Reference
1. Addidas HK (2011). Retrieved from http://www.adidas.com/campaigns/miadidas-nonecomm/content/hongkong.asp
2. Addidas US (2011). Retrieved from http://www.miadidas.com/CustomizeShoe.action?ident=I1240520811987_ST&type=0
3.MingPao (2006). Retrieved from http://ol.mingpao.com/cfm/prod6.cfm?File=20060907/pra03b/adidas01.txt
=========================================================================
Summary of lecture
Lecture 11 continued to discuss the remaining three redeign principles. They are Analyze & Synthesize, Connect , Collect & Create and Personalize. These three principles aim at changing
knowledge management around processes. In this journal, I will use an example to illustrate the three principles.
Fig.1 shows the 3 principles and tactics
Principle 8 - Analyse&Synthesize
It means business should improve the interactive and synthesis capabilities around a process which would be then value added. This principle is mostly applied to business like agents that have to make recommendation to customers by summarizing and analyzing the information.
Principle 9 - Connect, Collect & Create
It means to capture intelligent and reusable knowledge around the process through all who touch it. The creation of knowledge repository through collecting the answer in the repetitive queries/FAQ can be used to illustrate this principle. The most suitable answer can be collectively derived from these knowledge creation processes.
Principle10 - Personalize
It suggests that business should make the process intimate with the preference and habits of participants, including customers and implementers. By repeating execution of a process, this will build up a knowledge repository of customers’ preference. Base on the information gathered and generated from the repository, the process can offer more personalized services to customers. Telecom companies can be applied to this principle. For instance, for the unlimited data plan, some customers may not be able to using that much data. The company can learn preferences of customers by profiling and keep track on their habits. Then they can provide the correlated recommendations to customers.
Example
The Mi Addidas Company
The Mi Addidas has redesigned the business process of designing the shoes which was usually done by designers, and now customers also had a choice to tailor-make their sports shoes. First, customers first choose a particular style of their shoes, for example running shoes, sneakers and so on. Then, they will customize the shoes and enter their size records.
This BPR redesign has applied many of the principles we discussed in class. In the following, I will mainly talk about the three discussed in this lecture.
8. Analyze and Synthesize
The Addidas can collect the data about the popular shoes style by generating sales statistics and collect opinions from their customers. Then, they can make the supply decision accordingly and make new designs of the shoes by referencing to these information.
Tactics used:
- Provide "what-if" capabilities to analyze decision options
- Provide "slice and dice" data analysis capabilities that detect patterns
- Provide intellgient integration capabilities across multiple information sources
9. Connect, Collect & Create
As the Mi Addidas has to customized and ordered online, the company can have routes to access their customers' preferences and information, and build a well-defined knowledge repositories to maintain long-term relationship with their customers.
Tactics used:
- Define procedures to collect this knowledge
10. Personalize
This is obviously the most important advantage of all. The customization allows customers to indicate their own preferences by tailor-making their shoes. Besides, the company can also keep track of their customers' information, to analyze their purchasing behaviours and to promote products that they may be interested in.
Tactics used:
- Learn preferences of customers and doers of the process through profiling
- Insert business rules that are triggered by personal profiles
- Keep track of personal process execution habits
Tam Kam Fai - COMP326 BPR
2012年4月9日 星期一
2012年3月25日 星期日
Lecture 10: Redesign Principle I
Reference
M. Bliemel and K. Hassanein (2004). E-health: applying business process reengineering principles to healthcare in Canada. Int. J. Electronic Business, 2 (6), 625-643.
Principles and tactics of process redesign for e-business
http://www.slidefinder.naet/p/principles_tactics_process_redesign_business/20788706
===================================================================
Reflection
In this lecture, the main focus is the principles and tactics for redesigning the business process.
The objectives of those principles and common tactics are:
(1) Maximize the value-adding content of a process
(2) Manage non-value adding activities
(3) Minimize repeated and redundant elements such as waste, valueless complexities.
