SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
BPO Feasibility Framework
OutsourcePortfolio – Research Article Series


1. Introduction
After the success of Business Process Outsourcing (BPO) in big corporations, BPO trend is
slowly picking up in mid-sized and small businesses. Nelson Hall, BPO research firm predicts the
global BPO market will reach by $450 Billion over the next four years. However, the BPO
adoption in mid-sized and small businesses is very low compared to big corporations due to
following reasons:

Mid-sized and small businesses are finding it difficult to identify what constitutes a business
process within their company.

Even if they identify their business process, they do not have a mechanism to find out if they can
benefit from outsourcing their business process or not.

For some small business owners, they know that they can save money by outsourcing, but they
do not know whether they need to outsource onshore, nearshore or offshore. As a result, small
business owners are having difficult time embracing business process outsourcing in their
companies. To simplify the issues and make the small and mid-sized businesses to understand
and evaluate their BPO options I have developed a BPO Feasibility Framework that consists of
following four steps:

       Identify the business processes

       Identify outsourcing readiness of the business processes

       Identify sourcing type and location for outsourcing

       Identify the potential value of outsourcing the business processes

2. BPO Feasibility Framework
The four-step BPO feasibility framework will provide mid-sized and small business owners a
simple but effective filtering process to make right choices in their BPO decisions. Each step is
built around key set of questions, and answers that will help business owners in making right
outsource decisions. The answers for the questions are plugged into the BPO feasibility decision
matrix that helps to short list the ultimate solution from the multitude of different business factors
in the outsource options.




www.outsourceportfolio.com | Page 1 | September 2008
OutsourcePortfolio – Research Article Series




www.outsourceportfolio.com | Page 2 | September 2008
OutsourcePortfolio – Research Article Series


The BPO framework provides an easy way for the business owners to ask the right question at
the right step and the answers will force them to think strategically about the short-term and long-
term goals for their business growth. Any type of small and mid-sized businesses can use the
BPO feasibility framework and it can adapt to changes in technology, business processes, and
government regulatory requirements. Moreover, the BPO framework helps business owners to
make decision based on facts rather then intuitions, past experience, or personal preferences.

Step1
2.1. Identify your Business Processes

First, you need to identify what constitutes a business process in their company, is it activities
performed by a group of people in one department or multiple departments. Thy need to ask
following questions and find answers to them:

What is the input for the business process and from where it comes?

What is the outcome of the business process and who consumes it?

Is it people or other business process that consumes the result of the business process?

Where are the people and the business processes located? Is it internal or external to the
business?

By asking questions like this, you can identify and understand the business processes that exist
in your company. As you perform the business process analysis, it is common to unearth low-
level tasks that are happening to support the high-level business processes. You may notice the
scope of your end-to-end business process is vast and you may find one or more business
processes are potential candidates for outsourcing.

2.1.2. Identify core Vs non-core Business Processes

Within your business, you might have business processes that are visible and well defined and
understood by your employees. For example, a manufacturing company may have following well-
defined business processes for the following activities:

       Get raw materials from suppliers

       Store it in inventory

       Pay Invoices to suppliers

       Use raw materials to manufacture goods

       Sell the goods to customers

       Send invoices to customers

       Collect checks for invoices

These activities are core business processes and you may have many personnel dedicated to
understand and monitor it for smooth day-to-day business operations. On the other hand, there
might be other business processes needed to support these core business processes. These


www.outsourceportfolio.com | Page 3 | September 2008
OutsourcePortfolio – Research Article Series


processes are not well understood or documented by your employees. Your employees might
have identified and performed the non-core business processes that would have evolved over a
period. In the above manufacturing company example, the following activities may be non-core
business activates:

       Handling missed invoices

       Identifying late payments

       Tracking the status of invoices

Generally, the non-core business processes are not well understood in small and mid-sized
companies. One of your employee tried a process for the above activities, found success and that
becomes the business process for that activity and adopted by the rest of the employees in your
business. The non-core business processes are part of the cost of doing business, and do not
add any strategic value to the business. All the non-core business processes can be a potential
candidate for outsourcing, and there is a potential economy of scale when BPO companies
perform similar type of activities to other companies potentially reducing the operating cost for
you.

Step 2

2.2. Business Process outsource readiness

Once you identify your core and non-core business processes, the next step is to identify if any of
the identified business processes are ready to be outsourced. The simple approach is to decide
to outsource all the non-core business processes and keep the core business processes in-
house. However, the simple approach will not work. Without analyzing the relationship between
the business factors and the business processes, you cannot benefit from your BPO efforts. In
short-term you may reduce cost, but in long-term you will have issues with your outsource
initiatives. Instead, you should take each business process and find answers for the following
questions:

       Can this business process be performed outside of your company?

       Is there any legal, security, or regulatory requirements, which need to be followed to fulfill
        the activities of the business process?

       How many different interfaces the business processes have?

       Can you write-down specific instructions on how to perform the tasks in the business
        process?

       Can you measure the performance of the business process?

2.2.1. Business Process Execution

Some business processes need deep business and technical skills that cannot be found outside
of your company. Your employees have been working on various activities of that business
process and it is not possible for someone else to do those activities. Whether it is core or non-
core, these business processes may not be outsourced. On the other hand if it can be performed




www.outsourceportfolio.com | Page 4 | September 2008
OutsourcePortfolio – Research Article Series


by an outsource vendor as effectively and efficiently as your employee then it is a potential
candidate for the outsourcing.

2.2.2. Business Process Interfaces
Any business process does not exist as a stand-alone entity; it takes input from other business
processes or people, or both, and then produces results, that are consumed by some other
people or business processes or both. As a business owner, you need to identify where the input
is coming from and where the output is consumed. For example, if the input for the business
process comes from customers or customer-faced business processes then that business
process may not be a good candidate for outsourcing.

