14
Int. J. Production Economics 113 (2008) 914–927 Integrating the global enterprise using Six Sigma: Business process reengineering at General Electric Wind Energy Sanjay Goel a, , Vicki Chen b a School of Business, BA 310b,University at Albany, SUNY 1400 Washington Avenue, Albany, NY 12222, USA b General Electric Energy, 1 River Road, Schenectady, NY 12345, USA Received 1 September 2006; accepted 1 December 2007 Available online 23 December 2007 Abstract This paper describes the risks involved in business process reengineering (BPR) when a large enterprise company acquires small fast-growing companies to power its own growth engine. Integration of business processes across disparate organizations with different cultures requires careful planning and involves process automation, globalization, system selection, downsizing, and information security. It is important to streamline and automate processes in order to improve efficiency and reduce operating cycle times. Ideally, during reengineering, processes should be built from scratch based on evolving business needs, changing market conditions, as well as innovations in technology. Business realities, however, often force organizations into redesigning peripheral business processes while keeping the core process intact. This helps avoid disruption of organizational operations and allows for more flexible time constraints during implementation. Several compromises must be made during this redesign. This paper presents a framework for BPR using a structured analytic approach to make business decisions. The paper discusses the case of BPR at General Electric Energy’s Wind Division to integrate business operations across its globally dispersed acquisitions. The effort involved defining metrics for redesign, identifying alternate tools and processes, and evaluating the alternatives through those metrics employing Six Sigma methodology. The goal of this work is to demonstrate our approach that abstract best practices for process integration across global engineering corporations developed over time at General Electric. r 2007 Elsevier B.V. All rights reserved. Keywords: Security; Risk analysis; Information assurance; Business process reengineering (BPR); Six Sigma; General Electric 1. Introduction Large corporations often make strategic acquisi- tions of startup or small high-growth companies in order to achieve higher growth rates. Following such acquisitions, disparate processes across the business, e.g., finance, engineering, marketing, and human resources need to coalesce into a streamlined mono- lithic process. The objective of business process reengineering (BPR) is not only to improve cost and performance, but also to meld organizational cultures and impose parental controls on the acquired business. Mergers offer a tremendous opportunity to improve efficiency and reduce oper- ating costs through consolidation of activities, streamlining of operations, and integration of busi- ness processes. Barriers to successful integration include divergent organizational cultures, poor com- munication, incompatible processes, and language ARTICLE IN PRESS www.elsevier.com/locate/ijpe 0925-5273/$ - see front matter r 2007 Elsevier B.V. All rights reserved. doi:10.1016/j.ijpe.2007.12.002 Corresponding author. Tel.: +1 518 442 4925. E-mail address: [email protected] (S. Goel).

Integrating the global enterprise using Six Sigma: Business process reengineering at General Electric Wind Energy

Embed Size (px)

Citation preview

ARTICLE IN PRESS

0925-5273/$ - se

doi:10.1016/j.ijp

�CorrespondiE-mail addre

Int. J. Production Economics 113 (2008) 914–927

www.elsevier.com/locate/ijpe

Integrating the global enterprise using Six Sigma: Businessprocess reengineering at General Electric Wind Energy

Sanjay Goela,�, Vicki Chenb

aSchool of Business, BA 310b,University at Albany, SUNY 1400 Washington Avenue, Albany, NY 12222, USAbGeneral Electric Energy, 1 River Road, Schenectady, NY 12345, USA

Received 1 September 2006; accepted 1 December 2007

Available online 23 December 2007

Abstract

This paper describes the risks involved in business process reengineering (BPR) when a large enterprise company

acquires small fast-growing companies to power its own growth engine. Integration of business processes across disparate

organizations with different cultures requires careful planning and involves process automation, globalization, system

selection, downsizing, and information security. It is important to streamline and automate processes in order to improve

efficiency and reduce operating cycle times. Ideally, during reengineering, processes should be built from scratch based on

evolving business needs, changing market conditions, as well as innovations in technology. Business realities, however,

often force organizations into redesigning peripheral business processes while keeping the core process intact. This helps

avoid disruption of organizational operations and allows for more flexible time constraints during implementation. Several

compromises must be made during this redesign. This paper presents a framework for BPR using a structured analytic

approach to make business decisions. The paper discusses the case of BPR at General Electric Energy’s Wind Division to

integrate business operations across its globally dispersed acquisitions. The effort involved defining metrics for redesign,

identifying alternate tools and processes, and evaluating the alternatives through those metrics employing Six Sigma

methodology. The goal of this work is to demonstrate our approach that abstract best practices for process integration

across global engineering corporations developed over time at General Electric.

r 2007 Elsevier B.V. All rights reserved.

Keywords: Security; Risk analysis; Information assurance; Business process reengineering (BPR); Six Sigma; General Electric

1. Introduction

Large corporations often make strategic acquisi-tions of startup or small high-growth companies inorder to achieve higher growth rates. Following suchacquisitions, disparate processes across the business,e.g., finance, engineering, marketing, and humanresources need to coalesce into a streamlined mono-

e front matter r 2007 Elsevier B.V. All rights reserved

e.2007.12.002

ng author. Tel.: +1 518 442 4925.

ss: [email protected] (S. Goel).

lithic process. The objective of business processreengineering (BPR) is not only to improve costand performance, but also to meld organizationalcultures and impose parental controls on theacquired business. Mergers offer a tremendousopportunity to improve efficiency and reduce oper-ating costs through consolidation of activities,streamlining of operations, and integration of busi-ness processes. Barriers to successful integrationinclude divergent organizational cultures, poor com-munication, incompatible processes, and language

.

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927 915

problems. If BPR is not properly performed,resulting integration can disrupt operations, impedeproductivity, hurt employee morale, and stiflegrowth. Unanticipated organizational changes canthreaten the very success of the integration effort(Orlikowski and Hofman, 1996). Careful planningand analysis is essential for a smooth, uninterruptedtransition to the new business processes. This paperdiscusses the conundrum that organizations face intemporarily disrupting current activities and hurtingshort-term profits versus rebuilding for futuregrowth.

