Implications of Robotic Technology

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

1

Information System

By (Student’s Name)

Professor’s Name

Department

Course

Date
2

Implications of robotic technology


Many businesses are embracing a slew of modern technologies to increase productivity,
efficiency in their supply chain operations and in order to stay competitive. The robotic order
fulfillment has therefore become extremely valuable due to their ability to automate tasks
requiring minimal or even no cognition.

One of the major implications of robotic technology in warehousing is in its capabilities


in reducing the travel time through the facility. By reducing the time taken by human operators
in moving from one end of the warehouse floor to the other, the human operators are able to
allocate more time in dedicating the productive activities which impacts on the customer
satisfaction. Therefore, in automating the travel amid picking, the robots’ aids in reducing the
length of the trips that the warehouse employees must make in fulfilling orders ( Gibelli et al.,
2021).

This therefore results to less congestion in aisles as there are just few workers who are
moving up and down through the facility. Some of the collaborative mobile robots leverage AI as
well as machine learning with an aim of optimizing pick routes in real-time, this therefore
reduces the overall time spent in fulfilling orders (Fiske, Henningsen & Buyx, 2019).

The robotic order fulfillment also reduces strain on warehouse associates. Through
robotic order fulfillment the warehouse is offered with an effective and efficient way of handling
repetitive manual tasks, and also those which are risky as well as those who have physical
demand for human workers. In such activities such as the transportation of heavier loads across
the warehouse, the retrieval of SKUs from high shelves as well as any other potentially
dangerous activities that requires physical human intervention, robotics are used in reducing
human physical strain. As well, this does not only reduce the physical strain on the human
operators, it also creates a safer working environment for human operators. As well, this ensures
that there is less mental stress as human operators within the warehouse are not required to
remember the location of each and every item throughout the warehouse and do not have to
struggle to maintain their own work pace.

The collaborative robots are known for their role in improving scalability and flexibility.
They are also relatively easy to implement and do not require any infrastructural changes to the
3

warehouse, therefore the initial setup costs are considerably lower as compared to the costs of
implementing the traditional automation solutions such as the conveyor systems (Fiske,
Henningsen & Buyx, 2019). Since the collaborative robots work with the already existing
infrastructure, they provide business with easy and cheaper automation process as well as
making it possible to transfer robots between facilities as their demand fluctuates from one part.

such warehouses have an option to implement a modular deployment system, which will
facilitate in bringing the additional units onboard as the business grows as well as allowing order
fulfillment to evolve. During periods with high demand, the warehouse operators can be able to
hire additional units to aid in handling the increased workloads and then return them back when
demand decrease. As such, the collaborative robots are superlative in most business scenarios,
which include the short-term operations as well as in the businesses plan while moving to a new
facility (Fiske, Henningsen & Buyx, 2019).

More than that, the human operators are prone to fatigue, stress, distraction, among other
effects which are attributed to the physically demanding or the repetitive manual tasks. These
effects can end up predisposing human operators to making errors which could result in damaged
inventory, wrong shipping, accidents, or even incomplete SKUs to the customers. Since
computer-controlled systems and robots are not vulnerable to these factors, therefore, leveraging
on the robotics or computer-controlled systems can aid in increasing the accuracy of the order
fulfillment activities as they are not subject to these human factors (Fiske, Henningsen & Buyx,
2019).

As a result of the consumerization and also the Amazon effect, many customers are now aware
of technological advancements and have now come to expect accurate and fast deliveries which
may prevent them from making repeat purchases from a business that fail to meet the customer
expectations. As a result, the order fulfillment is an important aspect in boosting customer
satisfaction through the enabling of an accurate and fast order fulfillment as well as ensuring
timely deliveries.
4

1b

ERD diagram for IMDB


5

Question two

Smartphones security problem

Newly purchased smartphones can be configured insecurely. If such a smartphone


contains the original vulnerable operating system (OS) or one that is not fully updated to
eliminate the known vulnerabilities, they can pose a security issue to the user. If a device does
not have access control such as fingerprint or personal identification number, such a device can
be accessed by anyone posing a threat to data access by anyone accessing the device (Lee, Yang &
Kwon, 2018).

