Increase Bot Login Success % 80% -> 90%
β
This project is intended to list out experiments to increase the login success % for data scraping bots.
β
Background about it:
β
Robotic process automation platform at HighRadius has a 1000+ data aggregation bots repository setup across 100+ enterprise clients.
β
What is a data aggregation bot ? : Bot that logs into a retail portal like Walmart or amazon on a daily basis and downloads business data like claims, PODs, Invoices and supplies it back to core products of Highradius products for data processing.
β
β
Monthly Login success % of these data aggregation bots currently stand at 80%. Overall business goal is to improve it from 80% to 90% to ensure continuous value delivery for what is being paid to Highradius by enterprise clients.
β
P.S. Login Success % = #Actual Logins/#Scheduled Logins
β
Post historical data analysis, it is identified that below are 2 key reasons for the 20% failures.
β
β
β
Given above, we are planning to tackle the problem of portal password expiry by understanding through experiments why the client users fail to update the passwords before they expire even though Highradius robotic process automation platform is notifying them proactively.
β
Outcome : Increase in login success % by 10% across data aggregation bots
If we proactively display in app popup for client users to let them know about portal passwords which are expired and need their attention with clear CTA to either
β
Then our login success % will improve by 10% due to clear communication of the underlying problem right onto their face & CTA being the only focus.
Goal of the experiment is to validate the improvement in login success % metric by proactively displaying the in-app popup to reset passwords/notify admin as and when user logs into the product module tab.
β
Improvement in login success % going to drive the direct value to business given if data aggregation bots are able to login with a higher success rate, it will lead to a high level of data capture rate and high value for our enterprise clients.
β
β
Best Case Scenario : Increase in login success % >10%
Worst Case Scenario : Increase in login success % >5% & <7%
β
β
Given, we have seen below in the past across H2 2023, that login success % across data aggregation bots stand at around ~80%
β
β | July 2023 | Aug 2023 | Sept 2023 | Oct 2023 | Nov 2023 | Dec 2023 |
Login Success% | 76% | 75% | 79% | 78% | 79% | 80% |
Hence we have planned to show proactive app popup to existing client users to nudge them to update passwords/notify admin for the same.
β
Mockups :
β
β
β
We will be introducing the new popup within claim tab with CTA
β
Control Version copy will have Review Passwords as the primary CTA
β
Test Version copy will have Notify Admin as the primary CTA
β
β
This popup will be visible to analysts and managers currently having access to the claim module within the Highradius product.
β
Hence there will be 2 type of client users : Analyst & Managers
β
Sample Size : Above will be visible to cohort of 20 most impacted clients
β
Control : 20 (Primarily for managers)
Variation 1 : 20 (Primarily for analysts)
β
Duration of the Test : Above will be live for next 3 months since majority of passwords typically have time duration of 3 months
β
Implementation Specs : ARPA-Portal Credentials Expiry-250324-102226.pdf
A/A Test : Experiment will be run on the Prod Environment of Highradius. Both copies are live for 5 days. Here are the results
β
β | # Clients Copy Live for | #Clients Open the Copy | #Clients Reset Passwords | #Clients Notify Admin |
Copy A | 20 | 15 | 6 | 2 |
Copy B | 20 | 13 | 7 | 3 |
β
Given above, we can say that A/A test is successful across the platform
β
β | User Persona | # Clients Copy Live for | #Client Users Open the Copy | #Client users Reset Passwords | #Clients Notify Admin |
Control (Primary CTA is Review Passwords) | Analyst | 20 | 5 | 3 | 1 |
Managers | 20 | 10 | 8 | 0 | |
Variation 1 (Primary CTA is Notify Admin) | Analyst | 20 | 25 | 3 | 15 |
Managers | 20 | 5 | 1 | 1 |
β
Copy 1 makes sense to be shown for managers since 80% of managers who open the copy reset the passwords
Copy 2 makes sense to be shown to analysts since 60% of analysts who open the copy actually notified the admins, it means that majority of analysts do not have access to update passwords themselves
β
To summarize this experiment can be scaled for rest of the enterprise clients as well given the results but CTA needs to be shown to the users based on their security roles setup in Highradius
β
β
β
β | One | Two | Three |
Whom to Communicate ? | Immediate Manager | Product Group Head, CPO | Product Team, Designers |
When to communicate ? | Post the data analysis done and hypothesis is established | Once approved by immediate manager and execution plan is ready with timelines for identified impact | Experiment scope is detailed out with technical spec |
What to communicate ? | One pager opera explaining the details of RCA why login success rate is ~80% and top reasons for it and what is the solution plan and expected outcome for it | Detailed opera with Cost value analysis of executing the solution and how is it align with business priorities and timelines for understanding impact | Specification document explaining the why and nuances and list of clients for which experiment copies to be displayed along with expected outcome and tracking proces |
β
Brand focused courses
Great brands aren't built on clicks. They're built on trust. Craft narratives that resonate, campaigns that stand out, and brands that last.
All courses
Master every lever of growth β from acquisition to retention, data to events. Pick a course, go deep, and apply it to your business right away.
Explore foundations by GrowthX
Built by Leaders From Amazon, CRED, Zepto, Hindustan Unilever, Flipkart, paytm & more
Crack a new job or a promotion with the Career Centre
Designed for mid-senior & leadership roles across growth, product, marketing, strategy & business
Learning Resources
Browse 500+ case studies, articles & resources the learning resources that you won't find on the internet.
Patienceβyouβre about to be impressed.