Professional Documents
Culture Documents
Abstract—In networked collaborative virtual environment, users users, it is also involved dynamic tasks and resources. For
from dispersed locations can work as a group. Each user holds instance, when a project advances to a new phase, it needs a
certain roles along with responsibilities and access to resources. new set of roles and users [6]. A smooth transit in matching
However, the virtual environment is dynamic and users have to and passing the role between old and new users is crucial.
change their roles frequently. The process is called role Hence, a proper management of role transition is vital for a
transition and currently it is managed by users manually or continuous and successful collaboration [7-9].
handled by specific domain applications automatically. In
manual management, users are burden with unnecessary This research aims to explore the provision of role
workload and the role transitions are prone to errors, whereas transition management. This exploration will uncover the vital
the automatic handling is limited to its preset role transition patterns for structured and flexible role transition management.
capability. This research aims to explore the provision of role As a case study, a call center in a leading banking system is
transition management. This exploration will uncover the vital chosen to capture real-life scenarios via observation and
patterns for structured and flexible role transition management. interviews. Based on the qualitative data collection, a role
In order to achieve the objective, this research has chosen a call transition management and its behavior are determined.
centre in a leading banking system to capture real-life scenarios Eleven environmental factors for role transition scenarios have
via observation and interviews. For immerse and deep been extracted from the case study. The knowledge is treated
understanding of role transition, personas have been utilized as a as the foundation for modeling a role transition management,
mechanism of illustration to demonstrate the complex role
which has received less attention in the previous studies.
transition in the call center. All factors gathered in the study will
provide strong foundation in the design of an automated system
Moreover a few issues on role transition management have
for facilitating role transition management that will balance the been identified.
workload of an authorized human and an automatic
II. RELATED WORKS
programmable technical element in a system.
This section describes briefly the concept and issues of role
Keywords - call center; networked collaborative virtual transition management. Since the study involves virtual and
environment; role transition management; role-based complex environments, this work employs a controlled abstract
management; persona; scenario scene via the use of personas and scenarios. Therefore, the
next sub-sections cover role transition management and brief
I. INTRODUCTION description of personas and scenarios.
In network collaborative virtual environment, entities such
as users, tasks and resources [1] are dynamic and they change A. Role TransitionManagement
from time to time. One of the suitable methods to manage the Role transition management is defined as the ability to
dynamic entities is through role-based management (RBM). In control role occurrence and transference when dealing with
such management, tasks are not assigned directly to users, users in dynamic virtual environment. The management is
instead, they are assigned to a virtual entity called role [2]. important since it has a great impact to the collaborative works
Then, resources that are required to perform the task are that consequently linked to economy, resource and users. The
identified and assigned to the role [3]. Lastly, qualified users disrupted work can reduce economic gain in terms of money
who will perform the tasks are selected and also assigned to the and time. It also affects access right to resources, secured and
role [4]. Such management attempts to minimize the impact of private functionalities of the system. Moreover, unmanaged
changed entity over others. Hence, in RBM, roles are the role transition consistently imposes pressure to users and in
center of management that glues tasks, resources and users. turn leads to other negative issues [10]. Such negative issues
Role has control to determine who it can be assigned to, along include cases where users refuse to accept the changes and fail
with the tasks, responsibilities, and access restrictions to to adapt to the new designated role structure which affects their
allocated resources. Since users are dynamic [5], they change emotions negatively. Consequently, the impact is on their job
or leave their roles as they wish at anytime and the process is satisfaction and commitment that leads to absenteeism,
called role transition. The role transition is not only applied to withdrawal, disloyal and abandoned from the collaboration
III. UNDERSTANDING ROLE TRANSITION MANAGEMENT • VIP: The section that provides services to VIP customers
BEHAVIOR regarding credit card, saving and general issues.
• Credit Card: This section is responsible to manage call
A call center is selected because it involves monetary value
regarding credit card that covers issues such as balance
and it is one of the most valuable assets to human. The chosen
bank is the largest bank and financial group in Malaysia and enquiry, lost of card, activation and many more.
internationally recognized. It has 401 branches in Malaysia • Saving and General: This section is to assist customers
and is the leading listed company on the Malaysian Stock in relation to their saving accounts and general issues
Exchange, Bursa Malaysia. The call center adopts RBM including any complaints.
system where there exist roles, users, tasks and resources • Socio Network: The representative’s duty is to respond to
which can provide various views of role transition all messages received via socio network medium such as
management. In order to understand the role transition e-mail, facebook and twitter.
management in these complex environments, the abstract scene • Trust and Investment: The section only manages call
analysis method [20] is adopted for qualitative experiment. regarding trust and investment issues.
104
2014 3rd International Conference on User Science and Engineering (i-USEr)
With the roles presented by all the personas, the next
section describes the scenarios of role transition management
in the call center.
