BPR: Evaluation of Existing Methodologies and Limitations

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 4

Abstract

Many of known organizations had their business processes changed and reengineered in order to achieve their objectives, meet their customer’s expectations and attain competitive advantage. Thus, they were willing to adopt the concept of BPR at any cost no matter if they really need a radical change in their process. Unfortunately, it has been estimated that more than 70 % of BPR implementations have failed to achieve the expected result. Due to this risk, enterprises become more cautious to implement BPR projects in large scale. This paper discusses and the design of recent BPR methodologies identified in the literature, aiming to underline their limitations. It also presents the success and failure factors that affect BPR projects.

Authors and Affiliations

Hossain A. Alghamdi , Mohammed A. Alfarhan , Abdullah AL - Malaise AL - Ghamdi

Keywords

Related Articles

Password-Only Authenticated Key Exchange Using Distributed Server

Authentication using Password-authenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key - exchange of messages. Database of all passwords to authenticate clients are stored in a dist...

MIMO Schemes With Spatial Modulation in Wireless Communication

The combination of spatial modulation (SM) and space-time block coding (STBC) provides more advantages than other modulation techniques. In the MA-SM system, the transmitted symbols are mapped into a high dimensional con...

WLan Architecture

It is the review paper of Architecture of Wireless local area networks. In this paper we are discussing the architecture of wlan. A wireless LAN (WLAN) is a local area network based on wireless technology. Most modern lo...

FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor

We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with h...

Security Strategies for Online Social Networks

In this decade online social networks (OSNs) have marvelous enlargement per hundred of millions of users on the internet. The internet users are more good-looking about OSNs for information sharing and social interaction...

Download PDF file
  • EP ID EP141971
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Hossain A. Alghamdi, Mohammed A. Alfarhan, Abdullah AL - Malaise AL - Ghamdi (2014). BPR: Evaluation of Existing Methodologies and Limitations. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 7(4), 224-227. https://europub.co.uk/articles/-A-141971