’ mobile phoneand a dedicated server.The lecturer generated theQR code on the server foreach lecture and put the QR code in the first
slide.
with the mobile app forthe attendanceregister.
Facial ComparisonBefore the student can scan the QR code, a mugshot will be takenwith the camera and sent to the server for the facial comparison.
The Amazon Rekognition service is used for the facial comparison,the service allowsuserstocomparefacesindifferentpicturestoseehowcloselytheymatchbasedonasimilaritypercentage.
This feature can prevent thestudents do the attendanceregistration for others.
Indoor Positioning
The Indoor Positioning technologyis used for location check. If a student
scanned the QR codeoutside the classroom,his/her status will beshown as “Alert” inthe system.
Mobile App
Whentheappislaunchedfor thefirsttime,itwillaskthestudenttologon,itcollectsthepositioningdataandsendstheinformationalongwithacapturedphotoofthestudenttotheserverviatheinternetortheintranetaftertheQRcodebeingscanned.
Mobile App Work Flowchart Real-time Attendance Prototype
ConclusionThe study proposed a QR code-based attendance management system, with the adoption of QR codetechnology, mobile technology, facial recognition technology and indoor positioning technology, the systemaddressed some attendance management system problems.Both the accuracy and efficiency of the attendance check process can be improved with the use of theproposed system.
The students scan the QR
18
Exploring Urban Agriculture Smart Aquaponics
Mark San Agustin:Email: [email protected] | Phone: 022 531 2498 | Linkedin: https://www.linkedin.com/in/ramsamarksanagustin/ |
Bio:I have over ten years of professional work experience at Singapore in Information Communication Technology industry which comprises several multi-national organizations.
Over the last few years, I worked on various phases of infrastructure support roles, environments and projects involving plan, design, implementation, operation, analysis and creation of the knowledgebase as well as training of a personnel. This includes experience from end user computing to server/network related environments.
I have supported clients in Air Transport (SITA Inc.), Global Infrastructure Integration (Eze Castle Inc.), Telecommunication (MyRepublic Pte. Ltd.), Government Agencies (National Library Board) and Call Centre Industries and enjoyed working in a dynamic and challenging environment that delivers high standards of services to the clients.
Abstract:Sustainability and food security is a primary concern particularly in small countries and cities, due to population growth rapid urbanization decrease land resource for agriculture while food demand continues to increase there is also a concern for safe and sustainable food sources.
Traditional agriculture requires colossal land space, human resources and time, urban rooftop farming (URF) comprising various techniques shows potential for increasing food production.
In Agriculture, Aquaponics serves as an integration of aquaculture and growing plants without soil. Aquaponics often encompasses the use of the nutrient-rich water used in raising fish serving as a natural fertilizer for the plants and the vegetables further play a critical role in helping purify the water for the fish.
Taking advantage of available technology Internet of Things (IoT), cloud computing and embedded systems can ease the task of evaluating those parameters by deploying actuators and sensors in Aquaponics system.
The purpose of this research proposal is to explore aquaponics potential as an urban smart agriculture farming because until now despite technology advancement in smart cities there is no integrated approach to explore its potential as smart urban agriculture.
19
Schedule Objective
1 to 2 weeksKick off planning meeting to discuss objectives, timeframe and logistics (survey software) of research.
1 to 2 weeksResearch design, questionnaire creation, determine target population, determine sample size, creation of invite and reminder
2 to 3 weeksAssembling email list, survey deployment, Survey distribution, monitor response rate, send email reminder if necessary.
2 to 3 weeksSurvey collection, download completed surveys, ending data collection
2 to 3 weeks Data Analysis.
20
Case Study at Portbase Challenges in Transition from Waterfall to Scrum
Pushpinder Kaur:Email: [email protected] | Phone: 020 4142 2160 |
Bio: I have finished my Masters in Computer Science and Engineering in India and am now finishing my Postgraduate Diploma in IT at EIT Auckland Campus. I have worked as Customer Service Representative at Harvey Norman, New Zealand for 6 months and have worked as a web designer for 1 year in India. I have also finished course in Java Script. As a person I am optimistic with a can do attitude and would to become a part of NZ IT Sector.
Abstract:Project Management provides framework for managing activities during the life cycle of the project. Knowledge management areas are the key terms for the management of the project. This poster provides details regarding the Scrum implementation at Portbase.Waterfall and Scrum methodologies are sown as image explaining the working of the methodologies. The poster shows the comparison of Waterfall and Scrum on the basics of nine Knowledge Management Areas.
21
www.postersession.comwww.postersession.com
CASE STUDY AT PORTBASE
CHALL CHALLENGES IN TRANSITION FROM WATERFALL TO SCRUM
Submitted To-Dr. Kay FieldanADVANCED IT PROJECT MANAGEMENT ITPG8.100
CASE STUDY
• Portbase is the port management company who
provide services with knowledge sharing..
• Portbase was established in 2009. Its main aim is to
make Dutch ports by having only one stop for
information exchange of logistics.
• In the year 2012, Portbase switched from traditional
waterfall methodology to Scrum. After adopting Scrum
the products will be delivered on time and achieve
more customer satisfaction.
PRESENTED BY-PUSHPINDER KAUR
KNOWLEDGE MANAGEM-ENT AREAS
WATERFALLIterative based Requirement Gathering
Quality Assurance
Timeline CostEstimation
UnstructuredRisk Management
Project Charter AD-HOCProcurement Management
TraditionalCommunication
Can cope with employee turnover
Expert based time estimations
SCRUM ProductBacklog
QAInvolvement
Scrum BoardPossible Risk
AnalysisGantt Chart
Demand Supply EquilibriumBased Recording
Ineffective but Unstructured
Hard to bring new Members
Story based
PROJECT MANAGEMENT
• Application of Knowledge skills, tools
techniques to protect activities to meet
stakeholder requirements.
• A discipline of initiating, planning, executing,
controlling and closing the work of a team to
achieve success.
• Established principles, procedures and policies
to manage a project.
