Managing Business Process Outsourcing - NMIMS Solved Assignments Latest

 

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

 

 

Managing Business Process Outsourcing

 

June 2022 Examination

 

 

Q1. Many companies have considered outsourcing a broad range of business processes, including IT services, to achieve critical cost savings. Although this kind of agreement can be structured in many ways, a thoughtful contractual arrangement, with appropriate cost sharing, pass-through mechanisms and pricing adjustments, allows the parties to share certain risks and at the same time establish a productive and profitable relationship. Explain BPO contract negotiation and monitoring and their risk impact?      (10 Marks)

Ans 1.

Introduction

Businesses have best currently begun to understand the significance of powerful agreement management. Contracts were regarded entirely as prison files that would handiest be consulted during legal proceedings. Because of this, contracts are used to define the whole client-seller relationship in the IT-BPO industry. This consists of all components of buyer-vendor dating, from prison to business. As outsourcing of non-center and center services has grown exponentially, as has globalization and the creation of recent business models, IT-BPO contracts have become increasingly complex.

 

Q2. Organizations typically undertake periodic process improvement that are focused on specific business processes and may or may not align with the business strategy. In order to realize all the benefits of sometimes disparate BPM efforts, there needs to be an ongoing, organization-wide effort to assess and measure the results and continue to use the successful implementations. A process portfolio is widely considered the answer. What are the benefits of effective process portfolio management?    (10 Marks)

Ans 2.

Introduction

 

This is the process that project managers and PMOs use to assess the capacity of a project and devise a plan for managing it. The PPM technique consolidates current facts, forecasts pipeline prospects, and gives all the facts in real-time. The unified control method is one in which all projects are handled under a single roof, referred to as a portfolio. The benefits of a holistic approach to venture portfolio control include monitoring the repute and fitness of tasks, their interdependencies, and the overall performance of assets assigned to the tasks. Since task metrics can be up to date in actual

 

 

 

Q3. For ALPHA CallCenter, a leading healthcare BPO company based out of Gulf approached MeraBPO with a requirement to improve their BPO process. The customer's BPO division handles over a million customer calls every month, but their customer satisfaction levels were plummeting downwards. Even their CSAT was as low as 47%. Since the customer was a part of the healthcare industry, it was unacceptable for the company to find a low level of satisfaction from their customers. MeraBPO's role was to nail down the causes for the low CSAT levels and then to provide a customized BPO solution that would help the company's performance to soar.

At the onset of the project, the BPO team at MeraBPO decided to dissect the problem and get to the root cause. Through a detailed analysis, they identified some of the critical issues in the process that were affecting the customer's BPO's performance. The following were the requirements of the customer:

There was a linguistic and cultural mismatch between the BPO's personnel and the client's customers. The client's customer base was native Arabs while the BPO employees of the customer (5 male agents and 5 female agents) were not native Arabic speakers. This  language barrier made it difficult for the employees to effectively address the culture- specific requirements of the customers

There was a critical need to align the BPO support team with the standard processes that govern BPO functioning. The BPO team also required intensive training in BPO platform management

The BPO's turnaround time lagged over a period of 7 days in contacting their customers after discharge

The support BPO team worked only 5 days a week (Monday to Friday) and only between

 

9 am to 5 pm. This posed a serious limitation for the customers who wanted to contact our client

The customers wanted to make sure that they were talking to an Arab agent and would ask the BPO employees for their last name

Female patients of our client would submit contact numbers of the male members of their family instead of their own

The customer reach percentage was less than 2%

After identifying the unique problems that were affecting our client's BPO, they deployed one their best teams to implement a customized BPO platform. MeraBPO's skilled BPO team refurbished the entire BPO process of the customer by adopting the following measures:

1. BPO Service Timings: they increased the support time span by a period of 4 hours. Next, they made the support center available from 7 AM to 7 PM. To match the working week of UAE, they decided to change the work days of the BPO to Sunday to Thursday instead of Monday to Friday. Multiple shifts were also introduced to meet the time demand with WFM.

