Final MIS Report - Copy (1)
Final MIS Report - Copy (1)
SUBMITTED BY:
SUBMITTED TO:
MR. BIRENDRA YADAV
THAKUR RAM MULTIPLE CAMPUS
Faculty of management
Tribhuvan University
Kathmandu
2021
ACKNOWLEDGEMENT
This report is the result of continuous effort made and extended support of many
people. The preparation of this report needed a lot of effort and suggestions of many
people in order to get to its complete form. Firstly, I would like to thank Tribhuvan
University for designing a platform where we can gain not only theoretical knowledge
but also practical knowledge.
We express our thankfulness to our teacher Mr. BIRENDRA YADAV for nonstop
support and making us to know about the subject matter of the book in practical way.
We are also very grateful and would like to thank our college administration of
THAKUR RAM MULTIPLE CAMPUS, who gave us opportunity for the
organization field visit.
We would like to acknowledge with much appreciation the crucial role of the staffs
and manager of; “NIC ASIA Bank Limited”, who helped us by providing
information regarding organization changes and its development. It is our great
pleasure to submit this report as the partial fulfilment of the course materials for the
curriculum.
Finally, I would like to pay heartwarming thanks to my family and my dear friends for
their valuable support and assistance, without their support this report would not be
possible. I have tried my best to design a complete application that fulfill all the
requirements. Though I am not a professional or experienced in this field but I had
tried my level best to make this project according to the teachers’ guidelines.
Thank you!!!
Table of Contents
CHAPTER ONE: INTRODUCTION
1.1. Introduction of organization......................................................................................1
1.2. Background of the Study...........................................................................................2
1.3. Significance of the Study..........................................................................................2
1.4. Statement of the Problem..........................................................................................2
1.5. Objective of the Study..............................................................................................3
1.6. Delimitation of the Study..........................................................................................3
1.7. Methodology of the Study.........................................................................................4
CHAPTER –TWO: REVIEW OF LITERATURES
2.1. Types of Information System....................................................................................5
2.2. Information system Department................................................................................7
2.3. Role of MIS..............................................................................................................7
2.4. Uses of IT facilities and services...............................................................................8
2.5. Communication.......................................................................................................10
2.6. Software as enterprise application...........................................................................13
2.7. IT for Firms’ operation............................................................................................14
2.8. IT Infrastructure......................................................................................................17
2.9. Security...................................................................................................................23
2.10. MIS in decision making......................................................................................25
2.11. Ethics..................................................................................................................27
2.12. Corporate social responsibility............................................................................27
2.13. Competitive advantage........................................................................................28
2.14. Outsourcing.........................................................................................................30
2.15. Organization change pattern................................................................................31
2.16. System changes and redesign..............................................................................33
CHAPTER - THREE
CONCLUSION, RECOMMENDATIONS And REFERENCE
3.1. Conclusion
3.2. Recommendations
3.3. Reference
CHAPTER ONE: INTRODUCTION
NIC ASIA Bank has its antecedents in NIC Bank which was established on 21st July
1998. The Bank was rechristened as NIC ASIA Bank after the merger of NIC Bank
with Bank of Asia Nepal on 30th June 2013. This was a historic merger in the annals
of the Nepalese financial landscape as the first of its kind merger between two
successful commercial banks in the country. Today, NIC ASIA has established itself as
one of the most successful commercial banks in Nepal.
During the post-merger integration phase, NIC ASIA managed the transition very
smoothly receiving accolades from the regulators as well as the stakeholders, paving
the way for other mergers and consolidation in the Nepalese financial sector. After the
merger, NIC ASIA was recognized as “Bank of the Year 2013-Nepal” by The Banker,
Financial Times, UK. This is the second time that the Bank was recognized with this
prestigious award, the previous occasion being in 2007.
NIC ASIA Bank is now, one of the largest private-sector commercial banks in the
country in terms of capital base, balance-sheet size, number of branches, ATM
network, and customer base. The Bank has 356 branches, 70 extensions counters
81 branchless banking, and 472 ATMs across Nepal with a network covering all major
financial centers of the country. The Bank strongly believes in Meritocracy,
Transparency, Professionalism, Team spirit, and Service Excellence. These core
values are internalized by all functions within the Bank and are reflected in all actions
the Bank takes during its business.
Corporate Vision:
“To ensure the creation of optimum values for all the stakeholders”
1
Objectives:
NIC Asia Bank Limited has the following objectives:
Focus on building the positive net worth and meeting minimum capital
requirement over the coming five years.