WATERFALL MODEL SCRUM
CONCLUSION
Portbase being an international organization it was crucial for them to be ahead of the game. Two Methodologies were
analyzed based on nine key PMBOK areas. Since 2002 they have been successful in project management deliveries.
Financially company is recovered after moving to Scrum and helps in providing more customer satisfaction.
22
Case Study of Adobe Premier Pro using Scrum and Waterfall methodologies
Sheila Sara Prem Kumar:Email: [email protected] | Phone: 022 399 0454 | LinkedIn: https://www.linkedin.com/in/sheila-sara-a2717115/
Bio:I am finishing my PG Diploma in IT at EIT (Auckland International Campus) and hold a Master’s degree at Central Queensland University, Melbourne (Australia).
I had an opportunity to proactively involve myself as a mentor for the new students through the Mentorship Programme offered by EIT, that enhanced my leadership skills and team adaptability.
On the professional front, I have worked as a Customer Service Representative in Melbourne for 1 year and have also worked as Relationship Manager for IIPM for 3 years.
Done a short term course in Software Testing (Manual & Automation).
About myself: I am an optimistic and hardworking individual with a willingness to learn and a passion to innovate, waiting to carve a niche for myself in the IT industry.
Abstract:Project Management is the application of processes,methods,skills,knowledge and experience to achieve project objectives. Effective project management requires controlled scope and resource focus according to organizational requirements. There are ten knowledge areas in project management which would be utilized by a project manger in order to successfully manage a project. Therefore, the key to project’s success is perceived as, choosing the right methodology for the right project rather than thrusting the project to a methodology.
This poster illustrates the case study of a non-linear video editing company called ‘Adobe Premier Pro.’ The poster also elaborates how an agile mindset towards project management enabled the company to achieve significant improvements in quality, communication, market perception and sustainable pace of development for team members. The poster briefly addresses the strengths and weaknesses of the Waterfall and Scrum methodologies. Ultimately, the poster showcases how the knowledge is stored using the two methodologies for the ten knowledge areas that are represented in a table.
23
www.postersession.comwww.postersession.com
Case Study of Adobe Premier Pro using Scrum and Waterfall methodologies
ITPG8.100 ADVANCED IT PROJECT MANAGEMENT
Project Management
• Project Management is the practice of initiating,
planning, executing, controlling, and closing the
work of a team to achieve specific goals at the
specified time.
• Effective project management requires
controlled scope and resource focus, according
to organizational requirements.
Project Management Body of Knowledge (PMBOK)
• The Project Management Body of
Knowledge is a collection of processes and
knowledge areas accepted as best practice
for the project management profession.
• There are ten PMBOK Knowledge areas
which are utilized by a project manager in
order to successfully manage a project.
Knowledge Areas
Integration Scope Time Cost Quality Human Resources
Communication Risk Procurement Stakeholder
Scrum Gantt chart BacklogPrioritization
Critical Path Analysis (CPA)
Cost Baseline Q&A sessions
Cross-functional teams
“Brady Bunch Daily Scrum”
Risk burn down chart
Flexibility for customers in contracts clause.
SprintReview meetings. Product owner is part of team.
WaterfallProjectCharter.
Work break down structures
Sequencing activities
Earned Value Management (EVM)
Quality assurance
Resource histogram.
Face to face conversation.
Risk register
Stringent contracts and agreements.
Project manager manages business stakeholders.
Presenter: Sheila Sara Prem KumarSupervisor : Dr. Kay Fielden
Scrum Focuses more on customer collaboration.
Upholds individuals and interactions.
Emphasis is on fast delivery.
Lack of Documentation.
Lack of emphasis in necessary designing.
Waterfall Complete requirements are required at the start.
Well disciplined approach.
Suits projects with defined phases.
Lack of early feedback.
Response to change is slow.
Adobe Premier Pro – Scrum AdoptionAdobe Premiere Pro is a company that deals with non-linear video editing in various sectors such as broadcasting, business videography and film
or video editing.
In the year 2005 and 2006, the team of Premier Pro was using a traditional phase- by-phase approach and the quality of the product was not as
expected, despite the team’s efforts and the main cause of the problem was that the team spent more time fixing bugs towards the end of the
project causing much stress to the team members.
After adopting scrum methodology, the company experienced significant improvements in quality, communication, market perception and team’s
work-life balance with its first release CS5.
Eastern Institute Of Technology
24
Challenges in Transition from Waterfall to Scrum in Port Base, Netherland
Devina Haridas:Email: [email protected] | Phone: 022 501 9670
Bio:I am currently finishing my PG Diploma in Information Technology at Eastern Institute of Technology, Auckland.
I have a 2.5 years of work experience in web designing and hold a bachelor’s degree in computer science.
As a web designer I studied a site designing and am keen to do more of web design. Apart from this , I worked on the project using the programming language Asp.net and Java.
Abstract:Project management is the application of skills, tools, techniques and knowledge to the project activities to meet the project requirements. The knowledge management areas consist of Integration, scope, Time, Cost, Quality, procurement, Human resources, communication, Risk management and stakeholder management. This poster explains about the two project management methodologies such as Waterfall and scrum. Waterfall is a traditional approach and whereas scrum is a modern approach. Moreover, the poster portrays about how the knowledge is stored in the above-mentioned project management methodologies. In addition to that, the poster describes how the port base company benefited when they transitioned from waterfall to scrum.
25
www.
post
erse
ssio
n.co
m www.postersession.com
ConclusionPortbase was created by a merger between Rotterdam’s Port infolink and Amsterdam’s PortNET .The new organization was set up in 2009 by the Port of Rotterdam Authority and Port of Amsterdam and enjoys wide support amongst the port business community .They transitioned from waterfall toscrum. By scrum the product are delivered on time and the frequent feedbackhelps the customers to know how it works .As a result, can build a relationshipwith customer. As a result of so many feedback and demo’s ,the customers are highly satisfied. Before scrum they didn’t have contact with customers until the product is delivered. Sometimes they produce something different and failed tomeet the customer satisfaction. However, the situation is different afterimplementation the scrum could bring so many values to the organization.
