The Myth of Enterprise Database Redesign

The Myth of Enterprise Database Redesign

David Paper (Utah State University, USA), Kenneth B. Tingey (Utah State University, USA) and Wai Yin Mok (University of Alabama in Huntsville, USA)
DOI: 10.4018/978-1-59140-057-8.ch007
OnDemand PDF Download:
$37.50

Abstract

This chapter illustrates how IT-enabled business process reengineering can fail if top management fails to understand the underlying process problems and limitations of data-centric enterprise software. Vicro Communications (we use a pseudonym to mask the organization’s name) attempted to reengineer its basic business processes with the aid of data-centric enterprise software. Vicro management however made the mistake of relying completely on enterprise software to improve the performance of its business processes. It was hoped that the software would increase information sharing, process efficiency, standardization of IT platforms, and data mining/warehousing capabilities. Management however made no attempt to rethink existing processes before embarking on a very expensive implementation of the software. Unfortunately for Vicro, the reengineering effort failed miserably even after investing hundreds of millions of dollars in software implementation. As a result, performance was not improved and the software is being phased out. By using a phenomenological approach, we were able to socially construct the events surrounding the case to gain a rich understanding of what really happened. From deep analysis, we were able to develop emergent theory about a set of factors influencing enterprise database integration success.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Parag C. Pendharkar
Preface
Parag C. Pendharkar
Acknowledgments
Chapter 1
Witold Abramowicz, Marek Nowak, Joanna Sztykiel
The main purpose of this article is to discuss applicability of Bayesian belief networks (BBN) within the procedures of working-capital credit... Sample PDF
Bayesian Networks as a Decision Support Tool in Credit Scoring Domain
$37.50
Chapter 2
Marvin D. Troutt, Michael Hu, Murali Shanker, William Acar
Frontier Regression Models seek to explain boundary, frontier or optimal behavior rather than average behavior as in ordinary regression models.... Sample PDF
Frontier Versus Ordinary Regression Models for Data Mining
$37.50
Chapter 3
Parag C. Pendharkar, Sudhir Nanda, James A. Rodger, Rahul Bhaskar
This chapter illustrates how a misclassification cost matrix can be incorporated into an evolutionary classification system for medical diagnosis.... Sample PDF
An Evolutionary Misclassification Cost Minimization Approach for Medical Diagnosis
$37.50
Chapter 4
Aaron Ceglar, John Roddick, Paul Calder
Knowledge discovery is the process of eliciting interesting knowledge from data repositories. Due to the inability of computers to understand... Sample PDF
Guiding Knowledge Discovery Through Interactive Data Mining
$37.50
Chapter 5
Karim K. Hirji
There is an enormous amount of data generated by academic, business, and governmental organizations alike; however, only a small portion of the data... Sample PDF
A Proposed Process for Performing Data Mining Projects
$37.50
Chapter 6
Chi Kin Chan, Heung Wong, Wan Kai Pang, Marvin D. Troutt
This chapter is a case study in combining forecasts for inventory management in which the need for data mining in combination forecasts is... Sample PDF
Data Mining for Optimal Combination Demand Forecasts
$37.50
Chapter 7
David Paper, Kenneth B. Tingey, Wai Yin Mok
This chapter illustrates how IT-enabled business process reengineering can fail if top management fails to understand the underlying process... Sample PDF
The Myth of Enterprise Database Redesign
$37.50
Chapter 8
Sudhakar Kuppuraju, Girish Subramanian
Recent interest in relationship management and relationship marketing has led many firms to consider how to improve customer retention rates. The... Sample PDF
New Information Technologies and Other Pertinent Issues Impacting the Strategic Dimension of CRM for Business Excellence
$37.50
Chapter 9
James A. Rodger
Accounting information systems enable the process of internal control and external auditing to provide a first-line defense in detecting fraud... Sample PDF
Utilization of Data Mining Techniques to Detect and Predict Accounting Fraud: A Comparison of Neural Networks and Discriminant Analysis
$37.50
Chapter 10
Jose Maria Cavero, Carmen Costilla, Esperanza Marcos, Mario G. Piattini, Adolfo Sanchez
Data warehousing and online analytical processing (OLAP) technologies have become growing interest areas in recent years. Specific issues such as... Sample PDF
A Multidimensional Data Warehouse Development Methodology
$37.50
Chapter 11
Bahador Ghahramani
The telecommunications industry (TI) is challenged by a significant increase in the complexity of information transfer due to a recent proliferation... Sample PDF
A Telecommunications Model for Managing Complexity of Voice and Data Networks and Services
$37.50
Chapter 12
Wan Kai Pang, Heung Wong, Chi Kin Chan, Marvin D. Troutt
This chapter proposes an approach to the combination of forecasts from a new perspective and uses a new estimation methodology. Concepts from... Sample PDF
Combination Forecasts Based on Markov Chain Monte Carlo Estimation of the Mode
$37.50
Chapter 13
Roderick L. Lee
This chapter presents an overview of web mining. The three areas of web mining—Web content mining, Web usage mining, and Web structure mining—are... Sample PDF
Web Mining: Creating Structure out of Chaos
$37.50
Chapter 14
Parag C. Pendharkar, Girish Subramanian
Mining information and knowledge from very large databases is recognized as a key research area in machine learning and expert systems. In the... Sample PDF
Connectionist and Evolutionary Models for Learning, Discovering and Forecasting Software Effort
$37.50
About the Authors