Change Management for Human in Enterprise Resource Planning System
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 2
Abstract
In recent years, there are more enterprises that use Enterprise Resource Planning (ERP) to gain significant advantages through allowing for An organization to control its business processes and gaining benefits of enhanced process flow, improved data analysis, better profit margins , reduced inventories, and better customer service. ERP considers strong tool for getting competitive advantage for any organization. Although many enterprises chose ERP system, the ratio of the success was low. In this paper, the authors analysis some critical success factors and challenges which influence the implementation of ERP system to contribute in increasing the ERP implementation success rate. The most significant issues during ERP implementation process is employees' resistance to accept the new system and dealing with it. Therefore, this paper mainly focuses on how to use change management approaches and strategies to improve the individuals' acceptance rate which lead to successful ERP implementation.
Authors and Affiliations
Abdullah AL-Malaise AL-Ghamdi , Khulood Salem Albeladi , Afnan Atiah Alsolamy
A Literature Survey on Face Recognition Techniques
With data and information accumulating in abundance, there is a crucial need for high security. Biometrics has now received more attention. Face biometrics, useful for a person’s authentication is a simple and non-intrus...
Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites...
Application of Machine Learning Techniques in Aquaculture
In this paper we present applications of different machine learning algorithms in aquaculture. Machine learning algorithms learn models from historical data. In aquaculture historical data are obtained from farm practice...
Anomaly Detection Based on Access Behavior and Document Rank Algorithm
Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DD...
Creation of Load Balanced Mail Server Management System Using Cloud Computing
This system facilitates mailing among the users of an internet, having an efficient and easy to communicate with telecommunications. The mails are transmitted and receiving by individual users registered in a mail manage...