Discuss about the The Impact of a Call Centre on Communicationn in a Programme.
The scenario is based on the multinational payment card company located in the suburb of Brisbane is planning to outsource with the help of telephone marketing. The telemarketing service providers having call centers in Singapore and Suva requires a large number of numbers of the customers and the details of the payment card. The call center is responsible for storing the required information about the customers and need to update headquarter about all the updated information. The payment card company wants security strategies, policies and the standards from the call center to ensure that the security provided to the confidential details about the customer to the call center is secured.
The need for strategy regarding the security of the customer details is a sensitive area for the payment card company as the reputation of the company is dependent on the way it handles the payment of customer in a secured way (Regina M. Hechanova 2013). Therefore, when the payment card company is giving the details of the payment information of a customer to the call center they required a security strategy of the details and the policies the call center company is acquiring for keeping the information secured.
The strategies like recording call and data, customer relationship management, voice over Internet protocols and customer tracking solutions are the significant strategies that the call center can follow for adhering with the payment card company. The call center should optimize the workforce providers for ensuring the solutions that are been provided have the exact security protocols as well as the operation is done in a network having high level of security (Guedes, Furtado and Pequeno 2014). The solution might differ with the different level of automated devices that are been used for protecting the sensitive data of the clients. The best strategies that could be applied by call centers to convince card payment company is by facilitating controls of automated controls of pause/resume system for the voice as well as screen recorder. The other option that could be used is Interactive Voice Response, end-to-end encryption, password management and audit trail (Martin 2015).
Capability/ Strategies |
Description |
Pros |
Cons |
Pause/Resume (Manual) |
The agents follow the manual pause/resume strategies. At the time, customers started sharing data, which is confidential and sensitive the agent can manually operate with help of a button that pause the recording and aging press the button for the second time for resuming recording. |
The sensitive data is protected from recording. |
The manual operation depends on the agent who is operating the system, as he might not pause the recording when the customer is sharing confidential data (Xiaosong et al. 2016). This step might affect the experience of the customer. |
Pause/Resume (Automated) |
API helps in integrating the recording with servicing application. At the time of accessing the sensitive field in application servicing, the recording is paused automatically and it is resumed automatically (Mao et al. 2016). |
The sensitive data is prevented from recording. The risk of having human error is eliminated. The process is clear and transparent. |
The resources regarding the Information Technology from the call center or the enterprise is needed at the time of implementing the solution. The customer might share the sensitive data ahead of the trigging of the automatic pause button. |
Desktop Analysis |
It helps in pausing as well as resuming the record automatically. |
This process is an automatic process and is transparent to the customers. The changes regarding code level is not required. |
The application has to be purchased and resources are required for the implementation of the Desktop Analysis (Barros, Pickering and Gudes 2015). |
Analytics of Real-time speech |
This strategy is used to spot information that is sensitive in real time. Application pauses automatically as soon as it get certain commands and recording is resumed when after a definite time delay or when other word is said by the customers (Deshpande 2014). |
The application minimizes the risk like recording and storing significant data of the customers. |
High skilled operators are needed for implementing and managing the system. |
Interactive Voice Response process of payment |
It is significantly used for recording information regarding the credit or debit card of the customer (Saylor 2014). The time when customer makes payment, the operator is responsible for transferring the customer to IVR. IVR only see or hear the information of credit card. |
The process of payment by credit card is fully secured. |
The call handling time is increased. The customer could have a negative impact as the call is transferred to the IVR. |
The implementation of cloud computing has bring a revolutionized period for the call center. The cloud computing technology has eliminated the huge capital expenditure and the investment done on the upgradation and maintenance. The call center when taking the responsibility of the payment card company needs to implement this technology (Al-Ayyoub et al. 2015). This helps in the update of the regulation, which is done by the software provider.
The call center should developed a strategy according to the requirement of the payment card company. The strategies include the following steps:
The call centers should convince the payment card company about implementation of the suitable retention policies. The policies are stated below:
The policies should be clear about the appropriate user authentication implementation among the staff, administrators and operators. The policies include the following steps:
The understated policies should be implemented by the call centers in order to adhere with the payment card company. The policies are stated below:
The call center needs to provide certain standards to the payment card company for meeting the global standards. The standards are stated below:
The goal of setting the standard to meet the global requirements is enhancing the security of the payment account with the help of awareness, knowledge and the various standards that helps in increasing the standard of the security of card payment. The major card payment companies like American Express, JCB International, Visa Inc and Discover Financial service follows the rule like PIN Transaction Security, Payment Application Data Security Standard (Ammons 2014) could be implemented by the call centers for adhering with the payment company card.
The concept of outsourcing implemented by the payment company card is great but there are certain challenges that are been assumed that the company might face while giving the work to the call center for storing the information and updating the stored data. The call center might store in the important card details of the customer in the audio recordings of the voice. The call center could overcome these challenges and convince the payment card company by the security strategies that are stated above in the report (Bond-Barnard, Steyn and Fabris-Rotelli 2013.). The call center could also convince the payment card company by which the recording of the important information data could be restricted so that no fraud or forgery could happen.
Conclusion
The recent survey shows that the customers in UK are giving a second thought before making payments through the call center. The card payment company might face this as a big barrier. The research done by Syntec Telecom shows that 30% of the Great Britain Population does not agree to pay through the call centers. The customers and the clients steel felt that a lot of thing is need to be improved for keeping the data securely in the call center. The call center could only convince the card payment company if they earn the trust of the customers. The call centers should also try to eliminate the fraud trademark that they carries and should maintain the security policies and strategies for their development.
The call center managers have to take initiative for regaining the trust of the clients. The regaining of trust is only possible if the call center starts applying the following steps in their company for customer satisfaction. The steps include:
Technology Usage: The use of technology for hiding the important information regarding the details of the credit and debit card should be implemented by the call centers.
