Making the value of data determine the security: A case study of rural business process outsourcing

2019 ◽  
Vol 44 ◽  
pp. 104-116
Author(s):  
Reena Singh ◽  
Timothy A. Gonsalves
2021 ◽  
Vol 7 (5) ◽  
pp. 2916-2923
Author(s):  
Feng Shuo ◽  
Qi Yao ◽  
Gualberto A. Magdaraog

Objectives: The study focus on the capability needs of Business Process Outsourcing (BPO) employees for tobacco industry.The study is a quantitative and qualitative research study. It used a survey questionnaire to gather data needed for analysis. The respondents of the study were 50 employees of BPO companies in Clark Pampanga Philippines,where BPO industry is a trend. The findings show an up-to-date picture of BPO industries in Clark Pampanga and an insight into BPO human resources capabilities needs for tobacco industry. It may let Tobacco companies analyze own employee management system with increased precision. They still enabled us to define employment perspective and the challenges tobacco companies are facing, to identify the current BPO human resources capability issues and the long-term human resources trends for Tobacco industry. Together, they provide an exact depiction for the Tobacco industry and valuable foresights to both its employees and employers.


Author(s):  
Myriam Raymond ◽  
Frantz Rowe

S. Alter's Work System Method is used in advancing the understanding and analyses of service innovation Business Process Outsourcing (BPO) from a business systems viewpoint. We propose to use this framework to distinguish what usually characterizes IT-enabled BPO service innovations, and which implications could be drawn for the underlying IS's design. We focus our analysis guided by the Traffic point banking BPO case study in Egypt. This paper brings forward important IS design considerations to the attention of systems analysts and designers to take into consideration while working on the conceptions of Innovative Service BPOs.


Author(s):  
Reena Singh ◽  
Hemant Jalota

Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.


2006 ◽  
Vol 21 (2) ◽  
pp. 99-115 ◽  
Author(s):  
Mark Borman

Information Technology enabled Business Process Outsourcing (BPO) is a growing phenomenon, yet little research has been conducted to understand the factors that determine its appropriateness for organisations and what capabilities they should seek in potential suppliers. A multi-perspective approach to the BPO decision, encompassing the transaction, the organisation and its context, is proposed and a set of supplier capabilities to deliver upon it is outlined. A case study of outsourced call centres in Australia, based upon interviews with three suppliers and three clients, suggests such a multi-perspective approach is useful but that the interaction between the factors shaping the BPO decision is more complex than envisaged. The case also suggests that a common set of capabilities is sought from suppliers – though it is narrower than first proposed.


2009 ◽  
Vol 5 (4) ◽  
pp. 67-78
Author(s):  
Carlos Miguel Barber Kuri ◽  
Raul Alejandro Moreno Fabre

This case study was written using a variety of documentary sources which are all cited throughout the document. The content of this study is a result of the synthesis of information collected and is presented to be used for academic purposes This document was translated from the original in September, 2008 by Lenise L. Butler, International Cultural Center


2010 ◽  
Vol 30 (3) ◽  
pp. 277-282 ◽  
Author(s):  
Kayhan Atesci ◽  
Akshay Bhagwatwar ◽  
Trupti Deo ◽  
Kevin C. Desouza ◽  
Peter Baloh

Sign in / Sign up

Export Citation Format

Share Document