eastern institute of technology celebrating student success · the eastern institute of technology...

40
EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success 2018

Upload: others

Post on 25-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

EASTERN INSTITUTE OF TECHNOLOGY

Celebrating Student Success 2018

Page 2: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome
Page 3: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

WelcomeThe Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome you to our Students’ Success Celebration. EIT has a long and successful history in tertiary education spanning over four decades and the Auckland campus is now in its fourth year of operation.

Today we are pleased to present our 2018 Auckland International Campus graduands and their work to our business partners and other guests. Our graduands are from both the Computing and Business Schools which sit in the Faculty of Commerce and Technology. Our students come to our Schools as professionals who are already experienced in their field of work. Their experience ranges from management, software development and web design, to testing, business analysis and networking.

This celebration marks their successful completion of Postgraduate Programmes either in IT or Applied Management and their return to the business environment either here in New Zealand or back in their home country.

We welcome all our guests and wish our graduands every success in their future endeavours.

Deputy Chief Executive: Mark Oldershaw

and

Head of the Computing and Business Schools: Rebekah Dinwoodie

Page 4: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome
Page 5: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Contents

Tardio Darwin Machine Learning and Cognitive Applications for New Zealand SMEs 1

Elizabeth Reyes Factors that Affect a User to Fall for a Phishing Email 3

Joel Sevilla SQL Standard –Not the Standard? 5

Jeanette Bautista Popular Platforms Used in Cybervetting For IT in New Zealand 7

Maria Victoria Alcantara Critical Analysis of a Strategic IT Plan for a Media Company 9

Reshma Begum IoT Based Smart Parking System 11

Vijay Krishnan Radhakrishnan Agile - Scrum Project Development at Intel 13

Gustavo Valverde Evaluating the Perception of Online Shopping Customers regarding Data Security in New Zealand 15

Lucas Barcellos Victoria A Review of the Agile Methodology 17

Yubing Shi Smart Attendance System 19

Mark San Agustin Exploring Urban Agriculture Smart Aquaponics 21

Pushpinder Kaur Case Study at Portbase Challenges in Transition from Waterfall to Scrum 23

Sheila Sara Prem Kumar Case Study of Adobe Premier Pro using Scrum and Waterfall methodologies 25

Devina Haridas Challenges in Transition from Waterfall to Scrum in Port Base, Netherland 27

Parth PancholiCase Study of Adobe Premier Pro using Scrum and Assessing Perception of Students Towards E-Learning at EIT

29

Dave Jigar BalkrishnaAuckland’s Android Smartphone Users’ Perception Regarding Security in Installation of Third-party Entertainment Applications

31

Geo Augustine Bio 33

Yan Chen In Absentia 33

Page 6: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Machine Learning and Cognitive Applications for New Zealand SMEs

Tardio Darwin: Email: [email protected] | Phone: 027 526 3699 | LinkedIn: www.linkedin.com/ln/darwinjerome | Website: http://darwin.tardio.info

Bio:I come from the software industry particularly in the game development production. My passion is software application development and anything about technology.

Additionally, my professional experience spans 12 years in the development of video games, mobile and enterprise application. My career track includes managing mobile app and web development teams from conceptualisation, prototyping to launch support. I have handled various development languages such as PHP/ MySQL, C++, Python, Javascript and Actionscript. I also have experience in handling both managed / dedicated server and cloud-based solutions particularly Amazon Web Services. My executive position has given me the opportunity to managed various talented and skilful employees during my career involving different trades; creative and engineering teams. Lastly, I also have been a consultant that assisted schools and academic institutions to establish their game development and design courses. Say hello!

Abstract:Machine Learning applications are ushering a paradigm shift in how enterprises conduct their operations. Technology giants such as Google, Amazon and Facebook are embattled in the new-age Artificial Intelligence arms race, investing huge amount of resources at an increasing pace. In addition, data scientists and IT engineers are constantly placing effort in optimizing and creating new algorithms that provide faster, efficient and secure machine learning services. All this leading to a broader impact in business operations and processes. This research proposal intends to answer fundamental questions on how machine learning can help New Zealand Small and Medium-scale Enterprises (SMEs) in business growth. It aims to study current trends and applications of ML algorithms. Furthermore, it identifies critical success factors in using machine learning enabled systems.

1

Page 7: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

KiwiStore

1. This research aims to contribute to the advancement of theoretical understanding of Machine Learning applications. This represents a phenomenon deemed relevant to local businesses aiming to compete with their bigger competitors yet limited with resources.

2. This project will provide a holistic understanding of ML, by combining different fields of research, i.e. marketing, operations, IT and knowledge management

3. Having a pragmatic and cross-disciplinary approach, the project will have the potential to discover whole new theoretical openings in the AI/ML industry.

4. DEMOCRATISE ML, as investments on new technologies are always critical specially for companies with limited resources.

5. To COMMODITISE ML algorithms and services that will assist New Zealand SMEs to propel its economy forward.

RESEARCH OVERVIEW BACKGROUND RESEARCH FRAMEWORK SIGNIFICANCE

RESEARCH QUESTIONS

of New Zealand companiesare categorised as SMEs97%

SMEs also employ 29% of NZ workforce and generates 28% GDP share. Despite all these staggering contributions, SMEs are in dire need of support in various areas such as business growth, customer acquisition, revenue and financial evaluation, planning and cashflow, and operations related to decision making based on a given business data.

What are the benefits of Machine learning and Cognitive Applications for New Zealand SMEs?

How ML can support companies for business growth, mainly in the area of business development and customer acquisition?

What are the adoption strategies and implementation challenges of ML in business operations?

CUSTOMER ENGAGEMENT

AI Chatbots

REVENUE GENERATION MARKET ANALYSIS

ML Analytics

WORLDVIEWPragmatic DESIGN

Grounded Theory

METHODSQuestions

Data CollectionAnalysis

Interpretation

BIG DATA ANALYSIS

Cloud AI/ML or MLaaS

Machine Learning applications are ushering a paradigm shift in how enterprises conduct their operations. Technology giants such as Google, Amazon and Facebook are embattled in the new-age Artificial Intelligence arms race, investing huge amount of resources at an increasing pace. In addition, data scientists and IT engineers are in constant effort in optimizing and creating new algorithms that provides faster, efficient and secure machine learning services.

All this leading to a broader impact in business operations and processes. This research proposal intends to answer fundamental questions on how machine learning can help New Zealand Small-Medium Enterprises (SMEs) in business growth. Study current trends and applications of ML algorithms. Furthermore, identify critical success factors in using machine learning enabled systems.

CUSTOMER RELATIONSHIP MANAGEMENT CUSTOMER ACQUISITION AND SUPPORT

Cognitive Applications

METHOD: Qualitative

SAMPLING: Purposive - heterogenous

INSTRUMENTS: Interview questions and unstructured questionnaires

SAMPLES: 30-50 participants in an New Zealand SME, primarily holding top positions such as CEO, CTO or any relative decision-making role. IT professionals and software engineering position will also be included.

DATA ANALYSIS: Framework Analysis Methodology

RISK ASSESSMENTFRAUD MANAGEMENT

ML Algorithms

MACHINELEARNING

A to

olb

ox o

f mac

hine

le

arning applications for business grow

th in New

Zealand

DARWIN JEROME TARDIOMachine Learning and Cognitive Applications for New Zealand SMEsITPG8.300 Research in Information [email protected] | http://darwin.tardio.info/research-work/

Copyright © 2018Eastern Institute of Technology, Auckland

Submitted to Dr. Dobrila Lopez, PhD

MACHINE LEARNING AND COGNITIVE APPLICATIONS FORNEW ZEALAND SMEs

2

Page 8: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Factors that Affect a User to Fall for a Phishing Email

Elizabeth Reyes:Email: [email protected] | Phone: 022 028 3907 | Linkedin: https://www.linkedin.com/in/reyes-elizabeth/

Bio:Elizabeth completed Electronics and Communications Engineering in Mapua University in Manila, Philippines. She worked as an Associate Engineer in Trend Micro and as a Telecommunications/Design Engineer in Manila Electric Company (MERALCO) before emigrating to Canada. She is a well-experienced Technical Support / IT Help Desk Analyst. Her most recent IT work experience was with Fujitsu Americas Inc. in Montreal, where she worked as a senior analyst in the email team and provided VIP phone support for Government of Alberta employees, and provided training to new email analysts.

Abstract:Phishing is defined as an act of getting personal information such as usernames, passwords, and credit card numbers. People do this for fraudulent activities or even for serious cases of identity theft. When it comes to health, as many people would say, prevention is better than cure. Same goes to the internet world. The researcher believes it would be beneficial to determine the reasons why users fall for phishing emails. Many researches on phishing attacks have been done yet there is just a little information on why users fall for phishing emails. Hence, the research question: What are the factors that affect a user to fall for a phishing email?

3

Page 9: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

ITPG8.300 Combined Research Methods [Part B]

| Elizabeth Reyes | 2017003643 | Postgraduate Diploma in IT | EIT Auckland || Lecturer: Dr. Dobrila Lopez |

(Chawla and Chouhan, 2014)

Phishing Attack Procedure

Life Cycle of a Phishing Email

(Almomani, Gupta, Atawneh, Meulenberg, & Almomani, 2013)

BuyDomain

SpoofedSite

User submits infoto spoofed site

Send Bait(as Spam)

Stolen Info

User reads bait, clicks on link

Bait

Info

Info

EmailName

CreditCard #

(Jones, Towse, & Race, 2015)

Theoretical Influencesin Email Response Decision

Email Response Decision

Persuasive techniques

employed by the sender

Human computer interaction

Cognitive make-up of the user

Phisher

Victim Web Server

Compromise a host and installs a phish web site and mass-mailer

Victim user

Victim user

Victim user

Victim user

Sends out phishing email

Victim clicks a phishing URL

Phishing website is viewed

Victim submits information

Factors that Affect a User to Fall for a Phishing Email

Research Question

What are the factors that affect a user to fall for a phishing email?

Significance of the Research

▪ A study conducted by IBM found out that 70% ofcredentials are collected within the first hour of aphishing attack (D’Alfonso, 2017)

▪ To develop tools that would effectively combatphishing, it is important to first understand the reasonswhy users fall for them (Downs, Holbrook, & Cranor,2007)

▪ Studies by APWG (2009), Microsoft (2010), andSymantec (2010) shows that phishing attacks' mosttargeted industry is the financial industry (Choo, 2011)

Method and Sampling

Instrument▪ Recruitment Flyer / RAD Form▪ Questionnaire Design

Part 1. Demographic questionsPart 2. Perception of user’s knowledge on phishing emailsPart 3. Phishing or not phishing

Data Analysis

▪ Quantitative Method▪ Online Survey: Survey Monkey

▪ Convenience Sampling (minimum of 100 participants)

▪ Univariate Analysis▪ Frequency distribution

▪ Survey Monkey

Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE communications surveys & tutorials, 15(4), 2070-2090.

