Bsa520 V4gail Industries Case Studybsa520 V4page 6 Of 6gail Industri ✓ Solved

BSA/520 v4 Gail Industries Case Study BSA/520 v4 Gail Industries: Smallville Collections Processing Entity Case Study This case study will be used to complete your assignments throughout the course. Some sections of the case study will be necessary in multiple assignments. See the assignment instructions for specific assignment requirements. Introduction to Gail Industries Gail Industries is a partner to many Fortune 1000 companies and governments around the world. Gail Industries’ role is to manage essential aspects of their clients’ operations while interacting with and supporting the people their clients serve.

They manage millions of digital transactions every day for various back office processing contracts. One of Gail Industries’ clients is the city of Smallville. Smallville, despite its name, is a metropolis seated in the heart of the nation. The city has 2.5 million residents, and the greater Smallville metropolitan area has a population of about 4 million people. Overview of the Operations of Smallville Collections Processing Entity (SCOPE) Summary of Services Provided Collections Processing The Smallville Collections Processing Entity (SCOPE) provides collections processing services to the city of Smallville.

SCOPE receives tax payments, licensing fees, parking tickets, and court costs for this major municipality. The city of Smallville sends out invoices and other collections notices, and SCOPE processes payments received through the mail, through an online payment website, and through an interactive voice response (IVR) system. Payments are in the form of checks, debit cards, and credit cards. After processing invoices, SCOPE deposits the monies into the bank account for the city. SCOPE is responsible for ensuring the security of the mail that comes into the possession of all employees, subcontractors, and agents at its processing facility, located within Smallville.

Controls and procedures for money and mail handling are established by SCOPE to ensure payments are accounted for, from the earliest point received through processing and deposit. These controls and procedures provide: 1. Assurances for proper segregation of duties 2. The design and use of satisfactory documentation to ensure proper recording of transactions 3. The safeguarding of access to and use of all assets and records 4.

Independent checks on performance Payment Receipt The purpose of collections processing is to receive and process various types of payments, post the payment data to the Central Collections System (CCS), and deposit the accompanying funds in the Smallville bank account. This process includes the following types of payment receipts: · Regular mail – paper checks only · Website – credit and debit card payments; electronic checks · IVR – credit and debit card payments Mail Delivery A bonded courier picks up the payments from the United States Postal Service (USPS) facility in Smallville. SCOPE uses a subcontractor for courier services. This courier is dedicated, picking up and delivering mail only for SCOPE.

This courier is also required to sign for registered, certified, and express delivery envelopes. Opening and Sorting Mail The daily success of payment processing depends on receiving mail quickly from the postal service, opening that mail, and properly sorting the contents for processing. Batches contain similar payment types: tax payments are processed together, court collections together, and so forth. Deposits Deposits are made daily into the Smallville bank account. Electronic payments (debit cards, credit cards, and paperless checks) are deposited through an interface between CCSys and the bank.

Checks are converted to electronic debits and deposited electronically. However, those that cannot be converted to electronic form are deposited in physical form. Functional Areas of Operations Gail Industries uses the following specific functional areas of operations for SCOPE: · Contract manager – responsible for the overall management of contract deliverables of the payment processing operation, including the monitoring of financial expenditures to ensure compliance with contract budgets. · Operations manager – responsible for planning, managing, and controlling the day-to-day activities of the team that provides operational support for the business unit, including the establishment of operational objectives and work plans and delegation of assignments to subordinate managers. · Information technology (IT) manager – responsible for developing and maintaining the strategy of the future direction of IT infrastructure, including developing plans for the implementation of new IT projects and managing relationships with IT-related vendors and subcontractors. · Accounting – responsible for performing a variety of routine clerical and accounting functions within the accounting department, including daily balancing of receipts.

In addition, the accountant resolves exception transactions, including charged back checks (bounced checks), forgery affidavits, and recoupment. · Call center – the city of Smallville does not have a centralized call center for handling questions relating to payments and invoices. It is considering adding one to the scope of services offered by Gail Industries. Information Systems Services Gail Industries services are designed around the following tools and technologies: · Data Capture and Imaging – real-time instrument imaging and data capture—provides imaging, accountability and reporting of checks and remitted payments. · Invoice Management and Reporting – data correction and maintenance utilizing automated payment auditing and historical analysis.

A browser-based application is available for internal SCOPE and Smallville staff to perform administrative functions. A separate internet-accessible payment portal allows for citizens, business owners, and others to view invoices and make payments. Processing Platforms Gail Industries currently utilizes cloud-based servers on the Amazon Web Services (AWS) platform for internet-accessible application. Data capture, imaging, and the payment processing application run on local servers in a secured computer room. Local servers run both Linux and Windows Server operating systems.

Data is stored on Microsoft SQL Server to provide storage of payment, image, and balancing data. The servers supporting the CCS are housed within the server room (also known as the data center) and are managed by Gail Industries’ IT staff. The IT staff provides the following services: · Firewall management – monitoring and management of the firewall systems and networks on a 24/7/365 basis. · Network monitoring – proactive network and server monitoring services to help maximize system performance and uptime. · Data backup – data backup services for the production payment, imaging, and balancing data. · Incident management – IT incident monitoring, documentation, and resolution management. Control Objectives and Related Controls Note : Only select control objectives and related controls are included in the list below.

Physical Security (Data Center) Control Objective 1: The controls provide reasonable assurance that physical access to computer resources within Gail Industries’ data center is restricted to authorized and appropriate personnel. To protect physical assets, management has documented and implemented physical access procedures to grant, control, monitor, and revoke access to the on-site data center. The data center requires two-factor authentication: a biometric credential via retinal eye scanner and a badge access card. Individuals requesting badge access document the request on a standardized employee management form that must be approved by departmental management. Administrative access to the badge access system is restricted to authorized IT personnel.

When an employee is terminated, IT personnel revoke the badge access privileges as a component of the termination process. In addition, the IT manager performs a review of badge access privileges on a monthly basis to help ensure that terminated employees do not retain badge access. All visitors must sign a logbook and present picture ID to their escort upon entering the data center. Access is restricted to authorized IT personnel and equipment technicians. CCTV surveillance cameras are utilized throughout the facility and the data center to record activity; these images are retained for a minimum of 45 days.

Physical Security (Facilities) Control Objective 2: Controls provide reasonable assurance that physical access to assets within Gail Industries’ facilities is restricted to authorized and appropriate personnel. To protect physical assets, management has documented and implemented physical access procedures to grant, control, monitor, and revoke access to the on-site facility for SCOPE. A door badge access system is employed to control access to areas within the facility (including the data center) through the use of predefined security zones. Individuals requesting badge access to the facility document the request on a standardized employee management form, accessible through Gail Industries’ employee on-boarding system (known as GEO).

All requests must be approved by departmental management. Administrative access to the badge access system is restricted to authorized IT personnel. Upon termination (voluntary or involuntary), IT personnel revoke badge access privileges as a task in the termination process. In addition, the IT manager performs a monthly review of badge access privileges to ensure that terminated employees do not retain badge access. Both entrances into the facility are locked and are monitored by administrative personnel.

The receptionist must unlock the door for visitor access. Visitors are required to ring a video doorbell and announce themselves to the receptionist. Visitors sign a logbook when entering the facility, and they are required to wear a visitor’s badge at all times. Visitors must be escorted by an authorized employee when accessing sensitive facility areas such as the mail room and server room. CCTV surveillance cameras are utilized throughout the facility and server room to record activity.