Case Study
ComparisonWATERFALL
SCRUM
Scrum was introduced in the mid-1990s by Jeff Sutherland and KenSchwaber. Scrum is an iterative incremental process based on sprints andeach sprint is a period of 30 days duration needed to develop a part of asystem. The sprint begins with a planning session that lasts up to 2-3hours and these planning sessions includes the client, scrum master andthe cross- functional project team. Next is the Product backlog are therequirements needed for the work which also consists of the set offeatures that went to each sprint
Project Integration
Management
Project Scope
Management
Project Time
Management
Project Cost
Management
Project Quality
Management
Project HR
Management
Project Communication
Management
Project Risk
Management
Project ProcurementManagement
Gantt ChartProjectCharter
ProductBacklog
WorkBreak Down
Structure
Time-Line BasedStoryBased
ScrumBoard
BurnDownChart
TrainingScrum values
Human Resource plan
Communication Management
plan
Skype Videos
Risk BreakDown
Structure
Risk mitigation Plan
Demand-supply equilibrium
AD-HOC Procure
management
ExpertBased
SoftwareTesting
waterfallscrum
One of the traditional project management methodologies in softwaredevelopment is waterfall. As the name suggests it flows downwardsthrough various phases in the software development cycle such asrequirements gathering, design, implementation, testing, integration andmaintenance. One of the significant feature of waterfall is that theinformation is gathered at the beginning and this will not changethroughout the entire development processes. This can create problemsespecially when stakeholders are not able to determine every requirementat the beginning and developers don’t have much understanding at thebeginning point about the system they are going to develop. Because ofthis, undefined problems, emerging and changing requirements posechallenges to waterfall methodology..
26
Assessing Perception of Students Towards E-Learning at EIT
Parth Pancholi:Contacts: Email: [email protected] | Phone: 020 4151 8588 | LinkedIn: https://www.linkedin.com/in/parth-pancholi-57620312a
Bio: I have finished my Bachelors in Computing in India. Since my arrival to New Zealand I have finished my Post Graduate Diploma, Level 8 from Eastern Institute of Technology at Auckland. I have 3 years work experience in Helpdesk and IT support environment. I am also an Oracle Certified Professional and currently studying for CCNA, MCSA and ITIL certifications. Have worked as IT Sales Representative (Tele-Calling) in one of the call centres at New Market, Auckland.
Abstract:This poster aims at assessing the perceptions of the students towards e-learning. The study is to be carried out because, with the increase in the use of technology, there are applications which enhance e-learning, therefore there is the necessity to ascertain the idea of the students towards e-learning. The study will be carried out at the Eastern Institute of Technology (EIT), New Zealand, using 15 Questions questionnaire with a target of 100 students across the three campuses. The proposed outcomes of the research indicate that majority of the students have a positive attitude towards e-learning and thus should be motivated. Likewise, there are challenges that impede the success of e-learning such as the attitude of the students.
27
RESE
ARCH
PO
STER
PRE
SENT
ATIO
N DE
SIG
N ©
201
2
ww
w.P
oste
rPre
sent
atio
ns.c
om
This
prop
osal
aim
sat
asse
ssin
gth
epe
rcep
tions
ofth
est
uden
tsto
war
dse-
lear
ning
.The
stud
yis
tobe
carr
ied
outb
ecau
se,w
ithth
ein
crea
sein
the
use
ofte
chno
logy
,th
ere
are
appl
icat
ions
whi
chen
hanc
ee-
lear
ning
.Th
eref
ore
ther
eis
the
nece
ssity
toas
certa
inth
eid
eaof
the
stud
ents
tow
ards
e-le
arni
ng.T
hest
udy
will
beca
rrie
dou
tatt
heEa
ster
nIn
stitu
teof
Tech
nolo
gy(E
IT),
New
Zeal
and,
usin
g15
Que
stio
nsqu
estio
nnai
rew
itha
targ
etof
100
stud
ents
acro
ssth
eth
ree
cam
puse
s.Th
epr
opos
edou
tcom
esof
the
rese
arch
indi
cate
the
maj
ority
ofst
uden
tsha
vea
posi
tive
attit
ude
tow
ards
e-le
arni
ngan
dth
ussh
ould
bem
otiv
ated
.Li
kew
ise,
ther
ear
ech
alle
nges
that
impe
deth
esu
cces
sof
e-le
arni
ngsu
chas
the
attit
ude
ofth
est
uden
ts.
ABST
RACT
RESE
ARCH
QU
ESTI
ON
S
BACK
GRO
UN
D
This
stud
yw
illad
opt
aqu
antit
ativ
ere
sear
chm
etho
din
cond
uctin
gth
esu
rvey
.Thi
sap
proa
chis
pref
erre
dbe
caus
eit
ensu
res
the
rese
arch
ism
ore
com
preh
ensi
vedu
eto
stat
istic
alan
alys
isin
addi
tion
toth
eob
serv
atio
n,in
terp
reta
tion
and
inte
rvie
ws.
The
rese
arch
will
cons
ist
ofth
eEa
ster
nIn
stitu
teof
Tech
nolo
gy(E
IT)
stud
ents
acro
ssits
thre
eca
mpu
ses:Hawke’s
Bay
,Auc
klan
d,an
dG
isbo
rne,
New
Zeal
and.
The
targ
etpo
pula
tion
will
best
uden
tsat
Gra
duat
ean
dPo
stG
radu
ate
from
the
two
faci
litie
sna
mel
yth
eSc
hool
ofB
usin
ess
and
the
Scho
olof
Com
putin
g.
The
stud
yw
illsa
mpl
e10
0pa
rtici
pant
s.Th
isw
illre
pres
ent
the
entir
epo
pula
tion
ofEI
Tan
den
able
the
rese
arch
toac
hiev
eth
eob
ject
ive
ofex
amin
ing
som
eel
emen
tsof
the
popu
latio
nan
dex
trapo
late
onth
ew
hole
popu
latio
n.
Con
veni
ence
sam
plin
gm
etho
dw
illbe
used
toac
quire
asa
mpl
efr
omth
eta
rget
popu
latio
n(S
uri,
2011
).Th
iste
chni
que
will
beus
edto
choo
sepo
tent
ialp
artic
ipan
tsba
sed
onth
ein
clus
ion
crite
riaof
bein
gEI
Tst
uden
ts.