Chawla, M., and Chouhan, S. S. (2014). A survey of phishing attack techniques. International journal of computer applications, 93(3), 32-35. DOI: 10.5120/16197-5460

Choo, K-K. R. (2011). Cyber threat landscape faced by financial and insurance industry. Australian Institute of Criminology, 408(2011). Retrieved from http://go.galegroup.com.ezproxy.eit.ac.nz/ps/i.do?ty=as&v=2.1&u=per_eit&it=DIourl&s=RELEVANCE&p=EAIM&qt=SN%7E0817-8542%7E%7ETI%7E%22Cyber+threat+landscape+faced%22%7E%7ESP%7E1%7E%7EIU%7E408&lm=DA%7E120110000&sw=w

D'Alfonso, S. (2017). Phishing attacks collect 70 percent of credentials within the first hour. Retrieved from https://securityintelligence.com/phishing-attacks-collect-70-percent-of-credentials-within-the-first-hour/

Downs, J. S., Holbrook, M., & Cranor, L. F. (2007). Behavioral response to phishing risk. Retrieved from https://docs.apwg.org/ecrimeresearch/2007/proceedings/p37_downs.pdf

Gréaux, S. (2016). How to spot a phish. Risk Management, 63(2), 12-13. Retrieved from http://ezproxy.eit.ac.nz/login?url=https://search-proquest-com.ezproxy.eit.ac.nz/docview/1784939468?accountid=39646

Jones, H. S., Towse, J. N., & Race, N. (2015). Susceptibility to email fraud: A review of psychological perspectives, data-collection methods, and ethical considerations. International Journal of Cyber Behavior, Psychology and Learning, 5(3), 13-29. DOI: 10.4018/IJCBPL.2015070102

Thakur, H., and Kaur, S. (2016). A survey paper on phishing detection. International journal of advanced research in computer science, 7(4), 64-68. Retrieved from www.ijarcs.info/index.php/Ijarcs/article/download/2706/2694

References

Phishing▪ The word "phishing" came from its homonym "fishing”, where the

phish scammers fish for information (Thakur and Kaur, 2016)▪ “Phishing” is an email-based attack on social media (Gréaux, 2016)

4

Page 10: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

SQL Standard – Not the Standard?

Joel Sevilla: Email: [email protected] | Phone: 027 397 8183 | Linked-in: https://www.linkedin.com/in/jfcsevilla

Bio:I am a software developer with more than 10 years of professional experience in an open systems programming. Exposure in the industry facilitated strong database development skills required to analyze and code complex SQL Server and Oracle queries in conjunction with server-side scripting languages (C#, VB.Net and J2EE), SQL Server Reporting Services, and SQL Server Integration Services. My career started after passing a licensure exam (Electronics and Communications Engineering) in 2005, and a pre-employment development training in 2006. I then served as a software developer in BPI (Bank of the Philippine Islands, among the top 3 banks) and Deltek Systems (an American software solutions provider) 6 and 5 years, respectively.

Abstract:In 1983, IBM finally managed to complete a database management system after more than a decade of the technology’s conception by one of IBM’s own researcher. From the onset, people from the IT sector knew that SQL (Structured Query Language) is the database language of the future given IBM’s prestige as an industry leader at that time. Since then, SQL grew in fame and other players competed in the market with their own SQL implementation that resulted to various dialects of SQL. The International Organization for Standardization recognized the language as an international standard and has published specifications and revisions since 1986. As of this writing, not one DBMS provider has ever claimed full compliance to any of these revisions. This study aims to compare the degree of compliance as well as the quality of standards implementation in accordance to SQL-2011 specifications between these providers: Oracle, Microsoft, and PostgreSQL.

5

Page 11: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

RESEARCH POSTER PRESENTATION DESIGN © 2012

www.PosterPresentations.com

Codd, E. F. (1970). A relational model of data for large shared data banks. Communications of the ACM, 13(6), 377-387. doi:10.1145/362384.362685

Codd, E. F. (1990). The relational model for database management: version 2: Addison-Wesley Longman Publishing Co., Inc.

ISO. (2013). Committee Draft ISO/IEC CD 9075-2. Retrieved May 27, 2018, from http://jtc1sc32.org/doc/N2301-2350/32N2311T-text_for_ballot-CD_9075-2.pdf

Kline, K., & Kline, D. (2001). SQL In a Nutshell: A Desktop Quick Reference (G. Estabrook Ed.). United States of America: O'Reilly & Associates, Inc.

Kreines, D. C. (2000). Oracle SQL: The Essential Reference (D. Russell & J. Gennick Eds.). United States of America: O'Reilly & Associates, Inc.

Microsoft. (2017). SQL Server Transact-SQL ISO/IEC 9075-2 Standards Support Document (pp. 259). Retrieved from https://sqlprotocoldoc.blob.core.windows.net/productionsqlarchives/MS-TSQLISO02/[MS-TSQLISO02].pdf

Nogueira, P. E., & Matias Jr, R. (2015, 6-9 Dec. 2015). A quantitative study on execution time variability in computing experiments. Paper presented at the 2015 Winter Simulation Conference (WSC), Huntington Beach, California, USA.

Nogueira, P. E., Matias Jr, R., & Vicente, E. (2014). An Experimental Study on Execution Time Variation in Computer Experiments. Paper presented at the 29th ACM Symposium On Applied Computing, Gyeongju, Korea.

PostgreSQL. (2018). PostgreSQL 10.4 Documentation (pp. 3352). Retrieved from https://www.postgresql.org/files/documentation/pdf/10/postgresql-10-A4.pdf

Roeser, M. B. (2017). Oracle Database SQL Language Reference, 12c Release 1 (12.1) (pp. 1920). Retrieved from https://docs.oracle.com/database/121/SQLRF/E41329-25.pdf

Sevilla, Joel Franco

Postgraduate Diploma in Information TechnologyEastern Institute of Technology – Auckland Campus

SQL Standard – Not the Standard?

To measure the degree of SQL standard conformance

To measure the quality of standard implementation

1970• Edgar F. Codd theorized and published

the first SQL concept

1979• Relational Software Inc. (RSI) released

Oracle version 1

1980• Relational Technology Inc. (RTI) was

established to compete using INGRES

1984• Informix Corporation released the first

version of their SQL

1985• IBM released the first version of DB2 for

mainframe

1986• The first SQL standard, ISO/IEC

9075:1986, was published

1987• Sybase Inc. released their SQL version

1989• PostgreSQL version 1 became available

to external users• The first revision of the SQL standard

was published

1993• Microsoft released SQL Server for

Windows NT

2011• The seventh revision of the SQL

standard was published

DBMS Provider

MicrosoftOraclePostgreSQL

Independent Variable

Feature Disposition

SupportedPartially Supported

Not Supported

Dependent Variable

InstrumentISO/IEC 9075:2011Compliance Reports

Average Execution

Times

Core StatementsProminent Statements

Dependent Variable

InstrumentsMicrosoft SSMSOracle SQL DeveloperPostgreSQL Query Tool

Feasible to investigate with the aid of compliance reports from database providers

Get accurate average execution time through 30 query runs

Aid developers understand different SQL implementations

Compare performance and invest time or money accordingly

Research Methodology - Experimentation

Proposed Outcome – Data Visualization

ConclusionIntroduction

Objectives

References

Contact

Dr. Dobrila LopezLecturer

• Eastern Institute of Technology• Auckland, New Zealand• [email protected]

Joel SevillaPresenter

[email protected]

6

Page 12: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Popular Platforms Used in Cybervetting For IT in New Zealand

Jeanette Bautista:E-mail: [email protected] | Phone: 027 532 0138 | Linkedin: https://www.linkedin.com/in/jeanettebautista/

Bio:I have more than a decade of experience in the IT industry. Some of my previous projects include training users for newly developed systems, as well as documenting and marketing software. My experience in dealing with people also helped me get projects outside the Philippines; in fact, I was a remote worker for almost six years, servicing manual software testing and mobile app testing. I also have experience in managing IT testing teams and development teams from different parts of the world. Our projects spanned Agile works for clients in the US, Australia and UK.

I also helped start up companies from the US and Australia in hiring local IT teams in the Philippines. In addition, I have experience in administration and SEO.

I have a strong passion and interest in marketing and managing interactions with people. I am a person who does not fear trying anything because I am always eager and have a passion to learn and accept challenges. I am very excited to learn more as an individual and a professional in this industry.

Abstract:Cybervetting through social media is now one of the most popular ways of screening and vetting job hopefuls, on a global scale. This proposal aims to discover the most popular social media platform used by Human Resources professionals, hiring managers, and recruiters in the Information Technology sector of New Zealand in their IT recruitment process. In addition, it hopes to find the most important criterion that organisations consider to make hiring decisions, as well as the other factors that are assessed to determine a potential employee’s suitability. Finally, it hopes to add to the literature on the topic and help establish a guide that both organisations and IT professionals can use, where successful recruitment is concerned. This proposal aims to explore the influence of social media on the hiring practices of human resource professionals in the IT industry in New Zealand.

7

Page 13: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

cv

With the findings, IT job hopefuls will be able to draw

from an addition to the body of knowledge on the topic. This can help inform them on what constitutes ideal online behaviour for successful recruitment, as well as

guide them to accordingly streamline their social media

profiles to boost their chances at being hired.

POPULAR PLATFORMS USED IN

CYBERVETTING FOR IT IN NEW ZEALAND

Submitted by: Jeanette Bautista | [email protected]

Submitted to: Dr. Dobrilla Lopez

Guide HR professionals who will be conducting online background checks;

Add knowledge to emerging field narrowing down the research into the most popular social media websites used;

Serve as guide for hopefuls to define what are

the criteria that recruiters look for to impact their decision.

METHODOLOGY

Battis, S. A. (2016). A cross-sectional study of the impact

of social networking sites on organizational recruiting and

selection practices (Order No. 10254020). Retrieved

from ProQuest Dissertations & Theses Global.

(1857435907)

Berger, J. L. (2015). Cybervetting: A common

antecedents model (Order No. 3726707). Retrieved

from ProQuest Dissertations & Theses Global.

(1717823485)

Berkelaar, B. L. (2010). Cyber-vetting: Exploring the

implications of online information for career capital

and human capital decisions (Order No. 3444477).

Retrieved from ProQuest Dissertations & Theses

Global. (858608200)

QuantitativeSampling and Data

Collection

IT Hiring Managers

150 or Higher Target

Respondents

Online Questionnaire

1. What is the most commonly used social media site in cybervetting IT professionals in

New Zealand?2. What are the most significant factors in candidate information that hiring managers

consider when accessing social media websites for cybervetting?

SIGNIFICANCE

BACKGROUND

RESEARCH QUESTION

PROPOSED OUTCOME

CONCLUSION

ABSTRACT

This proposal aims to discover the most popular social

media platform used by Human Resources

professionals, hiring managers, and recruiters in the

Information Technology sector of New Zealand in their

IT recruitment process. The study will make use of a

voluntary online questionnaire on Social Media

Screening that will be emailed to HR and recruitment

managers and professionals, whose contact

information will be pulled from the database of the

Human Resource Institute of New Zealand (HRINZ),

which governs the industry in the country. Data from

respondents will be compiled with Survey Monkey, and

analysed with descriptive statistics. Once approved, it

will run for 14 weeks.

Identify the list of factors that are considered by IT

recruiters in making hiring decisions;

Give significance in detailing the number of IT

companies in New Zealand that make use of social

media in cybervertting.

Cybervetting is a process by which employers make

use of online information for profiling or conducting

informal background checks on potential employees

(Battis, 2016; Berkelaar, 2010).

Studies say that 44% of applicants have lied about

work histories, 41% lied about their education, and

23% lied about licences (Berger, 2015).

Doing online background checks as supplements to

traditional background checks helps hiring

managers vet more data available through social

media.

After collecting the data from Survey Monkey, it will be

downloaded into a statistical software programme and

will be subsequently analysed with an SPSS tool.

Testing the difference between criterion will be

conducted with chi-square to see the comparison of

results. Descriptive statistics through frequency tables

and charts will be used to present the findings.

