Business Administration Project Topics

Seminar Paper on Information Technology and Business Security in Automobile Companies in Nigeria

Seminar Paper on Information Technology and Business Security in Automobile Companies in Nigeria

Seminar Paper on Information Technology and Business Security in Automobile Companies in Nigeria

Chapter One

Objective of the study

The objectives of the study are;

  1. To ascertain the relationship between IT and business security in automobile companies in Nigeria
  2. To ascertain the roles IT play in business security in automobile companies in Nigeria

CHAPTER TWO  

REVIEW OF RELATED LITERATURE

Introduction

The automobile industry is a corporation that involves in the manufacture and overhaul of motorized vehicles together with nearly all components in the motor vehicle, such as the engines and bodies but debar of among others, batteries and fuel. The industry’s prime wares are lightweight trucks, pickups, traveller vehicles, vans as well as Sports Utility Vehicles (SUV). Since the days of cart and horse, people have happily possessed and passionately cared for their automobiles. Despite that, technologies such as smartphone, Internet, wireless and cellular communication is softening the impact of the bonds as it widens the frontiers of chances to an unending supply of conveniences and services. Individuals and enterprises alike are adopting the digital innovation, deploying mobile interactive devices to liaise, make choices and smooth the way for purchases. The automotive industry has been around for quite some time and it has developed ever since, but the major shift that is on nowadays from vehicles driven by humans (dependent) to autonomous vehicles (driven by themselves) will keep on taking part in a significant function as transportation changes on a global scale. Today’s automobiles have exploded thanks to IoT in two ways, these include, embedded and tethered. The former utilizes a built-in antenna and chipset while the latter use hardware to enable drivers to interface with their automobiles u s i n g smart/ cell phones . Moreover, application integration is becoming commonplace in today’s automobiles, Google Maps and other route devices have started to supplement works in the Global Position System (GPS) frameworks. For example, GasBuddy demonstrates where the driver can locate fuel in their local area. The industry is on the threshold of change to change to the self-driving automobile industry and the impulsive force behind this is the Internet of Things (IoT). As technology is becoming apparent as a result of swift development in the contemporary wireless telecommunication, IoT has been given a lot of attention and is presumed to promote good to the automobile industry. Though the prevalent use of IoT in the automobile industry is so far in its early stage with the origination of 4G and 5G networks, the demographic, market and digital trends are coming together to transform the automotive industry to expedite swift transmission and processing of assorted data. IoT is one of the leading trends that influence the evolution of Information and Communication Technologies (ICT) by connecting “everything” such as data, people, things and process to the Internet stated IoT is a turbulent technology where the cyber world run into the physical world. Therefore, IoT is an independent communication between non-living objects to profit human beings. As an emerging paradigm, IoT comes together with three principal innovations namely, things (the objects to trace, things-oriented vision), networking (the linking of the objects to the Internet and connection between the objects, Internet-oriented vision) and representation (the portrayal of the objects on the Internet, semantic-oriented vision). IoT also links automobile parts and services, machines, people and vehicles to smooth-running the flow of data, permit real-time judgment and ameliorate automotive experiences. In the automobile industry, the “things” in IoT may well be any objects that require to be tracked in practice, for example, products in inventory and cars on road. The “things” also focus on the three basic attributes to be recognizable, able to interact and smart. To encapsulate these attributes, several technologies such as Radio Frequency Identification (RFID) tags and two-dimensional (2D) bar code has been put to use to distinctively identify the statuses such as movement, temperature and location of an object. Sensors fused with communication technologies such as Wireless Sensor Networks (WSN) and RFID Sensor Networks (RSN) can also be employed to trace the state of an object and transfer the data to the Internet. Manufacturers in the automobile industry such as Honda pioneer the RFID to control the demand chain.