IV. THE CALL CENTER CONTROL
There are eleven scenarios that contribute to role transition
cases. Each scenario is divided into two parts. The first part
explains the activities that occur in the call center, whereas the
second part (grey box) is the analysis of scenarios from the
RBM point of view.
105
2014 3rd International Conference on User Science and Engineering (i-USEr)
Farzana Yah is playing VIP role and is not allowed to leave Lina Ahmad is released from handling extra tasks.
her role whenever the active role is less than 25. Based on the
instruction, she remains in her role. No role transition. Control:
• Shah as the supervisor in charge releases the task of taking
Control: message from Lina Ahmad and allows her to continue with
• Shah instruct VIP representative to remain hold the current her normal role.
role. • Shah will also make sure that members of the VIP role
• The instruction is delivered through verbal communication remain unchanged.
or screen pop-up message.
• Shah allows any request to VIP roles. Scenario 8: Ad-Hoc Condition
• When the quantity of the total representatives is 25 and In the event of problem where Kumar Mutusami fails to
above, Shah allows any representatives to hold and release handle customers, Shah as the supervisor will chip in and takes
their roles. over the task to handle the customer. He will continue to assist
the customer until the problem solved.
Scenario 4: Role Promotion Shah is performing the task of representative as long as the
Kumar Mutusami is a trainee who starts at the lowest level problem remains unsolved.
of the trainee position. As he masters the trainee’s tasks, he is
transited to a higher trainee position. Shah as his supervisor is Control:
responsible to evaluate Kumar Mutusami’s performance.
• Shah assigns the task of representative to himself while
Kumar Mutusami is holding a trainee role. When he is maintaining his current role.
transited to a higher trainee role, role transition occurs. He • There is no role transition taking place.
releases the old role and takes a new role.
Scenario 9: Off-Peak Condition
Control: Off-peak time is usually started in the middle of the night
• Shah assigns a higher trainee role to Kumar. until early morning. During this time, there is less incoming
• Shah releases the old role from Kumar. calls. Hence, supervisor assigns a few tasks from different
sections (Credit Card) to Lina Ahmad. Now, she has to answer
Scenario 5: Role Demotion the calls for her section and others.
During the training period, Kumar Mutusami is at risk of During off-peak time, Lina Ahmad performs variety of other
being demoted to lower position if he cannot achieve a tasks in addition to her current tasks.
satisfactory performance. As a supervisor, Shah is responsible
to access Kumar Mutusami’s performance from time to time. Control:
If Kumar Mutusami demoted to lower position, role transition • Shah assigns Credit Card tasks to Lina Ahmad.
occurs as he changes his position. • No role transition occur.
106
2014 3rd International Conference on User Science and Engineering (i-USEr)
In this case, the role transition has occurred. Kumar Mutusami are positioned in eleven scenarios to derive the various role
is now having a different role. transition management activities. With the existing theories on
role transition, environmental states, controlling patterns on
Control: tasks, resources and users, it is concluded from the case study
• Shah assigns Kumar Mutusami to a new role. that manually human controlled role transition can be
automated based on the supervisor’s roles by applying the
V. ABSTRACT SCENE ANALYSIS significant factors gathered in the analyses. Further
investigation and search should be carried out to structure the
The scenarios in the case study provide various techniques
management so that balance workload can be distributed
in managing role transition based-on RBM environment. Each
among human and automated systems.
scenario reveals when the role transition occurs and how it is
controlled. Supervisor is the main controller in managing role VII. ACKNOWLEDGEMENT
transition. He has the right to control, accept and reject any
role transition based on his judgment. However, call The authors would like to thank Universiti Teknologi
representatives have the right to request for role transition, MARA and Ministry of Higher Education Malaysia for the
even though it is subjected to the supervisor’s approval. financial support under the national grant 600-RMI/ERGS 5/3
Therefore, any programmable technical element in automatic (33/2012).
role transition management system is only to support REFERENCES
supervisor after he has made his decision as opposed to assist
him during decision making. [1] N. A. A Fadzillah, N. Omar, S. Z. Z Abidin, “Application-based
context-awareness in collaborative workspaces: A review,” IEEE
Since the environmental factors are responsible to trigger Conference (PEOCO) Melaka, Malaysia, 2012.
the role transition, the control is obviously not relying on one [2] J. Cao, J. Chen, H. Zhao, and M. Li, “A policy-based authorization
authorized entity. Role is not the center of management. For model for workflow-enabled dynamic process management,” Journal
of Network and Computer Applications, 2009, 32(2), pp. 412–422.
example, when Kumar Muthusami has gone through several doi:10.1016/j.jnca.2008.02.021.
different work environments, his roles change according to his [3] D. F Ferraiolo and D. R Kuhn, “Role-based access controls,” in 15th
situations. Hence, role does not have any authority to give the NIST-NCSC National Computer Security Conference,1992, pp. 554–
control, rather it is always available to be held and released by 563.
a supervisor through verbal instructions or messages that rely [4] I. Jahnke, “Impact of social roles on designing sociotechnical
on the electronic communication system. knowledge sharing,” Proceedings of I-KNOW ’05, 2005, pp. 624–631.