2.2.3. Business Process Instructions
Often times if you can write-down the steps for performing a business process then it may be a
potential candidate for outsourcing. If a business process is complex or the rules changes
dynamically every day then you may not write the instructions for that business processes. If you
cannot write the instructions for business processes then it may not be outsourced.

2.2.4. Business Process Performance Measurement
Some business processes are easy to measure the performance and efficiency. For example,
number of transactions entered in QuickBooks, number of outstanding invoices collected, number
of successful lead generated in a marketing campaign etc. If you can measure the performance
of a business process then you can compare how the outsource vendor is performing it compared
with your own employees. If you cannot measure the performance of a business process then
you cannot measure how the outsource vendor is performing it and you cannot get the true value
of outsourcing that business process. Professor Thomas H. Davenport, in Harvard Business
Review explains the importance of business process standard s and performance in BPO
projects. By asking these questions, you can short list the potential candidate of business
processes that are suitable for outsourcing. Next you need to go through other two steps to
identify business processes that are not suitable for outsourcing. For example, if a business
process is complex, has many interfaces with other business processes and its efficiency cannot
be measured, but gives maximum strategic value then it may be a potential candidate for
outsourcing. In this case you should come up with ways to break-down the complex process into
manageable chunks and then consider outsourcing it.

Step 3

2.3. Location and Sourcing Type of BPO
This step will help the you to identify the sourcing type and location in their outsource efforts. The
sourcing type and location goes together and both give different choices for outsourcing their
business processes. There are two types of sourcing available, insourcing and outsourcing. Most
of the time big corporations use insourcing by using their own subsidiaries to do business
processes. However, for small and mid-sized businesses outsourcing is the best option. Within
outsourcing, identifying the location is an integral part and you must consider several business
factors in making your decision.

2.3.1. Location Selection criteria



www.outsourceportfolio.com | Page 5 | September 2008
OutsourcePortfolio – Research Article Series


Determining the location where the business process has to be performed, you should assemble
data on a number of business factors:

Cost: First, identify what type of rate structure is appropriate to pay to the outsource vendor. The
rate can be, fixed rate (either hourly or monthly) or variable rate based on factors like number of
transactions processed, number of new customers acquired, etc. You must also perform a
detailed analysis to find out Fixed Cost VS Monthly Cost related to your business they will incur in
the outsourcing initiatives.

Availability of Skills: Finding outsource vendors is easy for you if you are outsourcing generic
business processes like accounting, data entry, telemarketing etc. However, any KPO type
outsourcing like financial analysis, insurance policy verification etc needs careful analysis in
finding appropriate outsource vendors.

Environment: Pay attention to government regulations, time difference, and knowledge in
English and business environment in selecting the location. For example, some business
processes may not be suitable for offshore outsourcing and in this case, you can consider
onshore outsourcing or nearshore outsourcing. Timing difference, business, and political
environment may not be favorable to outsource to certain countries and you should avoid these
locations.

Risks: Several outsourcing risks are associated with countries and businesses should perform
careful due diligence in assessing the pros and cons of it. Factors like political unrest, crime,
terrorism, and IP protection laws have to be considered in assessing the risks of potential
locations.

Perform analysis, and gather enough data for the above factors to compare various locations to
outsource your business processes. During this process go back to previous two steps outlined in
this BPO framework and shortlist the locations that suites your business and outsource needs.

2.3.2. Sourcing Type

Based on the location selection, you have following three types of sourcing strategy to consider:

       Onshore Outsourcing

       Nearshore Outsourcing

       Offshore Outsourcing

Each has its own advantages and disadvantages, you should collect enough data on sourcing
types, vendor list and proceed to next step.

Step 4

2.4. Value of BPO for your Business

In this part of the BPO framework, you identify the value proposition of outsourcing the business
processes. Cost saving is the main reason for businesses to use BPO. Apart from the cost
savings, you should evaluate the value of the BPO efforts to your company.

2.4.1. What is the value proposition of BPO?


www.outsourceportfolio.com | Page 6 | September 2008
OutsourcePortfolio – Research Article Series


You must clearly understand and identify the value proposition BPO brings to your company.
Identifying the value proposition is a complex initiative, and it varies from business to business. In
addition, the value of outsourcing is not easily quantifiable just like cost saving. Nevertheless you
must identify the value outsourcing brings to your business to achieve long-term strategic goals.
You should go through previous three steps of this BPO framework to capture the value you get
from the outsourcing your business processes. For example, following are some of the value
proposition big corporations have been looking for in their outsourced projects:

       Speed to market

       Profit Increase

       Gain Market Share

       Increased Customer Loyalty

       Increased Process Efficiency

       Improved Management Focus

Above list gives a sample of value factors and it is by no means a complete list, you should come
up with your own list based on your strategic business goals. Once the value proposition is
identified, next step is to perform BPO feasibility matrix analysis to find out ideal business
processes for outsourcing that gives maximum value for your company.

2.5. BPO Feasibility Decision Matrix

You can evaluate the best possible business processes for outsourcing by performing the
decision matrix analysis for each step and finding the winner among all the business processes.
In the decision matrix analysis, you identify the business factors; give weight for each business
factor based on the importance of it for your business. For example, if a business factor has high
importance then it will get five as its weight, and the lowest will get one. Then based on your
analysis for the business processes give rating value (1-5, 5 being best) for each one of them.
Now calculate the score for each process by multiplying the weight and the rating and put the
value in the Score column. Finally add all the scores and put it in the total column.