Con
veni
ence
sam
plin
gis
pref
erre
dbe
caus
eit
will
enab
leth
ere
sear
cher
toco
llect
data
that
wou
ldot
herw
ise
bedi
fficu
ltto
colle
ctus
ing
othe
rpr
obab
ility
sam
plin
gte
chni
ques
(Chr
iste
nsen
etal
.,20
11).
Stru
ctur
edqu
estio
nnai
res
will
beus
edto
gath
erpr
imar
yda
ta.
The
ques
tionn
aire
sw
illbe
self-
adm
inis
tere
dby
the
rese
arch
erw
how
illus
eth
eha
ndde
liver
ym
etho
dto
hand
out
the
ques
tionn
aire
san
dre
ques
tth
epa
rtici
pant
sto
indi
vidu
ally
fill
them
atva
rious
parts
ofth
eca
mpu
s.Th
equ
estio
nnai
res
will
have
clos
e-en
ded
ques
tions
and
the
resp
onse
sw
illbe
mea
sure
dus
ing
aLi
kert
scal
eto
ease
stat
istic
alan
alys
is(R
owle
y,20
14).
The
data
colle
cted
thro
ugh
the
ques
tionn
aire
sw
illbe
test
edfo
rco
mpl
eten
ess
and
cons
iste
ncy,
then
code
dto
allo
wcl
assi
ficat
ion
ofth
efe
edba
ck.T
heda
taw
illth
enbe
ente
red
into
SPSS
(Sta
tistic
alPa
ckag
efo
rSo
cial
Scie
nces
)an
dde
scrip
tive
stat
istic
sge
nera
ted,
and
perc
enta
ges
and
tabu
latio
nsca
lcul
ated
.Th
eou
tcom
esw
illbe
pres
ente
dus
ing
tabl
esan
dgr
aphs
fore
asy
unde
rsta
ndin
g.
MET
HODO
LOGY
CON
CLU
SIO
N
The
purp
ose
ofth
isre
sear
chw
illbe
toas
certa
inth
estudents’p
erce
ptio
nsof
e-le
arni
ngat
EIT.
Bas
edon
the
expe
cted
outc
omes
itca
nbe
pred
icte
dth
atm
ost
ofth
est
uden
tsw
illbe
cogn
izan
tof
e-le
arni
ngde
spite
ofth
eir
loca
tion.
Add
ition
ally
,thi
sres
earc
hw
illbe
tosh
owth
atth
ere
isno
defin
itede
finiti
onof
e-le
arni
ngbe
caus
eth
ede
finiti
onis
subj
ect
toth
ele
arni
ngen
viro
nmen
t.St
uden
tsm
ight
valu
ee-
lear
ning
beca
use
iten
able
sth
emto
easi
lyac
cess
and
retri
eve
info
rmat
ion.
The
stud
ents
perc
eptio
nsm
aybe
posi
tive
abou
te-le
arni
ng
REFE
REN
CES
Bat
alla
-Bus
quet
s,J.
M.,
&Pa
chec
o-B
erna
l,C
.(2
013)
.O
n-th
e-jo
bE-
lear
ning
:Wor
kers
'Atti
tude
san
dPe
rcep
tions
.TheInternationalReviewof
ResearchinOpenandDistributedLearning
,14(
1),4
0-64
.C
hris
tens
en,
L.B
.,Jo
hnso
n,B
.,Tu
rner
,L.
A.,
&C
hris
tens
en,
L.B
.(2
011)
.Res
earc
hm
etho
ds,d
esig
n,an
dan
alys
is.
Con
ole,
G.,
&A
levi
zou,
P.(2
010)
.Alit
erat
ure
revi
ewof
the
use
ofW
eb2.
0to
ols
inH
ighe
rEd
ucat
ion.AreportcommissionedbytheHigher
EducationAcademy.
Cre
swel
l,J.
W.,
&C
resw
ell,
J.D
.(20
17).Researchdesign:Qualitative,
quantitative,andmixedmethodsapproaches
.Sag
epu
blic
atio
ns.
EIT.
(201
8).H
isto
ry.R
etrie
ved
from
http
s ://w
ww.
eit.a
c.nz
/abo
ut/h
isto
ry/
Ghi
rard
ini,
B.
(201
1).E-learningmethodologies:aguidefordesigning
anddevelopinge-learningcourses.
Food
and
Agr
icul
ture
Org
aniz
atio
nof
the
Uni
ted
Nat
ions
.G
reen
how,
C.,
Rob
elia
,B.,
&H
ughe
s,J.
E.(2
009)
.Lea
rnin
g,te
achi
ng,
and
scho
lars
hip
ina
digi
tal
age:
Web
2.0
and
clas
sroo
mre
sear
ch:
Wha
tpa
thsh
ould
we
take
now
?.Educationalresearcher,38
(4),
246-
259.
Kuk
ulsk
a-H
ulm
e,A
.,Sh
arpl
es,M
.,M
ilrad
,M.,
Arn
edill
o-Sá
nche
z,I.,
&Va
voul
a,G
.(20
11).
The
gene
sis
and
deve
lopm
ent
ofm
obile
lear
ning
inEu
rope
.InCombininge-learningandm-learning:New
applicationsof
blendededucationalresources
(pp.
151-
177)
.IG
IGLO
BA
L.K
ulie
r,R
.,H
adle
y,J.,
Wei
nbre
nner
,S.,
Mey
erro
se,B
.,D
ecsi
,T.,
Hor
vath
,A
.R
.,&
Bur
ls,
A.
(200
8).
Har
mon
isin
gev
iden
ce-b
ased
med
icin
ete
achi
ng:
ast
udy
ofth
eou
tcom
esof
e-le
arni
ngin
five
Euro
pean
coun
tries
.BMCmedicaleducation,8(
1),2
7.N
cube
,S.,
Dub
e,L.
,&N
gulu
be,P
.(20
14).