Here is a diagram showing the respective tactics for each redesign principle:

There are numerous ways to improve the performance of a company. Business process redesign is one of the most important ways to improve the performance and efficiency of the company significantly. By applying the above principles, companies can clearly notice the areas that can make appropriate improvements as to let the company perform more cost-effectively and reduce unnecessary wastage.
Although the redesign principles define many areas for further improvement, a company should choose limited number of areas depending on the emergency of the need. For any BPR, the process should be made step by step to reduce the risk and the chaos made by BPR towards the company. If not, this may instead create negative effect to the company.
For every BPR projects, the company should first plan carefully and comprehensively with consideration of the extent of how much changes the company could bear. Later, they should prioritize the cost-effectiveness of each process that needed to be redesigned and do the least first as to test the reaction of the company such as the response of employees.
It is nearly impossible for any BPR project to satisfy all the principles. Therefore, the company should focus on certain principle according to the nature of business rather than aiming at satisfying all the principles.
Real-life example
Here are some realated cases for you to understand the application of the principles and tactics in the real world.
Healthcare service in Canada: E-health
Exisiting Problems:
Onaverage, patients have to wait for long hours. Also, there is lack of access to providers and information. Moreover, there are some medical errors.
Application of BPR principles and tactics:
Lose Wait: Reduction of waiting time when lab results are requested and when they are delivered through the utilisation of faster communication technologies such as email to shorten administrative delays.
Tactics used: Designing for continuous flow, reconfiguring support activities to avoid bottlenecks.
Tactics used: Designing for continuous flow, reconfiguring support activities to avoid bottlenecks.
Orchestrate: Coordinating between healthcare providers to balance workloads. For example, when one hospital has more beds for heart patients than another, the two can share heart patients between them so that both facilities have similar capacity levels. This is more efficient than taking on patients until capacity is reached in one hospital and then redirecting new patients to other hospitals with available beds. When hospitals have less than 100% utilisation of capacity, medical staff have more time to tend to patients and to improve service possibly leading to a shorter length of stay for patients.
Tactics used: Insourcing
Tactics used: Insourcing
Mass-Customize: Provide flexibility of interaction options and service offerings to different kinds of patients. This principle can be applied when communicating with patients that have different levels of health literacy, and who also have varying levels of interest in managing their own health by researching health information online. For example, patients could be offered multiple ways to access healthcare professionals when seeking advice – through telephone, email, or personal appointments.
Tactics used: Flexing Time & Space
Synchronize: Synchronise the physical and virtual parts of processes.To ensure that the online content accessed by consumers already serviced by a healthcare system also reflects the treatment options available under that healthcare system.
Tactics: Match offerings
Tactics: Match offerings
Digitise and propagate: The benefits of digitising health records, workflows and health information are enormous because the information can be shared faster, and more controls can be put into place to ensure their accuracy and completeness.Patients enter their own medical histories and complaints as part of their medical records through a series of structured questions prior to the consultation with a physician.
Tactics used: Digitize at source, make the process paperless
Tactics used: Digitize at source, make the process paperless
Vitrify: When workloads and information about patients(which also follows privacy policies) is shared – not only throughout individual hospitals but throughout the healthcare system as a whole – management, researchers and policy makers can get a clearer picture of problems and opportunities within the system. Understanding the healthcare system is easier when this principle is applied, allowing on-the-fly analysis of trends and faster problem identification.
Tactics used: On-demand Information Tracking, On-the-fly Reporting and Analysis
Tactics used: On-demand Information Tracking, On-the-fly Reporting and Analysis
Sensitize: Sensors can be utilised to detect abnormalities within the system in case a patient has been waiting longer than normal. Once abnormal situations in processes have been detected, software agents can prompt action by notifying the care provider responsible for the patient. This principle also works well in the healthcare context as sensors monitoring patients’ conditions are already employed with the ability to alert staff when a patient’s medical condition changes.