Financial problems through Skimming

If a smartphone has been attached to read credit cards, it can be compromised through a
technique which is commonly known as skimming. Through the specific features incorporated
into the smartphone such as camera, audio, as well as Global Positioning System (GPS)
capabilities, recording call logs, Short Message Service and contact information, a smartphone
can be used to perform surveillance (Lee, Yang & Kwon, 2018). This can result to financial
problems as if compromised, they can be used to send premium SMS messages, allow extortion
via ransomware, to steal transaction authentication numbers, and in making expensive calls
without the consent of the owner.

App based threats

The app-based threats of smartphones are such as malware attack, vulnerable apps,
spyware, compromised apps as well as data or information leakage resulting from poor
programming practices. Some of the threats that the smartphones pose as a result of app attack
include the disabling of security settings, unlocking device features, listening to phone calls.
Locating someone through GRS location and forwarding of emails to another inbox (Talal et al.,
2019).

B
6

There are several steps that individuals and organizations needs to follow to ensure that
their mobile devices are secure and minimize the risks posed by the mobile devices. These steps
are such as;

Establishing a mobile device security policy

Before issuing a mobile device by businesses to their employees, the businesses should
ensure to establish a device usage policy. This include the provision of clear rules about what
constitutes acceptable mobile device use. Ensuring that the employees understand the risks
involved in the use of mobile devices and the security measures that are applicable in mitigating
those risks creates well responsible and informed users which is the first line of defense against
cyber-attacks (Palanisamy et al., 2022).

Bring your own device policy

For businesses, allowing their employees to used their own devices for the business
activities should be followed by a formal Bring Your Own Device policy (BYOD). The BYOD
policy therefore should incorporate requirements for installing a remote wiping software on all
personal devices accessing the business data, training and education on responsible mobile
device use, data protection practices such as automatic locking after periods of inactivity and
strong passwords, lost device reporting protocols, use of protective security software and
antivirus to be applied, requirement for regular backups and an approval list for downloading
apps (Sahu et al., 2022).

Keeping devices updated

Software updates on mobile devices is necessary as it often include new patches for the various
identified security holes which can be an open door for mobile malware as well as other security
threats. Therefore, installing software updates as soon as they are available is a security best
practice to mobile devices. As such, individuals and businesses should ensure that they always
update their devices for maximum protection against those risks (Sahu et al., 2022).

Backing up content on regular basis


7

Data in mobile devices is prone to being lost. Backing up data is therefore necessary to ensure
that businesses and individuals do not lose data which may occur as a result of a lost device.

Choose passwords carefully

The last step involves ensuring that the passwords used in personal devices are strong enough to
limit device assess by unauthorized individuals.

For businesses, the password policy should ensure that the employees are required to change
their login passwords after every 90 days, the implementation of two factor verification,
passwords to include special characters and be 8 characters long and ensure that the passwords
don’t include simple sequence.

The apple platform is more secure by default as disk encryption is enabled by default, the apps
from app stove undergo a stricter vetting process, and apple does not gather any personal data
from its users for any purposes. This makes the platform more secure than Google.

Question 3a

The integration of enterprise system in Merry Pte. Ltd supply chain processes will make it easier
for the management and the employees to do their work and get access to all the key data needed
for the business. The integration will therefore be useful for the business as it will automate the
repetitive business processes to ensure that the staff are more productive. For example, these
systems will enhance the sending of sales emails, process the company’s employee pay and
even place automated inventory orders ( Uysal & Mergen, 2021). At the same time, these systems
will enable the business to organize key information in a manner that is easily accessible at any
point at any time. This therefore ensures that the employees have all the necessary data to do
their jobs.
8

The systems will also be advantegious to the company as they will facilitate in making business
plans and tracking how the company reach its goals. As the systems have alert capabilities, they
will inform the management of any potential problems within operations before they occur
limiting operation issues (Uysal & Mergen, 2021)..

Computer simulation technology has found its way in many industries where by it is used in
enhancing processes and attaining better results. It has therefore found its way into natural
sciences, space sciences, medical sciences, engineering technologies and even in education
sector. The application of the computer simulation technology is widely applied in classrooms to
enhance the ability of students to learn (Hockney & Eastwood, 2021). The technology is therefore
applied in testing theparticipants knowledge and skill levels through an approach known as
computer aided teaching. To date, numerous types of computer simulations such as System
Dynamics simulation, Monte Carlo (MC) simulation, and Fluid dynamics simulations are being
widely applied in finding the solution of complex problems, for developing different industrial
technologies applications as well as for educational purposes (Huang et al., 2021).