2.5.1 Outsource Readiness Decision Matrix

List the business processes identified in Step1 as shown in Outsource Readiness Decision
Matrix, for simplicity it shows only three business processes. Next list the business factors
identified in Step 2 in the first column. Give weight for each one of the business factor based on
the importance for the “business process readiness analysis”. For example, if you believe that
execution is not important for you and anyone can perform the business process then give lowest
weigh. By giving the lowest weight, you are making a decision that the execution business factor
plays very less role in deciding the business process readiness. On the other hand, if the
“Performance” of the business process is important for you and you want to measure it properly
then give higher weight to it. Once you assign weight to each business factor, your next step is to
identify individual rating for each business process under the business factor. For example, if the
business process “Collecting checks” can be performed easily by an outsource vendor then give
higher rating for it. On the other hand, if the performance can be measured easily for “Collecting
Checks” then give lower rating for it. The final step in decision matrix analysis is identifying score



www.outsourceportfolio.com | Page 7 | September 2008
OutsourcePortfolio – Research Article Series


for each business process. The score for the business process is identified by multiplying the
rating and the weight.




Find the sum of all the scores for each business process and put it in the “Total” column. Now
identify the business process that has the highest total and it is the winner among all the business
processes. In our Outsource Readiness Decision Matrix example, Track Invoices is the winner.

2.5.2 Outsource Type Decision Matrix




2.5.3 Business Value Decision Matrix




Apply the same decision matrix analysis for the other two steps and identify the winner as shown
in Outsource Type Decision Matrix and Value Decision Matrix examples. Based on the Outsource



www.outsourceportfolio.com | Page 8 | September 2008
OutsourcePortfolio – Research Article Series


Type Decision Matrix and Value Decision Matrix examples “Track Invoices” is the winner. The
decision matrix shown are only examples and in typical outsource decisions; you may be using
several business factors in each step of this BPO framework. You should use this framework as a
reference model in coming up with your own business factors that are suitable for your business.

2.6. Conclusion
This BPO framework is designed specifically for small and mid-sized businesses and it is easy to
use across all industries. Business owners can apply this BPO framework to all of the business
processes in evaluating the outsource viability. All employees can participate and contribute to
the BPO framework and that gives collaborative decision-making in evaluating the outsource
initiatives. The BPO framework is easy to manage and administer. The simplicity of this BPO
framework allows the all employees to use it by themselves rather than rely on outside experts
and consultants. Also employees are more likely to believe in the outsource efforts and the value
it brings to the company when they participate in outsource decisions. Several other side benefits
come with using the BPO framework; by using the steps explained in this framework business
owners can document and understand various business processes that are being executed inside
their company. As the small and mid-sized business personnel uses the framework they
understand all the core and non-core business processes and gives them an opportunity to
redesign it for maximum efficiency. Of course redesigning the business process is a separate
initiative apart from outsourcing but this framework gives an opportunity for all the employees to
acknowledge the issues that exist in their business processes as they see the individual business
processes and how it collaborates with all other business processes. The BPO framework does
not make the outsource feasibility analysis easy. However, it makes the entire outsource
feasibility analysis manageable and facilitates the small and mid-sized business owner to make
the right outsourcing decision with their employee participation from start to finish.




www.outsourceportfolio.com | Page 9 | September 2008
OutsourcePortfolio – Research Article Series




Disclaimer                                                         Copyrigh

This publication is provided “AS-IS”. The author(S) and the        No part of this publication may be reproduced, stored in a
publisher (OutsourcePortfolio, its affiliates, partners, and its   retrieval system, or transmitted in any form or by any means,
related entities) will assume No liability or responsibility to    electronic, mechanical, photocopying or otherwise without
any person or entity with respect to any loss or damage            the written permission of OutsourcePortfolio
related directly or indirectly to the information provided in
this publication. No warranties of any kind, express or
implied, are made, the publisher will provide no remedy for
indirect, consequential, punitive or incidental damages            Copyright © 2009 OutsourcePortfolio.com. All rights
arising from this publication, including such from negligence,     Reserved
strict liability, or breach of warranty or contract, event after
notice of the possibility of such damages. This publication is
not a substitute for professional advice or services, nor
should it be used as a basis for any decision or action that
may affect your business. Before making any decision or
taking any action that may affect your business, you should
consult a qualified professional advisor. The publisher shall
not be responsible for any loss sustained by any person who
relies on this publication. Your use of the information is at
your own risk and you assume full responsibility and risk of
loss resulting from the use thereof. The publisher will not be
liable for any direct, indirect, special, incidental,
consequential, or punitive damages or any other damages
whatsoever, whether in an action of contract, statute, tort
(including, without limitation, negligence), or otherwise,
relating to the use of the information.

If any of the foregoing is not fully enforceable for any
reason, the remainder shall nonetheless continue to apply.




www.outsourceportfolio.com | Page 10 | September 2008
OutsourcePortfolio – Research Article Series




ABOUT
OUTSOURCEPORTFOLIO
OutsourcePortfolio is a fully owned entity of Cybelink
Systems, Inc, primary focus of OutsourcePortfolio is to
publish news, blogs, and research articles pertinent to
outsource industry. For the past several months
OutsourcePortfolio has collaborated with several
organizations, professionals, and bloggers working in
outsource industry to bring in latest research articles to
our readers.




  For more information contact
  5786 Blackshire Path
  Inver Grove Heights
  MN 55706
  USA

  www.outsourceportfolio.com
  info@outsourceportfolio.com

Weitere ähnliche Inhalte

Was ist angesagt?

10 innovative models & business models in education shared by turian labs
10 innovative models & business models in education shared by turian labs10 innovative models & business models in education shared by turian labs
10 innovative models & business models in education shared by turian labsManoj Kothari
 
SaaS Showcase Pitch :: HeyDay :: L-SPARK Accelerator
SaaS Showcase Pitch :: HeyDay :: L-SPARK AcceleratorSaaS Showcase Pitch :: HeyDay :: L-SPARK Accelerator
SaaS Showcase Pitch :: HeyDay :: L-SPARK AcceleratorL-SPARK
 
Entreprenuership Presentation at IIT e-Cell
Entreprenuership Presentation at IIT e-CellEntreprenuership Presentation at IIT e-Cell
Entreprenuership Presentation at IIT e-CellIksula
 
ESG engagement inisghts (v 1.1)
ESG engagement inisghts (v 1.1)ESG engagement inisghts (v 1.1)
ESG engagement inisghts (v 1.1)Nawar Alsaadi
 
Walmart Pitch Deck
Walmart Pitch DeckWalmart Pitch Deck
Walmart Pitch DeckXavierRoss4
 
Klarna - NOAH12 London
Klarna - NOAH12 LondonKlarna - NOAH12 London
Klarna - NOAH12 LondonNOAH Advisors
 
Lazada E-commerce Statistics Across Southeast Asia
Lazada E-commerce Statistics Across Southeast AsiaLazada E-commerce Statistics Across Southeast Asia
Lazada E-commerce Statistics Across Southeast Asiacharmaine17
 
TeleAfya Pitch Deck
TeleAfya Pitch DeckTeleAfya Pitch Deck
TeleAfya Pitch Deckvinny950
 
Walmart Developing Blockchain Technology for Food Safety
Walmart Developing Blockchain Technology for Food SafetyWalmart Developing Blockchain Technology for Food Safety
Walmart Developing Blockchain Technology for Food SafetyEtherecash
 
Pitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deck
Pitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deckPitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deck
Pitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deckHajeJanKamps
 
The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated] The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated] Vin Lim
 
Insights From Climate Tech Leaders 2021
Insights From Climate Tech Leaders 2021Insights From Climate Tech Leaders 2021
Insights From Climate Tech Leaders 2021sosv
 
Young Lions CZ 2021 | PR 06 - Winners
Young Lions CZ 2021 | PR 06 - WinnersYoung Lions CZ 2021 | PR 06 - Winners
Young Lions CZ 2021 | PR 06 - WinnersYoungLionsCZ
 
Mckinsey 7s Strategic Management Powerpoint Presentation Slides
Mckinsey 7s Strategic Management Powerpoint Presentation SlidesMckinsey 7s Strategic Management Powerpoint Presentation Slides
Mckinsey 7s Strategic Management Powerpoint Presentation SlidesSlideTeam
 
Venture Capital Unlocked (Stanford) / Venture Capital 2.0
Venture Capital Unlocked (Stanford) / Venture Capital 2.0Venture Capital Unlocked (Stanford) / Venture Capital 2.0
Venture Capital Unlocked (Stanford) / Venture Capital 2.0Dave McClure
 

Was ist angesagt? (20)

10 innovative models & business models in education shared by turian labs
10 innovative models & business models in education shared by turian labs10 innovative models & business models in education shared by turian labs
10 innovative models & business models in education shared by turian labs
 
SaaS Showcase Pitch :: HeyDay :: L-SPARK Accelerator
SaaS Showcase Pitch :: HeyDay :: L-SPARK AcceleratorSaaS Showcase Pitch :: HeyDay :: L-SPARK Accelerator
SaaS Showcase Pitch :: HeyDay :: L-SPARK Accelerator
 
Deel Presentation
Deel PresentationDeel Presentation
Deel Presentation
 
Entreprenuership Presentation at IIT e-Cell
Entreprenuership Presentation at IIT e-CellEntreprenuership Presentation at IIT e-Cell
Entreprenuership Presentation at IIT e-Cell
 
ESG engagement inisghts (v 1.1)
ESG engagement inisghts (v 1.1)ESG engagement inisghts (v 1.1)
ESG engagement inisghts (v 1.1)
 
Walmart Pitch Deck
Walmart Pitch DeckWalmart Pitch Deck
Walmart Pitch Deck
 
Klarna - NOAH12 London
Klarna - NOAH12 LondonKlarna - NOAH12 London
Klarna - NOAH12 London
 
Dutchie
DutchieDutchie
Dutchie
 
Lazada E-commerce Statistics Across Southeast Asia
Lazada E-commerce Statistics Across Southeast AsiaLazada E-commerce Statistics Across Southeast Asia
Lazada E-commerce Statistics Across Southeast Asia
 
TeleAfya Pitch Deck
TeleAfya Pitch DeckTeleAfya Pitch Deck
TeleAfya Pitch Deck
 
Walmart Developing Blockchain Technology for Food Safety
Walmart Developing Blockchain Technology for Food SafetyWalmart Developing Blockchain Technology for Food Safety
Walmart Developing Blockchain Technology for Food Safety
 
Pitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deck
Pitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deckPitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deck
Pitch Deck Teardown: Phospholutions's $10M Series A extension AgTech deck
 
The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated] The Best Startup Pitchdeck [Updated]
The Best Startup Pitchdeck [Updated]
 
Insights From Climate Tech Leaders 2021
Insights From Climate Tech Leaders 2021Insights From Climate Tech Leaders 2021
Insights From Climate Tech Leaders 2021
 
Lunar deck
Lunar   deckLunar   deck
Lunar deck
 
Young Lions CZ 2021 | PR 06 - Winners
Young Lions CZ 2021 | PR 06 - WinnersYoung Lions CZ 2021 | PR 06 - Winners
Young Lions CZ 2021 | PR 06 - Winners
 
Mckinsey 7s Strategic Management Powerpoint Presentation Slides
Mckinsey 7s Strategic Management Powerpoint Presentation SlidesMckinsey 7s Strategic Management Powerpoint Presentation Slides
Mckinsey 7s Strategic Management Powerpoint Presentation Slides
 
Business presentation bpo services
Business presentation bpo servicesBusiness presentation bpo services
Business presentation bpo services
 