Study begins with setting our objectives of going into the organization.
Questionnaires strictly concerned with the objectives were also prepared. NIC being
one of the leading commercial banks of Nepal, was our choice. We arrived in the
organization with queries which were related to our subject of report.
2
With the help of this research, we have been able to get knowledge and information
regarding various sectors of IT and its importance in the organization to run it
smoothly and effectively. Some of them are listed below: -
This research has helps us to identify the types of information system used in
the organization.
It has helps to find out the effectiveness of MIS in the organizations.
It has help to locate the types of collaboration tools used in an organization.
It has help to gather information regarding security threats and tools of an
organization.
It has help us to analyze that how the use of IS/IT has benefitted the
organization.
It has been providing various banking facilities it has to face cutthroat competition in
banking business. Especially, when the private banks were more focused on profitable
ventures and better customer service NIC had to provide services to the remote areas
all around the nation to serve the rural people and community as well. NIC should be
able to facilitate its customers with high-tech services. It also needs to re-imagine
tech-enabled services continuously and be ready to face innovative technological
challenges. More convenient international transactions a well-defined IT plan/policy
and audit plans.
NIC technology adaptation will definitely help to reshape itself in Nepalese banking
industry in recent future. NIC ASIA Bank is committed to take up technology trends
in safe and secure manner to deliver innovative, effective and efficient services to the
satisfaction of people of different demography.
3
1.5. Objective of the Study
A study or investigation without any objectives becomes haphazard and cannot meet
its target. This study has been done taking certain objectives. The main objectives of
this study are as follows:
Every investigation has its own limitations. We have collected as much as information
as we could and per the requirement but still we are unable to collect full information
needed for our research due to some limitation we faced, listed below:
For conducting the study, I have used both primary data and secondary. The sources
are given below:
4
Secondary data sources:
This study attempts to explain the role of each type of information systems in NIC
Asia Bank Limited.
5
Transaction Processing System (TPS) plays a vital role in financial
transactions in banking sector. When evaluating and managing the risks, it is
more anticipatory and effective way to analyzing the potential risks. It helps an
organization manage its risks, enhance its value and improves business
performance. On the other hand, Information system security is always a
necessity in order to deal with threats.
check management,
6
into an information system which provides insight to policy framers in a bank.
Collectively all these data are called Management Information System.
The use of DM and DSS is becoming increasingly common. Many banks are
upgrading from management instinctive decisions to mining of data and using
it to make decisions for business growth, not only because of the bad result
they get often from the instinctive decisions but from the fact that they need to
mine the daily increase in data, look at the trends and patterns, and look for in
accurate data to so as to make better decisions because of its wide support for
business convenience and ease of use. “Data mining can be considered as a
method that is used for a data warehouse which daily banks data are sourced
for use and new once are stored, while DSS is a tool that helps develop and
generate decisions based on the data mined. This includes the following
characteristics:
A wide number of data is stored all over the banks departments and
branches across its coverage and it accessed concurrently.
The IT department has enthusiastic and dedicated staffs responsible for providing backbone and suppo
for the functioning of the bank. The rapid expansion drive of the bank encompassing its network of
ATMs and branches has been made possible through the centralized system and dependable network
7
infrastructure commissioned and maintained by the IT department. The department is actively engage
in trouble shooting and providing support in matters relating to banking software, connectivity and
hardware fault handing ensuring smooth operations which again is important for mainlining highest
quality of services.
The IT department has evolved and grown from its support responsibility into strategizing innovation
bringing out new products that offer customers added benefits by leveraging the technological advent
The department has been a mix of the youth and experience strongly led by Mr. Prakash Kumar
Adhikari, continuously providing with the learning opportunities and information sharing between the
employees with diverse competence level and skill set providing a strong career prospect.
8
successful banks of the future. The bank gains a vital competitive advantage by
having a direct marketing and accountable customer service environment and new,
streamlined business processes. Consistent management and decision support systems
provide the bank that competitive edge to forge ahead in the banking marketplace.
Application
of IT in NBL
For For
For bank
customer employee
A) For the customer: NIC ASIA Bank Limited is aware of customer's need for
new services and plan to make them available. IT has increased the level of
competition and forced them to integrate the new technologies in order to
satisfy their customers. They have already developed and implemented a
certain number of solutions among them:
9
issue and inquiry on rates without visiting the bank. Moreover, LC text and
details on bills can be sent by the customer, and the bank can download the
same. The technology used to provide this service is called electronic data
interchange (EDI). It is used to transmit business transactions in computer-
readable form between organizations and individuals in a standard format.