E-Le
arni
ngR
eadi
ness
amon
gA
cade
mic
Staf
fin
the
Dep
artm
ento
fInf
orm
atio
n.Pa
rk,
S.Y.
(200
9).
An
anal
ysis
ofth
ete
chno
logy
acce
ptan
cem
odel
inun
ders
tand
ing
univ
ersi
tyst
uden
ts'
beha
vior
alin
tent
ion
tous
ee-
lear
ning
.Educationaltechnology&society,12
(3),
150-
162.
Puri,
G.
(201
2).
Crit
ical
succ
ess
Fact
ors
ine-
Lear
ning–A
nem
piric
alst
udy.InternationalJournalofMultidisciplinaryResearch
,2(1
),14
9-16
1.Ta
ha,
M.
(201
4).InvestigatingthesuccessofE-learninginsecondary
schools:ThecaseoftheKingdomofBahrain(
Doc
tora
ldis
serta
tion)
.Ya
ghou
bi,J
.,M
alek
Moh
amm
adi,
I.,Ir
avan
i,H
.,A
ttara
n,M
.,&
Ghe
idi,
A.
(200
8).
Virt
ual
Stud
ents
'Pe
rcep
tions
ofe-
Lear
ning
inIr
an.Online
Submission
,7(3
).Zh
eng,
Y.,&
Yano
,Y.(
2007
).A
fram
ewor
kof
cont
ext‐a
war
enes
ssu
ppor
tfo
rpe
erre
com
men
datio
nin
the
e‐lea
rnin
gco
ntex
t.BritishJournalof
EducationalTechnology,38
(2),
197-
210.
Dr.
Dob
rilla
Lope
z,Ea
ster
nIn
stitu
teof
Tech
nolo
gy,A
uckl
and
•W
HAT
AR
E TH
E PR
OFE
SSED
USE
FULN
ESS
OF
E-LE
AR
NIN
G T
O
THE
STU
DEN
TS S
UC
CES
S?
•W
HAT
IS T
HE
ATTI
TUD
E O
F ST
UD
ENTS
TO
WA
RD
S E-
LEA
RN
ING
?
•IS
THER
EA
NY
AWA
REN
ESS
OR
UN
DER
STA
ND
ING
AM
ON
GST
THE
STU
DEN
TSO
FE-
LEA
RN
ING
PLAT
FOR
M?
The
ques
tionn
aire
sw
ere
then
ente
red
into
stat
istic
also
ftwar
epa
ckag
ena
med
SPSS
17fo
rge
tting
the
Stat
istic
alre
sults
ofth
eda
tato
war
dsth
efin
ding
sof
the
rese
arch
stud
y.Th
eda
taw
asan
alys
edus
ing
the
freq
uenc
yan
dpe
rcen
tage
mea
sure
sfo
rth
enu
mer
ical
data
follo
wed
bym
ean
scor
esan
dst
anda
rdde
viat
ions
.The
Alp
haC
ronb
ach
Coe
ffici
enta
ndth
ePe
arso
nC
orre
latio
nC
oeffi
cien
twas
also
used
fora
naly
zing
the
data
.He
also
used
AN
OVA
(One
Way
Ana
lysi
sof
Varia
nce)
for
anal
yzin
gth
edi
ffere
nces
betw
een
mea
nsc
ores
ofth
ree
orm
ore
grou
ps.
The
leas
tsi
gnifi
cant
diffe
renc
ete
stw
asal
soca
rrie
dou
tto
iden
tify
the
dire
ctio
nof
diffe
renc
esbe
twee
nth
ree
orm
ore
grou
ps.Student’s
attit
ude
cam
ein
the
first
plac
eco
mpa
red
tostudent’s
mot
ivat
ion
andstudent’s
com
pute
rsk
ills
with
the
mea
nof
4.38
.Ita
llow
edth
atth
est
uden
tsag
reed
with
the
first
poin
toft
hequ
estio
nnai
re.T
hem
ean
scor
eof
4.19
fort
heco
ntro
loft
echn
olog
yfo
rthe
teac
hers
sign
ified
that
both
stud
ents
and
teac
hers
agre
edth
atus
eof
e-le
arni
ngw
asm
ore
enco
urag
ing
and
mot
ivat
ing
fort
hein
tera
ctio
nth
anth
etra
ditio
nall
earn
ing
met
hod.
Whi
lefo
rth
eth
irdse
ctio
n,w
ithth
em
ean
of3.
64,
stud
ents
and
teac
hers
felt
that
qual
ityof
tech
nolo
gyw
asal
soan
impo
rtant
aspe
ctof
e-le
arni
ng.
They
agre
edth
ate-
lear
ning
was
mor
edi
fficu
ltto
use
inth
ele
arni
ngan
dte
achi
ngpr
oces
san
dha
ving
e-le
arni
ngac
cess
toe-
lear
ning
mat
eria
lson
line
24/7
was
prac
tical
for
the
lear
ning
and
the
teac
hing
proc
ess.
Affil
iate
d to
EIT
Auc
klan
d Ca
mpu
sPa
rth
Panc
holi
–Po
st G
radu
ate
Dipl
oma
in A
pplie
d M
anag
emen
tAs
sess
ing
Perc
eptio
n of
Stu
dent
s Tow
ards
E-L
earn
ing
at E
IT
INTR
ODU
CTIO
N
The
perc
eptio
nof
stud
ents
tow
ards
e-le
arni
ngin
adva
nced
educ
atio
nca
nbe
dete
rmin
edby
seve
ral
fact
ors
such
asag
e,se
x,fo
rmer
prac
tise
inco
mpu
ters
,rec
eptio
nof
tech
nolo
gyan
dpe
rson
alst
yles
ofle
arni
ng(P
ark,
2009
;R
ossi
nget
al.,
2012
).Se
vera
lst
udie
sha
vebe
enca
rrie
dou
ton
e-le
arni
ng,b
utst
illno
tmuc
his
know
nw
ithre
gard
sto
the
perc
eptio
nof
the
students’o
nlin
ele
arni
ng(S
unet
al.,
2008
).A
sa
resu
lt,fu
rther
rese
arch
isre
quire
dso
asto
acqu
irem
ore
unde
rsta
ndin
gon
this
subj
ect.