REFERENCES

8

Page 14: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Critical Analysis of a Strategic IT Plan for a Media Company

Maria Victoria Alcantara:Email: [email protected] | Phone: 021 0816 3036 | Linkedin: https://www.linkedin.com/in/mvl-alcantara-ctfl/

Bio:I am a graduate of University of the Philippines-Diliman and a Registered Nutritionist-Dietician turned IT professional. I started my IT journey by testing an Electronic Medical Records system in the Philippines and continued manual testing of insurance, payroll and other web applications. I gained my automation testing experience in Hewlett-Packard Philippines Corporation (now DXC Technology) using HP QTP and UFT tools and was trained in Shanghai, China for the SAP Global Supply Chain project. I am flexible as a part of the team or a sole tester of a project with experience in a Scrum and Kanban Agile environment. I hold a Foundation Level Certificate from the International Software Testing Qualifications Board (ISTQB) and a certificate in Software Engineering from the University of the Philippines Information Technology Development Center (UP ITDC). Aiming to be an automation tester, I participated in a Selenium + Robot Framework workshop and attended the 2017 Python Conference in the Philippines. I have also attended the Google Cloud OnBoard training last Feb 2018 in Auckland. With about 5 years of testing experience, I must say that the learning doesn’t stop and I am excited for more!

Abstract:A strategic IT plan aims to align the organisation’s business goals and objectives with its IT goals and objectives. Part of a strategic plan is to implement an IT project to maintain the global competitive advantage and increase the value of the organisation in response to the technological influence in the market. To become successful, an IT governance framework is utilised such as COBIT 5 that acts as a guide in governance and management of the IT investment. This report provides a proposal and critical analysis of the IT strategic plan for a media company.

9

Page 15: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Critical analysis of a strategic IT Plan for a Media CompanyEastern Institute of Technology, Auckland ITPG 8.200 Strategic IT Management

Information security, as defined by ISACA (Information Systems Audit and Control Association), is ensuring the CIA concept (confidentiality, integrity and the availability) of the information. Confidentiality is protecting the information from unauthorised access and disclosure. Integrity is ensuring that the information is free from improper modification or deletion and keeping its authenticity. Availability is ensuring the reliable access to the information whenever required. The group proposes the use of COBIT 5 for Information Security as it is intended for information security stakeholders such as CISO (Chief Information Security Officer), ISM (Information Security Managers), and other information security engineers, analysts or professionals. COBIT 5 for Information Security provides the framework, examples and guidance for IT governance and for the implementation of information security on any enterprise.

1. Provide a security architecture.2. Provide security awareness.3. Provide security assessments.4. Provide adequate incident response.5. Provide adequate protection against malware, attacks & intrusions.6. Provide monitoring and alert services for security related events.

COBIT 5 GOVERNANCE FRAMEWORKMEDIUM

International SuppliersNational Suppliers

HIGHSocial MediaNewspaper

Internet

HIGHNumerous Source

Better competitor services

LOWHigh Capital InvestmentExpensive License Fee

Customer Loyalty

HIGH

PORTER’S FIVE FORCES ANALYSIS

IT activities, projects or services must

contribute value to every organisation, which is why

an IT agenda must be aligned with clearly defined

business goals. Additionally, it should measure non-IT related

metrics that have a significant impact on the resulting processes,

systems, and results for the business. When business expectations are staked on

good IT management, alignment is successful and can bring about positive results to the business. The

BBC’s previous implementation of DMI gave rise to multiple issues that eventually translated to negative losses for the company. The authors proposed the use of COBIT 5 for the overall IT governance using modules on Information Security, Assurance and Performance Management as it provides the framework, examples, and guidance the management, implementation, quality and capability measurement of the IT system enforced in any enterprise. As BBC can be considered one of the major media companies worldwide, quality services are expected, more so, information security should be vastly guarded. Moreover, an improved IT framework using COBIT 5 was presented which covered all aspects of the organisation’s business and IT goals. The new framework aimed at BBC’s value creation by the interrelation of the IT objectives, enablers, scope, and the stakeholders as an improved model from the 2010 technology plan.

Porter's Five Forces provides an analytical framework for measuring the influence of industry structures on profit potential. It covers: bargaining power of buyers, the bargaining power of suppliers, the threat of new entrants, threats of substitute and services, and rivalry among existing competitors. Its risk to business are measured by force: High, Medium, and Low scores.

A proposed IT plan is presented and discussed based on COBIT 5 guidelines and utilising BBC’s 2010 Technology Framework. The proposed IT plan is based on COBIT 5’s end-to-end governance and management approach and its components.

The utilisation of COBIT 5 framework in strategic IT planning has been proven as an effective approach given the number of

successful case studies in this area. Several success stories were also researched from various

industries and organisational types such as in the government, IT Consulting,

education, automotive industry, and in the financial services. Given its

characteristics of flexibility and compatibility to various

industries, has made COBIT 5 an ideal approach to IT

Governance for organisations today. It

does not only a c c o m m o d a t e customisation to meet the o r g a n i s a t i o n a l requirements, but also encourages it.

Student Researchers:Maria Victoria Alcantara | [email protected] Bautista | [email protected] Reyes | [email protected] Jerome Tardio | [email protected]

Dr. Dobrila Lopez, PhdAcademic Supervisor

[email protected] Institute of Technology, Auckland

Copyright © 2018

The British Broadcasting Company (BBC) as a media organisation, acknowledges technology as central to their business process as they move toward the digital era. The company is positioned to ride with the technological advances and adapt fast since it requires changes that may affect competitiveness, market demands from the business, and behavioural changes from its customers.

IT projects are successful when it is aligned well with the business goals and objectives. Management and delivery of the IT project as

expected provides credibility to the IT organisation and its leadership structure. This report paper presents the critical analysis of the

authors on BBC’s IT strategic plan. Arising from their failed digital transformation project, a Cloud storage solution is

proposed within this case study wherein the governance and management guidelines are

based on COBIT 5 framework. The high-level details of the project are indicated in

this business case report.

STRATEGIC I.T. PLAN

ABSTRACTA strategic IT plan aims to align the organisation’s business goals and objectives with its IT goals and objectives. Part of a strategic plan is to implement an IT project to maintain the global competitive advantage and increase the value of the organisation in response to the technological influence in the market. To become successful, an IT governance framework is utilised such as COBIT 5 that acts as a guide in governance and management of the IT investment. The case study report provides a proposal and critical analysis of the IT strategic plan for a media company.

10

Page 16: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

IoT Based Smart Parking System

Reshma Begum:Email: [email protected] | Phone: 020 4144 3389 | LinkedIn: https://www.linkedin.com/in/reshma-begum-629a7858/

Bio:I have completed my Bachelor of Technology from Jawaharlal Nehru Technological University, India. To further enhance my skill set and to gain international exposure, I have decided to pursue the Post Graduate Diploma in Information Technology at Eastern Institute of Technology. I found my passion towards software engineering while participating in a Hackathon. I bring in 3+ years of experience as a software engineer in the IT industry. I worked as a vendor for Microsoft as a level 3 Application Support engineer and SQL Server DBA. Being a Microsoft Azure Infrastructure certified professional, I hold experience in supporting Azure applications. My skills include: .Net, SQL server, ADO.NET, C, C#, ASP.NET, Microsoft Azure. A vast experience in high-volume environments with strong analytical, communication and organizational abilities helped me to be able to thrive in fast-paced and challenging roles.

Abstract:With the evolution of the Internet of Things (IoT), the concept of smart cities is rising and has gained popularity. Commuters in urban cities face difficulties in finding a free parking space due to the lack of notification process and lack of autonomous parking systems. This causes drivers to make multiple rounds to find a parking spot which causes discomfort and wastes time and fuel, leading to increase in greenhouse gases. With IoT, the troubles of traffic congestion, restricted parking space, and road safety are being addressed. The poster presents a proposal for a cloud enabled Intelligent parking system that helps users in searching for a parking lot and reserving a parking slot through a client side mobile application.

11

Page 17: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

www.postersession.com www.postersession.com

IoT Based Smart Parking System

Prepared by Reshma Begum Eastern Institute of Technology, ITPG8.600

Supervised by Samuel Ekundayo

Smart Parking System •Provides nearest parking slot information •Reserve parking space before reaching the destination •Guides users to nearest parking slot

Smart Home •Smart Temperature Control •Optimized Energy use

Industrial •Quality Control

Automotive •Vehicle auto diagnosis •Autonomous Cars •Smart Parking

Agriculture •Crop Management •Soil Analysis

Military •Situational Awareness •Threat Analysis

Medical •Optimized Patient Care •Wearable Fitness Devices

Environmental •Forest Fire Detection •Species tracking

Retail •Inventory Control •Focused Marketing

Internet of Things •Connects physical and virtual things •Enables communication between things over the internet. •IoT app’s monitor, detect problems, communicate and resolve issues without any human intervention

Integrating Internet of Things and cloud •Cloud acts as an intermediate between things & applications •Increased storage Capacity & Computation •High availability •Interoperability & Scalability

Raspberry Pi: Enables communication between cloud and mobile app. 26 GPIO pins

Parking Sensors: Infrared sensors- detect the presence of a car Pressure sensors- detect arrival & exit of a car from the parking lot

Cloud server: Acts as a database. MQTT server hosted on cloud. Records parking related information

Current Parking System •Manual search for vacant space •More time, effort •Increased traffic congestion

Mobile Application: For users to interact with the system. Book slots & pay parking fee

Display Unit: Red and green LED lights represent the status of the parking space

This system enables users to book their slots from remote location and users are provided with real-time information of empty parking spaces. The system enhances the parking facilities thereby improving the quality of life.

Architecture

Applications of IoT

12

Page 18: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Agile - Scrum Project Development at Intel

Vijay Krishnan Radhakrishnan:Email: [email protected] | Phone: 027 505 8385 | LinkedIn: www.linkedin.com/in/vijay-krishnan-radhakrishnan-366999106

Bio:My experience covers a hands-on experience in: implementing, upgrading, training and supporting Enterprise Resource Planning System throughout various Business processes and the ability to pick up bespoke systems quickly. I was a Customer Service Representative with experience in handling US Clients and closing settlements. I possess well-developed leadership, interpersonal, analytical and organisational skills. I am able to communicate complex concepts to stakeholders. My technical skills includes: SQL Server Management studio, SQL queries, SharePoint, proficient in UML Diagrams and MS Office.

Abstract:Development of quality software with low cost and time is the goal of software industries. Project management methodologies provide a platform for managing the activities and functionalities performed during the project life cycle. Knowledge areas and their repositories are the key aspects which help the team to manage the project. The poster provides some insights on the case study on Intel where Scrum was implemented in phases. Explanation of Waterfall and Scrum methodologies are given with an image explaining the process followed. A comparison triangle is included for both methodologies to differentiate the usage of aspects like time, cost and scope. The poster highlights a comparison with two project management methodologies in terms of knowledge repositories for all the PMBOK knowledge areas.

13

Page 19: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

www.postersession.comwww.postersession.com

Agile - Scrum Project Development at IntelITPG8.100 Advanced IT Project Management

Vijay Krishnan Radhakrishnan - 2017003074Submitted to: Dr. Kay Fielden

A long history in fabrication and manufacturing has resulted in a strong waterfall culture at Intel, embraced widely as the best path to success. A Scrum Odyssey case – implementing

Scrum with Danube Technologies, Inc. as Scrum education and coaching vendor.