B) For the bank. During the last decade, NIC ASIA bank Limited applied IT to a
wide range of back and front office tasks in addition to a great number of new
products. The major advantages for the NIC to implement IT are:
10
iv. Avoidance of duplication of entries due to existence of single-point data
entry.
2.5. Communication
A = Attention
B = Brief
C = Clarity
Importance of communication
Nepal Bank Limited give more importance to communication because they emphasize
On Attention, Brief & clarity of communication &NIC ASIA retain customers through
proper communication.
Purpose of Communication
11
communication means communication within the organization, whereas external
communication is the communication with the outside environment.
Internal communication
Internal communication of NIC ASIA Bank Limited is mainly downward, but upward
and crosswise communication is also encouraged.
E-mails
Faxes
Letters
Reports
Memo
Telephones
Conferencing
Meetings
Following are the channels that NIC ASIA BANK uses to communication within the
organization. The most important channel they focus to communicate is “E-MAILS”.
All work is done through Email’s. This E-mail system is design by their IT
department who is responsible for controlling it & gives access to each & every
12
person within the organization. They communicate on daily basis internally &
externally both to Communication more clearly & correctly.
And the other work is done by using different channels that are letters, reports etc.
Different types of reports are prepared on suggestions or recommendations on
personnel, activity execution time and plans for overcoming the difficulties.
External communication
External communication helps the managers of IFL (Institute for Financial Literacy)
to become aware of:
13
Letters
These are the channels that NIC uses to communicate with external environment that
includes customer, suppliers, stockholders & government etc. NIC Communicate with
their customers in a better way & correctly to retain their customers. Their objective is
communicating clearly with customers. For this they provide facilities to their
customer such as a toll-free Number through this customer gets information regarding
their Accounts & services or anything they want to know. By communicating in that
way NIC gain the loyalty of customers. Even no little confusion occurs in
communication because while communicating with customer or making any contract
they confirm it many times. So, less chances of misunderstanding occurs. Letters are
written to the customers as well as to other external agencies like suppliers, taxation
authorities, governmental regulatory bodies etc.
This application is used by NIC ASIA bank where customer account is maintained
on the system and referenced by the account number in the general ledger. The
customer account number is the link for the customer with the online and offline
banking system applications. Customer account information is also the basis for
transaction exception reporting for various customer account issues.
This application is used in order to make decision regarding how much loan
should be provided by bank. Managers can access data to examine the bank loan
portfolio, generate compliance check for the auditors and track loan- loss reserve
14
account. Through this application bank (NIC bank) personnel is able to process
the forms and paperwork needed to make decision on customer’s credit standing.
For banks in the banking industry, mortgage bank application modules create and
maintain information according to the mortgage loans provided by banks to its
customers. NIC ASIA bank has been providing housing loans, hire purchase loans
(loan facilities to purchase new/used vehicles for commercial purpose).
Installation of ATM’s which offer non- stop cash withdrawal, remittances and
inquiry facilities. Networking of computerized branches, inter-city and intra-city
will permit customers of these branches, when interconnected, to transact from
any of these branches.
6. Electronic banking
This enables the bank to provide corporate or high value customers with a
graphical user interface (GUI) software on PC, to inquire about their financial
transactions and accounts, cash transfers, cheque book issue and inquiry on rates
without visiting the bank. NIC e-Banking provides secure communications using
128-bit encryption security that assures you of secure transactions made with the
Bank. NBL e-banking has dual factor authentication with the features of One
Time Password (OTP) for fund transfer.
7. Mobile banking
15
Mobile banking is 24 hour service through which inquiries regarding balance and
transaction in the account can be made over the mobile. NIC Mobile Banking is a
convenient and safe transaction banking application offered online. You can
manage and access your NIC Bank accounts quickly and securely either through
SMS, WIFI, 3G or Edge. With NIC Mobile Banking application, you can access
and manage your NIC Bank accounts to perform the following services.
