Verified Document

Technology Adoption In A Call Center Enterprise Essay

Related Topics:

Call centers have become a very vital component of business today and employ several million people the world over. Their increasing role and place in operations have made them a target for researchers looking to study operations management. This has been the case in several fields including capacity planning, personnel scheduling, queuing and forecasting. Further, with the advancement of information technology and telecommunications, new challenges have arisen that call centers all over the world have to face and various technologies have complicated the operations of call centers (Aksin, Armony & Mehrotra, 2007). Operation Technology (OT) helps in the creation of physical value as well as in the process of manufacturing. It consists of sensors, software and devices needed for the control and monitoring of equipment in a plant as well as the plant as a whole. On the other hand, Information technology (IT) brings together all the required pieces of technology to help in the processing of information. The last decade saw several companies manage IT and OT as independent entities with different technology protocols, governance models, organizational units, stacks and protocols. Nonetheless, the past few years has seen OT continuously adopt IT- related technologies. For instance, IP (Internet Protocol) is increasing in popularity as an all-inclusive networking protocol while Windows™ is becoming even more popular with several devices adopting it. The convergence of OT and IT is bringing the benefits of their use to the attention of executives as cost and risks are reduced and performance and flexibility improved (ATOS, 2012).Organizations have the independent will to choose which technology to adopt and so they must not rush to take up technologies just because competitors are using them. Adoption of technologies must be evaluated on their own merit. This calls for strong leadership and will to evaluate significant and relevant factors without bias or prejudice (Septer, 2013).

Issues in a Technical Environment



i. Cyber-security

The security of an organizations infrastructure depends on the soundness and reliability of its critical components. Cyber-security threats seek to take advantage of the rising complexity of the infrastructure systems. Just as reputational and financial risk behaves, cyber-security risk tends to affect an organization's bottom line. It can increase costs tremendously and reduce revenue. An organization can be critically harmed by a cyber attack and its ability to gain new customers and maintain the existing customers can be greatly dented (National Institute of Standards and Technology, 2014).

ii. Systems Issues

The design, development and implementation process of an Information System (IS) is neither easy nor straightforward. Reports indicate that IS projects have an unusually high failure rate. There have been increasing concerns why this is the case. The answer to the concerns is that the nature of Information Systems failures has not yet been adequately understood. It is...
Furthermore, new problems frequently arise when previous problems weren't nipped in the bud thereby leading to a situation where problems continually get from bad to worse. (Raza & Standing 2008).
The other contributing factors include (Septer, 2013):

i. Processes that are not documented completely from end to end within an organization lead to inefficiencies and delays.

ii. There are several inconsistencies as well defined governance policies and guidelines are lacking.

iii. Knowledge workers in an organization tend to waste lots of man hours searching for relevant information or developing workarounds of the pieces of information needed.

Enterprise Technology Management -- Best Practices



Enterprise systems are typically generic solutions. Their design reflects assumptions about how companies generally operate. The developers tend to systemize them to reflect best practices. The problem arises when the user has no say on what constitutes a best practice during development. It is the vendor who gets to define what the best practices are. Such assumptions can lead to a system that runs against the interests of an organization that uses them (Davenport, 1998).

Anatomy of an Enterprise System (Davenport, 1998)

The configuration of an enterprise system involves making sacrifices and balancing wants and needs and proceeding to operate in a way that the system allows. The following two configuration models can be adopted (Davenport, 1998):

1. Modules

A majority of enterprise systems are modular and so only allow an organization to put the system to use for some of the functions but not all. There are cases where a company really is not in need of a module. A service organization, for instance, isn't likely to need a manufacturing module. In some cases, other modules are rendered useless as the organization already has a working system for the function the module carries out. Generally, the higher the number of selected modules, the greater the benefits of integration, but also the higher the risks, changes and costs involved.

2. Configuration Tables

A configuration table allows a company to customize various aspects of a system to how it operates. An organization can choose, for instance, the mode of inventory accounting -- LIFO or FIFO -- that will be employed and the way it wants to recognize revenue -- by location, distribution channel or product line. Complex ES offering have lots of configuration tables with SAP's R/3, for instance, having 3000. It can take a lot of time to go through all of them. Dell Computer, for instance, spends more than one year on the exercise.

Besides having serious implications to the strategic goals of an organization, enterprise systems also impact an organization's culture. The provision of real-time and universal access to financial and operating data has allowed for…

Cite this Document:
Copy Bibliography Citation

Related Documents

Adoption As Well As Diffusion
Words: 4795 Length: 15 Document Type: Term Paper

The main framework is however the Diffusion of Innovation (DoI) theory that was proposed by Rogers (1995). Other factors are however incorporated so as to make use understand the user adoption of the ENUM technology. The users possessing high adoption application of ENUM are to be assumed to be the 'early adopters' and are to be associated with the factors employed in Roger's (1995) theory in characterizing the early

Technology Management in Pubic Administration
Words: 463 Length: 2 Document Type: Article Review

The finding of this study is consistent with others that over time the organizational culture, communication and culture will also change to reflect the IT foundational elements defined, implemented and eventually engrained into the culture of a public administration office or ministry (Androniceanu, 2009). Realizing this, public administration IT planners and Chief Information officers are designing systems to allow for greater agility and speed to response to citizen's requirements.

Technology Affect Marketing
Words: 3808 Length: 15 Document Type: Term Paper

These additional offerings can help to generate higher, sometimes passive, earnings as well as increase a firm's potential differentiation. Ways" (Margarit, Methods that can be used to do just this include the following: Setting up a knowledge base that your clients can have access to that includes a FAQ or query function allowing your clients to query you for information. Using a feedback form where clients can offer their input as their

Enterprise Architecture New Text Is
Words: 1781 Length: 4 Document Type: Term Paper

The hybrid nature of cloud computing in general and SaaS specifically will continue as enterprises question if they are really getting the value out of the systems they are relying on. References Bala, R., & Carr, S. (2010). Usage-based pricing of software services under competition. Journal of Revenue and Pricing Management, 9(3), 204-216. Beimborn, D., Miletzki, T., & Wenzel, S. (2011). Platform as a service (PaaS). Business & Information Systems Engineering, (6),

Enterprise Resource Systems the Company
Words: 4679 Length: 13 Document Type: Term Paper

Some manufacturers have sought to improve their profitability by becoming more horizontally integrated in their supply chain management operations, but it does not appear feasible for the company to acquire the vendors that supply its component parts so viable alternatives must be identified that can facilitate the supply chain management process vertically. As Choy, Lee and Lo (2003) point out, "Very few manufactures now own all the activities along the

Healthcare: How Technology Has Changed
Words: 3010 Length: 11 Document Type: Thesis

" (2004, p.159) Activities have included: (1) Development and promotion of industry-wide standards; (2) Funding of research for investigation of the impact of IT on quality; (3) Provision of incentives that provide encouragement of investment in IT; (4) Giving grants to investors in IT; and (5) Development of strategies to improve the flow of information across providers. (Report to Congress, June, 2004, p.159) Stated additionally in the Report to Congress is that there are multiple

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now