Table of contents | |
Chapter Overview | |
Introduction | |
Enterprise Business Processes | |
Automated Business Processes | |
Risks and Its Management |
In today’s connected world where information flows at speed of light, success of any organization depends on its ability to respond to fast changing environment. The capability of any organization depends on its ability to take fast decisions. A large organization typically has several different kinds of Information systems built around diverse functions, organizational levels, and business processes that can automatically exchange information. All these information systems have fragmentation of data in hundreds of separate systems, degrades organizational efficiency and business performance. For instance – sales personnel might not be able to tell at the time they place an order whether the ordered items are in inventory, and manufacturing cannot easily use sales data to plan for next production.
The solution to this problem is provided by Enterprise Information Systems, by collecting data from numerous crucial business processes like manufacturing and production, finance and accounting, sales and marketing, and human resources and storing the data in single central data repository. An Enterprise Information System (EIS) may be defined as any kind of information system which improves the functions of an enterprise business processes by integration.
An EIS provides a technology platform that enables organizations to integrate and coordinate their business processes on a robust foundation. An EIS provides a single system that is central to the organization that ensures information can be shared across all functional levels and management hierarchies. It may be used to amalgamate existing applications. An EIS can be used to increase business productivity and reduce service cycles, product development cycles and marketing life cycles. Other outcomes include higher operational efficiency and cost savings.
Example 1: When a customer places an order, the data flow automatically to other fractions of the company that are affected by them leading to the enhanced coordination between these different parts of the business which in turn lowers costs and increases customer satisfaction. Refer to the Fig. 1.1.1.
A Business Process is an activity or set of activities that will accomplish a specific organizational goal. Business processes are designed as per vision and mission of top management. Business processes are reflection of entities management thought process. The success or failure of an organization is dependent on how meticulously business processes have been designed and implemented.
Business Process Management (BPM) helps an organization achieve 3E’s for business processes, namely Effectiveness, Efficiency and Economy. BPM is a systematic approach to improving these processes. Business Process Management is an all-round activity working on a 24x7 basis to ensure improvement in all parameters all the time. The key components of business process are outlined below.
The details of these processes are shown in the Fig. 1.2.1 below:
The key guiding factor for any business process shall be top management vision and mission. This vision and mission shall be achieved through implementing Operational, Support and Management services. These are referred to as categories of business process.
Depending on the organization, industry and nature of work; business processes are often broken up into different categories as shown in the Fig. 1.2.2.
I. Operational Processes (or Primary Processes)
Operational or Primary Processes deal with the core business and value chain. These processes deliver value to the customer by helping to produce a product or service. Operational processes represent essential business activities that accomplish business objectives e.g. purchasing, manufacturing, and sales. Also, Order to Cash cycle (O2C) and Purchase to Pay (P2P) cycles are associated with revenue generation.
II. Supporting Processes (or Secondary Processes)
Supporting Processes back core processes and functions within an organization. Examples of supporting or management processes include Accounting, Human Resource (HR) Management and workplace safety. One key differentiator between operational and support processes is that support processes do not provide value to customers directly. However, it should be noted that hiring the right people for the right job has a direct impact on the efficiency of the enterprise.
Example 2: Human Resource Management
The main HR Process areas are grouped into logical functional areas - Recruitment and Staffing; Goal Setting; Training and Development; Compensation and Benefits; Performance Management; Career Development and Leadership Development.
III. Management Processes
Management Processes measure, monitor and control activities related to business procedures and systems. Examples of management processes include internal communications, governance, strategic planning, budgeting, and infrastructure or capacity management. Like supporting processes, management processes do not provide value directly to the customers. However, it has a direct impact on the efficiency of the enterprise.
Example 3: Process of Budgeting
Referring to the Fig. 1.2.3, in any enterprise, budgeting needs to be driven by the vision (what enterprise plans to accomplish) and the strategic plan (the steps to get there). Having a formal and structured budgeting process is the foundation for good business management, growth and development.
Table 1.2.1 summarises various categories of Business Processes through an example.