Use six sigma methods

Project charter

Gantt Chart

Project Manager plans stakeholder

management

Formal Document Plan

Procurement Documents

Stakeholder Map based on

Influence and Interest

Informal in both strategic and tactical level

Contracts

Project Status Report monitors Project Cost with

Earned Value Metrics

Project Manager acquires, develops

and maintains Project team

Formal Documentation

Quality Assurance is involved in all stages with

automation tools

ScrumMaster involves customers

with project team to maintain

cost

Creates cross-functional

teams

Face to face communication in

Scrum meetings

Product owner prioritises product

backlog to manage scope

Sprint manage time in Scrum

Project Manager maintains technical documentation for development plan

ScrumMaster has minimal

documentation

Use six sigma methods

Project charter

Gantt Chart

Waterfall ScrumPM AreasCase StudyA Scrum Odyssey at Intel - Oregon and Pacific (OAP) Product Development Engineering (PDE) team required to implement Scrum and Agile across the various sites of the organisation, used a test program running Automated Test Equipment (ATE) to prevent the usage of industry standards and Off-the-shelf software validation solutions. The need to implement Scrum augmented when most of the work was development of pre-silicon infrastructure and readiness of work. Danube Technologies, Inc was chosen as the Scrum education and coaching vendor. After training, the management and participants agreed to implement Scrum principles as per the book and practice for three months. Group and team leads functioned as the product owners for the seven teams, while the author worked as the ScrumMaster.

WaterfallWaterfall – is a heavyweight software development methodology with Plan, Design, Development, Testing and Deployment as phases to be followed in a sequential order. The Waterfall approach is simple to use, clearly defines stages, and is easy to manage tasks. Waterfall approach has disadvantages like no working software is produced until late during life cycle, not a good model for long ongoing and complex projects and cannot accommodate any changing requirements which leads to problems like customer satisfaction, time management and no profit.

ScrumScrum – is an Agile software development methodology with an incremental process of developing sprints. Scrum provides customer satisfaction, increases quality and is time efficient. Scrum has many advantages like helping company in saving time and cost, constant feedback makes it easier to cope with changes and identifying issues well in advance helps in resolving them quickly. The disadvantages to be considered are tasks should be well defined or may lead to increase in project cost and time, needs lot of commitment and experience of team members.

14

Page 20: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

A Review of the Agile Methodology

Lucas Barcellos Victoria:Email: [email protected] | Phone: 027 511 0073 | Linkedin: https://www.linkedin.com/in/lucasvictoria/

Bio:I have 9 years of IT experience, with solid experience in applications support, customer and stakeholders relationship, ERP systems support, Business analysis, Incident and Project Management. My skills are both technical and business focused, I’m able to translate technical language in a simplified way to explain all issues to everyone. I have a lot of knowledge and experience about the ITIL framework and ticketing systems. I have experience with PL/SQL and can create a lot of useful scripts to solve problems or create complex processes directly in the databases. I’m used to solve problems quickly and under pressure, being able to develop the best solution in a small time frame when needed. When not working I like to Cook (I can do a really good Brazilian barbecue and have barista skills) and play Videogames.

Abstract:A project manager should know all the advantages and disadvantages of any management method before choosing the correct one for each project. Currently Agile methods are a trend in the system development industry, as many companies are switching from more traditional methods to Agile, mainly the Scrum Methodology. The Agile philosophy was created from the dissatisfaction from more traditional project management methods, such as Waterfall, in a meeting made by developers in 2001, with the idea of being more flexible with changes and making client active part of the development. There are many studies about Agile explaining its benefits and its success, as it reduce development costs, accommodate changes easier than traditional methods and increases the Client satisfaction by making him part of the development and showing the development with prototypes. Even with all its benefits it can lead to problems like a never ending scope by always changing project requirements and organization communication problems. The objective of this research is to gather information about how the Agile methods are being conducted in New Zealand currently, and to identify its gaps and drawbacks to suggest improvements for them, adding more knowledge to the Agile Community.

15

Page 21: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

A Review of the Agile MethodologyPost Graduate Diploma in IT – Auckland, New Zealand

Lucas Barcellos Victoria – [email protected] Dr Dobrilla Lopez – [email protected]

The Agile manifesto was created from dissatisfaction from system developers towards traditional

development methods.Their focus was to agilize processes, reduce costs,

promote flexibility to accomodate changes

Poor change management can lead to a never ending project

Agile requires full embracement of the organizationSprint interruptions from clients, management and

external areasOpportunity for Improvement!

Qualitative approach to understand individual experiences

Semi-structured interviews built around research questions to allow adaption Recorded interviewsGather testimonies of diverse roles from different

Scrum teams to obtain feedback from scrum teams to learn with their experiences

Capture perception of how scrum is being implemented by teams through interviews to obtain feedback for improvements and find common issues

between different teams to draw conclusions.Research literature to support findings

Review current practices as done in the creation of the Agile Manifesto 17 years ago

Add knowledge to help IT professional to better understand Agile methodlogies

To help improve current Agile practices

Alase, A. (2017). The Interpretative Phenomenological Analysis (IPA): A Guide to a Good Qualitative Research Approach. International Journal of Education & Literacy Studies, 5(2). Azanha, A., Argoud, A. R. T. T., Camargo Junior, J. B. d., & Antoniolli, P. D. (2017). Agile project management with Scrum. International Journal of Managing Projects in Business, 10(1), 121-142. Beck, K., Beedle, M., van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., . . . Sutherland, J. (2001). The Agile Manifesto. Retrieved from http://agilemanifesto.org/Gonçalves, E. F., Drumond, G. M., & Méxas, M. P. (2017). Evaluation Of Pmbok And Scrum Practices For Software Development In The Vision Of Specialists. Independent Journal of Management & Production, 8(5), 569-582. doi:http://dx.doi.org/10.14807/ijmp.v8i5.598Hayat, M., & Qureshi, M. R. J. (2015). Measuring the Effect of CMMI Quality Standard on Agile Scrum Model. International Journal of Information Engineering and Electronic Business, 7(6), 46-52. doi:http://dx.doi.org/10.5815/ijieeb.2015.06.07Ozieranska, A., Kuchta, D., Skomra, A., & Rola, P. (2016). The critical factors of Scrum implementation in IT project - the case study. Journal of Economics & Management, 25, 79-96. doi:http://dx.doi.org/10.22367/jem.2016.25.06Tanner, M., & Mackinnon, A. (2015). Sources of Interruptions Experienced During a Scrum Sprint. Electronic Journal of Information Systems Evaluation, 18(1), 3-18.

The Agile methodology has increased project delivery speed and increased clients satisfaction, but it’s still not perfect and have some issues, this brings

an opportunity for improvement. The objective of this research is to search for common issues to later

research literature for their solution. For future work Implement the suggestions found during this research on

real projects to measure effectiveness

What can be done to mitigate these drawbacks?

What are the drawbacks of the Scrum Agile Development Methods?

What is the current perception of the Scrum Agile Development Methods by New Zealand

development teams?

To obtain information about how current Agile practices are being implemented.

To identify potential gaps with Agile practices

.To measure the effectiveness of current Agile

practices.

To develop improvements within current Agile practices.

Introduction

Problem Statement

Study Design

Data Analysis

Proposed Outcomes

References

Conclusion

Research Questions

Research Objectives

16

Page 22: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Smart Attendance System

Yubing Shi:Email: [email protected] | Phone: 027 458 4385 | Linkedin: https://www.linkedin.com/in/yubing-shi/

Bio:I am a highly motivated and results-oriented software developer with 4 years of relevant experience in coordination and development. I got my Bachelor of Engineering degree majoring in Computer Science and Technology in 2012 in China, then worked for 4 years in Dalian Shengli Tech which is a partner company of RICOH. I have experience in web development, desktop development as well as printer software (Xlet) development. Experienced in Java, C#, Javascript, Python3, and databases such as MySQL and SQL Server. I have just finished the study for my Postgraduate Diploma in Information Technology at EIT Auckland. A team player who takes the initiative to complete tasks with the highest quality in order to surpass the expectations of clients.

Abstract:The poster presents a QR code-based attendance management system, with the adoption of QR code technology, mobile technology, facial recognition technology and indoor positioning technology, the system addressed some attendance management system problems.

Both the accuracy and efficiency of the attendance check process can be improved with the use of the presented system.

17

Page 23: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Smart Attendance SystemITPG8.600Advancedmobileandwirelesstechnologies

Author:YubingShiSubmittedto:SamuelEkundayo

IntroductionTaking students’ attendance by university instructors duringeach class is a time-consuming process especially whenclasses are big.

Some faculty policies require this task to be performed bythe instructor in each lecture. In other words, out of the totalhours that are assigned to a given course, which is typicallyforty-five hours per semester, up to eight hours may be lostto perform this process that usually takes around tenminutes per lecture.

This study proposed a QR Code based student attendancesystem, combined with the indoor positioning technologyand Amazon Rekognition facial comparison service, thesystem can not only prevent the unauthorizedattendance registrationbut also save thelecturer’s timefrom the attendancecheck process.

Real-time Attendance

ITPG8.600Advancedmobileandwirelesstechnologies– Week13

SteveRogers

2017003020 PTonyStark

2917003021 B Bruce Banner

2017003022 P

Thor Odinson

2017003023 P 2017003024 LNatashaRomanoff Peter Parker

2017003025 A

Present Absent Late Alert

While the students scanning the QR code, thelecturer can check the real-time attendance online.

There are 4 status, Present (green), Absent (red), Late(brown) and Alert (yellow).

The status will be “Alert” when the student failed thefacial check or location check.

The lecturer can change the status of each student.

The System consists ofa mobile app installed on

students’ mobile phoneand a dedicated server.The lecturer generated theQR code on the server foreach lecture and put the QR code in the first

slide.

with the mobile app forthe attendanceregister.

Facial ComparisonBefore the student can scan the QR code, a mugshot will be takenwith the camera and sent to the server for the facial comparison.

The Amazon Rekognition service is used for the facial comparison,the service allowsuserstocomparefacesindifferentpicturestoseehowcloselytheymatchbasedonasimilaritypercentage.

This feature can prevent thestudents do the attendanceregistration for others.

Indoor Positioning

The Indoor Positioning technologyis used for location check. If a student

scanned the QR codeoutside the classroom,his/her status will beshown as “Alert” inthe system.

Mobile App

Whentheappislaunchedfor thefirsttime,itwillaskthestudenttologon,itcollectsthepositioningdataandsendstheinformationalongwithacapturedphotoofthestudenttotheserverviatheinternetortheintranetaftertheQRcodebeingscanned.

Mobile App Work Flowchart Real-time Attendance Prototype

ConclusionThe study proposed a QR code-based attendance management system, with the adoption of QR codetechnology, mobile technology, facial recognition technology and indoor positioning technology, the systemaddressed some attendance management system problems.Both the accuracy and efficiency of the attendance check process can be improved with the use of theproposed system.

The students scan the QR

18

Page 24: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Exploring Urban Agriculture Smart Aquaponics

Mark San Agustin:Email: [email protected] | Phone: 022 531 2498 | Linkedin: https://www.linkedin.com/in/ramsamarksanagustin/ |

Bio:I have over ten years of professional work experience at Singapore in Information Communication Technology industry which comprises several multi-national organizations.

Over the last few years, I worked on various phases of infrastructure support roles, environments and projects involving plan, design, implementation, operation, analysis and creation of the knowledgebase as well as training of a personnel. This includes experience from end user computing to server/network related environments.

I have supported clients in Air Transport (SITA Inc.), Global Infrastructure Integration (Eze Castle Inc.), Telecommunication (MyRepublic Pte. Ltd.), Government Agencies (National Library Board) and Call Centre Industries and enjoyed working in a dynamic and challenging environment that delivers high standards of services to the clients.