Tactics used: Monitor Environmental Change
Tactics used: Monitor Environmental Change
2012年3月11日 星期日
Lecture 8 - Redesign Process I
Reference
1.The case of Chase Manhattan Bank
http://info.sugoo.com/CN/Ebook/%E7%94%B5%E5%AD%90%E4%B9%A6%E7%B1%8D/%E8%BF%90%E4%BD%9C%E7%AE%A1%E7%90%86/BRP%E5%9C%A8%E6%9B%BC%E5%93%88%E9%A1%BF%E9%93%B6%E8%A1%8C%E6%A1%88%E4%BE%8B%E5%88%86%E6%9E%90.pdf
Summary of lecture
This lecture took a deeper look on Process Redesign, i.e. one of the Five Phases Approach of BPR methodologies discussed in last lecture. It includes five steps, scoping, modeling, analysis, redesign and integration. In order to better understand the process, a case study of Paloma Bank was used to explain what should be exactly done during every phase.
Here are the steps for scoping the process:
1) Operationalize process performance targets
2) Define process boundaries
3) Identify key process issues
4) Understand best practices & define initial visions
5) Familiarize participants with BPR software
6) Outline data collection plan & collect baseline data
7) Plan for modeling phase
Example and Evaulation
Here is an example to apply process redesign of BPR in reality. According to the case of Chase Manhattan Bank as referenced, it explored the procedures of BPR in Chase Manhattan Bank from the planning stage. It investigated that BPR best suited for financial institutions. This case provided detailed information of this BPR. This can much strengthen our understanding of BPR and better get the core idea of BPR.
Then, how can the process be redesigned? We always see long queues for the counter service at the bank particularly at lunch hours. In fact, some bank branches have already redesign the process and solved this problem with the help of a machine at the entrance to estimate customers' waiting time. We can use it as an example to illustrate process redesign.
2. Define process boundaries:
3. Identify key process issues:
4. Familiarize related CS officers with the BPR software
5. Outline data collection plan:
6. Plan for modeling:
1.The case of Chase Manhattan Bank
http://info.sugoo.com/CN/Ebook/%E7%94%B5%E5%AD%90%E4%B9%A6%E7%B1%8D/%E8%BF%90%E4%BD%9C%E7%AE%A1%E7%90%86/BRP%E5%9C%A8%E6%9B%BC%E5%93%88%E9%A1%BF%E9%93%B6%E8%A1%8C%E6%A1%88%E4%BE%8B%E5%88%86%E6%9E%90.pdf
Summary of lecture
This lecture took a deeper look on Process Redesign, i.e. one of the Five Phases Approach of BPR methodologies discussed in last lecture. It includes five steps, scoping, modeling, analysis, redesign and integration. In order to better understand the process, a case study of Paloma Bank was used to explain what should be exactly done during every phase.
Here are the steps for scoping the process:
1) Operationalize process performance targets
2) Define process boundaries
3) Identify key process issues
4) Understand best practices & define initial visions
5) Familiarize participants with BPR software
6) Outline data collection plan & collect baseline data
7) Plan for modeling phase
Example and Evaulation
Here is an example to apply process redesign of BPR in reality. According to the case of Chase Manhattan Bank as referenced, it explored the procedures of BPR in Chase Manhattan Bank from the planning stage. It investigated that BPR best suited for financial institutions. This case provided detailed information of this BPR. This can much strengthen our understanding of BPR and better get the core idea of BPR.
Then, how can the process be redesigned? We always see long queues for the counter service at the bank particularly at lunch hours. In fact, some bank branches have already redesign the process and solved this problem with the help of a machine at the entrance to estimate customers' waiting time. We can use it as an example to illustrate process redesign.