Video images are retained for a minimum of 45 days. Change Management Control Objective 4: Controls provide reasonable assurance that changes to network infrastructure and system software are documented, tested, approved, and properly implemented to protect data from unauthorized changes and to support user entities’ internal control over financial reporting. Documented change management policies and procedures are in place to address change management activities. Further, there are provisions for emergency changes to the infrastructure and operating systems. Change requests are documented via a change request (CR) form.

CRs include details of the change, including the change requestor, the date of the request, the change description, and change specifications. Management, through the Change Advisory Board (CAB), holds a weekly meeting to review and prioritize change requests. During this meeting, management authorizes change requests by signing off on the CR form. Detailed testing is performed prior to implementation of the change in test environments that are logically separated from the production environment. The CAB approves the changes prior to implementation.

The ability to implement infrastructure and operating system updates to the production systems is restricted to user accounts of authorized IT personnel. Logical Security Control Objective 5: Controls provide reasonable assurance that administrative access to network infrastructure and operating system resources is restricted to authorized and appropriate users to support user entities’ internal control over financial reporting. Information security policies have been documented and are updated annually to assist personnel in the modification of access privileges to information systems and guide them in safeguarding system infrastructure, information assets, and data. Infrastructure and operating system users are authenticated via user account and password prior to being granted access.

Password requirements are configured to enforce minimum password length, password expiration intervals, password complexity, password history requirements, and invalid password account lockout threshold, as documented in the IT Policies and Procedures Manual. The CCS application authenticates users through the use of individual user accounts and passwords before granting access to the applications. CCS utilizes predefined security groups for role-based access privileges. The application enforces password requirements of password minimum length, password expiration intervals, password complexity, password history, and invalid password account lockout threshold. Excerpt from IT Policies and Procedures Manual Version 1.0, 12/31/2016 Revision History Date Author Notes 12/31/2016 Ken Smith Version 1.0, accepted by client Overview This policy is intended to establish guidelines for effectively creating, maintaining, and protecting passwords at SCOPE.

Scope This policy shall apply to all employees, contractors, and affiliates of SCOPE, and shall govern acceptable password use on all systems that connect to SCOPE network or access or store SCOPE, city of Smallville, or Gail Industries data. Policy Password Creation 1. All user and admin passwords must be at least [8] characters in length. Longer passwords and passphrases are strongly encouraged. 2.

Where possible, password dictionaries should be utilized to prevent the use of common and easily cracked passwords. 3. Passwords must be completely unique, and not used for any other system, application, or personal account. 4. Default installation passwords must be changed immediately after installation is complete.

Password Aging 1. User passwords must be changed every 60 days. Previously used passwords may not be reused. 2. System-level passwords must be changed on a monthly basis.

Password Protection 1. Passwords must not be shared with anyone (including coworkers and supervisors), and must not be revealed or sent electronically. 2. Passwords shall not be written down or physically stored anywhere in the office. 3.

When configuring password “hints,†do not hint at the format of your password (e.g., “zip + middle nameâ€) 4. User IDs and passwords must not be stored in an unencrypted format. 5. User IDs and passwords must not be scripted to enable automatic login. 6.

“Remember Password†feature on websites and applications should not be used. 7. All mobile devices that connect to the company network must be secured with a password and/or biometric authentication and must be configured to lock after 3 minutes of inactivity. Enforcement It is the responsibility of the end user to ensure enforcement with the policies above. If you believe your password may have been compromised, please immediately report the incident to the IT Department and change the password. image1.png Operations Management Control Module 2 Case 2 Trident at American InterContinental University Student Name Operations Management Control Module 2 Case Professor’s Name Date of Submission Operations Management Control Module 2 Case 2-3 sentence introduction.

Resources should be no more than three years old for this case because the industry is changing rapidly and the goal is to remain relevant throughout your career. B2B logistics Research the pros and cons of logistics delivery choices: from the perspective of cost, supply chain integration and competitive advantage for Business to Business (B2B). This portion of the paper will be 1-page in length B2C logistics Research the pros and cons of logistics delivery choices: from the perspective of cost and customer service for Business to Consumer (B2C). This portion of the paper will be 1-page in length Last mile logistics Research the cost and logistical implications of last mile delivery. ( Human resource and legal aspects of last mile delivery which were addressed in the discussion should not be included .) This portion of the paper will be 1-page in length Since you are engaging in research, be sure to cite and reference the sources in APA format.

The paper should be written in third person; this means words like “Iâ€, “weâ€, and “you†are not appropriate. The excessive use of quotes or unoriginal content will directly impact performance since it suggests lack of comprehension and indicates that a student may not have mastered the concepts. Conclusion This is your 2-3 sentence conclusion. Remember this is the last thing your reader will hear. Your submission will include: · Trident University International’s cover page · The body will be 3 pages with APA citations (2-3 sentence introduction, 3-page body, 2-3 sentence conclusion) · The alphabetized reference list page in APA format References This listing should be in alphabetical order.

Below are a few examples of reference list entries. The following list needs to be removed before you submit the paper (not by category). Journal in online library (be sure that you give the specific library database for journal articles that you have retrieved from the library, e.g., Proquest, EBSCO – Academic Search Complete, EBSCO – Business Source Complete, IBISWorld, etc.): Last name, Initials. (yyyy of journal volume). Title of article. Title of Journal, volume number ,(issue number), pages.

Retrieved from [insert name of library database] Example: Borgerson, J. L., Schroeder, J. E., Escudero Magnusson, M., & Magnusson, F. (2009). Corporate communication, ethics, and operational identity: A case study of Benetton. Business Ethics: A European Review, 18 (3), .

Retrieved from Proquest. Book in online library: Last name, Initials. (yyyy published). Book title . Retrieved from [insert name of library database] Example: Johnson, R. A. (2009).

Helping really fat dogs . Retrieved from EBSCO eBook Collection. Newspaper in online library: Author last name, first initial. (YYYY, MM DD). Name of article. Title of Newspaper , Example: Dee, J. (2007, December 23).

A toy maker’s conscience. New York Times Magazine, 34-39. Retrieved from EBSCO – Academic Source Complete. Websites APA end reference for a website – with author: Author. (Year [use n.d. if not given]). Article or page title.

Larger Publication Title. Retrieved from Example: Shiva, V. (2006, February 12). Bioethics: A third world issue. Nativeweb . Retrieved from APA end reference for a website – with no author: Title of article. (Year [use n.d. if not given]).

Website Title. Retrieved from Example: Media giants. (2014). Frontline: The Merchants of Cool . Retrieved from

Paper for above instructions


Introduction


Gail Industries provides crucial processing services in the city of Smallville, dealing with diverse payment methods, contract management, and information systems. The company's performance relies significantly on the strategic application of logistics across its operations. Logistics, in its myriad forms, plays a vital role in enhancing service efficiency and ensuring customer satisfaction. This paper explores the implications of logistics on B2B and B2C delivery, as well as the nuances of last-mile delivery. Understanding these factors is pivotal to operational excellence and maintaining advantages in a competitive market.