[5] Z. Idrus, S. Z. Z. Abidin, N. Omar, R. H., “Users management in
Based on the personas and scenarios, there are eleven interactive networked collaborative environment,” International
environmental factors that trigger the change of a role (see Journal of Computers and Communications, 2011, 5(4).
Table I). The factors are role allocation, role assistance, role [6] H. Zhu, “Role-based collaboration,” The 2008 International Symposium
quantity, role promotion, role demotion, role notification, on Collaborative Technologies and Systems (CTS 2008), 2008, pp. 1–
stable condition, ad-hoc condition, off-peak condition, role 125.
replacement and role confirmation. [7] L. M. C. H Afsarmanesh and M. Ollus, “ECOLEAD : A holistic
approach to creation and management of dynamic virtual organizations,”
With this kind of role arrangement, resources that used in (n.d), Collaborative Networked and their Breeding Environments, 2005,
tasks are opened to representative at all time. Unfortunately, pp 3-16, Boston:Springer.
the representative can only access the resources when tasks are [8] H. Yang, C. Wang, Y. Liu, and J. Wang, “An optimal approach for
workflow staff assignment based on Hidden Markov Models,” On the
assigned to them. Therefore, the only security that prevents Move to Meaningful Internet Systems: OTM 2008 Workshops Lecture
them from accessing secured resources is in the system log. Notes in Computer Science, 2008, pp. 24–26.
Any illegal action can only be detected after the action has [9] L. Yingbo and W. Jianmin, “A machine learning approach to semi-
been performed through the log. automating workflow staff assignment,” Computers in Industry, 2008,
59, pp. 463–476..
VI. CONCLUSION [10] I. Jahnke, C. Ritterskamp, and T. Herrmann, “Sociotechnical roles for
This paper discusses a qualitative experiment with the sociotechnical systems - A perspective from social and computer
sciences,” AAAI 2005 Fall Symposium on Roles, an interdisciplinary
purpose to collect data on roles’ behavior and transition perspective (Roles’ 05), 2005, pp. 81–86.
management. The data collected is used to design four [11] S. M. Elias, “Employee commitment in times of change : Assessing
personas situated in several call center sections involving the importance of attitudes toward organizational change” Journal of
various role transition scenarios. Specifically, the personas Management, 2012, 35(1), pp. 37–55. doi:10.1177/0149206307308910.
[12] S. P. Goggins, J. Laffey, and M. Gallagher, Completely “Online group
TABLE I. ROLE TRANSITION VS. ENVIRONMENTAL FACTORS formation and development : Small groups as socio-technical systems,”
Information Technology & People, 2011, 24(2), pp. 104–133.
Freeze Role Unfreeze (Active) Role doi:10.1108/09593841111137322.
Role Changed Role Unchanged Role Added
[13] H. Dumont, D. Istance, F. Benavides, (eds.). The Nature of Learning:
role quantity role allocation role notification role assistance Using Research to Inspire Practice, Paris: OECD Publishing, 2010.
role promotion stable condition ad-hoc
role demotion condition [14] W. F. Cascio, “Whether industrial and organizational psychology in a
role replacement off-peak changing world of work?,” American Psychologists, 1995, 50(11), pp.
role confirmation condition 928-939.
107
2014 3rd International Conference on User Science and Engineering (i-USEr)
[15] Z. Idrus, S. Z. Z. Abidin, R. Hashim, and N. Omar, “Social awareness : Student Interaction Design Research Conference SIDER05. University
The power of digital elements in collaborative environment,” WSEAS of Southern Denmark, Sønderborg, 2005.
Transactions On Computers , 2010, 9, pp. 644–653. [19] P. T. A. Junior and L. V. L. Filgueiras, "User modeling with personas,"
[16] A. Cooper, The Inmates are Running the Asylum, Macmillan, 1999. CLIHC’05. Cuernavaca, México, ACM, 2005.
[17] J. E. Nieters, S. Ivaturi, and I. Ahmed, “Making personas memorable,” [20] N. Omar, "Modelling complexities of learner’s in handling web texts
CHI 2007. San Jose, California, USA, ACM, 2007. via abstract scene analysis," Malaysian Journal of Computing, Vol 2(1),
[18] P. J. Adler, "Dealing with interviews when creating personas: A 2014.
practical approach," in J. Buur and B. Mathews (Eds.), Proceedings of
108