26
A Publication of Business Information Technology Student’s Association Web site: http://www.rjt.ac.lk BITSA MAGAZINE BSc (Business Information Technology) Special Department of Business Management Faculty of Management Studies Rajarata University of Sri Lanka Volume 01, Number 01, March 2019

BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

BITSA

A Publication of Business Information Technology Student’s Association

Web site: http://www.rjt.ac.lk

BITSA

MAGAZINE

BSc (Business Information Technology) Special

Department of Business Management

Faculty of Management Studies

Rajarata University of Sri Lanka

Volume 01, Number 01, March 2019

Page 2: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential
Page 3: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Editors

Editor in Chief Mr. TUS Senarath

Leader of WISDOM, Department of BM, Faculty of Management Studies, RUSL.

Editorial Board Ms. WVR Fernando

Department of BM, Faculty of Management Studies, RUSL.

Ms. TDIT Karanthilaka

Department of BM, Faculty of Management Studies, RUSL.

Ms. DMM .Dissanayaka Department of BM, Faculty of Management Studies, RUSL.

Mr. WMHM Weerasinghe Department of BM, Faculty of Management Studies, RUSL.

Mr. WLV Samarasinghe

Department of BM, Faculty of Management Studies, RUSL.

Ms. WKND Gunawardhana Department of BM, Faculty of Management Studies, RUSL.

Ms. MAS Madampage Department of BM, Faculty of Management Studies, RUSL.

Mr. MMS Rathnayaka Department of BM, Faculty of Management Studies, RUSL.

Mr. MH Kadawathagedara Department of BM, Faculty of Management Studies, RUSL.

Ms. PPK Dissanayake Department of BM, Faculty of Management Studies, RUSL.

Mr. KWI Weerarathna Department of BM, Faculty of Management Studies, RUSL.

Chief Advisor Mr. VKN Gamini Coordinator, BIT Unit, RUSL

Page 4: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Rajarata University of Sri Lanka………………………………………………………..01

Academic Staff of the BIT Unit………………………………………………………….02

Information Technology and its impact on human life………………………………08

Nanotechnology for Targeted Drug Delivery…………………………………………09

The Future of Internet – Progressive Web Apps……………………………………...10

Message of the BITSA President………………………………………………………..11

BITCODE Completion…………………………………………………………………...12

Right to Privacy in Cyberspace and National Level Legal Provisions……………..13

HSBC and Digital Innovation…………………………………………………………..14

Importance of learning IT……………………………………………………………….15

Is Social Media and Human Mental Health…………………………………………..16

Learning Management System………………………………………………………….17

IT Adaptation in Government Sector………………………………………………….18

Point Cloud Based 3D Object Detection in Autonomous Vehicles…………………19

Technology Base Self Service Banking on Customer Satisfaction…………………..20

Content

Page 5: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Rajarata University of Sri Lanka is a public

university located in the historic city of Mihintale in

Anuradhapura, Sri Lanka. Over the years, the

University has developed to become a centre of

excellence in higher education in the North Central

Province as well as in Sri Lanka. At the inspection,

four faculties namely, Faculty of Social Sciences and

Humanities, Faculty of Management Studies, Faculty

of Agriculture and Faculty of Applied Science were

established and in the year of 2006, the Faculty of

Medicines and Allied Sciences was established as the

5th faculty of RUSL. Currently there are three faculties

located in Mihintale.

Vision: “To be a center of excellence in Higher Education and researching”

Mission: “To produce innovative intellectuals capable of taking challenges in the context of global development through the competencies developed from the academic programmers, researchers and training of wide nature”.

Faculty of Management Studies Faculty of Management Studies (FMS) is one of five

faculties which operate as one of the „Center of

excellence‟ in Management Studies that located in

Mihintale premises. The faculty consists of three

departments namely, Accountancy and Finance,

Business Management, Tourism and Hospitality

Management and Business Information Technology

Unit is under the Department of Business

Management.

Mission of Faculty of Management Studies

“The mission of the Faculty of Management Studies is

to provide quality education in Management Studies

and leadership with practical skills and to conduct

research giving due consideration to the changing

environment”.

Business Information Technology

Unit

B.Sc. (Business Information Technology) Special

Degree Programme is provided by Business

Information Technology Unit which is under the

Department of Business Management. Aim of this

degree programme is to provide excellent education in

the field of Management with Information Systems in

order to produce human resource with necessary

competencies to successfully perform business

function in an organization with essential insight to

conduct research giving due to consideration to the

dynamic business environment.

Figure 01. Faculty of Management Studies

Rajarata University of Sri Lanka

01

Page 6: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Academic Staff of the BIT Unit

Present Role of Information Technology

With the invention of the computer, the phrase “Information Technology” is

playing a splendid role in every aspect in all the fields practicing on the earth.

Today, universal Information Technology (IT) is treated as significant and essential

tool in enhancing the competitiveness in the business environment and this makes

mammoth changes which were not anticipated. Presently IT field has become as a

business sector that deals with computing involved in generating information for

decision making. Thus, it is indispensable for people to do the task in daily life.

Getting familiar to IT is must for people ignoring their age limits.

Dr. HMBPRanaweera

Head of the Department, Department of Business Management,

Faculty of Management Studies, Rajarata University of Sri Lanka.

Coordinators’ Message

“B.Sc. (Business Information Technology) Special Degree Programme of Faculty of

Management Studies of RUSL is designed according to international standards (ACM

and IEEE) to produce IT enable managers who are able to withstand the challenging

dynamic business environment. I am proud to say that now our students are showing

their colors within the university as well as in the industry. I wish to congratulate the

team members for starting a student magazine through their team work”.