B2B Logistics


Pros and Cons of Logistics Delivery Choices


In the realm of Business-to-Business (B2B) logistics, delivering services and products comes with distinct advantages and disadvantages that influence cost structures, supply chain integration, and competitive positioning.
Pros:
1. Cost Efficiency: B2B deliveries often involve bulk shipping, allowing companies to negotiate better freight rates (Fernie and Sparks, 2020). This bulk transportation results in lower per-unit costs and contributes to enhanced profitability over time.
2. Supply Chain Integration: B2B logistics nurtures a symbiotic relationship between suppliers and manufacturers, leading to streamlined operations and enhanced service delivery (Christopher, 2016). Integrated supply chains reduce duplication of processes, minimize inventory, and optimize resource allocation.
3. Competitive Advantage: Efficient logistics provide businesses with a significant competitive edge. Companies capable of swift deliveries and responsive supply chains are better positioned to satisfy the demands of B2B clients, which can lead to longer contractual terms and loyalty (Omar et al., 2017).
Cons:
1. Complexity in Coordination: B2B logistics often involves multiple stakeholders, each with distinct processes and requirements. This complexity can lead to inefficiencies or disruptions if not properly coordinated (Harrison and van Hoek, 2014).
2. Higher Initial Investment: Building an efficient B2B logistics network requires substantial upfront investments in technology, infrastructure, and human resources, which can deter smaller firms from entering the market (Coyle et al., 2020).
3. Supply Chain Vulnerabilities: Dependence on third-party logistics providers introduces potential risks, including delays or delivery errors, which can significantly impact customer satisfaction, thus affecting long-term profitability (Bonney et al., 2021).

B2C Logistics


Pros and Cons of Logistics Delivery Choices


Business-to-Consumer (B2C) logistics has its unique set of challenges and opportunities, significantly impacting cost-effectiveness and customer service.
Pros:
1. Customer Satisfaction: Secure, timely delivery enhances customer experience and satisfaction. Companies focusing on high-quality logistics can foster trust, leading to repeat business (Maghsoudi et al., 2022).
2. Technological Advancements: Innovations like tracking software and automated warehousing improve operational efficiency and customer engagement (Kumar et al., 2021). Customers can track their packages in real-time, which enhances their experience.
3. Flexible Delivery Options: B2C logistics allows for varied delivery methods, accommodating consumer preferences. This flexibility can include express shipping, pick-up points, and home delivery, catering to diverse consumer needs (Ramanathan, 2021).
Cons:
1. Higher Cost Pressures: The expectation of fast delivery increases operational costs. Last-mile delivery can be especially expensive due to the final leg of transportation to residential locations (Wang et al., 2018).
2. Increased Returns: B2C transactions usually have a higher return rate than B2B due to consumers changing their minds, which strains logistics capabilities and adds additional costs (Gonzalez-Feliu et al., 2018).
3. Service Expectations: The rapid evolution of e-commerce has set increasingly high expectations among consumers, meaning that failure to meet delivery timelines can result in significant customer dissatisfaction (Zhang et al., 2020).

Last-Mile Logistics


Cost and Logistical Implications


The last mile refers to the final segment of the delivery process, where goods are transported from a distribution center or facility to the final delivery destination. This area of logistics is often the most complex and expensive part of the logistics chain.
Cost Implications:
1. High Operating Expenses: According to research, last-mile delivery can account for up to 28% of total logistics costs (Cohen, 2020). The costs arise from vehicles, fuel, labor, and inefficiencies related to managing final delivery routes.
2. Delivery Assets: Companies often require more vehicles and personnel to meet delivery timeframes and customer expectations, increasing fixed and variable costs (Chopra and Meindl, 2019).
3. Disposal of Returned Goods: Last-mile logistics often involves reverse logistics, where returns must be handled efficiently. The costs related to managing these returns and processing them add to the overall cost burden of last-mile deliveries (Wang et al., 2020).
Logistical Implications:
1. Route Optimization: Efficient delivery requires advanced technologies and algorithms for optimal route planning, which can minimize delivery times and reduce costs associated with fuel and labor (Simeone et al., 2021).
2. Sustainability Pressures: As urban areas become more congested, adopting sustainable last-mile solutions, such as electric vehicles or bicycles, becomes increasingly crucial. Companies face logistical challenges regarding infrastructure and the necessary technology for efficient operations (Liu et al., 2020).
3. Consumer Flexibility Demands: Meeting the delivery expectations of consumers requires adaptive logistics strategies. This often leads to enhanced partnerships with localized distribution centers or investments in innovative delivery solutions, such as drone delivery (Tan et al., 2021).