Abstract:Sustainability and food security is a primary concern particularly in small countries and cities, due to population growth rapid urbanization decrease land resource for agriculture while food demand continues to increase there is also a concern for safe and sustainable food sources.

Traditional agriculture requires colossal land space, human resources and time, urban rooftop farming (URF) comprising various techniques shows potential for increasing food production.

In Agriculture, Aquaponics serves as an integration of aquaculture and growing plants without soil. Aquaponics often encompasses the use of the nutrient-rich water used in raising fish serving as a natural fertilizer for the plants and the vegetables further play a critical role in helping purify the water for the fish.

Taking advantage of available technology Internet of Things (IoT), cloud computing and embedded systems can ease the task of evaluating those parameters by deploying actuators and sensors in Aquaponics system.

The purpose of this research proposal is to explore aquaponics potential as an urban smart agriculture farming because until now despite technology advancement in smart cities there is no integrated approach to explore its potential as smart urban agriculture.

19

Page 25: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Schedule Objective

1 to 2 weeksKick off planning meeting to discuss objectives, timeframe and logistics (survey software) of research.

1 to 2 weeksResearch design, questionnaire creation, determine target population, determine sample size, creation of invite and reminder

2 to 3 weeksAssembling email list, survey deployment, Survey distribution, monitor response rate, send email reminder if necessary.

2 to 3 weeksSurvey collection, download completed surveys, ending data collection

2 to 3 weeks Data Analysis.

20

Page 26: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Case Study at Portbase Challenges in Transition from Waterfall to Scrum

Pushpinder Kaur:Email: [email protected] | Phone: 020 4142 2160 |

Bio: I have finished my Masters in Computer Science and Engineering in India and am now finishing my Postgraduate Diploma in IT at EIT Auckland Campus. I have worked as Customer Service Representative at Harvey Norman, New Zealand for 6 months and have worked as a web designer for 1 year in India. I have also finished course in Java Script. As a person I am optimistic with a can do attitude and would to become a part of NZ IT Sector.

Abstract:Project Management provides framework for managing activities during the life cycle of the project. Knowledge management areas are the key terms for the management of the project. This poster provides details regarding the Scrum implementation at Portbase.Waterfall and Scrum methodologies are sown as image explaining the working of the methodologies. The poster shows the comparison of Waterfall and Scrum on the basics of nine Knowledge Management Areas.

21

Page 27: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

www.postersession.comwww.postersession.com

CASE STUDY AT PORTBASE

CHALL CHALLENGES IN TRANSITION FROM WATERFALL TO SCRUM

Submitted To-Dr. Kay FieldanADVANCED IT PROJECT MANAGEMENT ITPG8.100

CASE STUDY

• Portbase is the port management company who

provide services with knowledge sharing..

• Portbase was established in 2009. Its main aim is to

make Dutch ports by having only one stop for

information exchange of logistics.

• In the year 2012, Portbase switched from traditional

waterfall methodology to Scrum. After adopting Scrum

the products will be delivered on time and achieve

more customer satisfaction.

PRESENTED BY-PUSHPINDER KAUR

KNOWLEDGE MANAGEM-ENT AREAS

WATERFALLIterative based Requirement Gathering

Quality Assurance

Timeline CostEstimation

UnstructuredRisk Management

Project Charter AD-HOCProcurement Management

TraditionalCommunication

Can cope with employee turnover

Expert based time estimations

SCRUM ProductBacklog

QAInvolvement

Scrum BoardPossible Risk

AnalysisGantt Chart

Demand Supply EquilibriumBased Recording

Ineffective but Unstructured

Hard to bring new Members

Story based

PROJECT MANAGEMENT

• Application of Knowledge skills, tools

techniques to protect activities to meet

stakeholder requirements.

• A discipline of initiating, planning, executing,

controlling and closing the work of a team to

achieve success.

• Established principles, procedures and policies

to manage a project.

WATERFALL MODEL SCRUM

CONCLUSION

Portbase being an international organization it was crucial for them to be ahead of the game. Two Methodologies were

analyzed based on nine key PMBOK areas. Since 2002 they have been successful in project management deliveries.

Financially company is recovered after moving to Scrum and helps in providing more customer satisfaction.

22

Page 28: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Case Study of Adobe Premier Pro using Scrum and Waterfall methodologies

Sheila Sara Prem Kumar:Email: [email protected] | Phone: 022 399 0454 | LinkedIn: https://www.linkedin.com/in/sheila-sara-a2717115/

Bio:I am finishing my PG Diploma in IT at EIT (Auckland International Campus) and hold a Master’s degree at Central Queensland University, Melbourne (Australia).

I had an opportunity to proactively involve myself as a mentor for the new students through the Mentorship Programme offered by EIT, that enhanced my leadership skills and team adaptability.

On the professional front, I have worked as a Customer Service Representative in Melbourne for 1 year and have also worked as Relationship Manager for IIPM for 3 years.

Done a short term course in Software Testing (Manual & Automation).

About myself: I am an optimistic and hardworking individual with a willingness to learn and a passion to innovate, waiting to carve a niche for myself in the IT industry.

Abstract:Project Management is the application of processes,methods,skills,knowledge and experience to achieve project objectives. Effective project management requires controlled scope and resource focus according to organizational requirements. There are ten knowledge areas in project management which would be utilized by a project manger in order to successfully manage a project. Therefore, the key to project’s success is perceived as, choosing the right methodology for the right project rather than thrusting the project to a methodology.

This poster illustrates the case study of a non-linear video editing company called ‘Adobe Premier Pro.’ The poster also elaborates how an agile mindset towards project management enabled the company to achieve significant improvements in quality, communication, market perception and sustainable pace of development for team members. The poster briefly addresses the strengths and weaknesses of the Waterfall and Scrum methodologies. Ultimately, the poster showcases how the knowledge is stored using the two methodologies for the ten knowledge areas that are represented in a table.

23

Page 29: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

www.postersession.comwww.postersession.com

Case Study of Adobe Premier Pro using Scrum and Waterfall methodologies

ITPG8.100 ADVANCED IT PROJECT MANAGEMENT

Project Management

• Project Management is the practice of initiating,

planning, executing, controlling, and closing the

work of a team to achieve specific goals at the

specified time.

• Effective project management requires

controlled scope and resource focus, according

to organizational requirements.

Project Management Body of Knowledge (PMBOK)

• The Project Management Body of

Knowledge is a collection of processes and

knowledge areas accepted as best practice

for the project management profession.

• There are ten PMBOK Knowledge areas

which are utilized by a project manager in

order to successfully manage a project.

Knowledge Areas

Integration Scope Time Cost Quality Human Resources

Communication Risk Procurement Stakeholder

Scrum Gantt chart BacklogPrioritization

Critical Path Analysis (CPA)

Cost Baseline Q&A sessions

Cross-functional teams

“Brady Bunch Daily Scrum”

Risk burn down chart

Flexibility for customers in contracts clause.

SprintReview meetings. Product owner is part of team.

WaterfallProjectCharter.

Work break down structures

Sequencing activities

Earned Value Management (EVM)

Quality assurance

Resource histogram.

Face to face conversation.

Risk register

Stringent contracts and agreements.

Project manager manages business stakeholders.

Presenter: Sheila Sara Prem KumarSupervisor : Dr. Kay Fielden

Scrum Focuses more on customer collaboration.

Upholds individuals and interactions.

Emphasis is on fast delivery.

Lack of Documentation.

Lack of emphasis in necessary designing.

Waterfall Complete requirements are required at the start.

Well disciplined approach.

Suits projects with defined phases.

Lack of early feedback.

Response to change is slow.

Adobe Premier Pro – Scrum AdoptionAdobe Premiere Pro is a company that deals with non-linear video editing in various sectors such as broadcasting, business videography and film

or video editing.

In the year 2005 and 2006, the team of Premier Pro was using a traditional phase- by-phase approach and the quality of the product was not as

expected, despite the team’s efforts and the main cause of the problem was that the team spent more time fixing bugs towards the end of the

project causing much stress to the team members.

After adopting scrum methodology, the company experienced significant improvements in quality, communication, market perception and team’s

work-life balance with its first release CS5.

Eastern Institute Of Technology

24

Page 30: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Challenges in Transition from Waterfall to Scrum in Port Base, Netherland

Devina Haridas:Email: [email protected] | Phone: 022 501 9670

Bio:I am currently finishing my PG Diploma in Information Technology at Eastern Institute of Technology, Auckland.

I have a 2.5 years of work experience in web designing and hold a bachelor’s degree in computer science.

As a web designer I studied a site designing and am keen to do more of web design. Apart from this , I worked on the project using the programming language Asp.net and Java.

Abstract:Project management is the application of skills, tools, techniques and knowledge to the project activities to meet the project requirements. The knowledge management areas consist of Integration, scope, Time, Cost, Quality, procurement, Human resources, communication, Risk management and stakeholder management. This poster explains about the two project management methodologies such as Waterfall and scrum. Waterfall is a traditional approach and whereas scrum is a modern approach. Moreover, the poster portrays about how the knowledge is stored in the above-mentioned project management methodologies. In addition to that, the poster describes how the port base company benefited when they transitioned from waterfall to scrum.

25

Page 31: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

www.

post

erse

ssio

n.co

m www.postersession.com

ConclusionPortbase was created by a merger between Rotterdam’s Port infolink and Amsterdam’s PortNET .The new organization was set up in 2009 by the Port of Rotterdam Authority and Port of Amsterdam and enjoys wide support amongst the port business community .They transitioned from waterfall toscrum. By scrum the product are delivered on time and the frequent feedbackhelps the customers to know how it works .As a result, can build a relationshipwith customer. As a result of so many feedback and demo’s ,the customers are highly satisfied. Before scrum they didn’t have contact with customers until the product is delivered. Sometimes they produce something different and failed tomeet the customer satisfaction. However, the situation is different afterimplementation the scrum could bring so many values to the organization.

Case Study

ComparisonWATERFALL

SCRUM

Scrum was introduced in the mid-1990s by Jeff Sutherland and KenSchwaber. Scrum is an iterative incremental process based on sprints andeach sprint is a period of 30 days duration needed to develop a part of asystem. The sprint begins with a planning session that lasts up to 2-3hours and these planning sessions includes the client, scrum master andthe cross- functional project team. Next is the Product backlog are therequirements needed for the work which also consists of the set offeatures that went to each sprint

Project Integration

Management

Project Scope

Management

Project Time

Management

Project Cost

Management

Project Quality

Management

Project HR

Management

Project Communication

Management

Project Risk

Management

Project ProcurementManagement

Gantt ChartProjectCharter

ProductBacklog

WorkBreak Down

Structure

Time-Line BasedStoryBased

ScrumBoard

BurnDownChart

TrainingScrum values

Human Resource plan

Communication Management

plan

Skype Videos

Risk BreakDown

Structure

Risk mitigation Plan

Demand-supply equilibrium

AD-HOC Procure

management

ExpertBased

SoftwareTesting

waterfallscrum

One of the traditional project management methodologies in softwaredevelopment is waterfall. As the name suggests it flows downwardsthrough various phases in the software development cycle such asrequirements gathering, design, implementation, testing, integration andmaintenance. One of the significant feature of waterfall is that theinformation is gathered at the beginning and this will not changethroughout the entire development processes. This can create problemsespecially when stakeholders are not able to determine every requirementat the beginning and developers don’t have much understanding at thebeginning point about the system they are going to develop. Because ofthis, undefined problems, emerging and changing requirements posechallenges to waterfall methodology..

