Business Process Outsourcing
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a Captive Market in BPO setup?

  • To run core business activities at cheaper costs (correct)
  • To handle one-off projects
  • To manage business activities with irregular frequencies
  • To provide dedicated development center
  • Which of the following is a trend in the BPO industry?

  • Better information security (correct)
  • Decreased use of cloud-based software
  • Decreased demand for social media outsourcing
  • Increased use of offshore outsourcing
  • What is the expected outcome of the BPO industry in the Philippines?

  • It will decline in the coming years
  • It will overtake OFW remittances (correct)
  • It will remain stagnant
  • It will be replaced by artificial intelligence
  • What is the purpose of a Dedicated Development Center in BPO setup?

    <p>To provide dedicated development center for business cases with hanging requirements</p> Signup and view all the answers

    What is the main issue concerning the BPO industry in the Philippines related to health?

    <p>The health issues of employees</p> Signup and view all the answers

    What is the purpose of URL blocking using proxy?

    <p>To block access to websites based on the words found in URLs</p> Signup and view all the answers

    What is a fundamental human right that is essential for the development and fulfillment of every person?

    <p>Freedom of expression</p> Signup and view all the answers

    What is the purpose of free debate on new legislation?

    <p>To ensure public support and increase respect for the law</p> Signup and view all the answers

    Why may public authorities restrict the right to freedom of expression?

    <p>To protect national security, territorial integrity, or public safety</p> Signup and view all the answers

    What is the result of free speech and media in a society?

    <p>The government addresses public concerns</p> Signup and view all the answers

    What is the purpose of media scrutiny in a society?

    <p>To reveal political strengths and expose corruption</p> Signup and view all the answers

    What is a circumstance in which an authority may be allowed to restrict freedom of expression?

    <p>If someone expresses views that encourage racial or religious hatred</p> Signup and view all the answers

    What is the main purpose of filtering in the context of undesirable content?

    <p>To match specific character strings and screen out unwanted content</p> Signup and view all the answers

    What type of filter is responsible for filtering out inappropriate links from search results?

    <p>Search-engine filter</p> Signup and view all the answers

    What is the minimum age requirement for a movie rated R-13?

    <p>13 years old</p> Signup and view all the answers

    What is the purpose of the Movie and Television Review and Classification Board (MTRCB)?

    <p>To classify and review tv programs, movies, and home videos</p> Signup and view all the answers

    What is child pornography considered a form of?

    <p>Child sexual exploitation</p> Signup and view all the answers

    What is the main issue with content filtering?

    <p>Legitimate content may be blocked</p> Signup and view all the answers

    What is referred to as engagement in sexual activity without meeting each other?

    <p>Virtual Prostitution</p> Signup and view all the answers

    Which type of cybersex user might use cybersex to enhance their sexual experiences?

    <p>Appropriate User</p> Signup and view all the answers

    What is a characteristic of the Discovery Group of cybersex users?

    <p>They use the internet to explore sexuality that normal life hasn’t offered them</p> Signup and view all the answers

    Which type of cybersex user may use dating sites to meet multiple partners in a manipulative or dishonest way?

    <p>Discovery Group</p> Signup and view all the answers

    What is a consequence of the Predisposed Group's cybersex use?

    <p>Work life and real relationships may suffer</p> Signup and view all the answers

    What is the term for the most extreme end of the continuum of sexual problems?

    <p>Lifelong Sexually Compulsive Group</p> Signup and view all the answers

    What is the primary method used in 'phishing' to obtain personal information?

    <p>Using email to trick people</p> Signup and view all the answers

    Which type of invasion of privacy involves collecting information under false pretenses?

    <p>Deception</p> Signup and view all the answers

    What is the purpose of employers monitoring workplace activities?

    <p>To mitigate risks like theft, data breaches, and inappropriate behavior</p> Signup and view all the answers

    What is the term for stealing credit card bills and junk mail directly from a victim's mailbox?

    <p>Mail Theft</p> Signup and view all the answers

    What is the consequence of an invasion of privacy?

    <p>Legal responsibility</p> Signup and view all the answers

    What is the term for obtaining personal information by watching someone fill out forms, enter passcodes, or provide credit card numbers?