2. Local BPO Agents: they hired a team of native speaking Arabs to eliminate the cultural gaps.

3. Support Infrastructure: they enhanced the infrastructure for the customer's BPO center and included best-of-breed voice, email and internet facilities. This helped in substantially reducing the turnaround time of the BPO team.

4. Value Added Support Services: they also offered a host of value added services, such as the following:

they extended the 24-hour call support for excess processing requirements during peak hours

The BPO agents were given customized 'Last Names' to suit the caller's country

The DID number was masked based on the caller's country

The BPO agents were given 20% hand-outs

Culture specific provisions were specially created to record rebuttals from the objections raised by the male family members of female patients

The BPO process of the customer was continuously improvised and enhanced based on

Lean and Six Sigma methods

The database of the customer was always kept up-to-date

The BPO application was rectified periodically

Within a short time span of just 2 months, they were able to present the following results to our customer. From an unsatisfactory 47% the CSAT galloped to a whopping 85% - 87%.

The turnaround time was improved by 24%.

a. What were the cultural challenges faced by ALPHA call center and how were these specific cultural challenges met by ALPHA call center     (5 Marks)

 

Ans  3a.

Introduction

Healthcare BPO company Alpha call center approached Mera BPO to assist with their BPO procedure development. Extra than one million consumer calls are responded to every month through the BPO department, yet client satisfaction turned into a declined. Consumer dissatisfaction with the company's service turned unacceptable because the client turned into healthcare professional. Mera BPO became tasked with figuring out the foundation causes of the organization's lousy customer delight before recommending a specialized BPO solution that could increase its overall performance.

Discussion

Internal communications, some

 

b. What are the advantages of outsourcing call center operations of a hospital to a BPO like ALPHA call center?       (5 Marks)

Ans 3b.

Introduction

A manager's attention and time are restricted in each firm, which is especially authentic for small organizations. Payroll, as an example, maybe delegated to a third party, releasing up the business proprietor's time and strength to awareness of the marketing and sales operations which are maximum essential to the company's long-term fulfillment.

Discussion

Healthcare firms can also focus all their time and effort on imparting special affected person care if they outsource their non-core tasks. This improves their productiveness and profitability. Outsourcing gives healthcare firms an

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

 

IT Security and Risk Management - NMIMS Solved Assignments Latest

 

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

 

 

IT Security and Risk Management

June 2022 Examination

 

 

Q1. Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Explain the various types of malware and how is ransomware different from a virus/worm? (10 Marks)

Ans 1.

Introduction

Viruses and other forms of harmful software can be covered under the umbrella term "malware." Cybercriminals commonly utilize it to gain facts from their victims that they'll then exploit to make money. From financial records to healthcare statistics to personal emails and passwords, the breadth of data that can be hacked has grown exponentially. The phrase "malicious software program" or "malicious software" is an umbrella period for any malicious program or code damaging to a computer. Assailants and

 

Q2. The estimated losses due to elder financial abuse range widely. The FBI’s Internet Crime Complaint Center (IC3) 2018 Internet Crime Report shows that people 60 and older submitted more than 62,000 fraud complaints in 2018 with losses totaling nearly $650 million. Some less conservative sources estimate that fraud against seniors, or what’s known as elder financial exploitation (EFE), costs families in the U.S. upwards of $36 billion per year. Research shows that as seniors age, they’re more likely to sustain higher average losses to senior financial scams.

Explain the most common types of attacks targeting senior citizens and suggest precautionary measures for them with reference to these attacks?     (10 Marks)

Ans 2.