Venture Capital Unlocked (Stanford) / Venture Capital 2.0
Venture Capital Unlocked (Stanford) / Venture Capital 2.0Venture Capital Unlocked (Stanford) / Venture Capital 2.0
Venture Capital Unlocked (Stanford) / Venture Capital 2.0
 
Pitch deck zespołu Preply
Pitch deck zespołu PreplyPitch deck zespołu Preply
Pitch deck zespołu Preply
 

Ähnlich wie BPO Feasibility Framework

Business-Process-Outsourcing.pptx
Business-Process-Outsourcing.pptxBusiness-Process-Outsourcing.pptx
Business-Process-Outsourcing.pptxryujin43
 
What is bpo
What is bpoWhat is bpo
What is bpoMKBMKB2
 
eBook: Business Process Outsourcing 101: Five Steps for Success
eBook: Business Process Outsourcing 101: Five Steps for SuccesseBook: Business Process Outsourcing 101: Five Steps for Success
eBook: Business Process Outsourcing 101: Five Steps for SuccessDATAMARK
 
Finding Uncommon Ground
Finding Uncommon GroundFinding Uncommon Ground
Finding Uncommon GroundSeanHart1766
 
Finding Uncommon Ground
Finding Uncommon GroundFinding Uncommon Ground
Finding Uncommon GroundSeanHart1766
 
White Paper - Checklist for Business Process Improvement
White Paper - Checklist for Business Process ImprovementWhite Paper - Checklist for Business Process Improvement
White Paper - Checklist for Business Process ImprovementCraig Maye
 
BPO Article MBE Mag Sept-Oct 2013
BPO Article MBE Mag Sept-Oct 2013BPO Article MBE Mag Sept-Oct 2013
BPO Article MBE Mag Sept-Oct 2013rich2682
 
EAME - Process Ownership_White_paper
EAME - Process Ownership_White_paperEAME - Process Ownership_White_paper
EAME - Process Ownership_White_paperDawn Dent
 
LANSA, Business Process Integration buyers guide
LANSA, Business Process Integration buyers guideLANSA, Business Process Integration buyers guide
LANSA, Business Process Integration buyers guideMarjanna Frank
 
ITM business barriers.pptx
ITM  business barriers.pptxITM  business barriers.pptx
ITM business barriers.pptxrajalakshmi5921
 
BPM - The Promise And Challenges
BPM  - The Promise And ChallengesBPM  - The Promise And Challenges
BPM - The Promise And ChallengesJerald Burget
 
ISO FAQ and Common Mistakes
ISO FAQ and Common MistakesISO FAQ and Common Mistakes
ISO FAQ and Common Mistakeslins421
 
Benefits of business process outsourcing
Benefits of business process outsourcingBenefits of business process outsourcing
Benefits of business process outsourcingmonaesolpk
 
Six Steps to Writing a Great SOP for Retail
Six Steps to Writing a Great SOP for RetailSix Steps to Writing a Great SOP for Retail
Six Steps to Writing a Great SOP for RetailYour Retail Coach
 
Strategies for Business Process Improvement
Strategies for Business Process ImprovementStrategies for Business Process Improvement
Strategies for Business Process ImprovementTilak Ramaprakash
 
John K Moore Org Alignment Article
John K Moore Org Alignment ArticleJohn K Moore Org Alignment Article
John K Moore Org Alignment ArticleJohn K. Moore
 
The Power of Business Process Improvement
The Power of Business Process ImprovementThe Power of Business Process Improvement
The Power of Business Process ImprovementBusiness Book Summaries
 
Business Analyst - Roles & Responsibilities
Business Analyst - Roles & ResponsibilitiesBusiness Analyst - Roles & Responsibilities
Business Analyst - Roles & ResponsibilitiesEngineerBabu
 

Ähnlich wie BPO Feasibility Framework (20)

Business-Process-Outsourcing.pptx
Business-Process-Outsourcing.pptxBusiness-Process-Outsourcing.pptx
Business-Process-Outsourcing.pptx
 
What is bpo
What is bpoWhat is bpo
What is bpo
 
eBook: Business Process Outsourcing 101: Five Steps for Success
eBook: Business Process Outsourcing 101: Five Steps for SuccesseBook: Business Process Outsourcing 101: Five Steps for Success
eBook: Business Process Outsourcing 101: Five Steps for Success
 
Finding Uncommon Ground
Finding Uncommon GroundFinding Uncommon Ground
Finding Uncommon Ground
 
Finding Uncommon Ground
Finding Uncommon GroundFinding Uncommon Ground
Finding Uncommon Ground
 
White Paper - Checklist for Business Process Improvement
White Paper - Checklist for Business Process ImprovementWhite Paper - Checklist for Business Process Improvement
White Paper - Checklist for Business Process Improvement
 
BPO Article MBE Mag Sept-Oct 2013
BPO Article MBE Mag Sept-Oct 2013BPO Article MBE Mag Sept-Oct 2013
BPO Article MBE Mag Sept-Oct 2013
 
EAME - Process Ownership_White_paper
EAME - Process Ownership_White_paperEAME - Process Ownership_White_paper
EAME - Process Ownership_White_paper
 
LANSA, Business Process Integration buyers guide
LANSA, Business Process Integration buyers guideLANSA, Business Process Integration buyers guide
LANSA, Business Process Integration buyers guide
 
ITM business barriers.pptx
ITM  business barriers.pptxITM  business barriers.pptx
ITM business barriers.pptx
 
Business plan-of villit
Business plan-of villitBusiness plan-of villit
Business plan-of villit
 
BPM - The Promise And Challenges
BPM  - The Promise And ChallengesBPM  - The Promise And Challenges
BPM - The Promise And Challenges
 