A MIS is used in providing background, current information as well as trend analysis to enable
prospect businesses have adequate information in all areas of the business. They are therefore
used in collecting and in keeping the business data and analyzing the market to provide
information to business owners necessary for analyzing, controlling and making decisions tat
relate to the business.

Question 4

Both business process engineering as well as the continuous improvement focus on the reshaping
of the already existing processes. However, a BPR aims ad shaking things up fundamentally. A
BPR therefore focuses on the outcomes of the processes other than the individual tasks. On the
9

other hand, the continuous improvement processes focus on individual tasks such as the
rearrangement of the order of tasks and elimination of tasks. For example, if the business only
retained its employees which is a focus on the parts, it is most likely not to be called a business
process reengineering. Alternatively, is the business realigned the processes so that the activities
starts to occur differently and ended up eliminating 50% of its total labor which is a focus on
relations, the process can be termed as a continuous process improvement (Gopal & Pilkauskaite,
2020).

Therefore, in business process reengineering, the business is more likely to involve a radical
redesigning of the core business processes with an aim of achieving a dramatic improvement in
productivity, quality and cycle times. Therefore, the BPR aims at a large-scale change other than
tweaking things step by step therefore can be termed as demolishing a staircase and building an
elevator. In BPR therefore, each and every activity that is carried out revolves around delivering
customer value (Pereira et al., 2020). The activity should therefore improve turnaround time,
reduce costs, boost quality, and be able to make explosively happy customers or otherwise it’s
fat or fluff to be cut or reshaped. In business reengineering therefore you aim at reorganizing
teams, eliminating the unproductive, ineffective and redundant activities and reducing
fragmentation of work. On the other hand, a continuous business process improvement involves
creating an incremental change. However even if a business adopts a BPR, the business should
also adopt continuous business process improvement to ensure its success. This will ensure that
the business is able to measure effectively the transformation against the KPI’s and make further
tweaks as well as changes when necessary.
10

Reference
Fiske, A., Henningsen, P., & Buyx, A. (2019). Your robot therapist will see you now: ethical
implications of embodied artificial intelligence in psychiatry, psychology, and
psychotherapy. Journal of medical Internet research, 21(5), e13216.

Gibelli, F., Ricci, G., Sirignano, A., Turrina, S., & De Leo, D. (2021). The Increasing Centrality
of Robotic Technology in the Context of Nursing Care: Bioethical Implications Analyzed
through a Scoping Review Approach. Journal of Healthcare Engineering, 2021.nce

Gopal, G., & Pilkauskaite, E. (2020). Implementing process innovation by integrating continuous
improvement and business process re-engineering. In Innovation Management. Edward
Elgar Publishing.

Hockney, R. W., & Eastwood, J. W. (2021). Computer simulation using particles. crc Press.

Huang, X., Zhang, Y., Moradi, Z., & Shafiei, N. (2021). Computer simulation via a couple of
homotopy perturbation methods and the generalized differential quadrature method for
nonlinear vibration of functionally graded non-uniform micro-tube. Engineering with
Computers, 1-18.

Lee, Y., Yang, W., & Kwon, T. (2018). Data transfusion: Pairing wearable devices and its
implication on security for Internet of Things. IEEE Access, 6, 48994-49006.

Palanisamy, R., Norman, A. A., & Mat Kiah, M. L. (2022). BYOD policy compliance: Risks and
strategies in organizations. Journal of Computer Information Systems, 62(1), 61-72.

Pereira, R., Lapão, L. V., Bianchi, I. S., & Amaral, D. (2020). Improving emergency department
through business process redesign. Australasian Journal of Information Systems, 24.

Sahu, D., Sharma, S., Dubey, V., & Tripathi, A. (2022). Cloud computing in mobile
applications. International Journal of Scientific and Research Publications, 2(8), 1-9.

Talal, M., Zaidan, A. A., Zaidan, B. B., Albahri, O. S., Alsalem, M. A., Albahri, A. S., ... &
Alaa, M. (2019). Comprehensive review and analysis of anti-malware apps for
smartphones. Telecommunication Systems, 72(2), 285-337.
11

Uysal, M. P., & Mergen, A. E. (2021). Smart manufacturing in intelligent digital mesh:
Integration of enterprise architecture and software product line engineering. Journal of
Industrial Information Integration, 22, 100202.

You might also like