Unless BPR is performed in a systematic andrationale manner, it is just as easy to createpermanent damage to reliability, profitability, andefficiency in the organization. Based on the experi-ence at General Electric (GE) through severalsuch endeavors a set of best practices has emerged.The following stepwise approach is typically carriedout in such integration efforts. The first step is tocreate a road map for process integration and toidentify all the issues and business requirementsinvolved in the current process. The second stepis to determine the root cause of the issues thatwere identified, understand their business impact,and identify alternate options. Based on theidentified solutions a cost–benefit analysis is per-formed for the different options. Based on theanalysis, a comprehensive process is defined andtools are selected, process risks are analyzed, andcontrols are introduced. Significant due diligenceand effort are required, however, this initial effortpays huge dividends by preventing subsequentproblems in the redesigned process. Process reengi-neering efforts in the recent past have relied ontechnological advancements to automate businessprocesses and improve performance (Venkatraman,1994; Brynjolfsson and Lorin, 1996). Therefore,it is understandable that particular attention shouldbe paid in ensuring information systems functionproperly while maintaining (or improving) thebasic infrastructure. In attempting to improveoperational efficiency the risks associated withexposure of critical data in information systemsused to model business processes should not beignored. On the one hand, process automationincreases productivity; on the other hand, it expo-ses the organization to threats from maliciousinsiders, competitors, and hackers. In certaincircumstances, the tools and processes that shaveoff cost and time expose the company to seriousliability.

A company engaged in BPR after an acquisitionaims to ensure continuity, reduction of costs,improvement of productivity, and synchronizationof business operations. To achieve these objectives,companies perform extensive cost–benefit analysesboth for process refinement and tool selection.However, due to additional upfront costs andcomplexity, information security issues are seldomincorporated in these analyses and are usuallyrelegated to information technology implementa-tion once the BPR decisions are complete. While webelieve that there is great benefit in incorporatingsecurity considerations early on during the BPRprocess, the consequent complexity that inevitablyensues may be too high given that the literature haslittle to offer in terms of best practices ormethodologies for handling such security issues.

The paper analyzes a BPR effort at GE Energy’sWind Division to elucidate the challenges associatedwith including information security considerationsin the BPR process and the compromises that weremade. While we were not able to incorporate formalinformation security risk analysis in the BPRprocess, information security was included as ahigh-level metric in the decision-making for toolselection.

BPR is a complex organizational–technical pro-cess and close observation of the dynamics involvedin the entire process as well as evaluation oftechnical decisions was required. In conjunctionwith performance metrics data collection, an em-pirical action research methodology was employedfor this work. One of the authors led the BPR effortfor the division and overtly engaged in the interac-tions among consultants, staff, managers, and ITexperts. Action research has been established asa legitimate research approach in informationsystems literature (Baskerville and Pries-Heje,1999; Baskerville and Wood-Harper, 1996, 1998).

The paper follows the reengineering effort fromconception to completion and provides an in-depthview of the process. First, the business case andanalysis of process reengineering in relation to thegoals, vision, and metrics of the organization wherea detailed structured approach based on Six Sigmamethodology (Mikel and Schroeder, 2000; Pandeet al., 2000) are described. Subsequently, businessdecisions made in selecting tools based on cost–be-nefit analyses are discussed. Tool selection decisionsare discussed in context of technical, organizational,and political constraints. This paper makes severalkey contributions to the literature and offers a more

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927916

detailed structured approach than currently exists.It presents a case study that highlights the difficultyglobal organizations have in BPR. In the Internetage, BPR and information security are inseparable.The issue of incorporating information security inBPR is also briefly discussed though a detailedsecurity risk analysis is beyond the scope of thispaper. The paper is organized as follows: Section 2presents our methodology; Section 3 describes thereengineering methodology; Section 4 discusses thecase study; Section 5 presents discussions; andSection 6 presents our conclusions.

2. Literature review

The literature in the area of BPR is very diversewith significant work in the practitioner literature.A brief review of the literature is provided here withspecific focus on the security aspect. The concept ofBPR first emerged in early 1990s with the works ofDavenport and Short (1990), Hammer (1990, 1996),Harrington (1991), and Hammer and Champy(1993), Davenport (1993), Johansson et al. (1993),Klein (1993), Dixon et al., 1994, Manganelli andKlein (1994), and Ovans (1995). All offer differentdefinitions of BPR. The most commonly useddefinition comes from Hammer and Champy(1993), who define reengineering as the redesign ofbusiness processes to dramatically improve perfor-mance in terms of cost, quality, service, and speed.Researchers, including Hales and Savoie (1994),Irani et al. (1997), Farmer (1993), and De Bruynand Gelders (1997), have extolled the virtues ofBPR. The success of BPR has been widelypublicized, while the more serious failures havenot. Caron et al. (1994) report a 50% failure rate,Murphy (1994) a 70% failure rate. Holland andKumar (1995) report that 60–80% of such effortsare unsuccessful, while Hammer (1996) and Cham-py (1995) claim that 70% of companies obtain nobenefit. One explanation for this is that seriouslytroubled companies often consider BPR to be thesolution to all their woes (Fitzgerald and Murphy,1996). In such cases, however, the problems run fardeeper than what can be fixed by reengineeringalone. Davenport (1994) suggests that in order tomaximize the benefits, reengineering should beintegrated with total quality management.

Effective BPR involves understanding existingprocess defects, identifying sources of inefficiency,and redefining processes to increase efficiency ordecrease errors. In the past, reengineering focused

on automating existing manual processes whileleaving the process flow intact, resulting in smallincremental gains in productivity (Fitzgerald andMurphy, 1996; Davenport and Stoddard, 1994). Tofurther improve performance and cost, radicalchanges to tactical and operational processes andthe procedures, policies, structures and infrastruc-ture that support them are required (Giaglis et al.,2000). According to Hammer (1990), using agrounds-up approach incorporating best practicesand leveraging new technologies allows for max-imum flexibility in process redesign. It is not feasibleto reengineer processes from scratch since existingoperations must continue during the reengineeringprocess and the data information security must bemaintained during all phases of the transition (Gosset al., 1993). Instead, greater efficiency and securitycan be achieved through other means, including:automating the process (or part of it), usinginformation technology; improving existing toolsor acquiring new ones; and simplifying controls inexisting processes. Hall et al. (1993) describes howshort-term narrow focus process improvements canlead to long-term profits. Guimaraes et al. (1997)presents critical success factors for BPR andoutlines issues that should be addressed duringimplementation. A crucial element is gatheringintelligence from available sources, e.g., processowners, consultants, IT security, and the literature.This helps designers understand current processesand make informed choices in selection of tools andprocedures. Ultimately, the success of such effortslies not only in careful technical analysis, but also inensuring that the employees directly affected em-brace the reengineered process.