Table 1.2.1: Examples representing all categories of Business Processes
Today technology innovations are increasing day by day, technology is becoming easily available, cost of accessing and using technology is going down, internet connectivity in terms of speed and geographical spread is increasing day by day. All these factors are having a profound impact on the business processes being used by entity.
In the days of manual accounting, most business processes were carried out manually. For example, a sales invoice would be raised manually and based on the shipment of goods the inventory would be manually updated for reducing the stock. Subsequently the accounting entries would be manually passed by debiting and crediting the respective accounts, through journal entries. Today most of the business processes have been automated to make enterprises more efficient and to handle the large volumes of transactions in today’s world. This is what has led to Business Process Automation (BPA). The manual example given above would be performed in an integrated computer system as follows:
Business Process Automation (BPA) is the technology-enabled automation of activities or services that accomplish a specific function and can be implemented for many different functions of company activities, including sales, management, operations, supply chain, human resources, information technology, etc. In other words, BPA is the tactic a business uses to automate processes to operate efficiently and effectively. It consists of integrating applications and using software applications throughout the organization. BPA is the tradition of analyzing, documenting, optimizing and then automating business processes.
The success of any Business Process Automation shall only be achieved when BPA ensures the following:
To ensure that all the above parameters are met, BPA needs to have appropriate internal controls put in place.
A process is a repetitively used network of orderly linked activities using information and resources for transforming inputs to outputs. And the business process is the flow of information, customized by value-added tasks, that begins with the primary contact with a potential customer and continues through deliverance of a finished product. Well -developed business processes can generate a flawless link from initial customer interface through the supply chain. Automation of these processes maintains the accuracy of the information transferred and certifies the repeatability of the value-added tasks performed.
Table 1.3.1 elaborates on major benefits of automating Business Processes.
Quality and Consistency
- Ensures that every action is performed identically resulting in high quality, reliable results and stakeholders will consistently experience the same level of service.
Time Saving
- Automation reduces the number of tasks employees would otherwise need to do manually.
- It frees up time to work on items that add genuine value to the business, allowing innovation and increasing employees’ levels of motivation.
Visibility
- Automated processes are controlled, and they consistently operate accurately within the defined timeline. It gives visibility of the process status to the organization.
Improved Operational Efficiency
- Automation not only ensures systems run smoothly and efficiently, but also that errors are eliminated and that best practices are constantly leveraged.
Governance & Reliability
- The consistency of automated processes means stakeholders can rely on business processes to operate and offer reliable services to customers, maintaining a competitive advantage.
Reduced Turnaround Time
- Eliminate unnecessary tasks and realign process steps to optimize the flow of information throughout production, service, billing and collection. This adjustment of processes distils operational performance and reduces the turnaround time for both staff and external customers.
Reduced Costs
- Manual tasks, given that they are performed one-at-a-time and at a slower rate than an automated task, will cost more. Automation allows to accomplish more by utilizing fewer resources.
Technology is the enabler of Business Process Automation (BPA). BPA offers many advantages to the business. But every business process is not a good fit for automation. Companies tend to automate those business processes that are time and resource-intensive operationally or those that are subject to human error. Following are the few examples of processes that are best suited to automation:
Automated processes are susceptible to many challenges, some of them are discussed below:
Business needs a reason to go for any new system. Benefits outlined in Table 1.3.1 are good indicators why any business shall go for automation for business process.
Of all good reasons discussed above, one factor needs additional consideration that is global competition. Today the connected world has opened huge opportunities as well as brought new threats to any business. The increased availability of choice to customers about products/services makes it very important for businesses to keep themselves updated to new technology and delivery mechanisms. All these factors are forcing businesses to adopt BPA.
The steps to go about implementing Business Process Automation are depicted in Table 1.3.2. One important point to remember is that not all processes can be automated at a time. The best way to go about automation is to first understand the criticality of the business process to the enterprise. Let us discuss the key steps in detail.
(i) Step 1: Define why we plan to implement a BPA?
The primary purpose for which an enterprise implements automation may vary from enterprise to enterprise. A list of generic reasons for going for BPA may include any or combination of the following:
(ii) Step 2: Understand the rules / regulation under which enterprise needs to comply with?