1. Operationalize process performance targets:
1. To shorten customers' waiting time
2. To maintain short queues at the bank
3. To better allocate the resources
2. To maintain short queues at the bank
3. To better allocate the resources
2. Define process boundaries:
Process name: Estimation of customers' waiting time
Process owners: Customer service officers
Process triggers: Customer walk into the bank
Sub processes:
1. Front-end customer service (CS officiers ask customers the service they required and input to the machine)
2. Backend calculation (calculate the estimated waiting time for the incoming customer according to the number of customers awaiting)
Process delivable: a ticket to the customer showing the estimated waiting time for the required banking service
Process owners: Customer service officers
Process triggers: Customer walk into the bank
Sub processes:
1. Front-end customer service (CS officiers ask customers the service they required and input to the machine)
2. Backend calculation (calculate the estimated waiting time for the incoming customer according to the number of customers awaiting)
Process delivable: a ticket to the customer showing the estimated waiting time for the required banking service
3. Identify key process issues:
1. Algorithm for calculating the estimated waiting time
2. Flag areas requiring attention
2. Flag areas requiring attention
4. Familiarize related CS officers with the BPR software
5. Outline data collection plan:
1. collect statistics to count the estimated service time per customers for each type of service, e.g. deposit & withdrawal, investment, enquires
2. collect data on customer flow at different time periods
2. collect data on customer flow at different time periods
6. Plan for modeling:
1. Create scoping report to prepare for modeling the whole process
2012年3月4日 星期日
Lecture 7 - BPR Methodologies
Reference
1. "Redesigning Enterprise Processes for e-Business", O. A. EI Sawy
2. http://www.plus.ie/bpr/papers/Critique%20of%20existing%20business%20process%20re-engineering%20methodologies.pdf
Summary of lecture
The BPR methodology is a structured set of guidelines/ principles that enables an analyst to derive ways for problem solving.
The general methodology taught in lecture consists of 5 typical phrases:
1. Triggering & executive visioning
2. BPR Project mobilisation
3. Process redesign
4. Implementation & organizational transformation
5. Monitoring & maintaining
In fact, the choice of technologies and methods within each phrase and the degree of relative emphasis of various aspects pf phrases is contingent upon the context of BPR, such as the scope and depth of the BPR project, the nature of the organizational infrastructure, and the nature of the process.
Evaluation
As referred to the journal Critique of existing business process re-engineering methodologies – The development and implementation of a new methodology, it revealed the weakness of these methodologies and used 3 European construction companies as case studies to explain this belief.
This critique mainly focused on missing the element of human and organizational issues in most of the BPR methodologies,i.e. the human and organizational issues were not incorporated well in the proposed methodologies. Also ,it focused on cost and effectiveness of the methodologies, which stated that the cost spent might not be worth and might exceed the benefits made.
From my point of view, we should use these methodologies appropriately and adjusting it depending on the nature of the company. I think no BPR methodologies are perfect and the company can certainly get a success in BPR after adopting these methodologies. It is impossible to have a theory that can apply to all the companies perfectly and solve all problems. Also I think we should not reject any methodologies because of some minor mistakes.
1. "Redesigning Enterprise Processes for e-Business", O. A. EI Sawy
2. http://www.plus.ie/bpr/papers/Critique%20of%20existing%20business%20process%20re-engineering%20methodologies.pdf
Summary of lecture
The BPR methodology is a structured set of guidelines/ principles that enables an analyst to derive ways for problem solving.
The general methodology taught in lecture consists of 5 typical phrases:
1. Triggering & executive visioning
2. BPR Project mobilisation
3. Process redesign
4. Implementation & organizational transformation
5. Monitoring & maintaining
In fact, the choice of technologies and methods within each phrase and the degree of relative emphasis of various aspects pf phrases is contingent upon the context of BPR, such as the scope and depth of the BPR project, the nature of the organizational infrastructure, and the nature of the process.
Evaluation
As referred to the journal Critique of existing business process re-engineering methodologies – The development and implementation of a new methodology, it revealed the weakness of these methodologies and used 3 European construction companies as case studies to explain this belief.
This critique mainly focused on missing the element of human and organizational issues in most of the BPR methodologies,i.e. the human and organizational issues were not incorporated well in the proposed methodologies. Also ,it focused on cost and effectiveness of the methodologies, which stated that the cost spent might not be worth and might exceed the benefits made.
From my point of view, we should use these methodologies appropriately and adjusting it depending on the nature of the company. I think no BPR methodologies are perfect and the company can certainly get a success in BPR after adopting these methodologies. It is impossible to have a theory that can apply to all the companies perfectly and solve all problems. Also I think we should not reject any methodologies because of some minor mistakes.