To successfully implement reengineering projects,companies need to follow a systematic approach(Andrews and Stalick, 1992). Although there is noset formula (Caron et al., 1994), several differentapproaches have been proposed. Evans (1993) usesa bridging metaphor to describe a broad frameworkfor BPR projects. He proposes a four-stage process:(1) defining vision; (2) outlining the current businessprocess; (3) creating a plan for the redefined process;and (4) implementing the plan. This seems feasiblebut provides little insight into how the new processshould be designed. Fitzgerald and Murphy (1996)outline a six-step process with interactive feedbackloops. Their approach includes selecting a processand establishing a process team. Though slightlybetter, it still offers little refinement in the area ofprocess reengineering and did not address the issues

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927 917

concerning information security. It is extremelyimportant not only to have a clear vision and goalsbut also to have crisp, quantifiable metrics (Croweet al., 2002) so that the progress of the reengineeringeffort can be measured.

Reengineering the public sector has also beenwidely discussed (Corbin, 1993; Davenport, 1994;Kettl, 1993; Miller, 1994; Moe, 1994; Malhotra,1998; Thong et al., 2000) and several US govern-ment agencies, however, have taken a lead infostering public sector reengineering efforts (GAO,1997). The US Department of Defense (DoD, 2004)has defined a process for strategic and businessplanning, especially as it pertains to BPR. Theyhave developed tools and techniques that can beused to define, analyze, develop, and implementstrategic organizational and business plans. Theyfollow a structured methodical approach similar tothe approach presented here but they do notconduct statistical analysis nor do they incorporateinformation security risks. Instead they createchecklists for facilitating specific reengineeringmissions, such as, environmental liabilities recogni-tion (DoD, 2006). Despite the availability ofmethodologies in the literature there is considerablerisk in reengineering projects. Several frameworksas well as best practices for business processredesign are presented in the literature, notablyJablonski and Bussler (1996), Berio and Vernadat(2001), Seidmann and Sundararajan (1997a), andMansar and Reijers (2005). They are howeverpresented at a conceptual level. In this work, wepresent a case study that actually defines the metricsand employs a metrics-driven methodology basedon Six Sigma that manages reengineering risks indecision-making at each step. Case studies such asthis one can help other organizations understandthe subtle nuances of this process.

Process Redesign

Define Vision

Create Process Metrics

Analyze Process

Redefine Process

Process Controls

Tool Selec

Identify To

Create Tool

Analyze T

Select To

Revision C

Fig. 1. Process reeng

3. Reengineering methodology

Decision makers may find it difficult to chooseamongst the various alternatives when integratingbusiness processes from different organizations.They often have to contend with sparse andinaccurate data that emanates from the variousorganizations, all of whom have a stake in promot-ing their tools and processes. A rational riskanalysis is seldom used to evaluate the merits ofprocess integration and return on investment lagsbehind expectations in the majority of cases. This, inlarge part, is due to inadequate recognition of theinterdependence among technology, practice, andstrategy. Researchers Crowston and Malone (1988)and Barua et al. (1995) have recognized the criticalrole that interdependence plays in affecting out-come. Milgrom and Roberts (1988) describe howpoorly understood interactions among the compo-nents of a system can prevent successful implemen-tation of a complex business process. To ensuresuccessful implementation, a rational analysis of therisks involved in process integration must beconducted in order to ensure current survivabilityas well as future gains in productivity. Themethodology presented in this paper presents astructured approach to facilitate the decision-mak-ing process (see Fig. 1). In step one, metrics aredefined and the process is analyzed and refined. Instep two, different tools are identified and analyzed.

3.1. Process redesign

Process redesign involved mapping the existingprocesses and then streamlining the processes tooptimize operational efficiency. This redesign wasdone using the Six Sigma approach, which is a rigo-rous data-driven approach that utilizes statistical

tion

ols

Metrics

ools

ols

ontrol

Security Analysis

Define Security Goals

Value Assets

Identify Vulnerabilities

Determine Threats

Select Controls

ineering steps.

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927918

analysis to measure and improve organizationalprocesses. This approach has been institutionalizedthroughout the company to manage process andproduct quality. By definition, Six Sigma quality isachieved when process errors are reduced to lessthan 3.4 per one million opportunities. An error isan instance when a process metric falls outside thenormal range of specification. The basic philosophyof Six Sigma is that: ‘‘if you can measure it, you canimprove it’’. This approach entails creation ofquantitative metrics for processes, which itself canlead to ambiguities in the computation of qualitymetrics. Six Sigma toolkit includes several tools thatassist users in managing risks and making decisions,including (1) design for Six Sigma (DFSS); and‘‘define’’, ‘‘measure’’, ‘‘analyze’’, ‘‘improve’’, and‘‘control’’ (DMAIC). Both of these tools areimplemented using a spreadsheet that is called the‘‘Pugh matrix’’. Pugh matrices are particularlyuseful for integration of multiple processes as wellas selection of tools and technologies. The processRedesign includes the following five steps: (1)

Table 1

Definition/

planning

Measurement Analysis Process desig

Business

requirement and

problems

Detailed project plan Benchmark

solutions

analysis

Project summ

Mission/scope

identify key

success factors

Process map Process design

analysis

Identify key

project succe

Build a team Customer

requirements

High-level

systems

integration

needs

Define busin

policy and o

changes

Multi-generation

plan

Critical to quality

measurement

Performance

targets

Vendor selec

(if required)

Define cost and

benefit

Data baseline Data quality Outline spec

requirements

Project plan Infrastructure

assessment—

hardware and

network

Detailed fit and

gap software

analysis

Risk related

new process

Communication

plan

Security assessment Root cause

analysis

New process

map

Legal

requirements

Secure funding Cost/benefit

analysis

Training pla

Risk

assessment—

security risk

Security

measurement

Security risk

analysis

Security fact

for success

Review/approve Review/approve Review/approve Review/appr

creating metrics; (2) weighing metrics; (3) identify-ing the baseline; (4) rating different options; and (5)selecting processes. During the consolidation phase,the best process chosen for each step is used toconstruct the final integrated process. In case of aconflict, e.g., processes from two divisions have thesame quality metric; rationalization is based onsecondary factors such as cost and culture.

