Strategies for successful implementation

Assignment Help Basic Computer Science
Reference no: EM13844534

The Case

Traditionally, Enterprise Resource Planning (ERP) systems are adopted by the manufacturing organisations; however, ERP vendors developed several modules to support organisations in different industries. As a result almost all the bigger organisations around the world implemented ERP systems to achieve cost savings and improve profits through business process automation.However, not every organisation achieved expected benefits through ERP implementation. In fact, new ERP implementation projects created several issues in relation to process efficiency for some organisations and costed significant amount of time and money.

In general, bigger organisations have financial buffers and access to expertise, which can help them overcome some of the problems in the long run.Whereas, Small to Medium sized Enterprises (SMEs) have the reputation for being innovative, but operate with low budgets, limited number of staff and resources. The majority of SMEs are family-owned, where tasks are carried out manually with minimal rules and task procedures. Recently, major ERP vendors released different ERP versions to support and meet the needs of both SMEs and large organisations.
Regardless of the organisation size, adoption of ERP systems requires careful budget, planning and execution.Although there is literature about some of the factors influencing ERP implementation processes in general, it does not consider individual circumstances for SMEs and large organisations.

Your Task

Your task is to identify what factors help achieve successful ERP implementation. In order to generate a report and to clarify issues with ERP implementation, you need to think about the:

•Critical success factors for ERP implementation at SMEs and large organisations.

•Importance of feasibility studies for adoption of ERP systems.

•Possible issues/challenges (budgets, infrastructure, skills, etc.) with ERP implementation.

•Success stories, benefits achieved through ERP implementation.

•Failures and consequences because of failures.

•Strategies for successful implementation.

Once you have examined the academic literature you may need to consider what is already known about implementation of ERP systems in order to identify any issues or risks pertinent to the SMEs (and large organisations) context.

For this assignment, you are required to use academic literature to support and illustrate your report. It is important that you look at how issues and potential problems inter-relate and explain the linkages in order to present the risks. It is up to you to explain and justify why the risks you identify may be a problem in the new implementation. It is also important to situate them in terms of the literature on causes of Enterprise Systems failure. Use this literature to develop your recommendations for strategies or actions that can avoid or mitigate the risks. Be aware that it may not be possible to avoid or mitigate all risks.

Your audience are non-technical.However, you can assume your readers are intelligent people who understand business arguments. Remember that there is no single right answer that will address all risks and recommendations. It is your choice to nominate which of the risks you believe are the most critical and up to you to select the most appropriate mitigation strategies for your recommendations. You will be assessed on your ability to persuade the reader, so it is essential you develop factual and logical arguments in your risk and recommendation justifications.

Hints

Your report should include Executive summary, Introduction, Discussion, Conclusion and recommendations.There is no minimum or maximum word count for this assessment, however it is suggested you keep your report between 3500 and 5000 words.

You must use trade and academic literature to inform and support your report. A minimum of 10 references are required, at least 5 of which must be from academic sources (journal, conference or edited book chapter papers). Failure to include these will result in a deduction of marks. A high achieving student will probably have between 15 and 20 references.

Reference no: EM13844534

Questions Cloud

Distinguish between current and noncurrent liabilities : Define and distinguish between current and noncurrent liabilities.
Define a loss contingency and give two examples : Define a loss contingency and give two examples that almost always are accrued.
Explain the advantages of ipv6 when compared to ipv4 : Explain the advantages of IPv6 when compared to IPv4
What was the balance in the warranty liability account : Its warranty expense is calculated as 1% of sales. Sales in 2013 were $40 million. What was the balance in the warranty liability account as of December 31, 2013?
Strategies for successful implementation : Strategies for successful implementation.
Paragraph on your analysis of your company''s ratios : Specifically define the issue that you selected from your updated SWOT as the most important issue for your company.
How does csma-ca in dcf handle media contention : How does CSMA/CA in DCF handle media contention
Explain the role portfolios play in an effective assessment : "Teachers compile and summarize classroom data to integrate and distill information from different sources, contexts, and methods, reduce it to a manageable size; and keep past assessments accessible for continued analysis and interpretation"
Facelets-master page for formatting : I also encourage you to be creative about your design. If you are familiar with CSS, I encourage you to add CSS to your site (or to manipulate the built-in CSS of the facelet template).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What interface does an application need to use

What interface does an application need to use if it wants to get updates on the current position of the mouse cursor as the mouse is being moved? How does the program get the x,y coordinates of the mouse cursor?

  The program must use a loop

The program MUST use a loop to read in the series of integers from the user. The output is then displayed after the loop. Algorithm   or Pseudo Code  (as an outline): At the beginning or end or your program write the algorithm or pseudo code as a mul..

  Shared assets do not bring competitive advantage

Why does Hansen recommend that competition among members should not be issue because shared assets do not bring competitive advantage? Describe.

  N-processor common crcw pram algorithm

Input is an array of n elements. give an O(1) time, n-processor common CRCW PRAM algorithm to check whether the array is in sorted order.

  Define the internet as part of a business solution

Assess the probable difficulties and risks associated with using a public infrastructure such as the Internet as part of a business solution.

  Explain the major concepts behind computers

1. Explain the major concepts behind computers, computer algorithms, and computer literacy. 2. Explain the technologies that have contributed to the exponential growth of the Internet and the World Wide Web (WWW)3. Describe the impact of software d..

  Input function to prompt the user to enter a square

In the script file, use the input function to prompt the user to enter a square 2-dimensional array. Use a loop to check that user's input is a square array and repeatedly ask the user to enter a square array until they enter a square array (you m..

  Ieee 754-floating point representation

Express the final answer in single precision IEEE 754-floating point representation - In single precision IEEE 754-floating point numbers, perform the subsequent operations.

  Use postings intersection procedure to find list of document

Assume we want to use postings intersection procedure to find simply the list of documents which satisfy a /k clause, rather than returning list of positions.

  Briefly describe the data collection techniques

Briefly describe the data collection techniques. Did the researcher use appropriate data collection techniques (qualitative and/or quantitative) to answer the study's research questions

  Creation of a base geometric class

The lab will require the creation of a base geometric class, called Shape, and two sub classes, Circle and Rectangle, that are derived public from the class Shape.

  Security models and cloud operations

From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd