Premium Essay

Re-Engineering the Payment Processing System at Rfc

In:

Submitted By CeeKhey
Words 530
Pages 3
Question 2

The company RFC encounters some difficulties in its payment processing system. Re-engineering might solve some of the issues faced by its managers.

First of all, a full understanding of the five different problems RFC listed in this case study is necessary. Althought each one of these problem is unique, affects different part of the organisation and have their own consequences, they all come from the same origin:

Complexity of information management and communication

Process too slow

Here are some possible changes that would improve the payment processing.

Eliminate the possibility for the customer to pay in the Home Office directly. Indeed, the Home Office have huge difficulties to find informations about the payment, leading therefore to lots of errors of payments (Problem #1). This action will simplifies the payment processing and reduce factors of errors and clerical work (Problem #3). Beside, it will also reduce the time needed to make necessary file updating.

There is a delay between the moment a payment is made, and the moment when this fact is taken into account in the business process database. Alas, no matter the changes in the processes, there will always be a little delay. In this case, batch payment processing is run every evening to update all data centrally, so the delay is at least 1 day long.

An action would be to urge managers of the branchs to hurry to update particuliary important file each time they have to make a modification on it. The Outstanding Loans File, which is a major document, is always several days out of date, leading to numerous problems:

Problem#2: Angry customers complain about receiving one reminder, even though they have already paid, even if after the due date. I don't think mistake of that kind can be avoided, since the delay would always exist, even made smaller. So maybe, to avoid

Similar Documents

Premium Essay

Any Title

...Review and update Consumption History. b. Performing the forecast with a Graphical Display c. Create Purchase Requisition. d. Creating Purchase Order (From the Purchase Requisition) 1. MM02 2. MP30 3. ME51N 4. ME58 I- 1a 2b 3c 4d II- 1d 2b 3a 4c III- 1d 2c 3b 4a IV- 1a 2b 3d 4c Q4. In a standard purchase process we use following sequences: 1. ME51N, ME57, ME58, VL31N, MIGO, MB03, MIRO. 2. ME51N, ME57, ME58, MIRO, MB03, MIGO, VL31N. 3. ME57, ME58, ME51N, MB03.JVIIGO, MIRO, VL31N. 4. MIRO, MIGO, VL31N, ME51N, ME58, ME57, MB03. Q5. Expand any 10: HR, SD, LO, LE, QM, PM, CS, PP, PP-PI, PS, MM, FI-AP, Fl-AR, FI-AA, FI-GL, TR, CO-OM, CO-CCA, CO-OPA, CO-CEL, CO-ABC, IM, EC, EC-CS, EC-PCA, RE, PS, Section: B 3 out of 4 (Long Questions) 10 Marks each. Q1. Does ERP implementation improves company's business performance explain, and give 2 Tangible as well as 2 Intangible benefits of after ERP adoption by a company. Q2. An ERP project can be classified into how many stages, explain each stage in brief. Q3. Which are the two largest players in the ERP segment, give their strengths and weaknesses and name one product...

Words: 1492 - Pages: 6

Premium Essay

Case: Re-Engineering the Payment Process System at Rfc

...ERP-systems (1729) Case: Re-engineering the Payment Process System at RFC Question 1: Draw a current process model for the payment processing system at RFC. Question 2: What changes in business processes and information do you feel will improve the payment processing system at RFC? Main system I would consider to adding a central server at the headquarters of RFC. Especially since they are considering to expand in the next three years. Using a central server gives the branches the opportunity to be up-to-date in real-time. To accomplish this, all branches need an Internet connection with a VPN connection to the headquarters central server. Every branch has its own ERP branch software that is connected to the headquarters ERP system and therefore also with the central server. When using a process like this it is important that the ERP systems know when someone is watching a certain profile or editing it as it will prevent errors and or double entries. The vouchers and bank receipts will not be used anymore and will be replaced by the ERP system. Customers have to sign a form whether they pay at a branch or at the HQ. If a branch deposited the money, an e-mail will be sent to the branch and HQ to inform the employees. The bank will send data to the main server that updates the main ERP system and thereby also the ERP branch software. Customers It is a must for customers to be able to use a web application that gives them the opportunity to pay online and...

Words: 966 - Pages: 4

Premium Essay

Business Process Management

...Business Process Management Methodology 1 Introduction From Wikipedia, we copy: «A business process is a set of linked activities that create value by transforming an input into a more valuable output. Both input and output can be artifacts and/or information and the transformation can be performed by human actors, machines, or both. There are three types of business processes: 1. Management processes - the processes that govern the operation. Typical management processes include "Corporate Governance" and "Strategic Management". 2. Operational processes - these processes create the primary value stream, they are part of the core business. Typical operational processes are Purchasing, Manufacturing, Marketing, and Sales. 3. Supporting processes - these support the core processes. Examples include Accounting, Recruitment, IT-support. A business process can be decomposed into several sub-processes, which have their own attributes, but also contribute to achieving the goal of the super-process. The analysis of business processes typically includes the mapping of processes and sub-processes down to activity level. Activities are parts of the business process that do not include any decision making and thus are not worth decomposing (although decomposition would be possible), such as "Answer the phone", "produce an invoice".» A business process is a systematic approach of the enterprise, where its activities are examined as revenue generating and value adding transformations of...

Words: 8923 - Pages: 36

Free Essay

Android

...------------------------------------------------- ------------------------------------------------- Session 2012-13 ------------------------------------------------- By + ------------------------------------------------- Jeetendra Kumar Maurya ------------------------------------------------- 1045914041 ------------------------------------------------- ------------------------------------------------- Under the guidance of ------------------------------------------------- MR. Vinod Kumar (Sr. Asst. Professor) ------------------------------------------------- ------------------------------------------------- ACADEMY OF BUSINESS & ENGINEERING SCIENCES ------------------------------------------------- (MCA Institute), Ghaziabad (459) | | | ------------------------------------------------- ------------------------------------------------- AFFILIATED TO ------------------------------------------------- MAHAMAYATECHNICAL UNIVERSITY, NOIDA -------------------------------------------------...

Words: 6401 - Pages: 26

Premium Essay

Computer Networking

...Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education,...

Words: 69922 - Pages: 280

Free Essay

Analysis of Long Term Financing in Riico

...“ANALYSIS OF LONG TERM FINANCING IN RIICO’’ A Summer Internship Project/Dissertation SUBMITTED FOR THE PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF Master of Business Administration SUBMITTED BY RAUNAK JAIN ROLL NO.-AUR1001049 UNDER GUIDANCE OF MS. ARPITA SHARMA AMITY BUSINESS SCHOOL AMITY UNIVERSITY RAJASTHAN 2010-2012 Acknowledgement Achieving A Milestone For Any Person Is Extremely Difficult. However, There Are Motivations Which Come Across The Curvaceous Path Like Twinkling Stars And Make Our Task Easier. An Opportunity Has Been Given To Me By Rajasthan Sate Industrial Development And Investment Corporation Limited. Jaipur For Summer Training In The Field Of Finance For The Period From 6 june 2011 To 21th July 2011 (45 Days) I Would Also Like To Express My Special Gratitude To Mr. P.M. Jain For Giving His Precious Time For Guiding Me And Help Me In Bringing Out The Work In The Present Shape And Sharing A Valuable Knowledge Which Help Me In Building The Future Edge Of My Career. Also I would Like To Thanks Mr. A.K Jahalani (Agm –Appraisal), Mr. Suneet Mathur (Osd-Infra/Finance), Mr. V.B.Mathur (Agm-F&R), Mr.A.C. Chhabra(Sr.Dgm-Finance), Mr.R.K.Limba(Dgm-Appraisal),Mr.P.K. Sharma(Dgm),Mr. Vishal Dixit, Anoop Kumar Mathur(Dgm-Pid). Unger The Supervision Of Sir Krishan Goyal Sipriya (Dgm(Finance)) Thanks To Sir For Giving Valuable Input Time To Time In The Course Of My Training...