DFSS facilitates gathering of specifications fromstakeholders and assists in evaluating differentoptions for creating the new process. DMAIC isused to measure the behavior of existing processes,and to improve, monitor and control them to ensureefficiency. Using Six Sigma methodology, the BPRis a multi-step process, as shown in Table 1. In theDefinition/Planning phase, the purpose and scope ofthe project are defined and background informationis obtained. A problem statement, goal statement,constraints, assumptions, and project plan areoutlined; a high-level process map and list of criticalto quality factors (CTQs) is also generated. In theMeasurement phase, process metrics are defined and

n System design Building, testing

and verification

Control

ary Hardware, software

prep, and

construction

Detailed training

plan

Launch pilot/beta

release

to

ss

New infrastructure

assessment

Coding Transition

application to

production

ess

rg.

Design issues and

strategies

Build

infrastructure

Transition

application to

business owners

tion Architecture design System integration

test

Train end users

ific Overall software

test strategy

Rollout plan Establish and

implement control

procedures

to User interface Implement

business policy

and org. changes

Production launch

Define support

strategy

User acceptance

test

Identify and

resolve post

production issues

n Application/help

manual

Vendor service

agreement

Verify key success

factors

ors Resolve legal

requirements/

security weaknesses

Test interfaces and

conversions

On-line

documentation

ove Review/approve Review/approve Review/approve

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927 919

baseline analysis is conducted to define projectgoals. In this phase, the problem statement isfurther refined and root cause analysis is used toidentify potentially defective areas. In the Analysis

phase, statistical methods and tools are used tofurther analyze root causes of defects; the processitself is analyzed in order to identify inconsistenciesor problem areas. We have incorporated securityrisk analysis as a part of this step. The improvementphase consists of: (1) process design; (2) system

design; (3) building, testing, and verification. Thisphase focuses on remedying the problems and isusually technologically intensive. Once improve-ments are made, the process needs to be controlledto ensure that problems do not recur; hence, theControl phase, which involves monitoring on acontinuous basis. By combining risk analysis withSix Sigma methodology, the reengineered businessprocess can be measured, analyzed, and improved;at the same time, security risks can be analyzed andcontrolled.

3.2. Selection of tools

Once a comprehensive reengineering process hasbeen defined, intricate details of the solution can bedeveloped, such as choosing the right tools, analyz-ing process risks and introducing controls. BPRefforts often fail because of poor tool selection andinadequate risk analysis. Tools are often toosimplistic; they neither capture the dynamics of thebusiness process nor are they able to adequatelyrepresent organizational knowledge. Sometimes,they are so complex that they prevent domainknowledge and intuitive judgment from being usedto solve business problems. A complex tool may actlike a black box, preventing users either fromrecognizing limitations when the tool is used outof context or from identifying errors propagatingdownstream from an inadvertent mistake. Businessprocesses are constantly evolving due to changingtechnology and legislation. Most traditional auto-mation tools are best suited to automation of staticprocesses with fixed inputs, outputs, and rules.Static business processes, however, hinder innova-tion and sometimes lead to a competitive disadvan-tage. In addition, a majority of BPR efforts focus oncost, speed, and logistics without considering hu-man behavioral factors. Behavioral modeling re-veals how business processes operate (Hansen,1994) and is, thus, essential for identifying propertools. Lastly, security and integrity of data should

be primary considerations in tool selection; thesemust not be treated as mere implementation details.

The tool selection process demands carefulplanning, clear specification of business require-ments, and a precise definition of tool metrics. Oncebusiness requirements have been identified, afeasibility study should be conducted to ensure thatthe tools selected meet functionality requirements.Once a short list of tools has been created, each oneshould be analyzed and ranked using the toolselection metrics. The metrics for tool selectionshould include change management challenges,business reengineering alternatives, usability con-siderations, security considerations, and mainte-nance needs. If several different types of tools arebeing considered, their compatibility must beexamined prior to selection. In such cases, theaggregate value of the entire group should beranked against that of other such groups. A SixSigma approach—Pugh matrix can also be used inthe tool selection process (see Fig. 2). Once the righttool has been selected, the final step is to analyzerisks associated with the tool and initiate revisioncontrols.

4. Case study

The research presented in this paper is based on acase study at GE Energy, which acquired severalnew wind turbine businesses and attempted tointegrate business processes across different divi-sions. Power generation is an extremely competitivefield, but GE considers it a core business in which itwould like to maintain its leadership position. It,too, is a cyclical business and GE is looking fornovel ways to maintain growth. Alternate sources ofenergy, particularly wind energy, provide one suchopportunity. In 1973, the oil crisis prompted the USgovernment to seriously consider investing in windenergy and solar power; large tax breaks were givento windmill farms and to corporations, which inturn, made significant progress in this field. Declin-ing government interest and investment has scaredoff many would-be investors. The current energycrisis, however, has rejuvenated worldwide interestin wind energy. In the past 15 years, the wind energyindustry has grown by 25–30% per year (GE Wind,2007). In Denmark, wind energy accounts for 20%of available electricity; in Germany it accounts for5.9%. The US federal government’s recent exten-sion of the Renewable Energy Production TaxCredit (PTC) provides a strong impetus for invest-

ARTICLE IN PRESS

List CriticalBusiness

Requirements

ListExisting Tools

AnalyzeFunctionality &

Architecture

Gap Analysis forTools (Capabilityvs. Requirement)

Rank Tools Basedon Requirements -Pugh Matrix (PM)

Identify Technical &Cultural Problems in

Selecting Tools

Populate PMfurther based on

Gap Analysis

Selected two highScored tools

AnalyzeImplementation

Cost (As-Is)

Compute Cost forTool Upgrade to

meet requirements

Cost BenefitAnalysis for Final

Tool Selection

Business SecurityRisk Analysis

Identify Experts to Evaluate Different

Tools

Create Roadmapfor Tool

Integration

Fig. 2. Six Sigma-based approach to tool selection.

S. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927920

ment in wind energy. While wind energy currentlyamounts to less than 1% of US electric production,the goal is to increase that figure to 6% by the year2020.