Mr. VKN Gamini

Coordinator, Business Information Technology Unit, Faculty of Management Studies, Rajarata University of Sri Lanka.

02

Page 7: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Academic Staff of the BIT Unit

Information and Communication Technology (ICT)

Information and Communication Technology (ICT) is opening new avenues for job creation

that could address the global economy. We as ICT academics in universities deliver the

message to our society that ICT should be used more and more to solve the problems in

existing society. It is one of our kings of ancient Sri Lanka, Parakramabahu the Great, who

had said, “Let no drops of rain which falls on my land flow into the sea without serving my

people”. It is the time that we ourselves resolved, “Let no ICT remains unutilized in the

exercise of solving problems of human society”.

Mr. PG Munasinghe

Senior Lecturer,

Business Information Technology Unit, Faculty of Management Studies,

Rajarata University of Sri Lanka.

Role of the interfaces in Modern Business

Information systems are essential requirement in today‟s business. Successfulness of

the information system will decide the survival of the business in competitive market.

With emerge of digital era and internet of thinks new form of digital business

transform the traditional business models in every nook and corner. Virtual business,

online buying and selling platforms are very common in the Internet today. These

systems actually help customers and suppliers to find, buying and selling product

easily. In a holistic view it is very clear that these systems save time and money of

customer, specifically travelling cost and time, product comparison effort etc. From

suppliers view point it reduces most of the operational costs of firms creating a large

market place. The place where customer and supplier make business in virtual

business is the interface of a System, if this interface do not provide flexible, user-

friendly and effective services to the customer then the business will get bad results.

As an instance if you investigate people use ATM machines you can find some people

confused with ATM machines and request for assistance, further in online stores

requesting assistance through mobile phone is another example. Causes for most of

these kind problems are bad user interfaces. Interface is the central entry point to the

system, and determines the unique service experience of that company. Business must

evaluate the system interfaces they provide for different business functions timely, in

software design process generally this kind of evaluations are done, but getting

feedback from customers, workers like key stake holders are still essential because

system may work in different community, demographic environment. Following

design principles, practices and continuously evaluating for possible drawbacks with

interfaces is a critical factor for wining and surviving in competitive virtual business.

Mr. HKGMN Karunarathne

Senior Lecturer, Business Information Technology Unit Faculty of Management Studies, Rajarata University of Sri Lanka.

03

Page 8: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Academic Staff of the BIT Unit

Mrs. DMJ Wikramasinghe

Lecturer (Prob), Business Information Technology Unit,

Faculty of Management Studies, Rajarata University of Sri Lanka.

Towards the Dark Data

Mrs. RMMD Pemarathna Lecturer (Temp), Business Information Technology Unit, Faculty of Management Studies, Rajarata University of Sri Lanka.

In this age of technology- driven enlightenment, data is our competitive

currency. Within this context, the big data is starting to departure and

dark data is starting to arrive. The dark data is not quite as sinister as it

sounds. According to the Gartner‟s IT glossary, dark data is “information

assets organizations collect process and store during business activities

and generally fail to use for other purposes”. As an instance company

collects customer information, past employees‟ records, and raw survey

data but it is never put to use for any valuable practices.

So, In 2018, as technology continues to advancement and the Internet of

Things (IoTs) takes hold, the amount of „excess‟ dark data being

produced is set to become an increasingly serious issue for businesses,

both in terms of how much it costs to store and the inherent risks it

contains. Although dark data branded as a troublemaker within the

businesses, some experts suggest that dark data provide the perfect

opportunity for Artificial Intelligence (AI). As well as through dark data

organization can go beyond the mysteries of the Customers. In

conclusion, it‟s better to consider the dark data as an untapped vein of

nearly endless information to improve your business.

The Internet and Us

The World Wide Web was invented almost more than 25 years ago by Tim Berners-Lee to help people easily share information around the world. The World Wide Web, known as “WWW”,”Web” or “W3” is the universe of network accessible information. Then mainly we can talk about internet, is a worldwide system of interconnected computers used for the storing and transmission data. Over the following decades, it has changed significantly is terms of design and functionality, as well as its big role modern society. Internet has had a major impact on society, and their impact is growing. By drastically changing our means of communication, the way we work, our housing, cloths and food, and more. These impacts can be positive and negative. In the future, these changes will happen faster with less time to prepare and may not try to create new life/ we should void wrong choice, otherwise this internet will destroy us. It is important to understand what the consequence of the diffusion and high use of the internet are for people‟s lives. Gretchen Rubin said that “Turn off your email; turn off your phone; disconnect from the Internet; figure out a way to set limits so you can concentrate when you need to, and disengage when you need to. Technology is a good servant but a bad master”.

04

Page 9: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Academic Staff of the BIT Unit

Structured Cabling Designing and implementing of separate systems to support voice and data

communication have gone obsolete in the last few years. System designers now

have to plan telecommunications infrastructure without knowing whether any

given user will require two voice ports, such as phone and fax, with one data port

for the Ethernet or only one voice and two data ports for Ethernet and video.

Therefore, this kind of flexible communication system requires a proper planning

by targeting the present and future devices and applications. Setting up a

structured cabling system will require a lot more planning. However, in the end,

the users will reap an innumerable of benefits. All new structured cabling designs and installations should conform to a high-performance cabling standard. The U.S. cabling industry accepts the American National Standards Institute (ANSI), in conjunction with TIA/EIA, as the responsible organization for providing and maintaining standards and practices within the profession. It has published a series of standards to design, install, and maintain cabling installations. These help to ensure a proper cabling installation.