One of the most important steps in automating any business process is to understand the rules of engagement which include following the rules, adhering to regulations and following document retention requirements. This governance is established by a combination of internal corporate policies, external industry regulations and local, state, and central laws. Regardless of the source, it is important to be aware of their existence and how they affect the documents that drive the processes. It is important to understand that laws may require documents to be retained for specified number of years and in a specified format. Entity needs to ensure that any BPA adheres to the requirements of law.
(iii) Step 3: Document the process, we wish to automate
At this step, all the documents that are currently being used need to be documented. The following aspects need to be kept in mind while documenting the present process:
The benefit of the above process for user and entity being:
An easy way to do this is to sketch the processes on a piece of paper, possibly in a flowchart format. Visio or even Word can be used to create flowcharts easily.
It is important to understand that no automation shall benefit the entity, if the process being automated is error-prone. Investment in hardware, workflow software and professional services, would get wasted if the processes being automated are not made error-free. Use of technology needs to be made to realize the goal of accurate, complete and timely processing of data so as to provide right information to the right people safely and securely at optimum cost.
Table 1.3.2: Steps involved in Implementing Business Process Automation
(iv) Step 4: Define the objectives/goals to be achieved by implementing BPA
Once the above steps have been completed, entity needs to determine the key objectives of the process improvement activities. When determining goals, remember that goals need to be SMART:
Example 4: Consider for the following cases
Case 1: For vendor’s offering early payment discounts, entity needs to consider:
Case 2: To determine the average invoice aging per customer. Entity can decide to reduce the average from 75 days to 60 days. This alone can dramatically improve cash flow.
(v) Step 5: Engage the business process consultant
This is again a critical step to achieve BPA. To decide as to which company/ consultant to partner with, depends upon the following:
(vi) Step 6: Calculate the RoI for project
The right stakeholders need to be engaged and involved to ensure that the benefits of BPA are clearly communicated, and implementation becomes successful. Hence, the required business process owners have to be convinced so as to justify the benefits of BPA and get approval from senior management. A lot of meticulous effort would be required to convince the senior management about need to implement the right solution for BPA. The right business case must be made covering technical and financial feasibility so as to justify and get approval for implementing the BPA. The best way to convince would be to generate a proposition that communicates to the stakeholders that BPA shall lead to not only cost savings for the enterprise but also improves efficiency and effectiveness of service offerings.
Some of the methods for justification of a BPA proposal may include:
The above can be very well presented to justify the proposal and convince management to go ahead with the project of BPA implementation as required for the enterprise.
(vii) Step 7: Developing the BPA
Once the requirements have been document, RoI have been computed and top management approval to go ahead has been received, the consultant develops the requisite BPA. The developed BPA needs to meet the objectives for which the same is being developed.
(viii) Step 8: Testing the BPA
Once developed, it is important to test the new process to determine how well it works and identify where additional “exception processing” steps need to be included. The process of testing is an iterative process, the objective being to remove all problems during this phase.
Testing allows room for improvements prior to the official launch of the new process, increases user adoption and decreases resistance to change. Documenting the final version of the process will help to capture all of this hard work, thinking and experience which can be used to train new people.
Case 1: Automation of purchase order generation process in a manufacturing entity Various steps of automation are given as follows:
Step 1: Define why we plan to go for a BPA?
The entity has been facing the problem of non-availability of critical raw material items which is leading to production stoppages and delay in delivery. Delay in delivery has already cost company in terms of losing customer and sales.
Step 2: Understand the rules / regulation under which needs to comply with?
The item is not covered by regulation, regarding quantity to be ordered or stored. To keep cost at minimum, entity has calculated economic order quantity for which orders are placed.
Step 3: Document the process, we wish to automate.
The present process is manual where the orders are received by purchase department from stores department. Stores department generates the order based on manual stock register, based on item’s re-order levels. The levels were decided five years back and stores records are not updated timely.
Step 4: Define the objectives/goals to be achieved by implementing BPA.