It acquired its wind power business from Enron in2002. Enron had two separate divisions in Califor-nia and Germany, to which it added acquisitions inUS, China, and Spain. Enron had failed to integrateits tools and processes. In addition, the Californiadivision maintained one set of tools and processesand the German division another. GE also had itsown tools and processes prior to its acquisition ofEnron’s wind power business. Consequently, GEwas saddled with three separate, uncoordinated setsof tools and processes. As a result, the threedivisions had to communicate manually, whichproved to be inefficient and expensive due todata integrity issues. To improve efficiency andreduce costs, it was decided to reengineer the windenergy business process and integrate processesand tools.

4.1. Process redesign

After making these acquisitions, GE Energy’sWind Division continued to operate functionally asa holding company for multiple, autonomous units.Issues such as inaccurate or incomplete bills of

materials (BOMs), delays in shipment, and poorquality forced it to reevaluate its business model andopt for a more synergistic model with an integratedbusiness process across all divisions. Developmentof a BOM generation process was the first processtargeted for reengineering. This subsection presentsan analysis of the BOM process using data forturbines manufactured during the 2003–2004 pro-duction run. Problems encountered in the originalprocess, the reengineering approach, and the rede-signed process are discussed. A statistical compar-ison of the original and reengineered processes isalso presented.

4.1.1. The BOM problem

BOM is a critical component of the product lifecycle; it lists the subassemblies, intermediate parts,and raw materials that go into a parent assembly.Manufacturing activities that originate in BOMinclude material resource planning, inventory con-trol, and production scheduling. Any problem inBOM can cascade down through subsequentprocesses and cause cost overruns and delays inshipment. Since the margins on wind turbines arethin, rework often results in a loss. In the 2003–2004production run, the requisition team at GE Windworked on designs that had delay-causing problemsin their BOMs. More than 150 Engineering Change

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927 921

Requests (ECR) were generated during this period.Since each ECR affects multiple subassemblies,errors were propagated through several processes,resulting in inventory overages and parts shortages.The order to remittance cycle was ultimatelyaffected, causing delays, premium delivery freightcharges, and damages for breach of contract. Therefined BOM process shown in Fig. 3 is a nine-stepprocess. Potential problems associated with eachstep, e.g., information integrity, communication,and notification failures, are indicated in theProblems box (below).

Commercialoperations providesthe go ahead to out

order requirement tothe GMS for theidentified project

High levelconfiguration is

manually extractedfrom CMS to theGMSL (monthly

update)

GMS obtain deliveryschedule fromCommercialoperations

GMS uploads highlevel configurationmatrix to Support

Central

Production planner manually extractsthe GMS high-level configuration from supply central and checks for

any special requirement. Also obtainsproduction start and end dates and

dispatches to MRP

MRP creates thevariant only for inside

(Nacelle), hub andconverter and sends itto production planner

Production entersstart and end date

and enters thevariant of BOM into

DF/GSB

Execute the processin DF/GSB to

create work order

P5

P3

P7

P9

Monthly QMIMeeting

Review the next 12months outlook

based on COOL andGMSL

P1

Fig. 3. Current business process and

4.1.2. Root cause analysis

In order to reengineer the process more data werecollected; 14 key BOM problems identified in the2003–2004 production run are listed below. Solu-tions to each of these problems follow (in italics).

(1)

P6

P4

P8

P2

infor

No primary BOM owner in the Americas(Need to define owner).

(2)

Insufficient tools within system (Need tocreate/select better tools).

(3)

Supply chain sometimes drives configuration;use of old material (Need correct BOM).

Problems:P1– Lost opportunity if problems notanticipated during this reviewP2– Manual communication between CMSand GMSLP3– Without proper review, commercialoperator approves ordering the material usingInaccurate & Incomplete BOM definitionP4/P5– High level configuration anddelivery schedules are updates from theproject manager database for projects thathave gone through a release meeting.Information handoff directly from sales toproject manager with out any involvementfrom engineeringP6/P7-Product planner and MRPcommunicate back and forth for theinformation without engineering inputP8/P9- Customer order information sent toMRP database and create work order. At thistime, manufacturer has already startedbuilding the turbine and errors go unnoticedand unresolved leading to poor quality ofproduct to customer.

Abbreviations:QMI – Quick Market IntelligenceCOOL-Commercial Operator ListGMSL-Global Master Schedule listCMS - Customer management SystemGMS – Global Master ScheduleMRP - Material Resource PlannerBOM – Bill of MaterialPPB – Production Policy BoardC&CE – Cost cycle estimateDF – US MRP systemGSB – German MRP system

mation integrity defects.

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927922

(4)

Items are not interchangeable with regard tofit, form and function (Need to correct BOM).

(5)

High number of inactive BOMs (Need toidentify and fix problems).

(6)

BOMs are not defined for global market in newproduct introduction (NPI) (NPI team needs to

be involved).

(7) ECR process does not entail creation/valida-

tion of new BOM after change is approved(Need proper review process).

(8)

No closed loop second party review of BOMprior to release on live side (Engineering and

manufacturing need to work as a team).

(9) No good baseline BOM; errors migrate into

new configurations (Need to build standard

BOM).

(10) Process of new component introduction poorly

defined (Need NPI to define the new compo-

nent).

(11) Flat BOM makes errors hard to spot (Need to

develop a clear hierarchical model).

(12) BOM entry in system is highly manual (Need to

start automation efforts).

(13) BOM definitions are not part of NPI scope

(Administrative change required to add this towork scope of NPI).

(14)

NPI process does not entail creation of GlobalBOM as part of NPI tollgates (Need to define

tollgates).

The histogram of defects in Fig. 4 shows thefrequency of each of the 14 causes listed above. Thesolid line shows the cumulative percentage count;here we see that cause numbers 1, 2, 9, 11, and 12account for 70% of all defects. The most significantproblem, i.e., that BOM lacked a primary owner,

Pareto of BOM

242 236213

158

11593

7

0.18

0.35

0.50

0.620.70

0.770.84

0.

