Problem Statement
The following paper is a research proposal that delves into the fact of outsourcing of business functions. One of the most important factors behind the expansion and growth of a business organisation is outsourcing. Outsourcing in business deals with third party engagement in a single or multiple business performance.
That may encompass human resource outsourcing or may be recruitment services or may be encompassing the payroll structure of the company. There are several underlying risks behind confirming business outsourcing. The risk lies in the act of exposing confidential data and method of business practice. In this research the effective business practices of a particular sectors is going to be investigated. Selection of authentic partner through a clear business indicator has to be be taken into consideration through the entire research process.
In this paper proper regulation of the act of business outsourcing with authentic business partners will be investigated and the process will be proposed with effective structure. Quality analysis of the business partners and the categorisation of the corporate responsibilities will be the main thematic approach to this paper. However, the basic understanding of the entire research process has to be analysed with a proper effect. The research will be conducted on the basis of growing number of the BPO sectors in Australia that are responsible for performing business process outsourcing in different sectors such as event organisation, business accounting, human resource management, software managing works, database management and others. There are certain business activities which are profoundly invigilated by the root company towards the outsourcing companies.
Problem Statement:
In most of the cases the business tasks are outsourced to the chosen vendors of expertise. Due to having technical expertise in the required fields the third party companies are taken into consideration. It is apparent that the BPO sectors in Australia have created a large segment of busi8ness performance. For past few years there has been a rapid emergence of the BPO sectors that are process business outsourcing of the multinational companies. In recent years it has been studied and explored that the MNCs have been hiring and contracting with the small BPOs in order to outsource their database system. There are several disadvantages of business outsourcing within the labour market and within the organisations. In this research, the advantage and disadvantage of business outsourcing of Telstra will be investigated.
Business outsourcing has apparently dismantled job security of the worker within the organisation. It is true that the outsourcing of business is often cost effective. However, the cross border business outsourcing by the companies has several job opportunities. If one considers the international labour market of business process outsourcing sectors, it is quite positive as the international labour market has generative flow of employment. However, in terms of particular country based labour markets are highly fluctuating. For instance, due to the rise of the BPO sectors in Australia, the job cutting rate has risen up to an alarming rate. For example, business outsourcing in Telstra has entailed unemployment and job-cut for many of the employees. Apart from the effect on the employees, outsourcing has different other impacts upon its core business processes- specifically pertaining to its confidentiality. The following paper is going to depict exact advantages and disadvantages of business outsourcing in Telstra in a holistic manner.
Research Objective
The research would be conducted to meet the following objective:
- i) To find out the mode of business outsourcing by the company
- ii) To investigate the effectiveness of business outsourcing upon the employees
iii) To find out whether the company has changed the third party outsourcing companies and the reason behind such shift from one company to the other
- iv) To make a proper understanding level of the company’s outsourcing policies
The following research questions shall be taken into consideration while conducting the research:
- i) Does Telstra secure its confidential data from the third party organisations?
- ii) Are the employees negatively affected by the business outsourcing conducted by Telstra?
iii) How does the company manage cost effective business outsourcing within the organisation?
Hypothesis 1: Telstra has so far been negatively affected by business outsourcing in past two years.
Hypothesis 0: Telstra has not been affected by business outsourcing.
Trade functions of an organisation pertaining to the act of outsourcing can be segmented with the help of internal and external organisational factors. In order to perform the trade functions, the authority of an organisation depends on the third party involvement and intervention. There are advantages and disadvantages in terms of the entire outsourcing process. The basic advantage lies in this fact that the third party organisations lessen the work load of the mother companies. The third party providers take the responsibility to take care of the entire skill based performance levels of the employees. More than taking care of the employees,
the third party agencies are also responsible for the trade performances of the organisations. On the contrary, there are some disadvantages as well. It relates to the dependency level of the organisations pertaining to the conduction of job and trade performance upon the third party service provider.
The term of dependence limits the working capacity of the organisation. Many issues rise during the contraction of business between the companies and third party service providers. However, proper execution of the chain of outsourcing and a dependable change in the management may lead to a positively effective performance level in terms of business and trade outsourcing with the third party service providers. In this case, the authority needs to adhere to the proper guidelines to be imposed upon the third party organisations so as not to divert from the entire effort from the core policies of the company.
Risk-sharing
While ensuring outsourcing of certain parts of the business within the organisations, the companies need to confirm certain obligations as a variant merchant. In this purpose, there are several issues that the companies do not tend to undergo rules and the expected obligations on trade. As a matter of fact, the basic argument was about the sense of authority of the organisations.
Research Methodology:
This chapter is going to illustrate the entire process of the research and investigation. Research methodology helps understand the exact research problem and thorough process of investigation. Research methodology includes the followings:
- i) Research Design
- ii) Research Method
iii) Research Philosophy
- iv) Research Approach
- v) Data Collection Method
- vi) Data Analysis
vii) Ethical Consideration
The following research would be conducted on the basic of hypothesis testing method. This is going to help the investigator form an effective research design to prove the hypothesis in a realistic manner.
Research method refers to the core process of the research. In case of this research, the quantitative and qualitative research method is going to be followed.
Research Philosophy:
Research philosophy refers to the rational understanding and consideration of the research. There are three types of research philosophy:
- i) Interpretivism
- ii) Positivism
- ii) Realism
While conducting this particular research the positivism philosophy would be taken into consideration as it would consider the authenticity of the retrieved data.
Research Approach:
The research approach refers to the mode of the researcher through which she or he tends to implement the research method. In this particular research a deductive approach would be taken into consideration.
Data Collection Method:
While conducting this research primary data would be collected. The employees and the managers of Telstra shops would be approached for their responses. While conducting this research, 50 respondents would be chosen.
Reference:
Anderson, A.A., Brossard, D., Scheufele, D.A., Xenos, M.A. and Ladwig, P., 2014. The “nasty effect:” Online incivility and risk perceptions of emerging technologies. Journal of Computer?Mediated Communication, 19(3), pp.373-387.
Baskerville, R.L. and Wood-Harper, A.T., 2016. A critical perspective on action research as a method for information systems research. In Enacting Research Methods in Information Systems: Volume 2 (pp. 169-190). Springer International Publishing.
Beasley, M. 2013. Practical web analytics for user experience. 1st ed. Waltham, MA: Morgan Kaufmann.
Beck, N., Campbell, M., Connelly, B., Manning, T., Moran, G., O’Malley, K., Swan, J.B., Swan, P.B., Tunney, J., Walsh, J.P. and Whalen, L., 2014. Irish Migrants in New Communities: Seeking the Fair Land?. Lexington Books.
De Ayala, R.J. and Santiago, S.Y., 2016. An introduction to mixture item response theory models. Journal of School Psychology.
Du, H.S., 2014. The role of media?embedded heuristics in achieving online readership popularity. Journal of the Association for Information Science and Technology, 65(2), pp.302-312.
Getaldi?, M., 2015. Inequalities of Opial and Jensen (Improvements of Opial-type inequalities with applications to fractional calculus).
Holliday, E., 2013. An Examination of Rater Agreement: The Behavioral Functioning of Children Engaged in a Wraparound Model of Care.
Joensivu, I., 2016. Improving Social Media Marketing of Smartphone Applications-Case Company Sunduka Oy.
Paul, A.R., 2016. Personas: A Strategy for More Inclusive and Usable Reproductive Health Tracking Technologies.
Rowley, J., 2016. Information marketing. Routledge.