26

Page 32: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Assessing Perception of Students Towards E-Learning at EIT

Parth Pancholi:Contacts: Email: [email protected] | Phone: 020 4151 8588 | LinkedIn: https://www.linkedin.com/in/parth-pancholi-57620312a

Bio: I have finished my Bachelors in Computing in India. Since my arrival to New Zealand I have finished my Post Graduate Diploma, Level 8 from Eastern Institute of Technology at Auckland. I have 3 years work experience in Helpdesk and IT support environment. I am also an Oracle Certified Professional and currently studying for CCNA, MCSA and ITIL certifications. Have worked as IT Sales Representative (Tele-Calling) in one of the call centres at New Market, Auckland.

Abstract:This poster aims at assessing the perceptions of the students towards e-learning. The study is to be carried out because, with the increase in the use of technology, there are applications which enhance e-learning, therefore there is the necessity to ascertain the idea of the students towards e-learning. The study will be carried out at the Eastern Institute of Technology (EIT), New Zealand, using 15 Questions questionnaire with a target of 100 students across the three campuses. The proposed outcomes of the research indicate that majority of the students have a positive attitude towards e-learning and thus should be motivated. Likewise, there are challenges that impede the success of e-learning such as the attitude of the students.

27

Page 33: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

RESE

ARCH

PO

STER

PRE

SENT

ATIO

N DE

SIG

N ©

201

2

ww

w.P

oste

rPre

sent

atio

ns.c

om

This

prop

osal

aim

sat

asse

ssin

gth

epe

rcep

tions

ofth

est

uden

tsto

war

dse-

lear

ning

.The

stud

yis

tobe

carr

ied

outb

ecau

se,w

ithth

ein

crea

sein

the

use

ofte

chno

logy

,th

ere

are

appl

icat

ions

whi

chen

hanc

ee-

lear

ning

.Th

eref

ore

ther

eis

the

nece

ssity

toas

certa

inth

eid

eaof

the

stud

ents

tow

ards

e-le

arni

ng.T

hest

udy

will

beca

rrie

dou

tatt

heEa

ster

nIn

stitu

teof

Tech

nolo

gy(E

IT),

New

Zeal

and,

usin

g15

Que

stio

nsqu

estio

nnai

rew

itha

targ

etof

100

stud

ents

acro

ssth

eth

ree

cam

puse

s.Th

epr

opos

edou

tcom

esof

the

rese

arch

indi

cate

the

maj

ority

ofst

uden

tsha

vea

posi

tive

attit

ude

tow

ards

e-le

arni

ngan

dth

ussh

ould

bem

otiv

ated

.Li

kew

ise,

ther

ear

ech

alle

nges

that

impe

deth

esu

cces

sof

e-le

arni

ngsu

chas

the

attit

ude

ofth

est

uden

ts.

ABST

RACT

RESE

ARCH

QU

ESTI

ON

S

BACK

GRO

UN

D

This

stud

yw

illad

opt

aqu

antit

ativ

ere

sear

chm

etho

din

cond

uctin

gth

esu

rvey

.Thi

sap

proa

chis

pref

erre

dbe

caus

eit

ensu

res

the

rese

arch

ism

ore

com

preh

ensi

vedu

eto

stat

istic

alan

alys

isin

addi

tion

toth

eob

serv

atio

n,in

terp

reta

tion

and

inte

rvie

ws.

The

rese

arch

will

cons

ist

ofth

eEa

ster

nIn

stitu

teof

Tech

nolo

gy(E

IT)

stud

ents

acro

ssits

thre

eca

mpu

ses:Hawke’s

Bay

,Auc

klan

d,an

dG

isbo

rne,

New

Zeal

and.

The

targ

etpo

pula

tion

will

best

uden

tsat

Gra

duat

ean

dPo

stG

radu

ate

from

the

two

faci

litie

sna

mel

yth

eSc

hool

ofB

usin

ess

and

the

Scho

olof

Com

putin

g.

The

stud

yw

illsa

mpl

e10

0pa

rtici

pant

s.Th

isw

illre

pres

ent

the

entir

epo

pula

tion

ofEI

Tan

den

able

the

rese

arch

toac

hiev

eth

eob

ject

ive

ofex

amin

ing

som

eel

emen

tsof

the

popu

latio

nan

dex

trapo

late

onth

ew

hole

popu

latio

n.

Con

veni

ence

sam

plin

gm

etho

dw

illbe

used

toac

quire

asa

mpl

efr

omth

eta

rget

popu

latio

n(S

uri,

2011

).Th

iste

chni

que

will

beus

edto

choo

sepo

tent

ialp

artic

ipan

tsba

sed

onth

ein

clus

ion

crite

riaof

bein

gEI

Tst

uden

ts.

Con

veni

ence

sam

plin

gis

pref

erre

dbe

caus

eit

will

enab

leth

ere

sear

cher

toco

llect

data

that

wou

ldot

herw

ise

bedi

fficu

ltto

colle

ctus

ing

othe

rpr

obab

ility

sam

plin

gte

chni

ques

(Chr

iste

nsen

etal

.,20

11).

Stru

ctur

edqu

estio

nnai

res

will

beus

edto

gath

erpr

imar

yda

ta.

The

ques

tionn

aire

sw

illbe

self-

adm

inis

tere

dby

the

rese

arch

erw

how

illus

eth

eha

ndde

liver

ym

etho

dto

hand

out

the

ques

tionn

aire

san

dre

ques

tth

epa

rtici

pant

sto

indi

vidu

ally

fill

them

atva

rious

parts

ofth

eca

mpu

s.Th

equ

estio

nnai

res

will

have

clos

e-en

ded

ques

tions

and

the

resp

onse

sw

illbe

mea

sure

dus

ing

aLi

kert

scal

eto

ease

stat

istic

alan

alys

is(R

owle

y,20

14).

The

data

colle

cted

thro

ugh

the

ques

tionn

aire

sw

illbe

test

edfo

rco

mpl

eten

ess

and

cons

iste

ncy,

then

code

dto

allo

wcl

assi

ficat

ion

ofth

efe

edba

ck.T

heda

taw

illth

enbe

ente

red

into

SPSS

(Sta

tistic

alPa

ckag

efo

rSo

cial

Scie

nces

)an

dde

scrip

tive

stat

istic

sge

nera

ted,

and

perc

enta

ges

and

tabu

latio

nsca

lcul

ated

.Th

eou

tcom

esw

illbe

pres

ente

dus

ing

tabl

esan

dgr

aphs

fore

asy

unde

rsta

ndin

g.

MET

HODO

LOGY

CON

CLU

SIO

N

The

purp

ose

ofth

isre

sear

chw

illbe

toas

certa

inth

estudents’p

erce

ptio

nsof

e-le

arni

ngat

EIT.

Bas

edon

the

expe

cted

outc

omes

itca

nbe

pred

icte

dth

atm

ost

ofth

est

uden

tsw

illbe

cogn

izan

tof

e-le

arni

ngde

spite

ofth

eir

loca

tion.

Add

ition

ally

,thi

sres

earc

hw

illbe

tosh

owth

atth

ere

isno

defin

itede

finiti

onof

e-le

arni

ngbe

caus

eth

ede

finiti

onis

subj

ect

toth

ele

arni

ngen

viro

nmen

t.St

uden

tsm

ight

valu

ee-

lear

ning

beca

use

iten

able

sth

emto

easi

lyac

cess

and

retri

eve

info

rmat

ion.

The

stud

ents

perc

eptio

nsm

aybe

posi

tive

abou

te-le

arni

ng

REFE

REN

CES

Bat

alla

-Bus

quet

s,J.

M.,

&Pa

chec

o-B

erna

l,C

.(2

013)

.O

n-th

e-jo

bE-

lear

ning

:Wor

kers

'Atti

tude

san

dPe

rcep

tions

.TheInternationalReviewof

ResearchinOpenandDistributedLearning

,14(

1),4

0-64

.C

hris

tens

en,

L.B

.,Jo

hnso

n,B

.,Tu

rner

,L.

A.,

&C

hris

tens

en,

L.B

.(2

011)

.Res

earc

hm

etho

ds,d

esig

n,an

dan

alys

is.

Con

ole,

G.,

&A

levi

zou,

P.(2

010)

.Alit

erat

ure

revi

ewof

the

use

ofW

eb2.

0to

ols

inH

ighe

rEd

ucat

ion.AreportcommissionedbytheHigher

EducationAcademy.

Cre

swel

l,J.

W.,

&C

resw

ell,

J.D

.(20

17).Researchdesign:Qualitative,

quantitative,andmixedmethodsapproaches

.Sag

epu

blic

atio

ns.

EIT.

(201

8).H

isto

ry.R

etrie

ved

from

http

s ://w

ww.

eit.a

c.nz

/abo

ut/h

isto

ry/

Ghi

rard

ini,

B.

(201

1).E-learningmethodologies:aguidefordesigning

anddevelopinge-learningcourses.

Food

and

Agr

icul

ture

Org

aniz

atio

nof

the

Uni

ted

Nat

ions

.G

reen

how,

C.,

Rob

elia

,B.,

&H

ughe

s,J.

E.(2

009)

.Lea

rnin

g,te

achi

ng,

and

scho

lars

hip

ina

digi

tal

age:

Web

2.0

and

clas

sroo

mre

sear

ch:

Wha

tpa

thsh

ould

we

take

now

?.Educationalresearcher,38

(4),

246-

259.

Kuk

ulsk

a-H

ulm

e,A

.,Sh

arpl

es,M

.,M

ilrad

,M.,

Arn

edill

o-Sá

nche

z,I.,

&Va

voul

a,G

.(20

11).

The

gene

sis

and

deve

lopm

ent

ofm

obile

lear

ning

inEu

rope

.InCombininge-learningandm-learning:New

applicationsof

blendededucationalresources

(pp.

151-

177)

.IG

IGLO

BA

L.K

ulie

r,R

.,H

adle

y,J.,

Wei

nbre

nner

,S.,

Mey

erro

se,B

.,D

ecsi

,T.,

Hor

vath

,A

.R

.,&

Bur

ls,

A.

(200

8).

Har

mon

isin

gev

iden

ce-b

ased

med

icin

ete

achi

ng:

ast

udy

ofth

eou

tcom

esof

e-le

arni

ngin

five

Euro

pean

coun

tries

.BMCmedicaleducation,8(

1),2

7.N

cube

,S.,

Dub

e,L.

,&N

gulu

be,P

.(20

14).

E-Le

arni

ngR

eadi

ness

amon

gA

cade

mic

Staf

fin

the

Dep

artm

ento

fInf

orm

atio

n.Pa

rk,

S.Y.

(200

9).

An

anal

ysis

ofth

ete

chno

logy

acce

ptan

cem

odel

inun

ders

tand

ing

univ

ersi

tyst

uden

ts'

beha

vior

alin

tent

ion

tous

ee-

lear

ning

.Educationaltechnology&society,12

(3),

150-

162.

Puri,

G.

(201

2).

Crit

ical

succ

ess

Fact

ors

ine-

Lear

ning–A

nem

piric

alst

udy.InternationalJournalofMultidisciplinaryResearch

,2(1

),14

9-16

1.Ta

ha,

M.

(201

4).InvestigatingthesuccessofE-learninginsecondary

schools:ThecaseoftheKingdomofBahrain(

Doc

tora

ldis

serta

tion)

.Ya

ghou

bi,J

.,M

alek

Moh

amm

adi,

I.,Ir

avan

i,H

.,A

ttara

n,M

.,&

Ghe

idi,

A.

(200

8).