0

50

100

150

200

250

300

1Cause,

Freq

uenc

y

2 9 11 12 13 6 8

92

Fig. 4. US problem Pare

had a frequency of 242. The second most importantproblem, i.e., inadequate tools, had a frequency of236. The third most important problem, i.e.,absence of good baseline BOMs, had a frequencyof 213. It is relatively easy to address the firstproblem by refining the process and assigning anowner to each BOM. The second problem is thehardest and most expensive since it typicallyrequires reengineering tools. The third problemstems from lack of NPI involvement in constructingthe non-standard BOM but can be remediedthrough process refinement. A management teamwas convened to address this issue; the team agreedto assign specific managers to different BOMs (andsub-BOMs). A team of core engineering staff met toaddress the issue of tool reengineering; their findingsare discussed in Section 3.2. To address the issue ofa ‘‘Flat BOM’’, each owner has to understand theBOM structure, create a proper hierarchy andensure accuracy. The fifth most important error,i.e., manual input, is a tool-related issue and will bediscussed in the section on Section 4.2. Theremaining problems are related to the processesand tools used in the creation of BOMs. Systemswere old and inefficient but the company chose touse existing tools to minimize process disruptionand reduce training costs.

An analysis of the tools and processes related toBOM sheds light on several serious problems; someexisted before acquisition by GE while others aroseas a result of the merger. These issues, together withroot causes, business impacts, and potential solu-tions, are identified in Table 2. Resolution wasessential prior to global integration of businessprocesses. The resolution effort was divided intothree phases. Phase I focused on centralizing the

Defects

7 72

3625

8 4 0

890.95 0.97 0.99 1.00 1.00

x

0

0.2

0.4

0.6

0.8

1

1.2

Cum

mul

ativ

e C

ount

, %

14 4 10 7 3 5

1.00

to of BOM defects.

ARTICLE IN PRESS

Table 2

Issues/problems Root cause Business impact Solution

Pre-integration problems

No unique process in each site No process to follow Manf. and sourcing will order the wrong

material/delay turbine delivery

Fix process

No PLM system Legacy system No unique data storage Build product life

cycle central (PLM)

Tool cannot meet requirements Tool too old Too many manual processes Generate new tools

Too many manual processes,

human errors

No tool available Data integrity, no control New control and

review security issues

Integration issues

Multiple processes and tools No standardization among

multiple sites

No communication between each sites/

cost/errors

Develop common

tool and process

Unable to link CAD data to

product definition in BOM

Multiple systems and too many

manual processes

Technology must maintain separate data

bases for product definition and CAD

data

Develop common

tool and process

Unable to accurately relate

valid customer orders to a

unit’s quoting limit

Tool not available in either

new or old systems

Comm. Ops, sales, ARE teams unable to

associate specific customer orders with a

particular unit type or configuration

Implement a proper

tool to support this

function

Unable to link F&O config to a

customer’s BOM

Not available in old/new

systems

ARE, Mfg teams unable to analyze

impact of F&O changes to orders in

pipeline

Find tool support this

function

Cannot link a serialized unit to

an ECO, assembled BOM,

work order and re-assigned

assay BOM

Tool not available in either

new or old systems

ARE, Mfg teams unable to analyze

impact of ECO, EFN, WO and others to

orders and fleet units as well as capture

As-built configurations by pad number

Implement a proper

tool to support this

function

S. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927 923

manufacturing and reengineering process in the US.Phase II focused on European processes and toolsissues. Phase III focused on the creation of a singletool and process across all divisions. The last phaserequired fundamental tool issues to be resolved,communication across divisions to be seamless, andprocesses to be consolidated across the US, Europe,and Asia. In addition, security concerns needed tobe incorporated into the BPR efforts.

4.2. Tool selection

To improve business processes it is often neces-sary to reengineer tools along with the processes.While GE wanted to integrate tools and synergizebusiness processes across all power generationdivisions, the existing tools were not powerfulenough to meet the process requirements of theWind Division. It thus decided to create a new toolcalled PLM/PDM1 that would be compatible withthe reengineered process. Using Six Sigma metho-dology, existing tools were compared in order todetermine which suite of tools would work best.

1PLM/PDM is a combination of two processes: product

lifecycle management and product data management.

These tools are shown in Table 3; and a Pugh matrixwas used to rank potential solutions. It wasgenerally anticipated that different divisions wouldbe reluctant to provide objective opinions in orderto protect their own turf and avoid having to retrainemployees in the new technology. The wrongdecision, however, would have made matters worseby raising costs without adding commensuratebenefits. A team consisting of developers, users,and managers was quickly formed in order to selecttools. The team was led by the InformationTechnology group and was named the GlobalProducts Company (GPC). Their main goal wasto migrate the energy division to a common tool setthat would integrate best practices into the businessprocess. The group decided to use an existing powergeneration tool suite, (the Newton Suite) as thebaseline for comparison.

The 10 key criteria used for the Pugh matrixcomparison are as follows: integration, functional-ity, stability, scalability, manageability (administra-tion), enterprise change management, economy(cost of ownership and licenses), capacity perfor-mance, architecture, and security. Pugh matrixresults showed that the not yet fully developedPLM/PDM system rated highest, followed by the

ARTICLE IN PRESS

Table 3

Subject Newton Suite Wind EU/Asians tools/

system

Wind US tools/

system

PLM/PDM

Reporting system Control Point Summary NA NA NA

Resource management GEW, Times, TIM Manual Manual Primavera

Product configuration

management

Window sticker, Pegasus,

AutoBoM

XLS file XLS file PLM/PDM (Product Central)

BOM control eBOM GSB DataFlow Engineering Central

Change control eBOM, DCI ECR ECR Engineering Central

Document management DART ERDB ERDB Engineering Central, Document

Central

Service tool eService NA NA NA

CommOpp tool CMS NA NA NA

Table 4

Business impact/

risk of Newton

suite

implementation

PLM/PDM team/

users

Newton Suite teams/

users

Process Process integration

with Newton process

None

Funding Reprioritize funding

and place

development on hold

Reprioritize funding;