The objective behind the present exercise is to ensure that there are no production losses due to non-availability of critical items of inventory. This shall automatically ensure timely delivery of goods to customer.
Step 5: Engage the business process consultant.
ABC Limited, a consultant of repute, has been engaged for the same. The consultant has prior experience and knowledge about entity’s business.
Step 6: Calculate the ROI for project.
The opportunity loss for the project comes to around ₹ 100/- lakhs per year. The cost of implementing the whole BPA shall be around ₹ 50/- lakhs. It is expected that the opportunity loss after BPA shall reduce to ₹ 50 lakhs in year one, ₹ 25/- lakhs in later years for the next five years.
Step 7: Developing the BPA.
Once the top management says ‘Yes’, the consultant develops the necessary BPA. The BPA is to generate purchase orders as soon as an item of inventory reaches its re-order level. To ensure accuracy, all data in the new system need to be checked and validated before being put the same into system:
Step 8: Testing the BPA.
Before making the process live, it should be thoroughly tested.
Case 2: Automation of Employee Attendance
Various steps of automation are given as follows:
Step 1: Define why we plan to go for a BPA?
The system of recording of attendance being followed is not generating confidence in employees about the accuracy. There have been complaints that salary pay-outs are not as per actual attendance. It has also created friction and differences between employees, as some may feel that other employees have been paid more for their salary has not been deducted for being absent.
Step 2: Understand the rules/regulation under which needs to comply with?
Numbers of regulations are applicable to employee attendance including Factories Act 1948, Payment of Wages Act 1936, State laws, etc. This is a compliance requirement and hence, any BPA needs to cater to these requirements.
Step 3: Document the process, we wish to automate.
The present system includes an attendance register and a register at the security gate. Employees are expected to put their signatures in attendance registers. The register at the gate is maintained by security staff, to mark when an employee has entered. There is always a dispute regarding the time when an employee has entered and what has been marked in the security register. The company policy specifies that an employee coming late by 30 minutes for two days in a month shall have a ½ day salary deduction. There is over-writing in attendance register, leading to heated arguments between human resource department staff and employees.
As the time taken to arrive at the correct attendance is large, there is a delay in preparation of salary. The same has already led to penal action against company by labor department of the state.
Step 4: Define the objectives/goals to be achieved implementing BPA.
The objective for implementing BPA is to have:
Step 5: Engage the business process consultant.
XYZ Limited a consultant of repute has been engaged for the same. The consultant has prior experience and knowledge about entity’s business.
Step 6: Calculate the RoI for project.
The BPA may provide tangible benefits in the form of reduced penalties and intangible benefits which may include:
Step 7: Developing the BPA.
Implementing BPA includes would result in the following:
Step 8: Testing the BPA.
Before making the process live, it should be thoroughly tested.
The above illustrations are of entities which have gone for business process automation. There are thousands of processes across the world for which entities have gone for BPA and reaped numerous benefits. These include:
Risk is any event that may result in a significant deviation from a planned objective resulting in an unwanted negative consequence. The planned objective could be any aspect of an enterprise’s strategic, financial, regulatory and operational processes, products or services. The degree of risk associated with an event is determined by the likelihood (uncertainty, probability) of the event occurring, the consequences (impact) if the event were to occur and it’s timing.
When an enterprise adopts automation to support its critical business processes, it exposes itself to several risks, such as downtime due to failure of technology. The most important step in risk management process is to identify the sources of risk, the areas from where risks can occur. This will give information about the possible threats, vulnerabilities and accordingly appropriate risk mitigation strategy can be adapted. Some of the common sources of risk are Commercial and Legal Relationships, Economic Circumstances, Human Behavior, Natural Events, Political Circumstances, Technology and Technical Issues, Management Activities and Controls, and Individual Activities.