ISO FAQ and Common Mistakes
ISO FAQ and Common MistakesISO FAQ and Common Mistakes
ISO FAQ and Common Mistakes
 
Benefits of business process outsourcing
Benefits of business process outsourcingBenefits of business process outsourcing
Benefits of business process outsourcing
 
Blank Steve Why companies are not startups
Blank Steve Why companies are not startupsBlank Steve Why companies are not startups
Blank Steve Why companies are not startups
 
Six Steps to Writing a Great SOP for Retail
Six Steps to Writing a Great SOP for RetailSix Steps to Writing a Great SOP for Retail
Six Steps to Writing a Great SOP for Retail
 
Strategies for Business Process Improvement
Strategies for Business Process ImprovementStrategies for Business Process Improvement
Strategies for Business Process Improvement
 
John K Moore Org Alignment Article
John K Moore Org Alignment ArticleJohn K Moore Org Alignment Article
John K Moore Org Alignment Article
 
The Power of Business Process Improvement
The Power of Business Process ImprovementThe Power of Business Process Improvement
The Power of Business Process Improvement
 
Business Analyst - Roles & Responsibilities
Business Analyst - Roles & ResponsibilitiesBusiness Analyst - Roles & Responsibilities
Business Analyst - Roles & Responsibilities
 

Kürzlich hochgeladen

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 

Kürzlich hochgeladen (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

BPO Feasibility Framework

  • 2. OutsourcePortfolio – Research Article Series 1. Introduction After the success of Business Process Outsourcing (BPO) in big corporations, BPO trend is slowly picking up in mid-sized and small businesses. Nelson Hall, BPO research firm predicts the global BPO market will reach by $450 Billion over the next four years. However, the BPO adoption in mid-sized and small businesses is very low compared to big corporations due to following reasons: Mid-sized and small businesses are finding it difficult to identify what constitutes a business process within their company. Even if they identify their business process, they do not have a mechanism to find out if they can benefit from outsourcing their business process or not. For some small business owners, they know that they can save money by outsourcing, but they do not know whether they need to outsource onshore, nearshore or offshore. As a result, small business owners are having difficult time embracing business process outsourcing in their companies. To simplify the issues and make the small and mid-sized businesses to understand and evaluate their BPO options I have developed a BPO Feasibility Framework that consists of following four steps:  Identify the business processes  Identify outsourcing readiness of the business processes  Identify sourcing type and location for outsourcing  Identify the potential value of outsourcing the business processes 2. BPO Feasibility Framework The four-step BPO feasibility framework will provide mid-sized and small business owners a simple but effective filtering process to make right choices in their BPO decisions. Each step is built around key set of questions, and answers that will help business owners in making right outsource decisions. The answers for the questions are plugged into the BPO feasibility decision matrix that helps to short list the ultimate solution from the multitude of different business factors in the outsource options. www.outsourceportfolio.com | Page 1 | September 2008
  • 3. OutsourcePortfolio – Research Article Series www.outsourceportfolio.com | Page 2 | September 2008
  • 4. OutsourcePortfolio – Research Article Series The BPO framework provides an easy way for the business owners to ask the right question at the right step and the answers will force them to think strategically about the short-term and long- term goals for their business growth. Any type of small and mid-sized businesses can use the BPO feasibility framework and it can adapt to changes in technology, business processes, and government regulatory requirements. Moreover, the BPO framework helps business owners to make decision based on facts rather then intuitions, past experience, or personal preferences. Step1 2.1. Identify your Business Processes First, you need to identify what constitutes a business process in their company, is it activities performed by a group of people in one department or multiple departments. Thy need to ask following questions and find answers to them: What is the input for the business process and from where it comes? What is the outcome of the business process and who consumes it? Is it people or other business process that consumes the result of the business process? Where are the people and the business processes located? Is it internal or external to the business? By asking questions like this, you can identify and understand the business processes that exist in your company. As you perform the business process analysis, it is common to unearth low- level tasks that are happening to support the high-level business processes. You may notice the scope of your end-to-end business process is vast and you may find one or more business processes are potential candidates for outsourcing. 2.1.2. Identify core Vs non-core Business Processes Within your business, you might have business processes that are visible and well defined and understood by your employees. For example, a manufacturing company may have following well- defined business processes for the following activities:  Get raw materials from suppliers  Store it in inventory  Pay Invoices to suppliers  Use raw materials to manufacture goods  Sell the goods to customers  Send invoices to customers  Collect checks for invoices These activities are core business processes and you may have many personnel dedicated to understand and monitor it for smooth day-to-day business operations. On the other hand, there might be other business processes needed to support these core business processes. These www.outsourceportfolio.com | Page 3 | September 2008
  • 5. OutsourcePortfolio – Research Article Series processes are not well understood or documented by your employees. Your employees might have identified and performed the non-core business processes that would have evolved over a period. In the above manufacturing company example, the following activities may be non-core business activates:  Handling missed invoices  Identifying late payments  Tracking the status of invoices Generally, the non-core business processes are not well understood in small and mid-sized companies. One of your employee tried a process for the above activities, found success and that becomes the business process for that activity and adopted by the rest of the employees in your business. The non-core business processes are part of the cost of doing business, and do not add any strategic value to the business. All the non-core business processes can be a potential candidate for outsourcing, and there is a potential economy of scale when BPO companies perform similar type of activities to other companies potentially reducing the operating cost for you. Step 2 2.2. Business Process outsource readiness Once you identify your core and non-core business processes, the next step is to identify if any of the identified business processes are ready to be outsourced. The simple approach is to decide to outsource all the non-core business processes and keep the core business processes in- house. However, the simple approach will not work. Without analyzing the relationship between the business factors and the business processes, you cannot benefit from your BPO efforts. In short-term you may reduce cost, but in long-term you will have issues with your outsource initiatives. Instead, you should take each business process and find answers for the following questions:  Can this business process be performed outside of your company?  Is there any legal, security, or regulatory requirements, which need to be followed to fulfill the activities of the business process?  How many different interfaces the business processes have?  Can you write-down specific instructions on how to perform the tasks in the business process?  Can you measure the performance of the business process? 2.2.1. Business Process Execution Some business processes need deep business and technical skills that cannot be found outside of your company. Your employees have been working on various activities of that business process and it is not possible for someone else to do those activities. Whether it is core or non- core, these business processes may not be outsourced. On the other hand if it can be performed www.outsourceportfolio.com | Page 4 | September 2008