re-evaluations

required for all tool

sets

Business impact Customer fulfillment

impacted during

bubble (2000 new

units wind orders),

impossible to migrate

users to Newton

overnight

None

Leadership Negative impact on

leadership credibility

and reputation

Need help to form

core teams to bring

the new users on

board

Cost $3M+ loss in PLM/

PDM spending

Reprioritize funding

dollars

Technology Move into worked

but old/new mixed

tools

No changes

S. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927924

Newton Suite, the acquiring department’s Europeantool (GSB is a manufacturing tool), and finally, theacquiring department’s US system (Dataflow is aUS manufacturing tool). PLM/PDM ranked high-est because it is a web-based tool in which modernsecurity functions are embedded. The Newton Suiteranked second because it embodies several tools andis well accepted in the business. In the NewtonSuite, manufacturing and resource managementtools are based on the IBM mainframe, whileconfiguration tools are web-based. The latter helpedthe Newton Suite rank second. The GSB andDataFlow systems have several weaknesses. Firstthey are limited to manufacturing functions only.Second, their software must be loaded onto localmachines and servers to be used. Third, GSB andDataflow do not have Enterprise Change Manage-ment role and finally they lack information securityfunctions. In summary, these are old tools andtechnologies that do not compare favorably with themore modern alternatives. Newton Suite and PLM/PDM, thus, became the common tool solution. Wenext present a step-by-step analytical evaluation ofthese tools. Some of the values were extracted fromthe Pugh matrix. It is clearly more expensive andmore time consuming to implement PLM/PDMthan the Newton Suite. Tables 4 and 5 present theseresults from the perspective of the technical teams.

Thirteen of the 16 teams reporting to the Vice-President of the energy division currently use theNewton Suite; this amounts to some 3000 activeusers. The PLM/PDM system is not yet fullydeveloped, thus, there are no active users, only betausers. The risk of moving 3000 active users to theunknown system was simply too high and it wouldbe impossible to switch all of them to the new toolovernight (see business impact and risk analysis in

Tables 4 and 5). The Decision-Making team spent aconsiderable amount of time evaluating the cost ofboth short- and long-term moves to the PLM/PDMsystem. Financial considerations forced the com-pany to give up the PLM/PDM system even thoughit embodies more modern technology.

The Information Management and Technologyteam summarized other reasons for not moving tothe PLM/PDM system. First, there is no technicallycompelling reason to move 3000 engineers away

ARTICLE IN PRESS

Table 5

Business impact/

risk of (PLM/

PDM)

implementation

PLM/PDM team/

users

Newton suite teams/

users

Process Need to integrate into

one process

Need to learn new

process

Funding Reprioritize funding;

re-evaluations

required for all tool

sets

Move all funding to

PLM/PDM

implementation

Training Need PLM/PDM

training due to tool

still under-

development

3000+ users need to

be moved to new

system; training

required

Cost Reprioritize PLM/

MGSP integration,

$3M will not have

been wasted

Fund migration of

3000+ users cost plus

tool ownership and

licenses cost

Technology Graduate move away

from GSB & dataflow

Move out of IBM

main frame use

S. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927 925

from current process automation tools to the PLM/PDM system since the latter is based on the sameplatform, i.e., MatrixOne. Second, there is nofinancial benefit to justify migration to PLM/PDMsince GE’s engineering and related functional needsdo not fit within the constraints of the configura-tion. PLM/PDM requires extensive customizationto meet current and future functional requirements.Moreover, GE’s common PLM suite (eBOM PLMsystem) scores higher in the Pugh matrix than thePLM/PDM. Pre-existing architecture and technol-ogy standards and 3 years’ worth of applicationdevelopment causes eBOM to score higher than thePLM/PDM. Without specific, quantifiable andcompelling reasons, the eBOM–MatrixOne centralwas preferred. Thus, it was decided that usersshould remain in the current common PLMproduction environment.

During the tool selection process security wasfactored at a very high level, since the complexity ofthe problem would have made decision-makingvirtually impossible. During the tool selectionprocess responders were asked three questions:Does risk analysis match the company’s securitypolicy? Does it require authentication across multi-ple applications? Does it have role-based access toapplication functionality? This however is insuffi-cient for ensuring security of the system. Informa-tion security risk analysis must answer many otherquestions and must involve other stakeholders,

including information creators, information users,and information technology support groups. Secur-ity risk analysis should examine the entirety of thebusiness process, data access, data integration, userbehavior, and communication. To this end, adetailed risk analysis of the refined process wasperformed to identify the necessary controls in theredesigned process.

5. Discussions and future directions

Companies engage in reengineering of theirbusiness processes for several reasons, such as,improving efficiency, increasing productivity, andreducing time to market. However, reengineeringoften results in huge short-term costs that need to beamortized over several years through increasedfuture revenues resulting from the reengineering.Even though at the top level primary decisions arerelated to selection of tools and design of process,success in reengineering is often tied to suchintangible factors as formation of balanced teams,due diligence in selection of tools, periodic verifica-tion, and validation of work practices, and mostimportantly, definition of quantifiable metrics. Inaddition, adequate resources should be available tocommensurate with the effort. The approach pre-sented in this paper reflects the Six Sigma philoso-phy used at GE. Projects are divided into multiplesegments with clear quantifiable metrics for eachsegment. Such reengineering efforts are especiallydifficult in global organizations due not only totechnical inconsistencies in processes and specifica-tions, but also to legal and cultural issues.

Decision makers typically focus on parameterswith a direct payoff, such as cost and productivity,reflecting their own performance metrics. Theystruggle to evaluate non-tangible factors that donot have a direct payoff or have a high degree ofuncertainty such as employee morale or companyimage (Tomasko, 1993; Beugre, 1998; Seidmannand Sundararajan, 1997b).

The problem is especially insidious since man-agers often feel uncomfortable with informationtechnology and they have traditionally treated it asa tool designed merely to reduce their workload. Inthe current business environment, information is themost important differentiator that provides acompetitive edge. Proprietary engineering informa-tion regarding technology and business practicesforms the company’s core competence. Engineeringcompetence derives from years of expertise in

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927926

aircraft engine manufacturing and power generationand must be protected to maintain a competitiveedge.

The paper presents a case study of BPR at GEEnergy Wind Division after the acquisition of manyglobal businesses. Automation of storage andprocessing of information, poses several challengesto decision makers, such as, minimizing disruptionof activities, ensuring synergy among operationsaround the globe, reducing costs, protecting pro-prietary information, as well as ensuring legalcompliance. Integration is harder in a globallydistributed organization, due to different culturalvalues, disparate information systems, and differ-ences in legal environment. In addition, distributedorganizations engender higher risks of securityvulnerability.