Virt

ual

Stud

ents

'Pe

rcep

tions

ofe-

Lear

ning

inIr

an.Online

Submission

,7(3

).Zh

eng,

Y.,&

Yano

,Y.(

2007

).A

fram

ewor

kof

cont

ext‐a

war

enes

ssu

ppor

tfo

rpe

erre

com

men

datio

nin

the

e‐lea

rnin

gco

ntex

t.BritishJournalof

EducationalTechnology,38

(2),

197-

210.

Dr.

Dob

rilla

Lope

z,Ea

ster

nIn

stitu

teof

Tech

nolo

gy,A

uckl

and

•W

HAT

AR

E TH

E PR

OFE

SSED

USE

FULN

ESS

OF

E-LE

AR

NIN

G T

O

THE

STU

DEN

TS S

UC

CES

S?

•W

HAT

IS T

HE

ATTI

TUD

E O

F ST

UD

ENTS

TO

WA

RD

S E-

LEA

RN

ING

?

•IS

THER

EA

NY

AWA

REN

ESS

OR

UN

DER

STA

ND

ING

AM

ON

GST

THE

STU

DEN

TSO

FE-

LEA

RN

ING

PLAT

FOR

M?

The

ques

tionn

aire

sw

ere

then

ente

red

into

stat

istic

also

ftwar

epa

ckag

ena

med

SPSS

17fo

rge

tting

the

Stat

istic

alre

sults

ofth

eda

tato

war

dsth

efin

ding

sof

the

rese

arch

stud

y.Th

eda

taw

asan

alys

edus

ing

the

freq

uenc

yan

dpe

rcen

tage

mea

sure

sfo

rth

enu

mer

ical

data

follo

wed

bym

ean

scor

esan

dst

anda

rdde

viat

ions

.The

Alp

haC

ronb

ach

Coe

ffici

enta

ndth

ePe

arso

nC

orre

latio

nC

oeffi

cien

twas

also

used

fora

naly

zing

the

data

.He

also

used

AN

OVA

(One

Way

Ana

lysi

sof

Varia

nce)

for

anal

yzin

gth

edi

ffere

nces

betw

een

mea

nsc

ores

ofth

ree

orm

ore

grou

ps.

The

leas

tsi

gnifi

cant

diffe

renc

ete

stw

asal

soca

rrie

dou

tto

iden

tify

the

dire

ctio

nof

diffe

renc

esbe

twee

nth

ree

orm

ore

grou

ps.Student’s

attit

ude

cam

ein

the

first

plac

eco

mpa

red

tostudent’s

mot

ivat

ion

andstudent’s

com

pute

rsk

ills

with

the

mea

nof

4.38

.Ita

llow

edth

atth

est

uden

tsag

reed

with

the

first

poin

toft

hequ

estio

nnai

re.T

hem

ean

scor

eof

4.19

fort

heco

ntro

loft

echn

olog

yfo

rthe

teac

hers

sign

ified

that

both

stud

ents

and

teac

hers

agre

edth

atus

eof

e-le

arni

ngw

asm

ore

enco

urag

ing

and

mot

ivat

ing

fort

hein

tera

ctio

nth

anth

etra

ditio

nall

earn

ing

met

hod.

Whi

lefo

rth

eth

irdse

ctio

n,w

ithth

em

ean

of3.

64,

stud

ents

and

teac

hers

felt

that

qual

ityof

tech

nolo

gyw

asal

soan

impo

rtant

aspe

ctof

e-le

arni

ng.

They

agre

edth

ate-

lear

ning

was

mor

edi

fficu

ltto

use

inth

ele

arni

ngan

dte

achi

ngpr

oces

san

dha

ving

e-le

arni

ngac

cess

toe-

lear

ning

mat

eria

lson

line

24/7

was

prac

tical

for

the

lear

ning

and

the

teac

hing

proc

ess.

Affil

iate

d to

EIT

Auc

klan

d Ca

mpu

sPa

rth

Panc

holi

–Po

st G

radu

ate

Dipl

oma

in A

pplie

d M

anag

emen

tAs

sess

ing

Perc

eptio

n of

Stu

dent

s Tow

ards

E-L

earn

ing

at E

IT

INTR

ODU

CTIO

N

The

perc

eptio

nof

stud

ents

tow

ards

e-le

arni

ngin

adva

nced

educ

atio

nca

nbe

dete

rmin

edby

seve

ral

fact

ors

such

asag

e,se

x,fo

rmer

prac

tise

inco

mpu

ters

,rec

eptio

nof

tech

nolo

gyan

dpe

rson

alst

yles

ofle

arni

ng(P

ark,

2009

;R

ossi

nget

al.,

2012

).Se

vera

lst

udie

sha

vebe

enca

rrie

dou

ton

e-le

arni

ng,b

utst

illno

tmuc

his

know

nw

ithre

gard

sto

the

perc

eptio

nof

the

students’o

nlin

ele

arni

ng(S

unet

al.,

2008

).A

sa

resu

lt,fu

rther

rese

arch

isre

quire

dso

asto

acqu

irem

ore

unde

rsta

ndin

gon

this

subj

ect.

Ncu

be,

Dub

e,&

Ngu

lube

(201

4)ar

gue

that

mod

ern

tech

nolo

gica

lde

velo

pmen

tsha

vefo

rcef

ully

influ

ence

din

stitu

tions

ofhi

gher

educ

atio

nto

adop

te-le

arni

ngw

orld

wid

e.K

ulie

ret

al.(

2008

)an

dK

ukul

ska-

Hul

me

etal

.(2

011)

obse

rved

lear

ning

inhi

gher

educ

atio

nha

sun

iver

sally

and

freq

uent

lyim

plem

ente

dth

eus

eof

e-le

arni

ngin

high

ered

ucat

ion.

Con

ole,

&A

levi

zou

(201

0),

Ghi

rard

in(2

011)

and

Park

(200

9)ar

gue

that

wor

ldw

ide

use

ofe-

lear

ning

has

been

fuel

led

byth

epr

ogre

ssin

gen

viro

nmen

tsfo

rlea

rnin

gan

dth

ein

crea

sein

the

educ

atio

nald

eman

dsth

atar

eno

toffe

red

onth

eun

iver

sity

phys

ical

ly.

E-le

arni

ngis

aty

peof

educ

atio

nalt

rain

ing

that

can

beco

nvey

edus

ing

avi

deo/

audi

oov

erth

epr

ivat

ene

twor

k,or

onth

eIn

trane

t,in

addi

tion

toEl

ectro

nic

Perf

orm

ance

Supp

ort

Syst

ems

(EPS

S)an

ddi

stan

cele

arni

ng.

The

bene

fits

ofe-

lear

ning

cann

otbe

unde

rest

imat

ed.

Iten

able

sth

est

uden

tsto

stud

yat

thei

row

nsp

eed,

mak

esit

poss

ible

tocu

stom

ize

lear

ning

tom

eett

heva

ryin

gne

eds

ofea

chst

uden

t,an

dfo

ster

sim

prov

edco

mm

unic

atio

nbe

twee

nth

est

uden

tsan

dst

aff

amon

got

hers

(Gre

enho

w,R

obel

ia,&

Hug

hes,

2009

).

On

the

cont

rary

,th

ere

sear

chby

Bat

alla

-Bus

quet

san

dPa

chec

o-B

erna

l(2

013)

show

edth

aton

e-on

-one

train

ing

isst

illre

gard

edas

am

ore

insp

iratio

nali

nstru

ctio

nalm

etho

din

com

paris

onto

virtu

altra

inin

g.

East

ern

Inst

itute

ofTe

chno

logy

(EIT

)is

ago

vern

men

tow

ned

terti

ary

educ

atio

nin

stitu

tion

aim

edat

linki

ngth

etim

e,to

pogr

aphi

cal,

finan

cial

,so

cial

,le

arni

ngan

dco

mm

unic

atio

nex

pans

ebe

twee

nle

arne

rsan

dth

ein

stitu

tion,

lear

ners

and

educ

atio

n,st

uden

tsan

dpe

ers

(EIT

,20

18).

The

mis

sion

ofEI

Tis

toel

imin

ate

obst

acle

sto

acce

ssed

ucat

ion,

mai

ntai

npl

astic

ityof

prov

idin

gle

arni

ng,

focu

son

each

indi

vidu

alst

uden

t,as

sist

lear

ners

and

deve

lope

train

ing

prog

ram

sth

atar

esu

itabl

efo

rst

uden

tsle

arni

ng(E

ITPo

licy,

2008

).EI

Tis

ther

efor

ean

Ope

nD

ista

nce

Lear

ning

Inst

itutio

n(O

DL)

with

stud

ents

com

ing

from

over

forty

coun

tries

acro

ssth

ew

orld

mak

ing

itne

cess

ary

for

itto

have

the

setu

pan

dre

sour

ces

that

enab

leit

toof

fer

prom

pt,

effe

ctiv

ean

dre

gula

rtra

inin

g.EI

Tha

spr

ogre

ssiv

ely

been

impl

emen

ting

the

e-le

arni

ngin

itiat

ive

inov

er50

%of

itsun

derg

radu

ate

and

dipl

oma

cour

ses.

The

inst

itutio

nha

sov

er10

,00

0st

uden

tsfr

omdi

ffere

ntpa

rtsof

the

coun

try.E

ITha

stw

om

ajor

facu

lties

,na

mel

yth

eFa

culty

ofEd

ucat

ion

and

the

Facu

ltyof

Com

mer

cean

dte

chno

logy

stud

ies.

The

inst

itutio

nha

sth

ree

mai

nca

mpu

ses

inN

ewZe

alan

d:Hawke’s

Bay

,A

uckl

and,

and

Gis

born

e.EI

Tof

fers

over

130

prog

ram

mes

rang

ing

from

mas

ters

,po

stgr

adua

te,

degr

ee,

dipl

oma

and

prof

essi

onal

certi

ficat

e(E

IT,2

018)

.With

the

incr

easi

ngde

man

dfo

rfur

ther

educ

atio

nin

the

empl

oym

ents

ecto

rand

the

unav

aila

bilit

yof

time

toen

rol

asfu

ll-tim

est

uden

ts,t

hepr

ogra

ms

ofEI

Tar

eco

ntin

uous

lybe

ing

pref

erre

dby

lear

ners

from

diffe

rent

cate

gorie

sbe

item

ploy

ees

orju

stne

wst

uden

tsfr

omhi

ghsc

hool

.Thu

s,it

iscr

itica

lfor

EIT

toas

certa

inth

eef

fect

iven

ess

ofe-

lear

ning

and

thestudents’p

erce

ptio

nsas

wel

l.

LITE

RATU

RE R

EVIE

W

Yagh

oubi

,M

alek

moh

amm

adi,

Irav

ani,

Atta

ran

and

Ghe

idi

(200

8)co

nduc

ted

ast

udy

rega

rdin

gth

epe

rcep

tion

ofth

est

uden

tsab

oute

-lear

ning

inIr

an.T

hesa

mpl

ew

asco

mpr

ised

of11

8vi

rtual

grad

uate

stud

ents

outo

fw

hich

110

stud

ents

resp

onde

d.Th

equ

estio

nnai

rew

asde

sign

edta

rget

ing

four

diffe

rent

area

slik

ede

mog

raph

ysu

chas

age,

sex,

univ

ersi

ty,f

ield

ofst

udy,

exte

ntof

com

pute

rand

inte

rnet

use,

adva

ntag

esof

e-le

arni

ngsy

stem

and

disa

dvan

tage

sof

e-le

arni

ngsy

stem

.All

ofth

ese

wer

em

easu

red

ofa

5-po

intL

iker

tsca

le1

(ver

ylit

tle/s

trong

lydi

sagr

ee)t

o5

(ver

ym

uch/

stro

ngly

agre

e).