Words: 11007 - Pages: 45

Premium Essay

Srs Template

...Software tools Warranty, operational guarantee and system reliability with ‘on-site’ support Annual Maintenance Contract Price Loading for Evaluation of Bids Payment terms Project synopsis Bid Schedule Basic reference drawings Spares Time schedule Implementation schedule Quality assurance plan Qualifying requirements 2 of G1 2 of G1 4 of G1 19 of G1 23 of G1 23of G1 23of G1 24 of G1 24 of G1 26 of G1 26 of G1 27 of G1 27 of G1 27 of G1 27 of G1 27 of G1 28 of G1 28 of G1 28 of G1 29 of G1 Page-2 Section – G2 :: Technical specification requirements for Application Packages Sl. No. Title Page No. / Section No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Part-A – Essentially Required by most Utilities for setting up an IT backbone for collection of baseline data, Energy Accounting / Auditing and establishment of Customer care centers Introduction System Functionality Module : Meter Data Acquisition Module : Energy Audit Module : New Connection Module : Disconnection & Dismantling Module : GIS based customer Indexing and asset mapping Module : GIS based integrated network analysis module Module : Centralized Customer Care Services Module : Management Information System (MIS) Module : Web Self Service Module : Identity and Access Management system Module : System Security Requirement Part-B – Requirement based implementation of Commercial Processes like M,B,C for Utilities, who do not have such IT enabled systems Development of...

Words: 90558 - Pages: 363

Premium Essay

Computer Science

...to an act carried out in the open?Answer | | | | | Selected Answer: |    overt act | Correct Answer: |    overt act | | | | |  Question 2 0 out of 0.5 points | | | What is a characteristic of a hardened computer or device?Answer | | | | | Selected Answer: |    Unnecessary services have been turned off or disabled | Correct Answer: |    Both A and B | | | | |  Question 3 0.5 out of 0.5 points | | | Social engineering is a fancy phrase for lying. It involves tricking someone into sharing confidential information or gaining access to sensitive systems. In many cases, the attacker never comes face to face with the victim. Instead, the attacker might phone an employee and pose as a (n) ________________________. All too often, attackers trick employees into sharing sensitive information. After all, employees think, what’s wrong with giving your password to a(n) ________________?Answer | | | | | Selected Answer: |    system administrator | Correct Answer: |    system administrator | | | | |  Question 4 0 out of 0.5 points | | | Which of the following is not a type of monitoring device?Answer | | | | | Selected Answer: |    IPS | Correct Answer: |    Server log | | | | |  Question 5 0.5 out of 0.5 points | | | What is meant by clipping levels?Answer | | | | | Selected Answer: |    Values used in security monitoring that tell controls to ignore activity that falls below ...

Words: 12833 - Pages: 52

Free Essay

Nit-Silchar B.Tech Syllabus

...Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood Control Concrete Lab Structural Engineering Lab L 3 3 3 3 3 0 0 0 0 0 15 3 3 3 3 3 0 0 0 0 15 3 3 3 3 3 0 0 T 0 0 1 1 1 0 0 0 0 0 3 1 1 0 1 0 0 0 0 0 3 1 1 1 0 0 0...

Words: 126345 - Pages: 506

Premium Essay

Top Down Cisco

...Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy...

Words: 79785 - Pages: 320

Premium Essay

Pretty Good Privacy

...to and do, send mail to others who are connected directly or indirectly to the internet. PGP(Pretty Good Privacy) is an open-source freely available software for E-Mail security. It provides authentication through the use of digital signature, confidentiality through the use of symmetric block encryption, compression using the ZIP algorithm, E-Mail compatibility using the radix-64 encoding scheme and segmentation and reassembly to accommodate long e-mails. Chapter 2 Review of literature tells the need and appraisal of e-mail security Software. E-mail is well established as a prime means of communication for business purposes that is quicker and cheaper than more traditional methods. Thus is necessary to make one’s corporate messaging system as secure as...