Ncu
be,
Dub
e,&
Ngu
lube
(201
4)ar
gue
that
mod
ern
tech
nolo
gica
lde
velo
pmen
tsha
vefo
rcef
ully
influ
ence
din
stitu
tions
ofhi
gher
educ
atio
nto
adop
te-le
arni
ngw
orld
wid
e.K
ulie
ret
al.(
2008
)an
dK
ukul
ska-
Hul
me
etal
.(2
011)
obse
rved
lear
ning
inhi
gher
educ
atio
nha
sun
iver
sally
and
freq
uent
lyim
plem
ente
dth
eus
eof
e-le
arni
ngin
high
ered
ucat
ion.
Con
ole,
&A
levi
zou
(201
0),
Ghi
rard
in(2
011)
and
Park
(200
9)ar
gue
that
wor
ldw
ide
use
ofe-
lear
ning
has
been
fuel
led
byth
epr
ogre
ssin
gen
viro
nmen
tsfo
rlea
rnin
gan
dth
ein
crea
sein
the
educ
atio
nald
eman
dsth
atar
eno
toffe
red
onth
eun
iver
sity
phys
ical
ly.
E-le
arni
ngis
aty
peof
educ
atio
nalt
rain
ing
that
can
beco
nvey
edus
ing
avi
deo/
audi
oov
erth
epr
ivat
ene
twor
k,or
onth
eIn
trane
t,in
addi
tion
toEl
ectro
nic
Perf
orm
ance
Supp
ort
Syst
ems
(EPS
S)an
ddi
stan
cele
arni
ng.
The
bene
fits
ofe-
lear
ning
cann
otbe
unde
rest
imat
ed.
Iten
able
sth
est
uden
tsto
stud
yat
thei
row
nsp
eed,
mak
esit
poss
ible
tocu
stom
ize
lear
ning
tom
eett
heva
ryin
gne
eds
ofea
chst
uden
t,an
dfo
ster
sim
prov
edco
mm
unic
atio
nbe
twee
nth
est
uden
tsan
dst
aff
amon
got
hers
(Gre
enho
w,R
obel
ia,&
Hug
hes,
2009
).
On
the
cont
rary
,th
ere
sear
chby
Bat
alla
-Bus
quet
san
dPa
chec
o-B
erna
l(2
013)
show
edth
aton
e-on
-one
train
ing
isst
illre
gard
edas
am
ore
insp
iratio
nali
nstru
ctio
nalm
etho
din
com
paris
onto
virtu
altra
inin
g.
East
ern
Inst
itute
ofTe
chno
logy
(EIT
)is
ago
vern
men
tow
ned
terti
ary
educ
atio
nin
stitu
tion
aim
edat
linki
ngth
etim
e,to
pogr
aphi
cal,
finan
cial
,so
cial
,le
arni
ngan
dco
mm
unic
atio
nex
pans
ebe
twee
nle
arne
rsan
dth
ein
stitu
tion,
lear
ners
and
educ
atio
n,st
uden
tsan
dpe
ers
(EIT
,20
18).
The
mis
sion
ofEI
Tis
toel
imin
ate
obst
acle
sto
acce
ssed
ucat
ion,
mai
ntai
npl
astic
ityof
prov
idin
gle
arni
ng,
focu
son
each
indi
vidu
alst
uden
t,as
sist
lear
ners
and
deve
lope
train
ing
prog
ram
sth
atar
esu
itabl
efo
rst
uden
tsle
arni
ng(E
ITPo
licy,
2008
).EI
Tis
ther
efor
ean
Ope
nD
ista
nce
Lear
ning
Inst
itutio
n(O
DL)
with
stud
ents
com
ing
from
over
forty
coun
tries
acro
ssth
ew
orld
mak
ing
itne
cess
ary
for
itto
have
the
setu
pan
dre
sour
ces
that
enab
leit
toof
fer
prom
pt,
effe
ctiv
ean
dre
gula
rtra
inin
g.EI
Tha
spr
ogre
ssiv
ely
been
impl
emen
ting
the
e-le
arni
ngin
itiat
ive
inov
er50
%of
itsun
derg
radu
ate
and
dipl
oma
cour
ses.
The
inst
itutio
nha
sov
er10
,00
0st
uden
tsfr
omdi
ffere
ntpa
rtsof
the
coun
try.E
ITha
stw
om
ajor
facu
lties
,na
mel
yth
eFa
culty
ofEd
ucat
ion
and
the
Facu
ltyof
Com
mer
cean
dte
chno
logy
stud
ies.
The
inst
itutio
nha
sth
ree
mai
nca
mpu
ses
inN
ewZe
alan
d:Hawke’s
Bay
,A
uckl
and,
and
Gis
born
e.EI
Tof
fers
over
130
prog
ram
mes
rang
ing
from
mas
ters
,po
stgr
adua
te,
degr
ee,
dipl
oma
and
prof
essi
onal
certi
ficat
e(E
IT,2
018)
.With
the
incr
easi
ngde
man
dfo
rfur
ther
educ
atio
nin
the
empl
oym
ents
ecto
rand
the
unav
aila
bilit
yof
time
toen
rol
asfu
ll-tim
est
uden
ts,t
hepr
ogra
ms
ofEI
Tar
eco
ntin
uous
lybe
ing
pref
erre
dby
lear
ners
from
diffe
rent
cate
gorie
sbe
item
ploy
ees
orju
stne
wst
uden
tsfr
omhi
ghsc
hool
.Thu
s,it
iscr
itica
lfor
EIT
toas
certa
inth
eef
fect
iven
ess
ofe-
lear
ning
and
thestudents’p
erce
ptio
nsas
wel
l.