The

data

whi

chw

asco

llect

edw

asan

alys

edus

ing

the

Stat

istic

alPa

ckag

efo

rthe

Soci

alSc

ienc

es(S

PSS1

3)w

hich

had

stat

istic

alpr

oced

ures

for

desc

riptio

nlik

efr

eque

ncie

s,pe

rcen

tage

,m

eans

,st

anda

rdde

viat

ions

and

infe

renc

e.Th

ere

sults

show

edth

atar

ound

84.9

%st

uden

tspa

rtici

patin

gin

the

stud

yw

ere

betw

een

24to

29ye

ars

whi

le15

.1%

stud

ents

wer

eab

ove

30w

hich

mad

eth

em

ean

aver

age

age

of26

.3ye

ars.

81.2

perc

ent

ofth

est

uden

tsw

ere

empl

oyed

whi

leab

out

18.8

perc

ent

ofst

uden

tsw

ere

unem

ploy

ed.A

dece

ntnu

mbe

rof

stud

ents

adm

itted

they

used

com

pute

rsm

ainl

yfo

rInt

erne

tsur

fing,

follo

wed

bye-

mai

luse

.The

mai

nad

vant

age

ofe-

lear

ning

acco

rdin

gto

the

stud

ents

was

flexi

bilit

yin

time

and

plac

efo

llow

edby

easy

and

quic

ksh

arin

gof

educ

atio

nal

mat

eria

l.Te

chno

logy

issu

esw

ere

the

mai

ndi

sadv

anta

geof

e-le

arni

ngac

cord

ing

toth

est

uden

tsfo

llow

edby

redu

ced

soci

alan

dcu

ltura

lint

erac

tion.

Inth

est

udy

byTa

ha(2

014)

,he

inve

stig

ated

the

succ

esso

fe-le

arni

ngin

the

seco

ndar

ysc

hool

sin

the

Kin

gdom

ofB

ahra

in.H

ead

opte

da

quan

titat

ive

appr

oach

toun

ders

tand

the

perc

eptio

nof

the

stud

ents

and

teac

hers

tow

ards

the

criti

calf

acto

rsof

e-le

arni

ngin

the

seco

ndar

ysc

hool

sin

the

king

dom

ofB

ahra

in.T

hesu

rvey

-bas

edqu

estio

nnai

rew

asde

sign

edw

hich

cont

aine

d27

ques

tions

base

don

diffe

rent

poin

tssu

chasstudent’s

char

acte

ristic

s,teacher’s

char

acte

ristic

s,te

chno

logy

and

desi

gnan

dco

nten

t.Th

ere

spon

dent

sw

ere

aske

dto

answ

eron

a5-

poin

tLik

erts

cale

rang

ing

from

1=

stro

ngly

disa

gree

to5

=st

rong

lyag

ree.

The

ques

tionn

aire

was

desi

gned

inEn

glis

han

dw

asal

sotra

nsla

ted

into

Ara

bic

lang

uage

.The

ques

tionn

aire

was

dist

ribut

edto

600

rand

omly

sele

cted

parti

cipa

nts

outw

hich

200

wer

ete

ache

rsan

d40

0w

ere

stud

ents

from

six

scho

ols

inth

eki

ngdo

mof

Bah

rain

.The

num

bero

fval

idqu

estio

nnai

resc

ame

dow

nto

540

com

pris

ing

of18

0te

ache

rsan

d36

0st

uden

ts.T

heot

her

ques

tionn

aire

sw

ere

reje

cted

due

toin

com

plet

enes

sby

the

resp

onde

nts.

ACKN

OW

LEGM

ENTS

28

Page 34: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Evaluating the Perception of Online Shopping Customers regarding Data Security in

New Zealand

Gustavo Valverde: Email: [email protected] | Phone: 027 142 2051 | Linkedin: https://www.linkedin.com/in/gustavo-valverde/

Bio:Gustavo Valverde is a software engineer with project management skills (PMP certified) who worked over 10 years developing loan and credit card systems.

Gustavo has worked with reputable banks, including the Itau bank where he worked for 7 years, and won awards such as top developers award and project of the year award. Itau bank is the biggest Brazilian bank, also present in U.S. and U.K. In addition, Gustavo worked as a project analyst and IT consultant.

Recently, Gustavo completed his postgraduate diploma in Information technology at EIT.

When not travelling, Gustavo enjoys going on hikes and working on some personal projects involving coding and electronics.

Abstract:This poster aims to describe and analyse the Eurofins case study, and also presents the project management methodologies Prince2 and Scrum. The case study comprises an IT project that was implemented by Eurofins in 2015. The project was managed using Prince2 project management methodology. Even though the project succeeds, this paper points out positive and negatives aspects of the project, and compares both methods, Prince2 and Scrum. Moreover, this study shows a comparison between documents utilised by the project management methods described here. In the documents comparison table, the difference between a traditional method and an Agile method is clear. Traditional methods have much more documentation than Agile methods. However, the number of documents can show 2 different aspects. The first point of view is that Scrum has a lack of documentation, which can cause issues regarding planning. On the other hand, Prince2 has a comprehensive documentation, which can cause a waste of time. As a recommendation, this paper points to a hybrid method as a solution for this case. A hybrid method can explore the best of both methodologies. However, to decide which method should be used, the type of project and team knowledge has to be considered. In conclusion, there is no best project management methodology in general, but there is the best project management methodology for each case.

29

Page 35: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Instructor: Dr. Dobrila | Student: Gustavo Valverde | Course: MAPM8.900-ITPG8.300 Combined Research Methods (Part B)

Evaluating the Perception of Online Shopping Customers regarding Data Security in New Zealand

Why is it relevant?

• E-Commerce is constantly growing

• High-risk business

• Understand e-commerce customers’ perception

• Relevant for online business

What is the customer’s perception of security during an online purchase?1

Is there any difference in customer perception between using a public internet connection and a private internet connection to make an online purchase?

2

What is the customer’s perception about online stores keep the credit card number for future transactions?3

Quantitative Method• Collect numerical data•Associations between variables• Combined with snowball method can

reach a large number of people

Statistical Data Analysis•Descriptive Method• Summarize data• Identify trends• Explore the relation of the data

Snowball Method• Through Social Media•Reach people from different regions•Reach a large number o people

Survey Instrument•Online survey questionnaire• Likert-scale

Research Method

PlanningExecuted during Postgraduate

course

Survey Application Design- 2 weeks- Load the questionnaire in the

survey system

Report Formatting- 4 weeks- Write the research report

Data Analysis- 2 weeks- Analyze the survey

data

Proposed Timeline

PlanningSurvey

Application Design

Research Execution

Data Collection

Data AnalysisReport

Formatting

Research Execution- 4 weeks- Send the invitations through social media- Participants respond the survey

Data Collection- 2 weeks- Extract data from survey

system

Research Questions

30

Page 36: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Auckland’s Android Smartphone Users’ Perception Regarding Security in Installation

of Third-party Entertainment Applications

Dave Jigar Balkrishna: Email: [email protected] | Phone: 022 382 4225 | LinkedIn: linkedin.com/in/jigar-dave-48450738 | Website: newsdaily.co.in ; github.com/jigardave8

Bio:Currently, I am finishing a Postgraduate Diploma in Information Technology from EIT at the Auckland campus. I am an experienced Apple certified developer. I specialize in developing iOS applications and I have worked on applications for news, music, games, and the workplace. My experience also includes working on freelance projects for blockchain, BI and iOS. In addition, I have developed, maintained and marketed a dynamic news website. I have an intermediate level in Swift, Objective-c, Power BI, SOAP, PHP, C++, WordPress, and jQuery

Abstract:This research is designed to explore the perceptions of Android smartphone users regarding the security issues that exist when installing third-party applications from google play store and other sources. The findings from this study will help developers to design new applications or improve existing applications.

31

Page 37: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Auckland’s Android smartphone users’ perception regarding security in installation of third-party

Entertainment applications

Research Aim:

Significance

Conclusion

References

Expected outcomes

Research Question:

Methodology

What is the perception of Auckland’s Android smartphone users regarding the security in installing third party Entertainment applications

on smartphone device?

TO KNOW:

Perception of users regarding security in third party android applications

Preferences that user have regarding installation of applications

Security risks that users believe are associated with installing third party

Entertainment applications

Experience that users claim to install third party applications from google play store

and other sources

Suggestion for application developers to help improve smartphone applications.

To Understand Android

smartphone users better

To Help Application

developers to build better

security in applications

To Help Application

developers with development

guideline to review along

with literature findings

To Help Future researchers

know about Smartphone

users’ perception about third party applications

Grounded theory from user's

view will be built

New information will emerge

about perception of third-

party application security

Regulations in literature will

help application developers to

use content of Google

platform effectively

New Suggestions from

Participants for application

developers

Qualitative Research through Interview to

know perception (Creswell, 2012)

Convenience sampling , Recruitment of 12-

15 Participants as Android smartphone

users after Inclusion and Exclusion criteria

40-60 minutes Interview, Open ended 6-7

questions to get users’ view for grounded theory (Creswell, 2012)

Audio Tapping the Interview and

converting to password protected

computer, Note taking during Interview

Text analysis and Thematic Analysis to

Analyze the ideas and Map with Questions

through help of Nvivo 10 (Waller, 2015)

.

Addressed the Necessity to carryout the research.

Main research question that was focused for this research was to know the

perception of Android smartphone users’ perception regarding security in installation of third party entertainment applications. The research question

was broken down to the aim and objective to explore areas for interview.

Future recommendations include future researcher to take note of central

idea of this research and findings to carry out new research in terms of other

operating system applications example for future focus can be similar

research but for iOS or Windows.

Author: Jigar

Dave

Guided By:

Dr. Dobrilla

Lopez

Creswell, J. W. (2012). Educational research: Planning, conducting, and evaluating quantitative and

qualitative research (4th ed.). Boston, MA: Pearson.

Waller, T. (2015). Marketing strategies of mobile game application entrepreneurs.

32

Page 38: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

Geo Augustine:Email: [email protected] | Phone: 022 104 7034 | LinkedIn: https://www.linkedin.com/in/geo-augustine-5789b6156/

Bio:I have finished my Bachelor of Computer Applications and Master of Computer Applications. I am now finishing the Post Graduate Diploma in Information Technology at Eastern Institute of Technology, Auckland International Campus. I have one and a half year programming experience in Java and PHP at Entrepreneur Unified Ltd. I have also worked for seven months as Software Application Support at SISL Infotech India(P) Ltd - (National Informatics Centre (India). During this period I had the opportunity to provide training to central government employees and to give a technical support to contractors.

Abstract:

The capability of data management software to manage different types of queries is important to its role in providing the integrated data when it is required. Research proposal poster has discussed about the inventory management softwares, and key features to be considered on inventory management softwares. Discussed on processes to be followed inside a research method such as sampling, data collection, data analysis, and possible outcomes of this research. Expect, this research will help the small and medium businesses in New Zealand to identify what are the main factors to be considered while choosing an inventory management system for their business.

In Absentia:

Yan ChenEmail: [email protected] | Phone: 2108242932 |

32

Page 39: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

www.eit.ac.nz/campus/auckland

Page 40: EASTERN INSTITUTE OF TECHNOLOGY Celebrating Student Success · The Eastern Institute of Technology (EIT) and the Auckland International Campus staff and students are pleased to welcome

0800 22 55 348 | eit.ac.nz