  • 6. OutsourcePortfolio – Research Article Series by an outsource vendor as effectively and efficiently as your employee then it is a potential candidate for the outsourcing. 2.2.2. Business Process Interfaces Any business process does not exist as a stand-alone entity; it takes input from other business processes or people, or both, and then produces results, that are consumed by some other people or business processes or both. As a business owner, you need to identify where the input is coming from and where the output is consumed. For example, if the input for the business process comes from customers or customer-faced business processes then that business process may not be a good candidate for outsourcing. 2.2.3. Business Process Instructions Often times if you can write-down the steps for performing a business process then it may be a potential candidate for outsourcing. If a business process is complex or the rules changes dynamically every day then you may not write the instructions for that business processes. If you cannot write the instructions for business processes then it may not be outsourced. 2.2.4. Business Process Performance Measurement Some business processes are easy to measure the performance and efficiency. For example, number of transactions entered in QuickBooks, number of outstanding invoices collected, number of successful lead generated in a marketing campaign etc. If you can measure the performance of a business process then you can compare how the outsource vendor is performing it compared with your own employees. If you cannot measure the performance of a business process then you cannot measure how the outsource vendor is performing it and you cannot get the true value of outsourcing that business process. Professor Thomas H. Davenport, in Harvard Business Review explains the importance of business process standard s and performance in BPO projects. By asking these questions, you can short list the potential candidate of business processes that are suitable for outsourcing. Next you need to go through other two steps to identify business processes that are not suitable for outsourcing. For example, if a business process is complex, has many interfaces with other business processes and its efficiency cannot be measured, but gives maximum strategic value then it may be a potential candidate for outsourcing. In this case you should come up with ways to break-down the complex process into manageable chunks and then consider outsourcing it. Step 3 2.3. Location and Sourcing Type of BPO This step will help the you to identify the sourcing type and location in their outsource efforts. The sourcing type and location goes together and both give different choices for outsourcing their business processes. There are two types of sourcing available, insourcing and outsourcing. Most of the time big corporations use insourcing by using their own subsidiaries to do business processes. However, for small and mid-sized businesses outsourcing is the best option. Within outsourcing, identifying the location is an integral part and you must consider several business factors in making your decision. 2.3.1. Location Selection criteria www.outsourceportfolio.com | Page 5 | September 2008
  • 7. OutsourcePortfolio – Research Article Series Determining the location where the business process has to be performed, you should assemble data on a number of business factors: Cost: First, identify what type of rate structure is appropriate to pay to the outsource vendor. The rate can be, fixed rate (either hourly or monthly) or variable rate based on factors like number of transactions processed, number of new customers acquired, etc. You must also perform a detailed analysis to find out Fixed Cost VS Monthly Cost related to your business they will incur in the outsourcing initiatives. Availability of Skills: Finding outsource vendors is easy for you if you are outsourcing generic business processes like accounting, data entry, telemarketing etc. However, any KPO type outsourcing like financial analysis, insurance policy verification etc needs careful analysis in finding appropriate outsource vendors. Environment: Pay attention to government regulations, time difference, and knowledge in English and business environment in selecting the location. For example, some business processes may not be suitable for offshore outsourcing and in this case, you can consider onshore outsourcing or nearshore outsourcing. Timing difference, business, and political environment may not be favorable to outsource to certain countries and you should avoid these locations. Risks: Several outsourcing risks are associated with countries and businesses should perform careful due diligence in assessing the pros and cons of it. Factors like political unrest, crime, terrorism, and IP protection laws have to be considered in assessing the risks of potential locations. Perform analysis, and gather enough data for the above factors to compare various locations to outsource your business processes. During this process go back to previous two steps outlined in this BPO framework and shortlist the locations that suites your business and outsource needs. 2.3.2. Sourcing Type Based on the location selection, you have following three types of sourcing strategy to consider:  Onshore Outsourcing  Nearshore Outsourcing  Offshore Outsourcing Each has its own advantages and disadvantages, you should collect enough data on sourcing types, vendor list and proceed to next step. Step 4 2.4. Value of BPO for your Business In this part of the BPO framework, you identify the value proposition of outsourcing the business processes. Cost saving is the main reason for businesses to use BPO. Apart from the cost savings, you should evaluate the value of the BPO efforts to your company. 2.4.1. What is the value proposition of BPO? www.outsourceportfolio.com | Page 6 | September 2008