Conclusion


In conclusion, logistics plays a vital role in enhancing operational efficiencies and customer service at Gail Industries and its Smallville Collections Processing Entity. The analysis of B2B and B2C logistics highlights the multifaceted challenges and strategies needed to maintain competitive advantages and cost effectiveness. Additionally, navigating the complexities of last-mile delivery remains imperative for improving service quality and achieving sustainable operational goals. Recognizing these logistics dimensions will ensure Gail Industries remains agile and responsive in a rapidly changing environment.

References


1. Bonney, M., Murfield, J., & Barlow, T. (2021). The evolving logistics landscape: Challenges in Urban Logistics. Transport Review, 41(1), 21-39. https://doi.org/10.1080/01441647.2020.1768797
2. Chopra, S., & Meindl, P. (2019). Supply Chain Management: Strategy, Planning, and Operation. Pearson.
3. Christopher, M. (2016). Logistics & Supply Chain Management. Pearson.
4. Cohen, A. (2020). Understanding the costs and complexities of last-mile logistics. Logistics Management Magazine. Retrieved from https://www.logisticsmgmt.com
5. Coyle, J. J., Langley, C. J., Gibson, B., & Novack, R. A. (2020). Supply Chain Management: Logistics and Supply Chain Management. Cengage Learning.
6. Fernie, J., & Sparks, L. (2020). Retail Logistics: The Use of Technology in Logistics Operations. International Journal of Retail & Distribution Management, 48(8), 821-834. https://doi.org/10.1108/IJRDM-06-2019-0187
7. Gonzalez-Feliu, J., Morana, J., & Duhamel, C. (2018). Urban Logistics: Towards Sustainable Urban Supply Chain Management. ESCI – European Journal of Transport and Infrastructure Research, 2, 1-13.
8. Kumar, S., Singh, D., & Saini, J. (2021). Innovations in B2C E-commerce Logistics: Recent Trends and Challenges. International Journal of Logistics Research and Applications, 24(2), 158-178. https://doi.org/10.1080/13675567.2020.1835009
9. Liu, Z., Huang, Y., & Wu, J. (2020). Sustainable Last-Mile Distribution: A Supply Chain Perspective. Sustainable Production and Consumption, 23, 191-202. https://doi.org/10.1016/j.spc.2020.06.032
10. Maghsoudi, K., Joolaei, L., & Asgarian, R. (2022). Customer satisfaction in omnichannel retailing: A literature review. Business Strategy and the Environment. https://doi.org/10.1002/bse.2891
11. Omar, M., Gade, B., & Mishra, R. (2017). Analyzing the Performance of Various Logistics Strategies for B2B Firms. International Journal of Logistics Research and Applications, 20(3), 303-318. https://doi.org/10.1080/13675567.2017.1367563
12. Ramanathan, U. (2021). Customer service in e-commerce: Factors influencing performance. Journal of Business Research, 124, 323-337. https://doi.org/10.1016/j.jbusres.2020.02.057
13. Simeone, P., De Piero, F., & De Azevedo, S. N. (2021). The logistics of last-mile delivery: A case study. Canadian Journal of Transport. https://journalhosting.ucalgary.ca/index.php/cjtr/article/view/72495
14. Tan, M., Huang, W., & Leung, J. Y. H. (2021). Technology for last-mile logistics: Insights from retailers in the new economy. Transportation Research Part E: Logistics and Transportation Review, 143, 102045. https://doi.org/10.1016/j.tre.2020.102045
15. Wang, Y., Sun, L., & Li, Z. (2020). A model for last-mile logistics network planning under customer satisfaction metrics. Computers & Industrial Engineering, 149, 106856. https://doi.org/10.1016/j.cie.2020.106856
16. Zhang, H., Wang, Y., & Wang, J. (2020). Impacts of e-commerce logistics on retailing in the omni-channel era: Trends and challenges. International Journal of Retail & Distribution Management, 48(10), 1051-1073. https://doi.org/10.1108/IJRDM-02-2020-0084