Structured cabling installations typically consists with several components such as entrance facilities, vertical and horizontal backbone pathways, vertical and horizontal backbone cables, horizontal pathways, horizontal cables, work area outlets, equipment rooms, cross-connect facilities, transition points, consolidation points and telecommunications closets. The entrance facility includes the cabling components needed to provide a means to connect the outside service facilities to the premises cabling. Backbone cabling extends from the main cross-connect to each of the horizontal cross-connects as well as any intermediate cross-connects between buildings in a campus installation.

The horizontal distribution cabling links the cross-connect system to the communication outlets in the work areas.

Typically, horizontal cabling is installed in a star configuration. In addition to the cross-connect hardware,

telecommunications closets can house communications equipment such as controllers, multiplexers, bridges, routers,

and LAN hubs in cabinets or on racks. Work area components extend from the telecommunications outlet end of the

horizontal cabling system to the station equipment.

Mr. RMGHN Rathnayake

Lecturer(Prob),

Business Information Technology Unit,

Faculty of Management Studies,

Rajarata University of Sri Lanka.

05

Page 10: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Dealing with Information Security The internal audit and information security functions should work together synergistically: the information security staff designs, implements, and operates various procedures and technologies to protect the organization's information resources, and internal audit provides periodic feedback concerning effectiveness of those activities along with suggestions for improvement. Security audits are needed no matter what business you are in. If you are dealing with consumers‟ information, credit card data, or healthcare details, then there is need to do a security audit on your business, process and overall security posture. Where you can start is at the hardware level and work your way up – starting somewhere is better than starting nowhere. The further you go down the stack, the more you will find and the more people might become involved. Security audits are important because they allow seeing where your potential threats are, establishing a baseline of where you are, determining where you need to be, and accordingly define a plan. This might seems like a lot of “fluff” but in reality, it needs to be addressed. Well, it is seems to be easy, using cutting-edge technology you may think you are far better than the unethical hacker. But no, for simple example have you watched Mr. Robot season one, the unethical hacker use Raspberry pi to hack in to the world most secured facility. Ok, you may think what is the raspberry pi, it is a computer which is size of a credit card and it use for learning purposes, and it is definitely not a super computer. Then what is the factor that affect success of unethical hacker, it is the thinking. THINKING OUT-OF-THEBOX. That‟s why it is really hard to deal with unethical hacker, because we are dealing with a Human, So, to be a security consultant you need to think like a thief and act like a policeman.

Mr. CSA Wijewardana

Visiting Lecturer, Business Information Technology

Unit, Faculty of Management Studies,

Rajarata University of Sri Lanka.

Academic Staff of the BIT Unit

06

Page 11: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Academic Staff of the BIT Unit

Revolutionary impact of information technology tools to society

At present there are over 20 Internet Service Providers (ISPs), including SLT and private companies. In 2016 there were 6,087,164 internet users in Sri Lanka which 29.3% share of Total Sri Lankan population. Internet Banking has emerged as the most critical form of customer interaction, encompassing the structural changes required by the banks to compete within the financial markets. Technology Laws play a key role in use of Internet Banking service as well as other technology related fields in Sri Lanka. There are several pieces of legislations that govern technology and internet usage in Sri Lanka. It refers to them collectively as ICT Laws. They include the ICT Act (2003), the Electronic Transactions Act (2006), Computer Crime Act (2007) and Intellectual property Act (2003). Under the Evidence Special Provisions Act of 1995,

computer evidence and audiovisual contemporaneous

evidence can be admitted as evidence in cases. Today

satellite constellations are bringing voice communication

services to the entire planet and deliver a host interactive,

multimedia communications option on a global scale.

These types of projects and services with their ability to

make an unprecedented impact on the rural sector of the

developing world will bring us more closely to making

the concept of a “global village” a reality.

Information Technology has become to the revolution in every field of human activity including the way we live and work. With the rapid growth of Information technology and introduction of internet, we now will be able to order good, reserve seat arrange anything from our personnel computer no matter where we are. Broad access to information communication technology is a key for people to understand, participate and respond to the challenges that development poses to civilization. Understanding of issues such as global warming, loss of biodiversity, evolution, implications of genetic research, and many other topics are essential, almost a requisite, for personal involvement in these issues. They affect all of us, and the better we understand them, the better we can respond with appropriate actions, whether these are activism in public causes or changes at the personal level. In the developed countries, access to information is wide spread. The speed of global technological and economic transformation demands urgent action to turn the present digital divide into digital opportunities for all. Internet usage has grown steadily in Sri Lanka in the recent past. In 2001, there were 121,500 Internet users in Sri Lanka. Since 1995, when the Lanka Internet Services initiated commercial operations, the industry of Internet Service Providing has grown exponentially. SLT started its Internet service facility in 1996.

Mr. PHL Jayathilake

Visiting Lecture in Law, Business Information Technology Unit

Faculty of Management Studies, Rajarata University of Sri Lanka.

07

Page 12: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Information Technology and its impact on human life

(Senior Assistant Librarian, Rajarata University of Sri Lanka.)

~ Dr. SK Illangarathne ~

The term „Information Technology (IT)‟ can be defined as „a very broad term encompassing all aspects of the management and processing of information by computer, including the hardware and software required to access it (ODLIS, 2018). During the last couple of decades, the concepts, infrastructure, and policies of producing, storing and retrieving of the information were developed tremendously and started to influence general human life gradually. As a result, now using the high technology to manage information has become a most influential necessity of human beings rather than a facility.