Broadly, risk has the following characteristics:
The risks can be broadly categorized as follows:
A. Business Risks: Business risk is a broad category which applies to any event or circumstances related to business goals. Businesses face all kinds of risks ranging from serious loss of profits to even bankruptcy and are discussed below:
B. Technology Risks: Automated processes are technology driven. The dependence on technology in BPA for most of the key business processes has led to various challenges. All risks related to the technology equally apply to BPA. As technology is taking new forms and transforming as well, the business processes and standards adapted by enterprises should consider these new set of IT risks and challenges:
(i) Downtime due to technology failure: Information system facilities may become unavailable due to technical problems or equipment failure. A common example of this type failure is non-availability of system due to server failure.
(ii) Frequent changes or obsolescence of technology: Technology keeps on evolving and changing constantly and becomes obsolete very quickly. Hence, there is always a challenge that the investment in technology solutions unless properly planned may result in loss to the organization due to risk of obsolescence.
(iii) Multiplicity and complexity of systems: The technology architecture used for services could include multiple digital platforms and is quite complex. Hence, this requires the personnel to have knowledge about requisite technology skills or the management of the technology could be outsourced to a company having the relevant skill set.
(iv) Different types of controls for different types of technologies/systems: Deployment of technology often gives rise to new types of risks. These risks need to be mitigated by relevant controls as applicable to the technology/information systems deployed.
(v) Proper alignment with business objectives and legal/regulatory requirements: Organizations must ensure that the systems implemented cater to all the business objectives and needs, in addition to the legal/regulatory requirements envisaged. (vi) Dependence on vendors due to outsourcing of IT services: In a systems environment, the organization requires staff with specialized domain skills to manage IT deployed. Hence, these services could be outsourced to vendors and there is heavy dependency on vendors and gives rise to vendor risks which should be managed by proper contracts, controls and monitoring.
(vii) Vendor related concentration risks: There may not be one but multiple vendors providing different services. For example, network, hardware, system software and application software services may be provided by different vendors or these services may be provided by a single vendor. Both these situations result in higher risks due to heavy dependence on vendors.
(viii) Segregation of Duties (SoD): Organizations may have a highly-defined organization structure with clearly defined roles, authority and responsibility. The Segregation of Duties as per organization structure should be clearly mapped. This is a high-risk area since any SoD conflicts can be a potential vulnerability for fraudulent activities. For example, if a single employee can initiate, authorize and disburse a loan, the possibility of misuse cannot be ignored.
(ix) External threats leading to cyber frauds/ crime: The system environment provides access to customers anytime, anywhere using internet. Hence, information system which was earlier accessible only within and to the employees is now exposed as it is open to be accessed by anyone from anywhere. Making the information available is business imperative but this is also fraught with risks of increased threats from hackers and others who could access the software to commit frauds/crime.
(x) Higher impact due to intentional or unintentional acts of internal employees: Employees in a technology environment are the weakest link in an enterprise. Employees are expected to be trusted individuals that are granted extended privileges, which can easily be abused.
(xi) New social engineering techniques employed to acquire confidential credentials: Fraudsters use new social engineering techniques such as socializing with employees and extracting information which is used to commit frauds. For example: extracting information about passwords from staff acting as genuine customer and using it to commit frauds.
(xii) Need for governance processes to adequately manage technology and information security: Controls in system should be implemented from macro and business perspective and not just from function and technology perspective. With BPA, technology becomes the key enabler for the organization and is implemented across the organization. The senior management should be involved in directing how technology is deployed in and approve appropriate policies. This requires governance process to implement security as required.
(xiii) Need to ensure continuity of business processes in the event of major exigencies: The high dependence on technology makes it imperative to ensure resilience to ensure that failure does not impact the organization’s services. Hence, a documented business continuity plan with adequate technology and information systems should be planned, implemented and monitored.
C. Data related risks: The primary concern of any organization should be its data, because it is often a unique resource. All data and applications are susceptible to disruption, damage and theft.
Various terminologies relating to risk management are given as follows:
Risk Management: Risk Management is the process of assessing risk, taking steps to reduce risk to an acceptable level and maintaining that level of risk. Risk management involves identifying, measuring, and minimizing uncertain events affecting resources.
Asset: Asset can be defined as something of value to the organization e.g., information in electronic or physical form, software systems, employees. Irrespective the nature of the assets themselves, they all have one or more of the following characteristics:
It is the purpose of Information Security Personnel to identify the threats against the risks and the associated potential damage to, and the safeguarding of Information Assets.
