Success factors of CBA
Information technology has been becoming a major factor of success for various organizations. Information technology has been providing several beneficial aspects to organizations. This report has been focusing on modification done in the information technology and its impact in the business of the Commonwealth Bank of Australia. The Commonwealth Bank has been ranked one of the largest retail sector bank in Australia (Laudon and Laudon 2016). This bank has been serving people by providing loans and retail business in the bank. The banking services have been a strong base for various other business segments in the market. This report has focused in the development of the organizational strategies to improve their business in the market.
The commonwealth bank has been looking for improving their business in the market. The company has been identifying various types of factors for implementing in their operational strategy. Various past success stories of the bank have been analysed during this process. This has helped in identifying various kinds of innovative technology in the market (Galliers and Leidner 2014). The bank has a wide range of customer base that might help in creating a common strategy for the benefits of all customers in the market. CBA has been regarded as one of the largest banking sector in the country and has been accepted by citizens of Australia. There has been a wide community of individuals holding a high level of expectation in the organization. There have been some success factors discovered by the company officials. These are mentioned below:
- Providing recognition and rewards to the employees that can be linked with the services provided over sales.
- Providing high level of training and motivation session to employees for enhancing their skills and performance in the workforce.
- Providing a clear goals and approach to employees to achieve their goals.
There are some primary form of objectives provided below:
- To expand share of customer with the help of direct online form of leadership
- To retain lowest form of structure of cost
- To implement proper form of management and leadership skills on resources and people
- To provide various types of financial services and meet expectations of clients
The CBA has been able to grow its competitive structure of the cost analysis. The growth if the customer base have been increased with competitive growth of the company. E-commerce websites and other internet based services. The major success factors have been internet expansion of the banking services to customers (Pearlson, Saunders and Galletta 2016). There have been strategy level of competitive pressure in the market. Therefore, many initiatives have been taken in order to maintain a keen approach towards the development of company.
The mission statement the Commonwealth Bank has been to provide quality level services to the clients and meeting their requirements.
(Fig 1: Organizational Chart of Commonwealth Bank of Australia)
The CBA has been a private company that has been listed in the Australian Securities Exchange. It is one of the largest multinational bank in Australia, which have branches in all over Australia, USA, New Zealand, Asia and Fiji. The bank has been able to provide quality services to the people in these countries. The bank has been doing business with many multinational companies by investing in their business (Whittington 2014). The organizational structure of the company has been integrated with vertical manner and able to operate in a network based structure. The primary form of vision of the association to becoming the finest form of organization in the market. Therefore, a huge strategy needs to be implemented fir the development of the company in the network. These strategies have been evacuated in order to recognize different kinds of significant opportunities in objectives of business (Lee et al. 2015). The value of the people as customers have been developed in order to maintain a keen relationship with them in the market.
Relevance of objectives
The technological aspects of the CBA have been integrated with the Information Technology systems within aspects of organization. The integration of IT has been dine in the bank for maintaining daily services and operations in the bank provided to the customers. The bank has been looking for enhancing their performances in the market for attracting more customers in the bank. The technical changes in the systems have been helping in modifying technology used in the systems (Wu, Straub and Liang 2015). The mobile application help in performing generally all the tasks and information including transaction and transfer. Therefore, along with website of the company and mobile application have been helping in gaining customer experience in their personal devices.
Mr. Whitely is the executive manager of the company has declared mobile banking systems of the CBA can be rewarded as one of the secure form of access methods with comparison of other computer banking system. The banking system have been enhanced with the implementation of information technology. The mobile devices have been using the SIM for the purpose of connecting banking systems with the internet browser. The security protocols might have been updated for increasing security in the network of the banking system (Torres, Mayo and Jiménez 2018). The use of current version of mobile application has been updated for adding new features in the mobile application. The fundamental agenda of company is to increase security level of database and server of the company over the internet.
Enhancement of mobile banking system, there have been high risks in security of database and server of the system. The banking system of the Commonwealth Bank has been following various form of mechanism has been based on concerns of the security within banking sector. A client has been able to transfer money from one banking account to another in a user-friendly environment. There has been able to check the current status of their account (Aversa, Cabantous and Haefliger 2018). However, there has been various customers that have been avail to provide different short level of trust on the banking.