2012年2月19日 星期日
Lecture 3 - The Strategic Framework and BPR for e-Business
Source:
1. The Use Of Strategic Tools by Small and Medium-sized Enterprises: An Australasian Study" (F. A. Frost, 2003)
================================================================
Reflection
Lecture 3 mainly talks about strategic framework. The important role of IS/IT in business process reengineering(BPR) is mainly identified in the stages, "Develop options for radical change", "Evalustion of options" and "Implementation of chosen options" . The main strategic framework suggested are PEST analysis and SWOT analysis.
In my opinion, these two analysis are the fundamental analysis for IS/IT strategy which can outline the business environment and problems in external and internal prospectives. This can fully understand the business environment and the firm's position in the market, and carry out appropriate IS strategy to reshape the business.
To support my view, we will come across a real life example. According to "The Use Of Strategic Tools by Small and Medium-sized Enterprises: An Australasian Study" (F. A. Frost, 2003) in the journal "Strategic Change", it introduced different stategic tools (Refer to Figure 1) and focus on the study of strategic planning tool usage by the SMEs in Western Australia, Singapore, Hong Kong and Malaysia.
A strategic management framework is provided to identify six stages with a range of tasks, so that the studied SMEs can follow the same and concrete framework.
Stage 1: Current direction (Where are we going?)
Stage 2: Strategic aduit (Where are we now?)
Stage 3: Environmental analysis (External operating environment)
Stage 4: Environment (Macro)
Stage 5: Strategic analysis
Stage 6: Strategic implementation and control




Refer to Figure 2, the study concluded that the four most used tools are SWOT, PEST, Financial Ratio Analysis and Budgeting. The range of tools used was narrow, concentrating on budget-related tasks, SWOT and PEST. Besides, there was a significant difference in terms of range and depth between Australia and Singarore comparing with Hong Kong and Malaysia.
1. The Use Of Strategic Tools by Small and Medium-sized Enterprises: An Australasian Study" (F. A. Frost, 2003)
================================================================
Reflection
Lecture 3 mainly talks about strategic framework. The important role of IS/IT in business process reengineering(BPR) is mainly identified in the stages, "Develop options for radical change", "Evalustion of options" and "Implementation of chosen options" . The main strategic framework suggested are PEST analysis and SWOT analysis.
In my opinion, these two analysis are the fundamental analysis for IS/IT strategy which can outline the business environment and problems in external and internal prospectives. This can fully understand the business environment and the firm's position in the market, and carry out appropriate IS strategy to reshape the business.
To support my view, we will come across a real life example. According to "The Use Of Strategic Tools by Small and Medium-sized Enterprises: An Australasian Study" (F. A. Frost, 2003) in the journal "Strategic Change", it introduced different stategic tools (Refer to Figure 1) and focus on the study of strategic planning tool usage by the SMEs in Western Australia, Singapore, Hong Kong and Malaysia.
A strategic management framework is provided to identify six stages with a range of tasks, so that the studied SMEs can follow the same and concrete framework.
Stage 1: Current direction (Where are we going?)
Stage 2: Strategic aduit (Where are we now?)
Stage 3: Environmental analysis (External operating environment)
Stage 4: Environment (Macro)
Stage 5: Strategic analysis
Stage 6: Strategic implementation and control

Figure 1



Figure 2
Refer to Figure 2, the study concluded that the four most used tools are SWOT, PEST, Financial Ratio Analysis and Budgeting. The range of tools used was narrow, concentrating on budget-related tasks, SWOT and PEST. Besides, there was a significant difference in terms of range and depth between Australia and Singarore comparing with Hong Kong and Malaysia.
2012年2月5日 星期日
Week 4 – The Strategic Alignment Model
Reflection
Nowadays, we could not live without IT, and so the business world. The appropriate adoption of the business strategy and IS strategy directly affect the success of a business. However, the more important thing is their consistency, whether the business and IS strategy can be integrated in order to improve the overall performance of the organization. This is what meant by "Strategic Alignment".