The common nature of information is out dating or expiring before its use by many users. The reason for that is updating information few times due to the transforming to the end-users before reaching the existed information. On the other hand, every user wishes to retrieve the correct information is correct time with the correct format. To address those issues, using technology will be a better solution.

Computers with Internet connections will be more helpful to send or retrieve information from one place to another. It can be used as the fastest communication media as well as the dedicated solution for delay sending message one place to another. The positive impacts of the Information Technology are easiness of managing and retrieving information, storing huge amount of information using digital or cloud spaces and apply „one to many‟ approaches to send bulk information to many recipients. Social media such as Facebook, Twitter and Instagram could be considered as the highly impacted sources by the information technology.

Utilizing the cloud server spaces (CSS) and Artificial Intelligence (AI) is the very latest developments of information technology. Through those technologies, it could be able to distribute information especially latest news, cloud library initiatives and other business related information very fast. As a result of these kinds of enhancements, the availability of information is increased by multiple times calls „Information overload‟. This will be another big issue which cannot be solved out through the technology.

Due to the information overload, many agencies

specifically handling the information will be met many

difficulties when they acquisition whole of them by

expending their available funds. It will be the huge

impact not only libraries but also radio and television

networks. As pointing out above positive and negative

impacts, it can be concluded Information Technology

as a facility that can be used to fulfill human

Information needs as fast as before it used and it would

be overhead when we follow to achieve very latest

technology by ignoring the existing methods we have.

08

Page 13: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Targeted drug delivery (TDD) is an advanced and smart method of delivering drugs to the patients in a targeted manner which increases the concentration of delivered drug only at the targeted body part of interest while safe guarding the healthy cells/ tissues.TDD ensures a certain defined minimally required amount of a therapeutic agent for a prolonged period of time so that in turn it enhances the efficacy of treatment by reducing side effects. Various drug carriers have been developed using nano-technological knowledge in advanced delivery systems including soluble polymers, inorganic nano-particles, magnetic nano-particles, biodegradable microsphere polymers, fibroblasts, artificial cells, lipoproteins, liposome, micelles and immune micelle etc.In selecting such a vehicle, important factors to consider are chemical and physical properties drugs, side effects or cytotoxicity to healthy cells, route to be taken for the delivery of the drug, the targeted site, and the disease. As such, TDD formulations are prepared by considering the specific properties of target cells, nature of markers or transport carriers or vehicles, which convey drug to specific receptors, and ligands and physically modulated components. Cisplatin is an anticancer drug which is very effective in action. It is based on coordination complexes of platinum, and it induces a programmed cancer cell death by attaching to DNA double strands. Porous Calcium carbonate nano particles (PCCNP) were used to encapsulate anticancer drug cisplatin for TDD and slow release application.

Vaterite polymorph of calcium carbonate which is basically in spherical morphological structure was well suited for this process and is chemically synthesized using precipitation reaction of NaHCO3 with Ca(CH3COO)2 in H2O/EG polar solvent system. PCCNP were characterized using FTIR, SEM, EDAX and XRF to confirm its morphology and the drug encapsulation. Drug releasing was triggered by pH-based mechanism since PCCNPs are pH sensitive. In lower pH values, PCCNP slowly dissolves and releases the anticancer drug cisplatin in to the tumor cells while in physiological pH conditions and higher pH values the release of the drug is negligible. Surface modifications of different nanoparticles for receptor based TDD is the novel approach for these ongoing projects. Physical research group of university of Peradeniya, Sri Lanka, mentored by Prof. R.M.G Rajapakse, has developed different types of inorganic nano-particles for commercially available anticancer drug targeting via inorganic nanoparticles. Inorganic nano-particles such as CaCO3 , ZnO, TiO2, MgO, hydroxyapatite and organic nano-particles such as keratin (Extracted from human hair)from bottom-up approach of nanotechnology starting from natural minerals. These nano-particles were used for encapsulating commercially available anticancer drugs such as cisplatin, doxorubicin and Taxol in them and were studied encapsulation efficiency, encapsulation capacity and release kinetics of the drug.

09

(B.Sc. (Pera, Sri Lanka), Ph.D. Scholar/ Teaching Assistant at Temple University USA.)

- ~ Mr. Shashiprabha Dunuweera ~

- -

Nanotechnology for Targeted Drug Delivery

Page 14: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

The Future of Internet – Progressive Web Apps

(Faculty of Applied Sciences, Rajarata University of Sri Lanka.)

~ IshiniPeiris Deraniyagala ~

- -

Unlike native apps PWAs doesn’t require to be

downloaded and installed. Users can open a PWA

by simply typing a URL on an any modern web

browser (powered by HTML 5). PWAs are written

to work on web browsers which make it the right

opposite of native apps. If you want to work on a

normal app you should first get the app from an

app store then you should check whether your

device is compatible with its requirements and then

you should download it and install it in order to

work with it. But when you visit a PWA after just

being there for 30 seconds it asks you whether you

want to add it to your home screen! Which by

allowing, it will become easier for you to visit the

URL next time.

PWAs are designed with mobile devices on mind

but still they work perfectly fine with desktops and

laptops too. Because PWAs are developed to be

responsive for whatever the screen size and the

device that it gets to work on. Simply we don‟t need

mobile app for the mobile devices and the desktop

app for the desktops computers.Also these PWAs

are cross browser compatible which means they are

compatible with all major browsers. The rendering

Engine of your browser shows you the

interpretation of the code of the website you

requests.