In current times, there have been various cases and hacks in the banking systems that has been lowering of trust in various mobile based banking forms. There are various customers that have been various banking systems as it has been bringing inconvenience of the users. There have been assumptions for preventing any kinds of direct and indirect forms of attacks on the systems (Maharaj and Brown 2015). There have been mechanism of security are maintained by adopting CBA for different kinds of security issues have been attacked by unauthorized users.
Mission Statement
There have been various weaknesses of CBA for outsourcing facilities from third party architecture. There have been various handling of customer service of mobile banking systems with the help of third party. The system of banking followed by CBA has been able to maintain some mechanism that are based on security concerns with mobile banking. A client might avail this technology as it provide mobility by which they can access the banking system. (Henriques de Gusmão and Pereira Medeiros 2016) Mobile banking have helped in maintaining a proper approach for applying technology in the banking. With the assistance of the versatile keeping money frameworks given by the CBA, the clients would have the capacity to exchange cash starting with one saving money account then onto the next in an easy to understand condition. They might likewise check the present status of their record. There are a few clients who might not wish to benefit these sorts of high type of administrations because of a short level of trust on the saving money (Salim, Arjomandi and Seufert 2016).
In the ongoing occasions, there have been significant instances of fraud and hacks inside the saving money frameworks, which has prompted bringing down of trust in the portable based keeping money shapes. These clients are not prepared to receive such sorts of managing an account frameworks as it would expedite burden the piece of the clients with the supposition that they would not have the capacity to keep any sorts of immediate or aberrant types of attacks on the frameworks (Abdelhak, Grostick and Hanken 2014). The instrument of security that are essentially received by the CBA for the most part confront various types of security issues, for example, being assaulted by numerous sorts of unapproved clients. This is mostly viewed as the most astounding type of need in the parts of security (Brown and Davis 2015).
Figure 2: Document flowchart
(Source: Created by author)
Another type of shortcoming that is looked by the CBA is that the banks chiefly outsource their offices from outsider design. They for the most part handle the client administration of versatile saving money frameworks with the assistance of an outsider specialist co-op (Florina, Ludovica and Leonica 2013). They are along these lines in charge of secure type of exchanges and administration of the frameworks. This type of technique in charge of alleviating the verification issues. There is no such type of trust in the security of the information of the records of the clients that would incorporate the points of interest of the financial balance, locations of the clients, which would be overseen by the outsider specialist co-op. Subsequently the client would not have the capacity to feel the security of sharing their own passwords and other natural points of interest to the obscure outsider. A portion of alternate sorts of issues that are significantly looked with the execution of the administrations given by the outsider incorporate system control and security, parental based controls, interoperability institutionalization, obligation, counteractive action from fakes and verification, protection of clients and educated consent (Salim, Arjomandi and Seufert 2016).
Formal Organizational Chart of CBA
Fig 2: Data Flow Diagram of the Systems of Commonwealth Bank of Australia
(Source: Created by Author)
The versatile managing an account frameworks are respected to be profoundly anchored in the keeping money division. Other than the ordinary types of keeping money based administrations, the ascent of versatile managing an account advances are ascending at a fast pace. They are indicating enormous level of upgrades yet they are confronting different sorts of security dangers inside the frameworks at CBA (Devadevan 2013). A portion of the enhanced highlights behind the security of the versatile saving money frameworks incorporate the utilization of biometrics, mix of PLS with the HLS guidelines and update the centralized server frameworks to a UNIX and DB2.
With the assistance of giving of biometric strategy to the security of the gadgets, the CBA would have the capacity to receive outrageous levels of trusts with the versatile managing an account frameworks. This would have the capacity to guarantee the trust inside the frameworks of portable keeping money (Lovelock and Patterson 2015. The utilization of biometric instrument would be critical as it helps in the change of the levels of security inside the managing an account frameworks of CBA (Bajada and Trayler 2015). There are different sorts of components for biometric acknowledgment in light of the strategies for confirmation. Every one of the natural highlights of people shift from each other. Thus, it could be suggestible that the biometric highlight of validation would be especially helpful for verifying the client. A portion of alternate highlights in view of biometric verification that could be incorporated inside the managing an account frameworks of CBA incorporate hand based acknowledgment, confront acknowledgment, unique mark acknowledgment and voice acknowledgment. Different types of research in the field of unique finger impression acknowledgment innovation are being created and more up to date sorts of sensors are being produced.