SAM (Strategic Alignment Model) defines external and internal domains in terms of strategy infrastructure respectively. The external and internal domains can be categorized into business and IT functions. This generates 4 domains called Business Strategy, IT Strategy, Business Infrastructure and IT Infrastructure.
Though the 4 domains are clearly divided according to the componenets they included, the domains are indeed closely related by the implementation of strategic alignment. There are mainly 4 alignment perspectives, namely Strategy Execution, Technology Transformation, Service Level and Competitve Potential.
Subject:
In Lect 4 - Which alignment strategy in SAM model is the best? and why?
SAM composes of four quadrants that consist of three components each. In the business area the two quadrants are business strategy and organizational infrastructure. The components that make up business strategy are business scope, distinctive competencies, and business governance. Business scope refers to everything that might effect the business environment.
The first quadrant involving the information technology area is information technology strategy. This quadrant consists of the technology scope, systematic competencies, and information technology governance components.The last quadrant in the strategic alignment model is the information technology infrastructure. The components here are architecture, processes, and skills.
As mentioned before, there are four strategic alignment perspectives, namely, strategy execution, technology transformation, service level and competitive potential.
In my opinion, service level alignment is the best strategy. It is bacause SAM highlights the importance of IT-based service options. Service providers are using IT to reduce costs and create value-added services for their customers. It proposes a service quality model that links customer perceived IT-based service options to traditional service dimensions. The model attempts to investigate the relationship between IT-based services and customers’ perceptions of service quality.
One of the example is banks introducing e-banking, which could encourage customers to make transactions through Internet. Service quality is increased as customers do not need to queue up for long time. Moreover, with the use of e-banking, the number of staff could be reduced and thus save the wages cost. This could ensure the effective use of resources.
Reference:
1.STRATEGIC ALIGNMENT:ANALYSIS OF PERSPECTIVES
http://sais.aisnet.org/2006/Coleman-SAIS2006-paper.pdf
Nowadays, we could not live without IT, and so the business world. The appropriate adoption of the business strategy and IS strategy directly affect the success of a business. However, the more important thing is their consistency, whether the business and IS strategy can be integrated in order to improve the overall performance of the organization. This is what meant by "Strategic Alignment".
SAM (Strategic Alignment Model) defines external and internal domains in terms of strategy infrastructure respectively. The external and internal domains can be categorized into business and IT functions. This generates 4 domains called Business Strategy, IT Strategy, Business Infrastructure and IT Infrastructure.
Though the 4 domains are clearly divided according to the componenets they included, the domains are indeed closely related by the implementation of strategic alignment. There are mainly 4 alignment perspectives, namely Strategy Execution, Technology Transformation, Service Level and Competitve Potential.
Subject:
In Lect 4 - Which alignment strategy in SAM model is the best? and why?
SAM composes of four quadrants that consist of three components each. In the business area the two quadrants are business strategy and organizational infrastructure. The components that make up business strategy are business scope, distinctive competencies, and business governance. Business scope refers to everything that might effect the business environment.
The first quadrant involving the information technology area is information technology strategy. This quadrant consists of the technology scope, systematic competencies, and information technology governance components.The last quadrant in the strategic alignment model is the information technology infrastructure. The components here are architecture, processes, and skills.
As mentioned before, there are four strategic alignment perspectives, namely, strategy execution, technology transformation, service level and competitive potential.
In my opinion, service level alignment is the best strategy. It is bacause SAM highlights the importance of IT-based service options. Service providers are using IT to reduce costs and create value-added services for their customers. It proposes a service quality model that links customer perceived IT-based service options to traditional service dimensions. The model attempts to investigate the relationship between IT-based services and customers’ perceptions of service quality.
One of the example is banks introducing e-banking, which could encourage customers to make transactions through Internet. Service quality is increased as customers do not need to queue up for long time. Moreover, with the use of e-banking, the number of staff could be reduced and thus save the wages cost. This could ensure the effective use of resources.
Reference:
1.STRATEGIC ALIGNMENT:ANALYSIS OF PERSPECTIVES
http://sais.aisnet.org/2006/Coleman-SAIS2006-paper.pdf
訂閱:
意見 (Atom)