 

Chapter Three

  Research methodology

 Research Design

The research design adopted in this research work is the survey research design which involves the usage of self-designed questionnaire in the collection of data. Under the survey research design, primary data of this study will be collected from Femich Automobile Engineer Company and Tallest Automobile Company in Lagos state in order to determine the information technology and business security in automobile companies in Nigeria. The design was chosen because it enables the researcher to collect data without manipulation of any variables of interest in the study. The design also provides opportunity for equal chance of participation in the study for respondents.

Population of Study

The population of study is the census of all items or a subject that possess the characteristics or that have the knowledge of the phenomenon that is being studied (Asiaka, 1991). It also means the aggregate people from which the sample is to be drawn.

Population is sometimes referred to as the universe. The population of this research study will be Seventy-five (75) of Femich Automobile Engineer Company and Tallest Automobile Company in Lagos state

CHAPTER FOUR

DATA PRESENTATION, ANALYSIS AND DISCUSSION

This chapter is about the analysis and presentation of data collected from the field through questionnaire. The analysis of the data with particular question immediately followed by the presentation of findings.

As mentioned in chapter three, 50 questionnaires were administered and 50 were retrieved and necessary analysis was carried out on them and presented as follows:

 CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

 Introduction

It is important to ascertain that the objective of this study was to ascertain information technology and business security in automobile companies in Nigeria. In the preceding chapter, the relevant data collected for this study were presented, critically analyzed and appropriate interpretation given. In this chapter, certain recommendations made which in the opinion of the researcher will be of benefits in addressing the challenges of information technology and business security in automobile companies in Nigeria 

Summary

This study was on information technology and business security in automobile companies in Nigeria. Two objectives were raised which included: To ascertain the relationship between IT and business security in automobile companies in Nigeria and to ascertain the roles IT play in business security in automobile companies in Nigeria. The total population for the study is 75 Femich Automobile Engineer Company and Tallest Automobile Company in Lagos state. The researcher used questionnaires as the instrument for the data collection. Descriptive Survey research design was adopted for this study. The data collected were presented in tables and analyzed using simple percentages and frequencies

Conclusion

Inclusion, we see that information technology have a create relationship with business security in automobile company and also have a role to play by monitoring the vehicle and tracking where it is

Recommendation

The study recommend that all the automobile companies should in should install a software that will help in securing the safety of the vehicles. Consultation should be encouraged between the automotive industry bodies for which automotive cyber security is, or should be, an agenda issue, and

those professional bodies and associations in non-automotive sectors that are already engaged in cyber security awareness building.

References

  • Alliance initiates new security forum’ – AutoAlliance media alert, July 2014http://www.autoalliance.org/index.cfm?objectid=ACE2D720-0DD5-11E4-869F000C296BA16‘Hacking the Internet: bringing down infrastructure’ – Engineering & Technology, September 2013
  • http://eandt.theiet.org/magazine/2013/09/hacking-the-internet.cfm3 ‘Industrial control systems and SCADA cyber security’ –Engineering & Technology, August 2014
  •  http://eandt.theiet.org/magazine/2014/08/cyber-        securitynewbattlefront.cfm
  • ‘Edward Snowden on Cyber Warfare’ – PBS Online, January 2015
  • http://to.pbs.org/145VaH8 Car Hacker’s Handbook by OpenGarages
  • http://opengarages.org/handbook/’Connected Car Forecast: Global Connected Car Market to Grow  Threefold Within Five Years’
  • http://www.gsma.com/connectedliving/wp-content/uploads/2013/06/ cl_ma_forecast_06_13.pdf 6 ‘Thousands using GPS jammers on UK roads pose risks, say  experts’ – The Guardian, February 2013
  • http://www.theguardian.com/technology/2013/feb/13/gps-jammers-uk-roads-risks ‘New jamming devices block both GPS and Galileo’ –  Engineering & Technology , February 2014h
  • ttp://eandt.theiet.org/news/2014/feb/gps-jamming.cfm7 ‘GM’s New Cybersecurity Chief Aims To Thwart Electronic Car Hackers’ – IB Times, September 2014