  • 8. OutsourcePortfolio – Research Article Series You must clearly understand and identify the value proposition BPO brings to your company. Identifying the value proposition is a complex initiative, and it varies from business to business. In addition, the value of outsourcing is not easily quantifiable just like cost saving. Nevertheless you must identify the value outsourcing brings to your business to achieve long-term strategic goals. You should go through previous three steps of this BPO framework to capture the value you get from the outsourcing your business processes. For example, following are some of the value proposition big corporations have been looking for in their outsourced projects:  Speed to market  Profit Increase  Gain Market Share  Increased Customer Loyalty  Increased Process Efficiency  Improved Management Focus Above list gives a sample of value factors and it is by no means a complete list, you should come up with your own list based on your strategic business goals. Once the value proposition is identified, next step is to perform BPO feasibility matrix analysis to find out ideal business processes for outsourcing that gives maximum value for your company. 2.5. BPO Feasibility Decision Matrix You can evaluate the best possible business processes for outsourcing by performing the decision matrix analysis for each step and finding the winner among all the business processes. In the decision matrix analysis, you identify the business factors; give weight for each business factor based on the importance of it for your business. For example, if a business factor has high importance then it will get five as its weight, and the lowest will get one. Then based on your analysis for the business processes give rating value (1-5, 5 being best) for each one of them. Now calculate the score for each process by multiplying the weight and the rating and put the value in the Score column. Finally add all the scores and put it in the total column. 2.5.1 Outsource Readiness Decision Matrix List the business processes identified in Step1 as shown in Outsource Readiness Decision Matrix, for simplicity it shows only three business processes. Next list the business factors identified in Step 2 in the first column. Give weight for each one of the business factor based on the importance for the “business process readiness analysis”. For example, if you believe that execution is not important for you and anyone can perform the business process then give lowest weigh. By giving the lowest weight, you are making a decision that the execution business factor plays very less role in deciding the business process readiness. On the other hand, if the “Performance” of the business process is important for you and you want to measure it properly then give higher weight to it. Once you assign weight to each business factor, your next step is to identify individual rating for each business process under the business factor. For example, if the business process “Collecting checks” can be performed easily by an outsource vendor then give higher rating for it. On the other hand, if the performance can be measured easily for “Collecting Checks” then give lower rating for it. The final step in decision matrix analysis is identifying score www.outsourceportfolio.com | Page 7 | September 2008
  • 9. OutsourcePortfolio – Research Article Series for each business process. The score for the business process is identified by multiplying the rating and the weight. Find the sum of all the scores for each business process and put it in the “Total” column. Now identify the business process that has the highest total and it is the winner among all the business processes. In our Outsource Readiness Decision Matrix example, Track Invoices is the winner. 2.5.2 Outsource Type Decision Matrix 2.5.3 Business Value Decision Matrix Apply the same decision matrix analysis for the other two steps and identify the winner as shown in Outsource Type Decision Matrix and Value Decision Matrix examples. Based on the Outsource www.outsourceportfolio.com | Page 8 | September 2008
  • 10. OutsourcePortfolio – Research Article Series Type Decision Matrix and Value Decision Matrix examples “Track Invoices” is the winner. The decision matrix shown are only examples and in typical outsource decisions; you may be using several business factors in each step of this BPO framework. You should use this framework as a reference model in coming up with your own business factors that are suitable for your business. 2.6. Conclusion This BPO framework is designed specifically for small and mid-sized businesses and it is easy to use across all industries. Business owners can apply this BPO framework to all of the business processes in evaluating the outsource viability. All employees can participate and contribute to the BPO framework and that gives collaborative decision-making in evaluating the outsource initiatives. The BPO framework is easy to manage and administer. The simplicity of this BPO framework allows the all employees to use it by themselves rather than rely on outside experts and consultants. Also employees are more likely to believe in the outsource efforts and the value it brings to the company when they participate in outsource decisions. Several other side benefits come with using the BPO framework; by using the steps explained in this framework business owners can document and understand various business processes that are being executed inside their company. As the small and mid-sized business personnel uses the framework they understand all the core and non-core business processes and gives them an opportunity to redesign it for maximum efficiency. Of course redesigning the business process is a separate initiative apart from outsourcing but this framework gives an opportunity for all the employees to acknowledge the issues that exist in their business processes as they see the individual business processes and how it collaborates with all other business processes. The BPO framework does not make the outsource feasibility analysis easy. However, it makes the entire outsource feasibility analysis manageable and facilitates the small and mid-sized business owner to make the right outsourcing decision with their employee participation from start to finish. www.outsourceportfolio.com | Page 9 | September 2008
  • 11. OutsourcePortfolio – Research Article Series Disclaimer Copyrigh This publication is provided “AS-IS”. The author(S) and the No part of this publication may be reproduced, stored in a publisher (OutsourcePortfolio, its affiliates, partners, and its retrieval system, or transmitted in any form or by any means, related entities) will assume No liability or responsibility to electronic, mechanical, photocopying or otherwise without any person or entity with respect to any loss or damage the written permission of OutsourcePortfolio related directly or indirectly to the information provided in this publication. No warranties of any kind, express or implied, are made, the publisher will provide no remedy for indirect, consequential, punitive or incidental damages Copyright © 2009 OutsourcePortfolio.com. All rights arising from this publication, including such from negligence, Reserved strict liability, or breach of warranty or contract, event after notice of the possibility of such damages. This publication is not a substitute for professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. The publisher shall not be responsible for any loss sustained by any person who relies on this publication. Your use of the information is at your own risk and you assume full responsibility and risk of loss resulting from the use thereof. The publisher will not be liable for any direct, indirect, special, incidental, consequential, or punitive damages or any other damages whatsoever, whether in an action of contract, statute, tort (including, without limitation, negligence), or otherwise, relating to the use of the information. If any of the foregoing is not fully enforceable for any reason, the remainder shall nonetheless continue to apply. www.outsourceportfolio.com | Page 10 | September 2008
  • 12. OutsourcePortfolio – Research Article Series ABOUT OUTSOURCEPORTFOLIO OutsourcePortfolio is a fully owned entity of Cybelink Systems, Inc, primary focus of OutsourcePortfolio is to publish news, blogs, and research articles pertinent to outsource industry. For the past several months OutsourcePortfolio has collaborated with several organizations, professionals, and bloggers working in outsource industry to bring in latest research articles to our readers. For more information contact 5786 Blackshire Path Inver Grove Heights MN 55706 USA www.outsourceportfolio.com info@outsourceportfolio.com