These rendering engines vary between browsers so

that the website may appear slightly different from a

web browser to another. PWAs being cross platform

compatible have overcome this issue and are able to

reach you with the same quality no matter which

modern browser you use.

What Else….,

PWAs are served by HTTPS ensuring secure data

transfer. They are very engaging thanks to the UI

and UX which is used in mobile apps. They are the

ones who brings you the best parts of mobile apps

and websites in a single package. They are faster and

easy to use. They are memory efficient. If this is the

first time you ever read about PWAs just get

yourself a moment and Google it! You will realize

how it has affected the internet. PWAs are the future

of web based businesses. Most of the leading online

businesses such as AliExpress have tremendously

increased its conversations across all browsers. Not

only AliExpress but also Twitter lite, Trivago,

Flipkart lite, Forbes are very popular PWAs across

continents. PWAs are the future of internet. This

isn‟t just a saying it has started becoming a fact

because even Google has commented that they are

moving there apps to PWAs and didn‟t stop there.

They have already moved there major service

Google Search. It is now backed by a service worker

(the base of PWA technology). Even the new Gmail

uses PWA technology. Microsoft offers PWAs

through their native app store in Windows 10.

Isn‟t it the future of the internet?

10

Page 15: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Message of the BITSA President

(BIT Unit, Faculty of Management astudies, Rajarata University of Sri Lanka.)

~AM N Amarathunga ~

- -

- -

BIT is a combination of IT and Business Management which are two

overwhelming trends in the present world and today it has become a

demanded field in the job market. So my personal opinion is it is a

privilege for the students who follow a degree like BIT.

In the year 2017 we started BITSA with the aim of developing the

academics of the students as well as to improve the collaboration

among the students. We expected to organize field trips, competitions

and entertainment programmes in order to accomplish our aim. As a

result we organized an Inter Faculty competition named “BITCODE”in

2018 and also we got a chance to participate for Inter University

competition named “Real Hack”. We also provided opportunities for

the students to participate for the seminars conducted by the experts of

the field in order to gain practical knowledge instead of what they gain

inside of a lecture hall.

So last but not the least I would like to thank most warmly for the

lecturers and other staff members, the Students Council of the

University and all the members and students for helping us to make

this success.

11

Page 16: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

BITCODE Completion

(Faculty of Management Studies, Rajarata University of Sri Lanka.)

~ Organized by BITSA Association ~

12

BIT code completion was a successful

implementation of BITSA association in 2018. All the

students in management faculty were openly invited

and more than 10 groups were participated. Staff

members of the BIT unit were worked as the judges

of the completion. The winners and first runners up

and second runners up were awarded with cash

prices and certificates were issued. The aim of the

code completion was to enhance the coding

knowledge of the students and the cohesiveness

among them.

Page 17: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Right to Privacy in Cyberspace and National Level Legal Provisions

(Faculty of Management Studies, Rajarata University of Sri Lanka.)

~ DMMP Dissanayake ~

The term privacy is a largely subjective one which depends on individuals and different cultures. If we ask from any person who relevant to a particular culture as “what is privacy?” the answers may be varied person to person, but share common themes. Broadly speaking, privacy means right to be let alone or freedom from interference or intrusion. It is the state in which one is not observed or disturbed by other people and being free from public attention.

Also can say is the ability of an individual or group to schedule themselves, or information about themselves, and thereby express them subjectively. Privacy and Security is not the same thing, but they are kissing cousins. Security is necessary for protecting data and it is not sufficient for addressing privacy. Privacy focuses more on use and governance of personal data while Security focuses more on protecting data from malicious attacks and the exploitation of stolen data for profit.

With speed of the technological innovation, the term Right to Privacy is becoming more and more complex. The Right to Privacy is an individual‟s fundamental legal right refers to the concept that one‟s personal information is protected from public scrutiny. Now the world has become global village, each and every person, sector, industry have been integrated by cyberspace and influenced by Information Technology.

As the technology gets more invasive, by the minute bulk of data is being collected, exchanged and used worldwide. This situation causes to make a critical issue which has many implications towards the violation of individual liberty in Cyberspace. Thereby, need of extensive laws regulating with regarding the Right to Privacy in Cyberspace is must; now more than ever.

Through this article presenting the National Level legal provisions regarding the right to privacy in Cyberspace. In fact, relevant Sri Lankan statutes such as Electronic Transaction Act (2006) and Computer Crimes Act (2007) could be seen to be devoid of specific provisions relating to the Right to privacy in Cyberspace.

Telecommunication Act (1991) has provided that interception of telecommunication transmissions is a punishable offence and it could be seen that preventing or obstructing the transmission of a telecommunication messages or intruding, interfering, or accessing telecommunication messages have also been prohibited.

Also, right to privacy has been recognized by the judiciary under the common law of Sri Lanka, actions brought under Roman Dutch Law. So, Sri Lankan courts have recognized the protection of personal information in cyberspace as a necessary right of individuals.

13

Page 18: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

HSBC and Digital Innovation

(Fund Administration, HSBC Sri Lanka.)

~ MH Kadawathagedara ~

HSBC is a leading international bank which was

founded in 1865 to finance trade between Asia and the

West. Today HSBC become a leading banking and

financial services organization by serving more than 38

million customers worldwide. As per the John Flint

(HSBC Group Chief Executive) “Our international

network covers more than 90 per cent of global trade”.