Audit: The regular audit on the calls should be done for monitoring the fraud and forgery cases.
Training of Employees: The employees should be trained and the extreme measures should be formulated if any of the employees violated the rules of the company by committing fraud and forgery with the customers.
Monitoring: The monitoring of external and internal fraud should be done appropriately.
Strategy: The security strategy should be formulated by the organizations that should be technically sound.
Improvement: The manager should monitor the requirement of the operation for improving the programs of the security.
Elimination of Failings: The basic failings of the operations should be deleted like storing of important information.
Trusted partners: The trusted secure partners should be chosen for the security areas of the company.
References
Al-Ayyoub, M., Wardat, M., Jararweh, Y. and Khreishah, A.A., 2015. Optimizing expansion strategies for ultrascale cloud computing data centers. Simulation Modelling Practice and Theory, 58, pp.15-29.
Ammons, D., 2014. Municipal Benchmarks: Assessing Local Perfomance and Establishing Community Standards. Routledge.
Barros, A., Pickering, C. and Gudes, O., 2015. Desktop analysis of potential impacts of visitor use: A case study for the highest park in the Southern Hemisphere. Journal of environmental management, 150, pp.179-195.
Bond-Barnard, T.J., Steyn, H. and Fabris-Rotelli, I., 2013. The impact of a call centre on communication in a programme and its projects. International Journal of Project Management, 31(7), pp.1006-1016.
Boutcher, D.C., Harney, R.K., Munroe, S.J. and Scheel, J.J., International Business Machines Corporation, 2014. Real-time security verification for banking cards. U.S. Patent 8,632,002.
De Pessemier, T., Stevens, I., De Marez, L., Martens, L. and Joseph, W., 2015. Analysis of the quality of experience of a commercial voice-over-IP service. Multimedia Tools and Applications, 74(15), pp.5873-5895.
Deryugin, V.N., Giacomini, P., Makagon, P., Ryabchun, A. and Anisimov, N., Genesys Telecommunications Laboratories, Inc., 2015. Method and apparatus for extended management of state and interaction of a remote knowledge worker from a contact center. U.S. Patent 9,002,920.
Deshpande, M.V., Marifet, K., Matthews, J.B., Wogulis, J.L. and Chou, L.P., Google Inc., 2014. System for displaying a web page with real time analytics data overlay. U.S. Patent 8,775,611.
Ferdoush, S. and Li, X., 2014. Wireless sensor network system design using Raspberry Pi and Arduino for environmental monitoring applications. Procedia Computer Science, 34, pp.103-110.
Filonov, V., Lum, H., Culbert, J., Blander, D., Subramaniam, S., Cicchitto, A. and Gvildys, P., Genesys Telecommunications Laboratories, Inc., 2015. Call event tagging and call recording stitching for contact center call recordings. U.S. Patent 9,178,989.
Guedes, R., Furtado, V. and Pequeno, T., 2014, September. Multiagent models for police resource allocation and dispatch. In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint (pp. 288-291). IEEE.
Long, J., Shelhamer, E. and Darrell, T., 2015. Fully convolutional networks for semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 3431-3440).
Mao, C., Yu, H., Shi, J., Cai, T. and Yang, B., 2016, January. Automated Interactive Visualization on Abstract Concepts in Computer Science. In International Conference on Computer Science Education Innovation & Technology (CSEIT). Proceedings (p. 121). Global Science and Technology Forum.
Martin, L., 2015. Noncitizen detention: Spatial strategies of migrant precarity in US immigration and border control. In Annales de géographie (No. 2, pp. 231-247). Armand Colin.
Milstein, D., Odinak, G. and Lee, H.M., Intellisist, Inc., 2015. Computer-Implemented System And Method For Protecting Sensitive Information Within A Call Center In Real Time. U.S. Patent Application 14/667,603.
Murdoch, S.J. and Anderson, R., 2014, March. Security protocols and evidence: Where many payment systems fail. In International Conference on Financial Cryptography and Data Security (pp. 21-32). Springer Berlin Heidelberg.
Ozkaynak, M., Johnson, S., Shimada, S., Petrakis, B.A., Tulu, B., Archambeault, C., Fix, G., Schwartz, E. and Woods, S., 2014. Examining the Multi-level Fit between Work and Technology in a Secure Messaging Implementation. In AMIA Annual Symposium Proceedings (Vol. 2014, p. 954). American Medical Informatics Association.
Paulsen, K.L., Cirque Corporation, 2014. Method for protecting cardholder data in a mobile device that performs secure payment transactions and which enables the mobile device to function as a secure payment terminal. U.S. Patent Application 14/150,313.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.
Puzio, P., Molva, R., Önen, M. and Loureiro, S., 2014. Block-level de-duplication with encrypted data. Open Journal of Cloud Computing (OJCC), 1(1), pp.10-18.
Regina M. Hechanova, M., 2013. The call center as a revolving door: a Philippine perspective. Personnel Review, 42(3), pp.349-365.
Saylor, M.J., Bouzid, A.T., Durgani, P.B., Rennyson, D.J. and Perera, P.S.N., Angel. Com Incorporated, 2014. Multimodal interactive voice response system. U.S. Patent 8,654,934.
Xiaosong, Z.H.O.U., Wu, H.J., Chung, C.Y., Normile, J.O., Abuan, J.S., Jeong, H., Yang, Y., Johar, G. and Jansen, T., Apple Inc., 2016. Dynamic detection of pause and resume for video communications. U.S. Patent 9,232,187.
Ye, N., Zhu, Y., Wang, R.C. and Lin, Q.M., 2014. An efficient authentication and access control scheme for perception layer of internet of things.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download