LITE
RATU
RE R
EVIE
W
Yagh
oubi
,M
alek
moh
amm
adi,
Irav
ani,
Atta
ran
and
Ghe
idi
(200
8)co
nduc
ted
ast
udy
rega
rdin
gth
epe
rcep
tion
ofth
est
uden
tsab
oute
-lear
ning
inIr
an.T
hesa
mpl
ew
asco
mpr
ised
of11
8vi
rtual
grad
uate
stud
ents
outo
fw
hich
110
stud
ents
resp
onde
d.Th
equ
estio
nnai
rew
asde
sign
edta
rget
ing
four
diffe
rent
area
slik
ede
mog
raph
ysu
chas
age,
sex,
univ
ersi
ty,f
ield
ofst
udy,
exte
ntof
com
pute
rand
inte
rnet
use,
adva
ntag
esof
e-le
arni
ngsy
stem
and
disa
dvan
tage
sof
e-le
arni
ngsy
stem
.All
ofth
ese
wer
em
easu
red
ofa
5-po
intL
iker
tsca
le1
(ver
ylit
tle/s
trong
lydi
sagr
ee)t
o5
(ver
ym
uch/
stro
ngly
agre
e).
The
data
whi
chw
asco
llect
edw
asan
alys
edus
ing
the
Stat
istic
alPa
ckag
efo
rthe
Soci
alSc
ienc
es(S
PSS1
3)w
hich
had
stat
istic
alpr
oced
ures
for
desc
riptio
nlik
efr
eque
ncie
s,pe
rcen
tage
,m
eans
,st
anda
rdde
viat
ions
and
infe
renc
e.Th
ere
sults
show
edth
atar
ound
84.9
%st
uden
tspa
rtici
patin
gin
the
stud
yw
ere
betw
een
24to
29ye
ars
whi
le15
.1%
stud
ents
wer
eab
ove
30w
hich
mad
eth
em
ean
aver
age
age
of26
.3ye
ars.
81.2
perc
ent
ofth
est
uden
tsw
ere
empl
oyed
whi
leab
out
18.8
perc
ent
ofst
uden
tsw
ere
unem
ploy
ed.A
dece
ntnu
mbe
rof
stud
ents
adm
itted
they
used
com
pute
rsm
ainl
yfo
rInt
erne
tsur
fing,
follo
wed
bye-
mai
luse
.The
mai
nad
vant
age
ofe-
lear
ning
acco
rdin
gto
the
stud
ents
was
flexi
bilit
yin
time
and
plac
efo
llow
edby
easy
and
quic
ksh
arin
gof
educ
atio
nal
mat
eria
l.Te
chno
logy
issu
esw
ere
the
mai
ndi
sadv
anta
geof
e-le
arni
ngac
cord
ing
toth
est
uden
tsfo
llow
edby
redu
ced
soci
alan
dcu
ltura
lint
erac
tion.
Inth
est
udy
byTa
ha(2
014)
,he
inve
stig
ated
the
succ
esso
fe-le
arni
ngin
the
seco
ndar
ysc
hool
sin
the
Kin
gdom
ofB
ahra
in.H
ead
opte
da
quan
titat
ive
appr
oach
toun
ders
tand
the
perc
eptio
nof
the
stud
ents
and
teac
hers
tow
ards
the
criti
calf
acto
rsof
e-le
arni
ngin
the
seco
ndar
ysc
hool
sin
the
king
dom
ofB
ahra
in.T
hesu
rvey
-bas
edqu
estio
nnai
rew
asde
sign
edw
hich
cont
aine
d27
ques
tions
base
don
diffe
rent
poin
tssu
chasstudent’s
char
acte
ristic
s,teacher’s
char
acte
ristic
s,te
chno
logy
and
desi
gnan
dco
nten
t.Th
ere
spon
dent
sw
ere
aske
dto
answ
eron
a5-
poin
tLik
erts
cale
rang
ing
from
1=
stro
ngly
disa
gree
to5
=st
rong
lyag
ree.
The
ques
tionn
aire
was
desi
gned
inEn
glis
han
dw
asal
sotra
nsla
ted
into
Ara
bic
lang
uage
.The
ques
tionn
aire
was
dist
ribut
edto
600
rand
omly
sele
cted
parti
cipa
nts
outw
hich
200
wer
ete
ache
rsan
d40
0w
ere
stud
ents
from
six
scho
ols
inth
eki
ngdo
mof
Bah
rain
.The
num
bero
fval
idqu
estio
nnai
resc
ame
dow
nto
540
com
pris
ing
of18
0te
ache
rsan
d36
0st
uden
ts.T
heot
her
ques
tionn
aire
sw
ere
reje
cted
due
toin
com
plet
enes
sby
the
resp
onde
nts.
ACKN
OW
LEGM
ENTS
28
Evaluating the Perception of Online Shopping Customers regarding Data Security in
New Zealand
Gustavo Valverde: Email: [email protected] | Phone: 027 142 2051 | Linkedin: https://www.linkedin.com/in/gustavo-valverde/
Bio:Gustavo Valverde is a software engineer with project management skills (PMP certified) who worked over 10 years developing loan and credit card systems.
Gustavo has worked with reputable banks, including the Itau bank where he worked for 7 years, and won awards such as top developers award and project of the year award. Itau bank is the biggest Brazilian bank, also present in U.S. and U.K. In addition, Gustavo worked as a project analyst and IT consultant.
Recently, Gustavo completed his postgraduate diploma in Information technology at EIT.
When not travelling, Gustavo enjoys going on hikes and working on some personal projects involving coding and electronics.
Abstract:This poster aims to describe and analyse the Eurofins case study, and also presents the project management methodologies Prince2 and Scrum. The case study comprises an IT project that was implemented by Eurofins in 2015. The project was managed using Prince2 project management methodology. Even though the project succeeds, this paper points out positive and negatives aspects of the project, and compares both methods, Prince2 and Scrum. Moreover, this study shows a comparison between documents utilised by the project management methods described here. In the documents comparison table, the difference between a traditional method and an Agile method is clear. Traditional methods have much more documentation than Agile methods. However, the number of documents can show 2 different aspects. The first point of view is that Scrum has a lack of documentation, which can cause issues regarding planning. On the other hand, Prince2 has a comprehensive documentation, which can cause a waste of time. As a recommendation, this paper points to a hybrid method as a solution for this case. A hybrid method can explore the best of both methodologies. However, to decide which method should be used, the type of project and team knowledge has to be considered. In conclusion, there is no best project management methodology in general, but there is the best project management methodology for each case.