To become a leading international bank, HSBC use

digital technology to make it simpler, better and faster

for their customers to bank with them, while keeping

their money safe and their data secure. HSBC is working

with companies and leading scientists to harness the

next generation of technology. HSBC is engaging with

more technologies like robotic, artificial intelligence,

facial recognition, etc. One of their newest digital

innovations is facial recognition payment system. HSBC

business customers can now access their accounts with

just their face. The bank has introduced a facial

recognition option which offers a quick, convenient and

secure way of logging into the HSBCnet Mobile app.

HSBCnet Mobile app is the online app that makes it

quicker and easier for people to transfer money to their

friends and family which has won two technology

awards recently. The facial recognition option is

compatible with selected new models of Smartphone.

14

Customers simply look at the screen and their face is

recognized in less than a second. The software creates

a 30,000-point „depth map‟ of the face, which will

adapt to a person‟s appearance as it changes. The app

can still recognize people safely and accurately as

they age, or if they start wearing glasses.

Page 19: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Importance of learning IT

(School of Computing, University of Colombo.)

~ DhanuraMunasinghe~

Learning is not something that goes in vain. Whatever

the new thing that you learn in your life, it will help

you in winning your life. In the same way learning IT

will help you win the life without much struggle in

future. As a developing country Sri Lanka is now

being exposed to the technologies. But we are way

behind with the developed countries and also with

many of the developing countries out there. To

compete with current world we need to get exposed to

these new technologies. The biggest weakness as I see

with Sri Lankans in common is that they are afraid of

trying out new things. Therefore they are not

interested in having techie stuffs in their lives. This is

the first thing that we, as Sri Lankans need to

overcome. You don‟t have to be afraid to open an

aping our mobile phone, click and open an application

on your computer. Simply you don‟t have to be afraid

to use a Smartphone or what mostly refers as touch

phones. Just go ahead and do touch this stuff and get

the experience. Let‟s have another simple example that

we get our hands on some IT related work in our day-

to-day life, it is using an ATM (Automated Teller

Machine) card to withdraw cash from the machine.

Many people are afraid of using the ATM card for the

first time. So they wait in the queue of the bank

counter with their passbook in hand to withdraw some

money, or wait till the next working day to go to the

bank. But you don‟t have to wait that much time if you

have some experience and curiosity to try. The title IT,

we can simply be divided it into two main sub topics

as Hardware and Software where the Hardware are

the things we could physically touch and Software is

what we cannot touch physically.

More than learning about the software it is good for

everybody to at least have the simple knowledge with

hardware if they are so afraid in engaging with the IT

stuff. How to connect the monitor and other peripherals of

a computer to the CPU (Central processing Unit) would be

even great if you have been so distant from exposing to IT

because nowadays in everywhere we go is occupied with

advanced technological instruments. To move with the

current flow of developing technology you need to learn

these things. If not you will start to feel that you are all

alone with many machines around you. It is not what

actually happens. It is like you simply have a match box in

your hand but you are trying to make some fire by

rubbing two stones which would cause more time and

energy of yours. Learning IT simply makes your life

easier. Now with the technology everything is so simple as

pressing a button would wash your clothes and get them

dried, cook you a ``meal, send your loved once a photo of

you who are miles away and there‟s many more. Benefits

that one could gain by learning IT is not limited and

cannot be explained in words like this. So from today

onwards get some motivation to yourself, wake the sleepy

head in yourself and start to learn something about IT

because you will never know how easy it is until you get

used to it .You cannot see the view you get from the

mountain peak by being at the base of the mountain.

15

Page 20: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Social Media and Human Mental Health

(Faculty of Management Studies, Rajarata University of Sri Lanka.)

~ TUS Senarath~

In present time, social media is becoming a part of the human life. People are so obsessed even they have biological responses when they can‟t participate. After presenting the smart phone, the situation became even worse. People started to experience phantom vibration syndrome. That is where a person thinks his phone went off when not getting notifications, and he checks and it did not. Almost all check their mobiles incessantly, even distracted in conversations. When people see something important or attractive; most probably their first reaction would be to take out their mobile phones and post it on social. To that extend people are living and behave with social media sites. So many empirical studies reviewed that 18 to 24 year olds happen to be the most active demographics on social media. Furthermore, researches have revealed that; 85% of undergraduates are on social media. According to some other research findings; they spend on average one to three hours a day there. People do not even eat for three hours a day. 96% of internet users in Sri Lanka are on social media. Sri Lanka voter turnout is not even 90%. High social media usage has its‟ own impregnated consequences. Maybe a person simply cannot focus because his/her notifications are going off the handle, and they need to check. That need, highly likely can become addiction. Regarding social media, people are already experiencing impairment similar to substance dependencies. With every like or reaction in social media, people get a shot of that feel-good chemical, dopamine. So to get more like, shares or comments; they post constantly on social media. On the other hand, they are earning more social currency. People are anxious if they do not have access to their social media accounts. That doesn‟t sound like every drug society has ever heard of.

Many Research findings give intelligence that social media has a negative impact on human mental health. To increase the quality of mental health, as all can assume, people should control their usage of social media. If they can quit from social media straighter way, they can make the damage to the mental health very low but the problem is; can anyone possibly do that..? Is it possible to quit from social media 100%..? Besides social media have not only bad things, but a lot of good things too. It creates a place of community and allows people to find each other who never otherwise would have, especially folks from marginalized identities like Korean people, it can be life changing in a positive way. But like any other tools, social media has both good and bad sides. People like social media, so get off from the social media would lead to some unintended consequences for mental health and only it can be worse. Actually social media is not going anywhere, so it is a waste of time if anyone tries to advice people for getting off from the social media. In a nut shell absence is no longer an option, but that does not mean people cannot practice safe social.