1. Acceptance of Deposits
2. Lending of Funds
3. Clearing of Cheque
4. Remittance of Funds
5. Lockers & Safe Deposits
6. Bill Payment Services
7. Online Banking
8. Credit & Debit Cards
9. Overseas Banking Services
10. Wealth Management
1) Acceptance of Deposits: Deposits are the basis of the loan operations since
banks are both borrowers and lenders of money. As borrowers they pay interest
and as lenders, they grant loans and get interest. These deposits are generally
taken through current account, savings account and fixed deposits. Current
account deposits can be withdrawn to the extent of the balance at any time
without any prior notice. Savings accounts are for encouraging savings by
individuals. Banks pay rate of interest as decided by central banks on the
16
deposits. Withdrawal from these accounts has some restrictions in relation to the
amount as well as number of times in a given period. Fixed accounts are time
deposits with higher rate of interest as compared to the savings accounts. A
premature withdrawal is permissible with a percentage of interest being forfeited.
2) Lending of Funds: Second major activity of NIC banks is to provide loans and
advances out of the money received through deposits. These advances can be
made in the form of overdrafts, cash credits, discounting trade bills, term loans,
consumer credits and other miscellaneous advances. The funds lent out by banks
contribute a great deal to trade, industry, transport and other business activities.
4) Remittance of Funds: NIC also facilitate fund transfer from one place to
another, leveraging the vast network of branches that are interconnected to each
other. Many banking instruments are in usage for enabling transfer of funds from
one account to another like bank drafts, pay orders, wire or mail transfers. Bank
earns nominal commission by way of bank charges on some of the transfers. The
bank issues a draft for the amount at its own branch which can be credited to
another account which might be with different branch or different bank. Banks
collect the amount on behalf of the depositor which is known as clearing process.
5) Lockers & Safe Deposits: Bank safe deposit lockers are a good option for
safeguarding valuables and important documents. Each locker is operated by
combination of two sets of keys, one for the customer, and the other with the
17
bank. The locker can only be operated if both the keys are used. NIC charge
nominal fees to provide the locker facility.
6) Bill Payment Services: Banks also provide services related to bill payments,
payment of insurance premium, collection of dividends etc. Recurring payments
can be automated for payment using the facilities extended by modern banks.
Account holders can directly pay from their account or using credit/debit cards
for their electricity, gas, landline and mobile phone billers and many more.
8) Credit & Debit Cards: Credit cards issued by banks are another form of
lending, and they are not only good business for the bank, they help the economy.
Offering Credit Card is a profitable form of lending for banks that has greatly
expanded in the last few years. Banks compete fiercely for this business and offer
varying forms and types of credit-card accounts. Many banks change or negotiate
rates with consumers, and special low-rate promotions and various types of
discounts are being offered as an incentive to use card and do purchasing. People
buy things with credit, and keep merchandise moving and manufacturing
producing at a more rapid rate than if transactions had to take place in cash.
Although there is risk in the unwise use of credit cards by consumers, the
judicious use of credit stimulates the economy.
18
UJK
2.8. IT Infrastructure
IT infrastructure is increasingly seen as an important factor affecting a banks
competitive performance. IT infrastructure is the enabling base of shared IT
capabilities that provide the foundation for other business systems. Banking IT
infrastructure typically consists of IT components like common hardware, software,
communication technology, databases, standards, tools etc. These provide the base for
shared services between a large range of business application. IT infrastructure differs
from business application in that it serves a shared and common enabling foundation
for the future applications and services of all business units.
19
Organizational Structure
Since, NIC ASIA Bank has many branches that, it has divisional structure. A central
headquarters supports a number of its branches that makes their own decisions. It
allows line managers to maintain more control and accountability. Also, day to day
decision making is decentralized, so that the central team can focus in “big picture”
strategic plan. This allows ensuring that the necessary support structures are in place.
20
Organizational Structure concerning IT
This organizational structure is concerned with IT. Card system is the IT department
that controls IS/IT resources, authorization and authentication into the system of other
departments. Core system is with Card System and other departments are simply
provided with tools to use the system of NIC ASIA Bank Limited. Card system
controls overall IT/IS resources used by other departments. Each department has a
department head including Card system. It keeps an eye on how the resources are
being used, controls how much resources can be used by each and every department
to ensure privacy of information, manages authorization and authentication of such
departments, and promotes fair use of IT/IS resources, but it acts as a department
itself. It interlinks other departments and provides them with tools to use the system
of NIC ASIA Bank Limited. It holds centralized control over the system and merely
provides other departments with tools to use the system to access information
concerned to the functional areas of such departments. For e.g.: Marketing department
is provided with tools to access information related to marketing only. Card system
strictly prohibits them to access information that is not concerned to them.