Vulnerability: Vulnerability is the weakness in the system safeguards that exposes the system to threats. It may be a weakness in information system/s, cryptographic system (security systems), or other components (e.g. system security procedures, hardware design, internal controls) that could be exploited by a threat. Vulnerabilities potentially “allow” a threat to harm or exploit the system. For example - vulnerability could be a poor access control method allowing dishonest employees (the threat) to exploit the system to adjust their own records. Some examples of vulnerabilities are as follows:
Missing safeguards often determine the level of vulnerability. Determining vulnerabilities involves a security evaluation of the system including inspection of safeguards, testing, and penetration analysis.
Normally, vulnerability is a state in a computing system (or set of systems), which must have at least one condition, out of the following:
Threat: Any entity, circumstance, or event with the potential to harm the software system or component through its unauthorized access, destruction, modification, and/or denial of service is called a Threat. It is an action, event or condition where there is a compromise in the system, its quality and ability to inflict harm to the organization. Threat has capability to attack on a system with intent to harm. It is often to start threat modeling with a list of known threats and vulnerabilities found in similar systems. Every system has a data, which is considered as a fuel to drive a system, data is nothing but assets. Assets and threats are closely correlated. A threat cannot exist without a target asset. Threats are typically prevented by applying some sort of protection to assets.
Exposure: An exposure is the extent of loss the enterprise has to face when a risk materializes. It is not just the immediate impact, but the real harm that occurs in the long run. For example: loss of business, failure to perform the system’s mission, loss of reputation, violation of privacy and loss of resources etc.
Likelihood: Likelihood of the threat occurring is the estimation of the probability that the threat will succeed in achieving an undesirable event. The presence, tenacity and strengths of threats, as well as the effectiveness of safeguards must be considered while assessing the likelihood of the threat occurring.
Attack: An attack is an attempt to gain unauthorized access to the system’s services or to compromise the system’s dependability. In software terms, an attack is a malicious intentional fault, usually an external fault that has the intent of exploiting vulnerability in the targeted software or system.
Basically, it is a set of actions designed to compromise CIA (Confidentiality, Integrity or Availability) or any other desired feature of an information system. Simply, it is the act of trying to defeat Information Systems (IS) safeguards. The type of attack and its degree of success determines the consequence of the attack.
Example 5: Fig. 1.4.1 depicts the risk and its related terms.
Counter Measure: An action, device, procedure, technique or other measure that reduces the vulnerability of a component or system is referred as Counter Measure. For example, well known threat ‘spoofing the user identity’, has two countermeasures:
Similarly, for other vulnerabilities, different countermeasures may be used.
The relationship and different activities among these terms may be understood by Fig. 1.4.1. To conclude, Risk can be defined as the potential harm caused if a threat exploits a particular vulnerability to cause damage to an asset, and Risk Analysis is defined as the process of identifying security risks and determining their magnitude and impact on an organization.
Risk Assessment includes the following:
New technology provides the potential for dramatically enhanced business performance, improved and demonstrated information risk reduction and security measures. Technology can also add real value to the organization by contributing to interactions with the trading partners, closer customer relations, improved competitive advantage and protected reputation.
Effective risk management begins with a clear understanding of an enterprise’s risk appetite and identifying high-level risk exposures. The unacceptable high levels of risks can be controlled by designing and implementing adequate proactive controls. But it is not always appropriate to counter risks by implementing controls because controls involve cost. After defining risk appetite and identified risk exposure, strategies for managing risk can be set and responsibilities clarified. Based on the type of risk, project and its significance to the business; Board and Senior Management may choose to take up any of the following risk management strategy in isolation or combination as required:
1. What are enterprise business processes? |
2. How can automated business processes benefit an organization? |
3. What are the risks associated with automated business processes? |
4. How can organizations manage the risks associated with automated business processes? |
5. What are some examples of automated business processes? |
30 videos|58 docs
|
|
Explore Courses for CA Intermediate exam
|