Everything in this short article has nothing and everything to do with social media. Social media is neither good nor bad. It is just the most recent tool people use to do what they have always done: tell stories and communicate with each other. So it is up to us to keep our good mental health by modeling good behavior no social media.

16

Page 21: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

Learning Management System

(Faculty of Management Studies, Rajarata University of Sri Lanka.)

~ TDIT Karunathilaka~

Knowledge management tools are emerged with E-learning concept.

E-learning is where the process of learning can be done at anytime

and anywhere by using computer or similar devices. It is used to

provide instructional programs to students who are separated by

space and from the instructor. Learning Management System (LMS) is

one of the most effective knowledge management tools that support

E-learning. Students, teachers as well as administers are used LMS, as

it provides access to online learning services. An LMS is usually

regarded as the starting point for developing an online course or

program as it provides a means for managing, delivering, and

tracking online instruction and student outcomes. The value of an

LMS is increased by its availability, scalability, usability,

interoperability, stability, and security. An LMS is also called Course

Management System, or CMS. LMS is provided a potential for rich

learning environments built on social constructivist theories and

available to all students, both on campus and those studying at a

distance. Basically, there are three components in LMS as Blackboard,

WebCT, and Desire2Learn. There are freely available and open access

LMS such as Moodle, Segue, Interact, Coursework, A tutor and

KEWL. Standards and criteria for assessing learning outcomes and

mixed mode teaching and ability to separate the learning that occurs

online from that which occurs in other environments are enhanced

the quality of a LMS. There are several perspectives of LMS as

learning experience of student, practices of teachers, technology

requirements, and the ability to maintain the resources. General

course organization (including administration and record-keeping of

student marks and absences and general planning for the course),

content (e.g., lectures, learning objects), self-study (including

instructions, readings, and practical exercises), assignments, testing

and communication (teacher-to-student, student-to-teacher, student-

to-student, group-to-teacher, teacher-to-group, etc.) are considered as

the features of an LMS.

It continuous the learning processes through emails,

discussion groups, student–teacher question–and–answer

sessions, the transfer and posting of administrative

information, and course content. An LMS supports

instruction and facilitating of learn through an organized

learning structure and a carefully managed system.LMS

makes a bridge between students and instructor. The

cognitive benefit of LMS is that, it enables them to react

with each other in a virtual class room. It facilitates the

instructor to, close observation of the learning abilities and

success rates of students. In return, students can benefit

from an LMS system since they can study the course notes

at their own places of study, meet their instructors and

classmates in virtual classrooms, and also prepare

themselves for the examinations by solving self-test quiz

questions whenever they feel like. Also it provides

interactive features such as threaded discussions, video

conferencing, and discussion forums. Flexibility of access

from anywhere and anytime, motivate learners, encourage

interaction, provide feedback, support content in many

formats (e.g., multimedia, video), design and organization

of activities within the LMS can proceed while the course

is in progress and Learning activities can be shared and/or

re-used among courses are some advantages of LMS. It

also support management task such as delivery and

tracking, examination, planning, virtual live classes and

several statistical analyses. Specially, there are benefits for

students and teachers from LMS.

17

Page 22: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

(Faculty of Management Studies, Rajarata University of Sri Lanka.)

~ DMPK Dissanayake~

IT Adaptation in Government Sector

Information and Communication Technology (ICT) has changed

organizations, businesses, and societies for decades. Many countries in the world are now using ICT to change the way government works. Information Technology has interwoven itself with almost all activities of human life today and it has many benefits, opportunities and challenges for managers and policy makers in private as well as public sectors. In here successful diffusion of information technology has technologies triggered the usage of Internet, e-commerce, and eventually in electronic government. The revolution of modern Information Technology leads many government authorities to spend a lot of money and resources for delivering their services to citizens electronically despite the difficulties and obstacles of this adoption. Electronic government (e-government) is an important application of the Internet and is used by establishments to encourage broad use of computers and help communication and interactions with its ministries, citizens and businesses. E-government represents a fundamental change in the whole public sector structure, values, culture and the ways of conducting business by utilizing the potential of ICT as a tool in the government agency. E-government is not just a tool to automate old practices of existing government. However it rather increases effectiveness, efficiency and overall productivity of government sector by offering citizen based services. E-Government enables citizens to access information efficiently and also has improved the transparency and communication of government information. E-Government, in simplest terms, can be defined as “the provision of government information through the internet to citizens and businesses and among government agencies”. Rapid developmental changes in the Internet and its services have allowed the governments to provide their services to citizens and others in new ways and how these governments handle their operations inside. By its implementation, the e-Government has revolutionary developments and seen improvements in governments‟ functional abilities. E-Government can be examined in terms of citizens, businesses, government employees and other sectors of governments and by provoking interactions between government and these parties, e-Government makes the interactions more effective, efficient, convenient, friendly and transparent. Different categories of e-Government can be noted in the literature: e-Government is categorized as Government to Citizen (G2C), Government to Business (G2B), Government to Government (G2G) and Government to Employee (G2E).

Each category has specific characteristics within the e-

Government settings. For example G2C category provides

basic e-Services to the citizen such as license renewals and

offers a single-point-of-access anywhere and anytime to the

citizens to see release of government services, benefits and

loans. The government‟s ability to expand electronic tax

products as one example of G2B initiatives. G2G category

establishes common procedures for governmental agencies for

example collection, processing, analyzing, verifying and

sharing of birth, marriage and death records and G2E is a

subset of G2C services in which specialized services for

government employees are provided exclusively. In the G2E

initiative government employees are given a common

platform for online training and development of human

capital.