21
This is why, Card system has central control over core system and it interlinks other
departments by simply providing them with tools to access that part of information
concerned only to them.
2.9. Security
Security refers to the policies, procedure and technical measures used to prevent
unauthorized access, alternation, theft or physical damage to information system.
a) Penetration Test Tool: A penetration testing tool is a tool used for testing the
security of a Web application. Penetration testing (also called pen testing) is
the practice of testing a computer system, network or Web application to find
vulnerabilities that an attacker could exploit.
b) Card Discover Tool: Card discover tool helps to identify the location from
where the card is swapped and the transaction occurred using that smart cards.
It helps to preserve integrity of cards holders.
c) Database Firewall: Database firewalls are a type of web Application
Firewalls that monitor databases to identify and protect against database
23
specific attacks that mostly seek to access sensitive information stored in the
database.
d) Network Firewall: A network firewall refers to a network device which
blocks certain kinds of network traffic, forming a barrier between a trusted and
an untrusted network. It is analogous to a physical firewall in the sense that
firewall security attempts to block the spread of computer attacks.
e) Intrusion Detection System (IDS) & Intrusion Prevention System (IPS):
An Intrusion Detection System (IDS) is a device or software application that
monitors a network or systems for malicious activity or policy violations. Any
malicious activity or violation is typically reported either to an administrator
or collected centrally using a security information and event management
(SIEM) system. A SIEM system combines outputs from multiple sources, and
uses filtering techniques to distinguish malicious activity from false alarms.
An Intrusion Prevention System (IPS) is a system that monitors a network for
malicious activities such as security threats or policy violations. The main
function of an IPS is to identify suspicious activity, and then log information,
attempt to block the activity, and then finally to report it. IDS (Intrusion
Detection System) and IPS (Intrusion Prevention System) both increase the
security level of networks, monitoring traffic and inspecting and scanning
packets for suspicious data. Detection in both systems is mainly based on
signatures already detected and recognized. The IDS only monitor traffic. The
IDS contain a database of known attack signatures. And it compares the
inbound traffic against to the database. The IPS monitors the inbound packets
and what they are really being used for before deciding to let the packets into
the network.
f) Security Information and Event Management (SIEM): Security
Information and Event Management (SIEM) tool for cyber threat analysis, IT
compliance maintenance, and provide suspicious activity alerts. A SIEM
system combines outputs from multiple sources, and uses filtering techniques
to distinguish malicious activity from false alarms. NIC Asia Bank uses SIEM
software of LogRhythm.
g) File Integrity Monitoring (FIM): File Integrity Monitoring refers to a
process for making sure that files have integrity; in other words that they have
not been damaged nor manipulated over a certain time period. File integrity
24
monitoring tools are generally utilities for internal processes that check current
file integrity against a predetermined baseline. NIC Asia Bank uses FIM
software of LogRhythm.
Card system interlinks all the departments. In other words, card system is the IT
department that acts as the head of all the other departments, but card system is also a
department itself. It acts as the head of other departments because its control IS and IT
resources, authorization and authentication of other departments. From collected data,
card system will generate necessary reports as per request of other departments.
Departments will use those reports to acquire necessary data and identify different
alternative solutions of problems and communicate it to the head. Finally, head and
department head will work together to select best alternative out of many alternatives
that is cost friendly as well as best for the organization. This is how decision flows in
NIC Card Centre.
25
9. Implement the decision
How the decisions are implemented depends upon the problem. If the problems can be
immediately solved, decisions are implemented immediately. If the problems need to
be solved a part at a time, a master decision will be divided into parts and are
implemented one at a time by analyzing the effects. All in all, how the decisions are
implemented depends upon the type of decision i.e. whether the decisions are routine
or basic, programmed or non-programmed, tactical or operational, and formal or
informal.
2.11. Ethics
26
2.12. Corporate social responsibility
Corporate social responsibility is the practice of integrating social and environmental
goals into business operations. Common roles of CSR include helping control costs,
improve a company's brand, attract top-quality talent and facilitate long-term financial
success. CSR is a thoughtful and practical way to give back to society. When
businesses are conscious of their social and environmental impact on the world, they
can benefit society by giving back and helping to find solutions to everyday issues.