29
Instructor: Dr. Dobrila | Student: Gustavo Valverde | Course: MAPM8.900-ITPG8.300 Combined Research Methods (Part B)
Evaluating the Perception of Online Shopping Customers regarding Data Security in New Zealand
Why is it relevant?
• E-Commerce is constantly growing
• High-risk business
• Understand e-commerce customers’ perception
• Relevant for online business
What is the customer’s perception of security during an online purchase?1
Is there any difference in customer perception between using a public internet connection and a private internet connection to make an online purchase?
2
What is the customer’s perception about online stores keep the credit card number for future transactions?3
Quantitative Method• Collect numerical data•Associations between variables• Combined with snowball method can
reach a large number of people
Statistical Data Analysis•Descriptive Method• Summarize data• Identify trends• Explore the relation of the data
Snowball Method• Through Social Media•Reach people from different regions•Reach a large number o people
Survey Instrument•Online survey questionnaire• Likert-scale
Research Method
PlanningExecuted during Postgraduate
course
Survey Application Design- 2 weeks- Load the questionnaire in the
survey system
Report Formatting- 4 weeks- Write the research report
Data Analysis- 2 weeks- Analyze the survey
data
Proposed Timeline
PlanningSurvey
Application Design
Research Execution
Data Collection
Data AnalysisReport
Formatting
Research Execution- 4 weeks- Send the invitations through social media- Participants respond the survey
Data Collection- 2 weeks- Extract data from survey
system
Research Questions
30
Auckland’s Android Smartphone Users’ Perception Regarding Security in Installation
of Third-party Entertainment Applications
Dave Jigar Balkrishna: Email: [email protected] | Phone: 022 382 4225 | LinkedIn: linkedin.com/in/jigar-dave-48450738 | Website: newsdaily.co.in ; github.com/jigardave8
Bio:Currently, I am finishing a Postgraduate Diploma in Information Technology from EIT at the Auckland campus. I am an experienced Apple certified developer. I specialize in developing iOS applications and I have worked on applications for news, music, games, and the workplace. My experience also includes working on freelance projects for blockchain, BI and iOS. In addition, I have developed, maintained and marketed a dynamic news website. I have an intermediate level in Swift, Objective-c, Power BI, SOAP, PHP, C++, WordPress, and jQuery
Abstract:This research is designed to explore the perceptions of Android smartphone users regarding the security issues that exist when installing third-party applications from google play store and other sources. The findings from this study will help developers to design new applications or improve existing applications.
31
Auckland’s Android smartphone users’ perception regarding security in installation of third-party
Entertainment applications
Research Aim:
Significance
Conclusion
References
Expected outcomes
Research Question:
Methodology
What is the perception of Auckland’s Android smartphone users regarding the security in installing third party Entertainment applications
on smartphone device?
TO KNOW:
Perception of users regarding security in third party android applications
Preferences that user have regarding installation of applications
Security risks that users believe are associated with installing third party
Entertainment applications
Experience that users claim to install third party applications from google play store
and other sources
Suggestion for application developers to help improve smartphone applications.
To Understand Android
smartphone users better
To Help Application
developers to build better
security in applications
To Help Application
developers with development
guideline to review along
with literature findings
To Help Future researchers
know about Smartphone
users’ perception about third party applications
Grounded theory from user's
view will be built
New information will emerge
about perception of third-
party application security
Regulations in literature will
help application developers to
use content of Google
platform effectively
New Suggestions from
Participants for application
developers
Qualitative Research through Interview to
know perception (Creswell, 2012)
Convenience sampling , Recruitment of 12-
15 Participants as Android smartphone
users after Inclusion and Exclusion criteria
40-60 minutes Interview, Open ended 6-7
questions to get users’ view for grounded theory (Creswell, 2012)
Audio Tapping the Interview and
converting to password protected
computer, Note taking during Interview
Text analysis and Thematic Analysis to
Analyze the ideas and Map with Questions
through help of Nvivo 10 (Waller, 2015)
.
Addressed the Necessity to carryout the research.
Main research question that was focused for this research was to know the
perception of Android smartphone users’ perception regarding security in installation of third party entertainment applications. The research question
was broken down to the aim and objective to explore areas for interview.
Future recommendations include future researcher to take note of central
idea of this research and findings to carry out new research in terms of other
operating system applications example for future focus can be similar
research but for iOS or Windows.
Author: Jigar
Dave
Guided By:
Dr. Dobrilla
Lopez
Creswell, J. W. (2012). Educational research: Planning, conducting, and evaluating quantitative and
qualitative research (4th ed.). Boston, MA: Pearson.
Waller, T. (2015). Marketing strategies of mobile game application entrepreneurs.
32
Geo Augustine:Email: [email protected] | Phone: 022 104 7034 | LinkedIn: https://www.linkedin.com/in/geo-augustine-5789b6156/
Bio:I have finished my Bachelor of Computer Applications and Master of Computer Applications. I am now finishing the Post Graduate Diploma in Information Technology at Eastern Institute of Technology, Auckland International Campus. I have one and a half year programming experience in Java and PHP at Entrepreneur Unified Ltd. I have also worked for seven months as Software Application Support at SISL Infotech India(P) Ltd - (National Informatics Centre (India). During this period I had the opportunity to provide training to central government employees and to give a technical support to contractors.
Abstract:
The capability of data management software to manage different types of queries is important to its role in providing the integrated data when it is required. Research proposal poster has discussed about the inventory management softwares, and key features to be considered on inventory management softwares. Discussed on processes to be followed inside a research method such as sampling, data collection, data analysis, and possible outcomes of this research. Expect, this research will help the small and medium businesses in New Zealand to identify what are the main factors to be considered while choosing an inventory management system for their business.
In Absentia:
Yan ChenEmail: [email protected] | Phone: 2108242932 |
32
www.eit.ac.nz/campus/auckland
0800 22 55 348 | eit.ac.nz