18

Page 23: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

(Faculty of Management Studies, Rajarata University of Sri Lanka.) .)

~ WVR Fernando~

Point Cloud Based 3D Object Detection in Autonomous Vehicles

Autonomous vehicles also known as driverless cars, Wheel

mobile robot, Self-driving cars are a kind of intelligent cars that moves to its destination by sensing its environment with no human input. The main characteristic of self-driving car is transporting people or objects to a predetermined target without humans driving the car. An autonomous vehicle consists of four fundamental technologies. They are environment perception and modeling, localization and map building, path planning and decision-making and motion control. This report will only focus on environment perception and modeling which answers for „what is around me?‟. Multiple sensors are used for surrounding environment perception like cameras, RADAR (Radio Detection and Ranging) and LiDAR (Light Detection and Ranging).LiDAR or Light Detection and Ranging is a remote sensing method to measure distance. Remote sensing means the science of obtaining information about objects or areas from a distance, typically from aircraft or satellites. As it is a laser ranging device it sends millions of pulses to the target so we can get the distance to the target. By firing off millions of beams of light per second, LiDAR delivers a large set of 3D measurements that build 3D environment. This set of 3D points known as point clouds. Point cloud is highly sparse and unordered set and 3D object detection provides distance measurement of road users like vehicles and pedestrians. There are two methods in object detection. They are classical method and modern method. Classical or traditional object detection method generally segments the point cloud into set of clusters and classifies them as objects. Segmentation is a significant step in the perception tasks. One segmentation approach is removing the ground plane points from the point cloud, mapping the remaining ones (non-ground points) to grid cells and connecting them as occupied grid cells. Another approach is using graphs to segment the object. Modern object detection method is divided into two parts as hand craft point cloud feature and end-to-end learning. In hand craft point cloud feature many works have used voxel grid representation. A voxel represents a value on a regular grid in three-dimensional space.

The idea of voxel grid representation is subdividing the 3D space into equally spaced voxels (3D grid cells) and each voxel is converted into a hand-crafted feature vector. The empty voxels (containing no points) are converted to zero feature vectors. An end-to-end trainable deep network learns point-wise features directly from point cloud without any

manual feature engineering.Ex: VoxelNet. There are two 3D object detection models that use LiDAR data only, they are PointNet and VoxelNet. As mentioned above point cloud is an order less set main challenge with modeling order less points is that the model needs to be constant to N! Permutations, where N is the number of points in the point cloud. PointNet is proposed as an end-to-end classification neural network. Neural network is a method of computing based on the interaction of multiple connected processing elements. PointNet is efficient and respects the permutation invariance of points in the input. An improved version of PointNet is introduced named PointNet++, which respects the spatial localities of points.Idea of VoxelNet is that it subdivides the input point cloud into equally 3D voxels and then transforms points within each voxel to a trainable feature vector that characterizes the shape information of the contained points. The representation vectors for each voxel stack together and pass to a region proposal network to detect the objects.

19

Page 24: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

(Faculty of Management Studies, Rajarata University of Sri Lanka.) .)

~ MAS Madampage~

Technology Base Self Service Banking on Customer Satisfaction

In the world the service sector plays a major role in many economies. But until recently Sri Lanka remained mainly as an agricultural nation, where the agricultural sector predominated. Today the industrial sector and the service sector constitute a major portion of Sri Lanka's Gross Domestic Product (GDP). Accordingly in 2016, service sector accounted for 56.5 % of the Gross Domestic Product in Sri Lanka (Central Bank Report, 2016).The service sector comprises of sub sectors including banking and financial sector, wholesale and retail sector, education, transportation and communication, postal services etc.According to the Central Bank Report, 2016 within the financial sector, banks play a predominant role in economic development of the country. Service Quality in banking sector is the most important criteria and asset for evaluating and satisfying customers and thereby increases the customer satisfaction and average retention rate of customers. In order to provide better services to customers, banks have been using different types of online banking, ATMs, CDMs and Kiosks. A very large proportion of bank customers use ATMs, CDMs and Kiosks for their routine operations. Still Many banks integrated information technology opened to deliver their services to their customers without any support by service staff and they identified as Self Service banking units (SSBU). Self-service banking (SSB) introduced as an alternative banking method to withdrawal and deposit of cash behalf of the counter transaction.

The automated teller machine and other new forms of banking method accelerated the customer satisfaction. However, SSB contains Self Banking unit (ATM banking), Internet banking, Mobile banking, Internet payment gateway and Telephone banking. There are several factors that the customers focus on when come to the usage of SSB. Many factors influence bank sector to evaluate their technology and assess their electronic commerce and internet banking such as competitive costs, customer service, increase in education and income level of customers, etc. (Khan &Mahapatra, 2008).Representing the service sector, banks give more priority to deliver quality service to their customers in ever increasing competitive environment and many banks have integrated information technology to differentiate their service. All these initiations are being made by the banks to increase customer satisfaction and thereby to achieve their loyalty.

20

Page 25: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential
Page 26: BITSA - itguidelkhome.files.wordpress.com · order to produce human resource with necessary competencies to successfully perform business function in an organization with essential

WISDOM

Faculty of Management Studies

Rajarata University of Sri Lanka

Mihinthale

Sri Lanka

Phone: +94(0)71 8999897 e-mail: [email protected]

http://www.rlt.ac.lk/mgt