Corporate social responsibility (CSR) is all about companies managing their business
process to produce the overall positive impact on the society. The interest for CSR has
grown rapidly the recent years and people started to demand corporate social
responsibility from the company. CSR is connected with corporate behaving ethically,
morally and socially responsible towards the society. This research focuses on
investigating why companies engage in CSR, how they apply CSR and how CSR can
affect financial performance. It was found that the employees and the people in
general do get motivated by their organization. All the respondents were very positive
and energized about being part of the CSR activities provided with the opportunities.
NIC has focused their CSR activities related with the health, education and
environment with the name as NIC health, NIC education and NIC environment
initiation. NIC has tried to cover the different aspect of essential factors in anyone’s
life. Majority of the respondents’ views that CSR activities has the positive relation
and can contribute on the financial performance of the company as it increases the
good image and goodwill of the organization. CSR needs planning and proper
implementation so that the society could actually have positive impact from CSR
activities. In Nepalese context, the organization don’t emphasize in CSR activities
rather they give priorities to earn more profit and flourish their business.
27
(CVM) was adopted for the operationalization of MIS effectiveness, which defines
four archetypes labeled as: open system (OS), human relations (HR), internal process
(IP) and rational model (RM). The empirical findings from a survey of 186 employees
in Greece revealed that a) the externally focused MIS effectiveness archetypes (OS,
RM) reflecting innovation, creativity, goal setting and planning enhance task
productivity b) the IP model of MIS effectiveness influences negatively task
productivity.
Information technology, also known as IT, is a comprehensive term that includes all
types of technology used to exchange, store, use or create information. From basic
computer terminals to IP-based telephony systems, information technology is an
integral part of most modern business operations. Some of the business benefits that
Nepal Bank has got through use of technology are;
Automation:
Speed:
One of the business benefits with the use of technology is increase in the speed while
working. Before the use of technology every work done by the organizations used to
take a lot of time. There was no work done on time due to which organization used to
have less production which results less profit. Likewise, NIC bank also faced the
same but now with the use of technology most of the work is done by the machine
which results high qualitative productivity and increase in profits too. Every work is
performed within a minute. Increase in speed results costumer satisfactions.
Business Security:
Information security is a big issue every day. Hackers and thieves steal consumer
information and company proprietary information daily, but technology can protect
28
company information. If there is one key benefit to businesses that should be updated
and continuously monitored, it is digital security. Hackers can interrupt business
operations, cost companies thousands of dollars, and cause businesses to fall under
public scrutiny. Security goes well beyond firewalls and anti-virus software. Digitally
linked security systems protect businesses from vandalism and theft. Not only do
systems provide Realtime alerts, but they also provide diversion tactics such as
alarms. Some systems give business owners away to speak directly to vandals from a
remote location via phone, informing intruders that they are on camera and identified.
Employee Monitoring:
Businesses can better manage large teams using technology. Applications track
customer service call times, which helps managers understand where lag times exist
and provide opportunities for coaching. Speed and GSP tracking of drivers support a
positive public image of employees who realize they can't get away with poor
behavior. The right technology automatically tracks sales numbers and potential sales,
which gives managers control of leading indicators rather than lagging behind.
Businesses operate more efficiently when they use technology correctly. Digitizing
files makes it easy to customize documents such as user agreements and contract
templates. Communication is instant with email and the ability to send documents
back and forth during negotiations. Customers can get information on websites and
request information anytime of the day or night using online forms. Software
programs continue to improve and make data collection and interpretation more
powerful. Customer relationship management software records everything from client
information to follow-up calendars, buying history and propensity patterns. This
information makes it possible for a sales team to manage prospects and solidify client
relationships effectively.
2.14. Outsourcing
In IS, outsourcing means using eternal agencies to create, process, manage and
maintain information systems and to provide the company the wide range of
information-related services such as data processing, accessing external databases,
29
systems integration, global networking, content development, web design and
maintenance, logistics, technical & amp; customer support, legal outsourcing and
gathering business intelligence. The specialized company that handles the outsourced
work is often streamlined, and often has the world-class capabilities and access to new
technology that a company couldn’t afford to buy on their own.
NIC Bank Limited outsource for reasons that can be classified into broad categories.
1. Strategic force: NIC outsource for systems that are not in their direct line of
business so that they can have better focus on their primary line of business
and utilize its resources to meet strategic goals and achieve its mission &
quote; “Do what you do best and outsource the rest! & quote(Tom Peters)”.