    <p>Shoulder Surfing</p> Signup and view all the answers

    Study Notes

    BPO Industry

    • 8 subsectors:
      • Knowledge Process Outsourcing and Back Offices
      • Animation
      • Call Centers
      • Software Development
      • Game Development
      • Engineering Design
      • Medical Transcription
    • BPO Setups:
      • Captive Markets (preferred for core or crucial business activities)
      • Offshoring/Third Party Outsourcing (for business activities with irregular frequencies or one-off projects)
      • Project Based Outsourcing (used for business activities with irregular frequencies or one-off projects)
      • Dedicated Development Center (used in business cases when there are hanging requirements)
    • Better Information security
    • Strategic balanced-shore outsourcing
    • Social and Professional Issues in IT:
      • Health Issues
      • Political Issues (revision and approval of RA 7916)
      • Economic Issues (BPO industry is expected to overtake OFW remittances)
      • DNS tampering and URL blocking using proxy

    Freedom of Expression

    • Key blockings: blocks access to websites based on the words found in URLs or blocks searches involving blacklisted terms
    • Search Results Removals: companies that provide Internet search services cooperate with governments to omit illegal or undesirable websites from search results
    • Fundamental human right
    • Limited by censorship, restrictive press legislation, and harassment of journalists, bloggers, and others who voice their opinions

    Social and Professional Issues in IT

    • Individual Level: freedom of expression is the key to the development and fulfillment of every person
    • National Level: freedom of expression is necessary for good government, economic, and social progress
    • Public authorities may restrict this right to:
      • Protect national security, territorial integrity, or public safety
      • Prevent disorder or crime
      • Protect health or morals
      • Protect the rights and reputations of other people
      • Prevent the disclosure of information received in confidence
      • Maintain the authority and impartiality of judges

    Using Digital Technologies for Freedom of Expression

    • Virtual Prostitution: engagement in sexual activity without meeting each other
    • Cybersex: sexual acts that are derived from surfing media sites that would titillate the sexual mind to satisfy the erotic needs
    • Types of Cybersex Users:
      • Recreational Users
      • Inappropriate Users
      • Problematic Users (Discovery Group, Predisposed Group, and Lifelong Sexually Compulsive Group)

    Filtering

    • Types of Filtering:
      • Browser Based Filters
      • Email Filters
      • Search-Engine Filters
    • Problems with Filtering: legitimate content, like sex education or medical information, may be blocked if it resembles pornographic material

    Television and Films

    • Movie and Television Review and Classification Board (MTRCB) - responsible for classification and review of TV programs, movies, and home videos
    • Films Description:
      • G (General Patronage) – All ages
      • PG (Parental Guidance) – Below 13 years old must be accompanied by a parent or a supervising adult
      • R-13 – 13 years old and above
      • R-16 – 16 years old and above
      • R-18 – 18 years old and above
      • X – Not suitable for public execution

    Child Pornography and Technology

    • Form of child sexual exploitation
    • Law prohibits the production, distribution, importation, reception, or possession of any image of child pornography
    • Child pornography purveyors use encryption and anonymous networks on the Dark Web to hide illicit images

    Identity Theft and Monitoring

    • Mail Theft: stealing credit card bills and junk mail directly from a victim's mailbox or from public mailboxes on the street
    • Dumpster Driving: retrieving personal paperwork and discarded mail from trash dumpsters
    • Shoulder Surfing: obtaining personal information by watching someone fill out forms, enter passcodes, or provide credit card numbers
    • Phishing: using email to trick people into giving personal information
    • Monitoring: employers monitor workplace activities to mitigate risks like theft, data breaches, and inappropriate behavior

    Invasion of Privacy

    • A circumstance where an individual or organization knowingly intrudes upon a person
    • Occurs when the person has a reasonable expectation of privacy, such as in a bathroom or locker room
    • Types of Invasion of Privacy:
      • Deception
      • Violation of Confidentiality
      • Intrusion & Misappropriation

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers different types of business process outsourcing, including knowledge process outsourcing, call centers, software development, and more. Test your knowledge of outsourcing subsectors and their applications.

    More Like This

    Use Quizgecko on...
    Browser
    Browser