Introduction

The trouble of cyber fraudsters preying on the elderly affects many countries. The elderly may be more liable to -bit scams than different age businesses. This makes them easy prey for criminals, who prey on the elderly, widows, and lonely grandparents. Different concerns come into play. Many older people have been overdue adopters of

 

 

 

Q3. For a payment processing site , such as PayPal, security is of utmost important. In PayPal, more than 12 million payment transactions are processed on a daily basis, and this number rises to 15M million during peak days. Nowadays, PayPal has implemented a new and advanced approach to catching bugs and vulnerabilities in its website. This security feature was an add-on to a committed team of more than 2000 anti-fraud specialists who are responsible for taking care of the perimeter security. Each customer accountand payment  transactions  were  monitored  by the  organisation  24/7  so  that  there  is  no fraudulent activity, email phishing and loss of identity.

Moreover, the security was also ensured by maintaining every communication between servers on SSL. However, in the case of any flaw in any of these security features, an alarm should be raised.

Now, PayPal has contacted and assigned members who can work on bonus basis for the website security. These security researchers who are paid for identifying the bugs and possible vulnerabilities in PayPal’s website are known as bounty hunters. “There are a lot of security researchers, there are a lot of other people out there who are experts on security. We have a very successful bug bounty program, where researchers will find a vulnerability on our sites that we’ve missed,” explains Shivananda.

Every bug spotter looks for his/her benefit in identifying bugs. Therefore, PayPal rewards these bounty hunters with the designation of a hero and their achievements portrayed on the ‘Wall of Fame’. In monetary terms, a huge amount is paid to them.

PayPal pays $10,000 (about `6.5 Lakh) to identify a remote code of execution. In this case, the spotter of an authentication bypass vulnerability will get $3000 and the one working on cross-site scripting error would get $750.

Many companies such as Facebook and eBay have involved the community for high- level security. Let’s understand the manner in which the bug bounty program introduced by PayPal works. First, a security researcher enters and submits a security bug on the PayPal portal. On its completion, the security professionals I working at PayPal test that vulnerability and checks whether or not it is a real issue. They also understand the fixes and communicates to the researcher saying “Yes, what you’ve submitted is a genuine issue. Thank you for that. We’re processing it, and as we process it, we’ll come back to you,” said Shivananda. After the bug is successfully closed, security researchers are entitled to compensation from PayPal.

The following vulnerabilities are out-of-scope for PayPal:

     Vulnerabilities based on social engineering techniques

     Vulnerabilities based on brute force

The main objective of a payment processing company is to serve customers innovatively in 200 markets taking care of the fact that the losses are a third of one percent. Along with this, a huge amount of creativity has to be brought in designing the fraud eco-system.

 

PayPal invests a lot of resources in analysing the transactions, account details, and ensuring that no fraudulent transaction is completed on their website. In fact, it’s surprising that PayPal has the least loss in the payment industry that is one-third of one   percent. The combination of machine learning and data sciences on the massive data sets helped PayPal to attain the position where it can assure the customers regarding the safety of their transactions.

“A loss rate of one-third of one percent is something we can brag about in the industry,”

beams Shivananda

a. Why PayPal thought of hiring bounty hunters?    (5 Marks)

 

Ans 3a.

Introduction

Moral hackers who uncover vulnerabilities in PayPal's software program and services were rewarded handsomely in the latest media reviews. As of March 2018, PayPal's most worm bounty payout has been raised to $30,000, a

 

 

 

b. What type of issues can be faced by PayPal if there is some sort of security lapse in the customer payment transactions?  (5 Marks)

Ans 3b.

Introduction

PayPal payments private limited ("PayPal"), an Indian corporation, and you've entered into this agreement to govern your use of your PayPal account and the PayPal offerings. A character has to be a minimum of 18 years of age and a resident of India to establish a PayPal account and utilize PayPal services.