Words: 27771 - Pages: 112

Free Essay

Character Evidence

...BLACKBERRY SOLUTION LICENSE AGREEMENT PLEASE READ THIS DOCUMENT CAREFULLY BEFORE INSTALLING OR USING THE SOFTWARE. This BlackBerry Solution License Agreement (the "Agreement"), previous versions of which were referred to as the BlackBerry Software License Agreement, is a legal agreement between you, individually if you are agreeing to it in your own capacity, or if you are authorised to acquire the Software on behalf of your company or another entity, between the entity for whose benefit you act (in either case, "You"), and Research In Motion UK Limited, Company No. 4022422 ("RIM") whose registered office is at Centrum House, 36 Station Road, Egham, Surrey, UK TW20 9LF (together the "Parties" and individually a "Party"). With respect to the license and distribution of the Software (as defined below) RIM is either a direct or indirect licensee of: (a) Research In Motion Limited ("RIM Canada") or any one or more of its subsidiaries and affiliates (which subsidiaries and affiliates together with RIM Canada are referred to in this Agreement as the "RIM Group of Companies"); or (b) a third party licensor to any of the RIM Group of Companies including RIM. BY INDICATING YOUR ACCEPTANCE BY CLICKING ON THE APPROPRIATE BUTTON BELOW, OR BY DOWNLOADING, INSTALLING, ACTIVATING OR USING THE SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU HAVE ANY QUESTIONS OR CONCERNS ABOUT THE TERMS OF THIS AGREEMENT, PLEASE CONTACT RIM AT LEGALINFO@RIM.COM. BY INDICATING YOUR...

Words: 13270 - Pages: 54

Free Essay

Global Dairy

...www.pwc.com Global Agribusiness Monthly commentary from our Agribusiness experts around the Globe. October 2014 Contents Regional views Did you know? Publications Calendar of events Prices Global Agribusiness contacts 2 8 11 13 14 21 Regional views Overview With teams around the Globe, this document sets out to give a flavour of what our local agribusiness experts are observing in their territories. This month we are reminded of the ever present impact of volatility on Global agriculture. We have seen significant falls in dairy commodities, grains and oils in 2014 with coffee soaring in the opposite direction on the back of a drought in Brazil. The moves have happened quickly (e.g dairy down over 50% in New Zealand since February 2014 and coffee spot prices up over 30% since August 2014) and this can be difficult for farm families or small holders to deal with. For example in the UK, dairy farmers have taken to public protests and blockades. At PwC we are bullish on the long term prospects for agriculture given Global population and wealth trends however we also recognise that this future optimism can be meaningless to a farmer when short term production costs exceed selling price. Agriculture is a volatile industry and participants have to put in place their own strategies to deal with this which are right for them, be it selling forward or hedging for budget certainty, insuring where possible against crop loss, keeping a buffer of cash or liquid assets which...

Words: 9275 - Pages: 38

Premium Essay

Capture

...COMMUNICATIONS Christopher Cox Director, Chris Cox Communications Ltd, UK A John Wiley & Sons, Ltd., Publication This edition first published 2012 © 2012 John Wiley & Sons Ltd Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate...

Words: 124044 - Pages: 497

Free Essay

Management Concept

...Software Engineering: A Practitioner's Approach Copyright © 1996, 2001 R.S. Pressman & Associates, Inc. For University Use Only May be reproduced ONLY for student use at the university level When used in conjunction with Software Engineering: A Practitioner's Approach. Any other reproduction or use is expressly prohibited. Chapter 1 The Product CHAPTER OVERVIEW AND COMMENTS The goal of this chapter is to introduce the notion of software as a product designed and built by software engineers. Software is important because it is used by a great many people in society. Software engineers have a moral and ethical responsibility to ensure that the software they design does no serious harm to any people. Software engineers tend to be concerned with the technical elegance of their software products. Customers tend to be concerned only with whether or not a software product meets their needs and is easy to use. 1.1 The Evolving Role of Software The main point of this section is that the primary purpose of software is that of information transformer. Software is used to produce, manage, acquire, modify, display, and transmit information anywhere in the world. The days of the lone programmer are gone. Modern software is developed by teams of software specialists. Yet, the software developer's concerns have remained the same. Why does software take so long to complete? Why does it cost so much to produce? Why can't all errors be found and removed...

Words: 43682 - Pages: 175