The combination of PLS with HLS frameworks would likewise end up being gainful for the security of the frameworks. The UI of the PLS is essentially worked on a non-supportable stage. In this sort of frameworks, the bank would ordinarily need to enter the information in view of the applications on the web into the frameworks in light of PLS to produce the documentation of credit. Consequently, keeping in mind the end goal to lessen the expenses, streamline the level of usefulness and enhance the level of usefulness, the CBA ought to have the capacity to coordinate these frameworks inside their area. With the coordination of these frameworks inside their division, the CBA would be profoundly fruitful for exceling their levels of client administrations with the assistance of their IT specialist co-ops. The foundation of IT inside the CBA have a noteworthy history of achievement (Van Oosterzee, Dale and Preece 2014). Subsequently they would have the capacity to actualize much better types of frameworks so as to give better types of client benefit. The usage of these types of frameworks inside the IT foundation would be useful for settling on quicker types of choices, financing, separation between more prominent type of items and therefore harvesting higher types of endorsement rates.
Analysis of Commonwealth Bank of Australia
The CBA has a higher type of IT construct foundation situated in light of IT frameworks. With the assistance of their IT accomplices, the CBA should overhaul their old centralized computer frameworks that depended on the more established renditions of Windows OS to a considerably more elevated amount in view of DB2 and UNIX frameworks. With the update of the frameworks to a totally unique centralized computer frameworks, it would be to a great degree imperative for the IT frameworks and portable keeping money segment to remain shielded from a few sorts of dangers inside the frameworks. The CBA would likewise have the capacity to expand the level of proficiency inside the association and furthermore would have the capacity to diminish the costs (Bott and Milkau 2014). The CBA frameworks ought to likewise actualize computerization frameworks inside their association to increase the security levels, screen over their current IT frameworks, and empower higher paces of preparing that would have the capacity to offer higher types of paces inside the openness of the frameworks.
The execution of the more up to date types of frameworks could be ordered under the EDI (Electronic Data Interchange). This frameworks is an electronic type of exchange in light of the data identified with a business association. This framework permit the IT frameworks of CBA for the handling of data utilizing an institutionalized organization. With the assistance of this procedure, the organization would have the capacity to send crucial data to some other organization in an electronic arrangement. With the assistance of the EDI frameworks, the CBA keeping money frameworks would have the capacity to decrease the dangers of losing of delicate data. This is because of the reason that with the impact of EDI frameworks, the information would be exchanged to another division in an electronic, anchored organize and a quick configuration. The utilization of EDI frameworks inside the managing an account frameworks of CBA would have the capacity to help the keeping money area to dodge different sorts of information misfortunes amid the procedure of travel as the transmissions could be effortlessly followed and would be checked progressively situations (Jain, Keneley and Thomson 2015).
The utilization of EDI frameworks inside the most recent outline of the new data frameworks inside the keeping money division would be especially valuable for supporting the proficiency inside the work process, streamlining of the different procedures identified with the exchange of records, sparing of a lot of time, decrease of blunders and furthermore acquiring precision of enhancing of reports, which would empower the quicker types of business related exchanges. The procedure of EDI is additionally significantly more financially savvy. Henceforth, the mix of the EDI frameworks inside the new actualized frameworks of the saving money part of CBA (Mocker, Weill and Woerner 2014).
Current system of Commonwealth Bank of Australia
Versatile managing an account is a type of administrations that is given by any money related foundation or saving money division, which principally enables their clients to direct different types of monetary based exchanges in a remote cell phone. The Commonwealth Bank of Australia additionally helps in giving such sorts of administrations to their clients. This framework is principally mindful bringing productivity inside the keeping money procedures and administrations (Gill, Bunker and Seltsikas 2015). There are various types of specialized stages in light of which the portable managing an account frameworks would have the capacity to work. Various types of stages, for example, HTML5, CSS and Javascript have been significantly utilized for the improvement purposes and which have been the real base for the advancement of high sorts of frameworks. With the assistance of these innovative stages, distinctive different sorts of saving money frameworks have been already characterized and effectively created.
There are different sorts of potential security chances that could influence the keeping money frameworks of Commonwealth Bank of Australia. A portion of the attacks on the frameworks of CBA include:
Trojan Horse Attacks – These sorts of attacks inside the saving money framework could assist the assailant with inviting a Trojan. This could be as a key lumberjack program in view of the PC of the client. This would regularly happen at whatever point the client would get to specific sites and utilize a few sorts of downloaded programs. While getting to the site or the downloaded programs, the key lumberjack program would likewise get introduced inside the figuring frameworks without the learning of the client (Bhunia et al. 2014). At whatever point the client would sign into the site of the bank, the data would be caught amid the specific session and would be passed on to the assailant.