Discussion

Customer pleasure can be similarly improved by multiplied dependability, processing speed, and authorization rates for PayPal customers. We offer nearby, cloud-based processing, industry-main reliability, and actual-time fee updates to

 

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

 

Digital Payments - NMIMS Solved Assignments Latest

 

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

 

Digital Payments

June 2022 Examination

 

 

Q1. After the onset of current pandemic situation, most of individuals are using various types of Digital Payment methods. Discuss the different types of Digital Payment methods (Any 5) and which method you find more suitable for usage and why (Discuss the same by stating benefits with example). Have you or your acquaintances faced  issues while performing the transactions? What measures have you taken to make that transaction smooth? Discuss the same with the help of an example.  (10 Marks)

Ans 1.

Introduction

Digital payment is when finances are sent digitally or electronically rather than physically. Both the sender and the receiver must utilize technological means to switch cash. Paying using a credit card, debit card, or cell cash are all covered in this definition of payment. It's impossible to agree on a single definition of digital payments considering that digital bills might be relatively digital, primarily virtual, or digital. On the other hand,

 

 

Q2. Cryptocurrencies is a currency which is secured by using cryptographic techniques. These currencies were in news recently due to the taxes levied upon it in the Budget announced on 1st  Feb,2022. Find out how much tax has been levied upon by Indian Government on same in the Annual Budget-2022 and what are the other measures thought of by the Government in the same regard. Also, discuss what are the risks and legal regulatory issues associated with these currencies and the factors one should take care of while investing in these types of currencies.    (10 Marks)

 

Ans 2.

Introduction

Encrypted records strings that constitute an economic unit are known as cryptocurrencies. As a comfy log of transactions, it's far tracked and managed by a peer-to-peer community called blockchain, which includes shopping, selling, and moving. The reality that cryptocurrencies are not issued by using governments or different monetary firms distinguishes them from conventional forms of currency. Further, it is easy to confuse advanced coins with conventional electronic cash as it isn't always an

 

 

 

Q3. A blockchain is a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain. Banking sector is the sector wherein one can see the potential of using this technology at wide scale. Considering the above scenarios, discuss the following:

 

a. Explain the features and contracts in Blockchains and why most of the organizations are adopting this technology?   (5 Marks)

 

Ans 3a.

Introduction

A blockchain acts as a shared database on a considerable scale computer community. It guarantees that the transaction is secure and comfortable. The majority of the facts on a blockchain are stored digitally on a

 

 

b. Discuss how Blockchains can help the Banking Sector in maintaining the databases and providing other advanced services and facilities to its customers. (5 Marks)

Ans 3b.

Introduction

Innovative healthcare solutions are being evolved with blockchain generation, which is still in its infancy. Healthcare carriers, diagnostic laboratories, pharmacies, and physicians use a Blockchain network to store and change affected person's information. It is possible to uncover critical mistakes in the scientific profession using

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

 

Quantitative Techniques - XIBMS Solved Assignments Latest

 

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

logo

Xaviers Institute of Business Management Studies

 

Quantitative Techniques

 

Please attempt any one question out of section A and any 10 questions out of Section B.

The section A is for 20 Marks and Section B is for 60 Marks (6 Marks X 10 Questions)

 

 

Total Marks - 80

Section A

 

Question. 1.       Distinguish between decision making under certainty and decision making under uncertainty. Mention certain methods for solving decision problems under uncertainty. Discuss how these methods can be applied to solve decision problems.

 

Question. 2.       Distinguish between probability and non-probability sampling. Elucidate the reasons for the use of non-probability sampling in many situations in spite of its theoretical weaknesses.

Answer: What is non-probability sampling?

Non-probability sampling (sometimes nonprobability sampling) is a branch of sample selection that uses non-random ways to select a group of people to participate in research.

Unlike probability sampling and its methods, non-probability sampling doesn’t focus on accurately representing all members of a large

 

Question. 3.       What are models? Discuss the role of models in decision-making. How can you classify models on the basis of behavior characteristics?

Question. 4.       What are matrices? How are determinants different from matrices? Discuss few applications of matrices in business.