2. Economics of Scale: NIC may also outsource for economic reasons. Since
most outsourcing agreements are fixed-price contracts, this helps eliminating
the escalating cost associated with the system development processes. A
carefully designed outsourcing contract decreases the overall cost of IS
operations.
3. Market force: Sometimes market force may make outsourcing an attractive
alternative. If an outside vendor can provide support function more efficiently,
outsourcing that function can reduce operating cost and give the company a
competitive advantage.
4. Technical consideration: Technical consideration such as lack of skilled
technical personnel compels organizations to consider outsourcing. Therefore,
many organizations outsource external vendors for handling IS related
functions so that they do not need to hire new employees, train them to build
software package for the company and then release them after the new system
is built.
Benefits
30
Drawbacks
1. Automation
2. Rationalization
3. Business process redesign
4. Paradigm shift
High
RISK Paradigm
Shift
Redesign
Rationalization
Low Automation
Low high
RETURN
31
six key steps to effective organizational change management are:
1. Clearly define the change and align it to business goals: It might seem obvious
but many organizations miss this first vital step. It’s one thing to articulate the
change required and entirely another to conduct a critical review against
organizational objectives and performance goals to ensure the change will carry
your business in the right direction strategically, financially, and ethically. This
step can also assist you to determine the value of the change, which will quantify
the effort and inputs you should invest.
2. Determine impacts and those affected: Once you know exactly what you wish to
achieve and why, you should then determine the impacts of the change at various
organizational levels. Review the effect on each business unit and how it cascades
through the organizational structure to the individual. This information will start
to form the blueprint for where training and support is needed the most to
mitigate the impacts.
3. Develop a communication strategy: Although all employees should be taken on
the change journey, the first two steps will have highlighted those employees you
absolutely must communicate the change to. Determine the most effective means
of communication for the group or individual that will bring them on board. The
communication strategy should include a timeline for how the change will be
incrementally communicated, key messages, and the communication channels
and mediums you plan to use.
4. Provide effective training: With the change message out in the open, it’s
important that your people know they will receive training, structured or informal,
to teach the skills and knowledge required to operate efficiently as the change is
rolled out. Training could include a suite of micro-learning online modules, or a
blended learning approach incorporating face- to-face training sessions or on-the-
job coaching and mentoring.
5. Implement a support structure: Providing a support structure is essential to assist
employees to emotionally and practically adjust to the change and to build
proficiency of behaviors and technical skills needed to achieve desired business
results. Some change can result in redundancies or restructures, so you could
consider providing support such as counseling services to help people navigate
the situation. To help employees adjust to changes to how a role is performed, a
32
mentorship or an open-door policy with management to ask questions as they
arise could be set.
6. Measure the change process: Throughout the change management process, a
structure should be put in place to measure the business impact of the changes
and ensure that continued reinforcement opportunities exist to build proficiencies.
You should also evaluate your change management plan to determine its
effectiveness.
33
NIC technology adaptation will definitely help to reshape itself in Nepalese banking
industry in recent future. NIC ASIA Bank is committed to take up technology trends
in safe and secure manner to deliver innovative, effective and efficient services to the
satisfaction of people of different demography.
34
CHAPTER - THREE
3.1. Conclusion
Our aim to visit NIC ASIA is to collect some information and get knowledge about
information system in the bank. NIC bank has successfully utilized its MIS in
providing banking products to its customers and also in improving its organizational
efficiency. It is one of the few banks which adapts quickly to the changing
environment and keeps pace with the ever-changing technology. Management
information system has been a boon to NIC bank. The bank has gained tremendous
lead over its competitors who lagged behind in incorporating MIS in their
organizations. Today MIS has played a crucial role in giving it a competitive
advantage. Though the current MIS in the bank is highly beneficial, the bank is very
keen on researching new avenues to improve its MIS system for better efficiency in
its operations and to continue to serve its customers effectively.
3.2. Recommendations
MIS information system in NIC was very effective and efficient. It has been a boon to
NIC though we would like to recommend the bank on certain issues and flaws that we
could recognize during our visit and research. Following sources should be improved
in order to develop more fluency and efficiency in company’s MIS:
1. User training
2. System redesign
3. Time management
4. Innovation
5. System analysis etc.
35
REFERENCE
https://www.nicasiabank.com.np/
https://dotnepal.com/case-study-writing-a-case-study-for-b-ed-third-year-tu/
36
37