Malicious Hackers – These types of malignant attacks inside the frameworks of managing an account would allude to the break in to the registering frameworks without a legitimate type of approval. These might incorporate the outside and within people inside the segment of managing an account. Hacking is a type of action that has turned out to be considerably more pervasive in the ongoing occasions. Thus this has took into account the motivation behind getting to the site in a remote way. Programmers can enter into the high actually ensured frameworks with the assistance of different sorts of supporting hardware, for example, switches or switches. Henceforth this can completely harm the system unwavering quality.
Control Weakness of CBA
Phishing attacks – With the gigantic ascent in the capacity of individual data of the clients who are connected with the keeping money segment, it has been a noteworthy type of obligation regarding the security of the managing an account frameworks. Abuse of different sorts of individual data, for example, driving permit, ledger numbers or government managed savings numbers could prompt the lead of taking of different sorts of budgetary based exchanges. The keeping money parts have significantly felt the issue of phishing based attacks in their profoundly created framework, which is always being idea as a hazard factor for the associations and the administrations given by the saving money segment.
Man-in-the-Middle (MITM) Attacks – In these sorts of attacks that are looked by the keeping money frameworks, a phony site is made for the significant reason for picking up consideration of a wide number of clients who mostly get to the specific sort of site. In this sort of assault on the framework, the aggressor can trap the client with the assistance of masking a character so as to take guarantee the client that the message was originating from a confided in source. On fruitful endeavor of the aggressor, the clients would be diverted to the site of the assailant and subsequently all the private and secret data of the client would be completely imparted to the assailant. Thus the classified data identified with the keeping money related exchanges would be imparted to the assailant and subsequently they might abuse with the data (Bicakci et al. 2014).
Information ruptures are additionally a typical type of action inside the saving money frameworks. These can prompt enormous type of effects inside the frameworks. These can prompt the loss of private and classified information of the association. The data of the client would likewise be put in question amid such instances of information breaks inside a specific association.
There are different sorts of bookkeeping control frameworks and methods, which could be taken after for keeping an immense type of power over the private information inside the saving money part.
Physical Audits – These sorts of reviews inside the inner framework would allude to the assurance and review over the physical resources of the data frameworks inside a keeping money association. A considerable lot of the bigger activities inside the managing an account segment would typically require a yearly or quarterly premise review over their frameworks (Jiménez, Lopez and Saurina 2013).
Endorsement Authority – There ought to be an appropriate type of prerequisite of particular type of directors who might be exceptionally fit the bill with the end goal of location of any sorts of fakes inside the frameworks. These sorts of exchanges would have the capacity to include a different layer of security over the exchanges. A legitimate type of endorsement of bigger sorts of installments and different sorts of costs of the framework would be fundamental for the counteractive action of such sort of deceitful exercises that may happen over the frameworks (Goodhart et al. 2013).
Partition of Duties – The division of different sorts of obligations would include the part of various types of duties that are assembled on the saving money frameworks, for example, stores, accounting, inspecting and detailing.
Access over Controls – There ought to be a legitimate type of authority over the managing an account frameworks with the assistance of lockouts, passwords and electronic types of logs, which would be useful for shielding any type of unapproved clients from getting to the genuine framework. A strong type of following of access would likewise have the capacity to serve any type of deceitful exercises inside the framework (Laeven and Valencia 2013).
Figure 4: ER diagram of CBA
(Source: Created by Author)
Conclusion
It can be concluded that CBA has been expanding its business in the market. The technique for selection of biometrics inside the versatile keeping money frameworks would have the capacity to distinguish the physical conduct of any person. The utilization of biometric technique would be a helpful strategy as the biometric subtle elements of a man are extraordinary for each individual. Henceforth it is amazingly unthinkable for duplicating, sharing or overlooking of the passwords. This is because of the reason as every individual has their very own character. They have been updating their licenses for providing high level of customer services. One of the successful implementation of technology in CBA has been implementation of mobile banking system in the company. Most of the customers used mobile as an accessible device. Therefore, mobile banking might help them to reach the bank more easily.
References
Aversa, P., Cabantous, L. and Haefliger, S., 2018. When decision support systems fail: Insights for strategic information systems from Formula 1. The Journal of Strategic Information Systems.