 

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601

 

 

 

Section B

 

Write short notes on any ten of the following:

(a) Concept of Maxima and Minima

 

(b) Types of classification of data

 

Answer:  Classification of data

The method of arranging data into homogeneous classes according to the common features present in the data is known as classification.

 

A planned data analysis system makes the fundamental data easy to find and recover. This can be of particular interest for legal discovery, risk management, and compliance. Written methods and sets of guidelines for data classification should determine what levels and measures the company will use to organise data and define the roles of employees within the business regarding input stewardship.

 

 

 

 

 

(c) Pascal Distribution

(d) Multi-stage sampling & Multi-phase sampling

 

(e) Box-Jenkins Models for Time Series

Answer: Box-Jenkins  Methodology  and  autoregressive  integrated  moving-average  (ARIMA)  are synonymous  models  applied  to  time  series  analysis  and  forecasting.  The  methodology  for identifying,  fitting  and  checking  appropriate  ARIMA  model  studied  extensively  by  Box  and Jenkins(1976).  For this reason, ARIMA models of forecasting often  referred to  as Box-Jenkins Methodology. ARIMA models are a class of linear models that capable of representing stationary (without trend) and nonstationary (with

 

 

 (f) Determinant of a Square Matrix

Answer: The determinant of a matrix is a number that is specially defined only for square matrices. Determinants are mathematical objects that are very useful in the analysis and solution of systems of linear equations. Determinants also have wide applications in engineering, science

 

 

 

(g) Primary and Secondary Data

Answer: What is Primary Data?

Primary data is the kind of data that is collected directly from the data source without going through any existing sources. It is mostly collected specially for a research project and may be shared publicly to be used for other

 

 

(h) Bernoulli Process

 

Answer: Bernoulli process: A sequence of Bernoulli trials is called a Bernoulli process. Among other conclusions that could be reached, for n trials, the probability of n successes is pⁿ.

 

Bernoulli trial: A Bernoulli trial is an instantiation of a Bernoulli event. It is one of the simplest experiments that can be

 

 

(i) The Student's t Distribution

Answer: The T distribution (also called Student’s T Distribution) is a family of distributions that look almost identical to the normal distribution curve, only a bit shorter and fatter. The t distribution is used instead of the normal distribution when you have small samples (for more on this, see: t-score vs. z-score). The larger the sample size, the more the t distribution looks like the normal distribution. In fact, for

 

 

(j) Use of Auto-correlations in identifying Time Series

Answer: A time series, as the name suggests, is a series of data points that are listed in chronological order. More often than not, time series are used to track the changes of certain things over short and long periods — with the price of stocks or even other commodities being a prime example. Regardless, you’re taking a closer

 

 

 

 (K) Absolute value function

 

 (l) Quantiles

Answer: The word “quantile” comes from the word quantity. In simple terms, a quantile is where a sample is divided into equal-sized, adjacent, subgroups (that’s why it’s sometimes called a “fractile“). It can also refer to dividing a probability distribution into areas of equal probability.

The median is a quantile; the median is placed in a probability distribution so that exactly half of the data is lower than the median and half of the

 

 

 

 

(n) Cluster vs. Stratum

Answer: Differences Between Stratified and Cluster Sampling

The differences between stratified and cluster sampling can be drawn clearly on the following grounds:

  1. A probability sampling procedure in which the population is separated into different homogeneous segments called ‘strata’, and then the sample is chosen from the each stratum randomly, is called Stratified

 

 

 (o) Moving average models

 

 (p) Step function

 

 (q) More than type ogive

 

 (r) Subjectivist's criterion in decision making

 

 

(s) Double sampling

Answer: Double sampling is a two-phase method of sampling for an experiment, research project, or inspection. An initial sampling run is followed by preliminary analysis, after which another sample is taken and more analysis is run.

It is used in three main

 

 

 

 

 (t) Auto regressive models

 

 

          

Dear students, get latest Solved assignments by professionals.

Mail us at: help.mbaassignments@gmail.com

Call us at: 08263069601