Dwivedi, Y.K., Wastell, D., Laumer, S., Henriksen, H.Z., Myers, M.D., Bunker, D., Elbanna, A., Ravishankar, M.N. and Srivastava, S.C., 2015. Research on information systems failures and successes: Status update and future directions. Information Systems Frontiers, 17(1), pp.143-157.
Fenna, A., 2013. The economic policy agenda in Australia, 1962–2012. Australian Journal of Public Administration, 72(2), pp.89-102.
Galliers, R.D. and Leidner, D.E., 2014. Strategic information management: challenges and strategies in managing information systems. Routledge.
Gill, A.Q., Bunker, D. and Seltsikas, P., 2015. Moving forward: emerging themes in financial services technologies’ adoption. Communications of the Association for Information Systems.
Goodhart, C., Hartmann, P., Llewellyn, D.T., Rojas-Suarez, L. and Weisbrod, S., 2013. Financial regulation: Why, how and where now?. Routledge.
Henriques de Gusmão, A.P. and Pereira Medeiros, C., 2016. A model for selecting a strategic information system using the FITradeoff. Mathematical Problems in Engineering, 2016.
Jain, A., Keneley, M. and Thomson, D., 2015. Customer?owned banking in Australia: From credit union to mutual bank. Annals of Public and Cooperative Economics, 86(3), pp.465-478.
Jiménez, G., Lopez, J.A. and Saurina, J., 2013. How does competition affect bank risk-taking?. Journal of Financial stability, 9(2), pp.185-195.
Kenway, J., 2018. Pulp Fictions? Education, Markets, and the Information Superhighway 1. In Power/knowledge/pedagogy(pp. 61-91). Routledge.
Laeven, L. and Valencia, F., 2013. Systemic banking crises database. IMF Economic Review, 61(2), pp.225-270.
Laudon, K.C. and Laudon, J.P., 2016. Management information system. Pearson Education India.
Lee, T., Ghapanchi, A.H., Talaei-Khoei, A. and Ray, P., 2015. Strategic information system planning in healthcare organizations. Journal of Organizational and End User Computing (JOEUC), 27(2), pp.1-31.
Lovelock, C. and Patterson, P., 2015. Services marketing. Pearson Australia.
Maharaj, S. and Brown, I., 2015. The impact of shared domain knowledge on strategic information systems planning and alignment. South African Journal of Information Management, 17(1), pp.1-12.
Mocker, M., Weill, P. and Woerner, S.L., 2014. Revisiting complexity in the digital age. MIT Sloan Management Review, 55(4), p.73.
Murray, D., Davis, K., Dunn, C., Hewson, C. and McNamee, B., 2014. Financial system inquiry.
Oliveira, T., Faria, M., Thomas, M.A. and Popovi?, A., 2014. Extending the understanding of mobile banking adoption: When UTAUT meets TTF and ITM. International Journal of Information Management, 34(5), pp.689-703.
Osei-Kyei, R. and Chan, A.P., 2015. Review of studies on the Critical Success Factors for Public–Private Partnership (PPP) projects from 1990 to 2013. International Journal of Project Management, 33(6), pp.1335-1346.
Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Salim, R., Arjomandi, A. and Seufert, J.H., 2016. Does corporate governance affect Australian banks’ performance?. Journal of International Financial Markets, Institutions and Money, 43, pp.113-125.
Schlagwein, D., Thorogood, A. and Willcocks, L.P., 2014. How Commonwealth Bank of Australia Gained Benefits Using a Standards-Based, Multi-Provider Cloud Model. MIS Quarterly Executive, 13(4).
Smith, R., 2018. Crime in the digital age: Controlling telecommunications and cyberspace illegalities. Routledge.
Tsang, E.W., 2014. Case studies and generalization in information systems research: A critical realist perspective. The Journal of Strategic Information Systems, 23(2), pp.174-186.
Whittington, R., 2014. Information systems strategy and strategy-as-practice: a joint agenda. The Journal of Strategic Information Systems, 23(1), pp.87-91.
Willcocks, L. and Reynolds, P., 2015. The Commonwealth Bank of Australia–strategizing from outsourcing to the cloud part 1: perennial challenges amidst turbulent technology. Journal of Information Technology Teaching Cases, 4(2), pp.86-98.
Wu, S.P.J., Straub, D.W. and Liang, T.P., 2015. How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. Mis Quarterly, 39(2), pp.497-518.