Most organizations operate in a reactive modeand only address security problems as they areuncovered. It is quite evident that security should beintegrated in the business processes during theredesign rather than as a patchwork of controls tofix security problems after incidents. However, it isnot always feasible to incorporate detailed securityanalysis during initial decision-making due to thecomplexity involved. Consequently, security is usedas a high-level metric during BPR and controls aredecided during implementation. In subsequentwork, we intend to show a detailed security analysisof the redesigned process.

6. Conclusions

This case study describes the process of businessprocess reengineering. The study shows how largeglobal corporations with multiple sites can accom-plish reengineering efficiently through a structuredmethodical approach. For successful reengineeringefforts due diligence is necessary to prevent futureproblems. The overall objective of reengineering isto define the business process and select appropriatetools such that the process requirements are satisfiedand cost and productivity goals met. Corporationsroutinely engage in BPR where a large number ofsuch endeavors fail often due to a variety of reasonsincluding lack of due diligence.

The study highlights the reengineering processbased on a repertoire of Six Sigma tools that areused at General Electric. These tools employstatistical analysis to track the quality and perfor-mance of individual components of a process,product or service. The tools described here are

not black boxes that provide a solution but ratherinformation aggregation tools that improve trans-parency and provide decision makers with acomprehensive view of information that they canemploy during the redesign process.

Reengineering of business processes across dis-parate globally distributed subsidiaries is a difficultprocess that if done carefully can pay largedividends or can be catastrophic if done poorly.This case study will provide users with a structuredapproach to reengineering in context of globalacquisitions of large engineering firms. This canprovide valuable insight for organizations that haveembarked on a similar endeavor to make globalacquisitions and integrate them in their businesses.

References

Andrews, D., Stalick, S., 1992. Business reengineering. American

Program 5 (5), 10–19.

Barua, A., Sophie Lee, S., Whinston, A., 1995. The Calculus of

Reengineering. Department of Management Science, Uni-

versity of Texas, Austin.

Baskerville, R., Pries-Heje, J., 1999. Grounded action research: A

method for understanding IT in practice. Accounting,

Management and Information Technologies 9 (1), 1–23.

Baskerville, R.L., Wood-Harper, A.T., 1996. A critical pers-

pective on action research as a method for information

systems research. Journal of Information Technology 11,

235–246.

Baskerville, R.L., Wood-Harper, A.T., 1998. Diversity in

information systems action research methods. European

Journal of Information Systems 7, 90–107.

Beugre, C.D., 1998. Implementing business process reengineer-

ing: The role of organizational justice. The Journal of Applied

Behavioral Science 34 (3), 347–360.

Berio, G., Vernadat, F., 2001. Enterprise modeling with

CIMOSA: Functional and organizational aspects. Production

Planning and Control 12 (2), 128–136.

Brynjolfsson, E., Lorin, H., 1996. Paradox lost? Firm-level

evidence of the returns to information systems spending.

Management Science 42 (4), 541–558.

Caron, J., Jarvenpaa, S., Stoddard, D., 1994. Business reengi-

neering at CIGNA corporation: Experiences and lessons

learned from the first five years. MIS Quarterly 18 (3),

233–250.

Champy, J.A., 1995. Reengineering Management: The Mandate

for New Leadership. Harper-Business, New York.

Corbin, L., 1993. Reengineering: The next management revolu-

tion. Government Executive 25 (9), 26–32.

Crowe, T.J., Fong, P.M., Bauman, T.A., Zayas-Castro, J.L.,

2002. Quantitative risk level estimation of business process

reengineering efforts. Business Process Management Journal

8 (5), 490–511.

Crowston, K., Malone, T., 1988. Information technology and

work organization. In: Helander, M. (Ed.), Handbook

of Human–Computer Interaction. Elsevier, Amsterdam,

pp. 1051–1069.

ARTICLE IN PRESSS. Goel, V. Chen / Int. J. Production Economics 113 (2008) 914–927 927

Davenport, T.H., 1993. Need radical innovation and continuous

improvement? Integrate process reengineering and TQM.

Planning Review 22 (3).

Davenport, T.H., 1994. Managing in the new world of process.

Public Productivity and Management Review 18 (2), 133–147.

Davenport, T.H., Short, J., 1990. The new industrial engineering:

Information technology and business process redesign. Sloan

Management Review, Summer 11 (27).

Davenport, T.H., Stoddard, D.B., 1994. Rengineering: Business

change of mythic proportions? MIS Quarterly 18 (2),

121–127.

De Bruyn, B., Gelders, L., 1997. From TQM to BPR: Two case

studies in personnel administration. International Journal of

Production Economics 50 (2–3), 169–181.

Dixon, J.R., Arnold, P., Heineke, J., Kim, J.S., Mulligan, P.,

1994. Business process reengineering: Improving in new

strategic directions. California Management Review 36 (4),

93–108.

DoD, 2004. Planning for Business Process Reengineering. The

Electronic College of Process Innovation.

DoD, 2006. DoD business process reengineering: Environment

liabilities recognition, valuation, reporting requirements

document.

Evans, K., 1993. Reengineering and cybernetics. American

Programmer 6 (11), 10–16.

Farmer, J.R., 1993. Reengineering the factory. Production and

Inventory Management Journal 34 (1), 38–42.

Fitzgerald, B., Murphy, C., 1996. Business process reengineering:

Putting theory into practice. INFOR 34 (1), 3–13.

GAO, 1997. Business Process Reengineering Assessment Guide

/http://www.gao.gov/special.pubs/bprag/ai10115.pdfS.

GE Wind Website, 2007. /http://www.windengery.orgS.

Giaglis, G.M., Irani, Z., Hlupic, V., 2000. Managing information

and operations. Brunel University.

Goss, T., Pascale, R., Athos, A., 1993. The reinvention roller

coaster: Risking the present for a powerful future. Harvard

Business Review 71 (6), 97–108.

Guimaraes, T., Yoon, Y., Clevenson, A., 1997. Empirically

testing ES success factors in business process reengineering.

International Journal of Production Economics 50 (2–3),

245–259.

Hales, H.L., Savoie, B.J., 1994. Building a foundation for

successful business process reengineering. Industrial Engineer-

ing 26 (9), 17–20.

Hall, G., Rosenthal, J.J., Wade, J.J., 1993. How to make

reengineering really work. Harvard Business Review 71 (6),

119–131.

Hammer, M., 1990. Reengineering work: Don’t auto-

mate, obliterate. Harvard Business Review July–August,

104–112.

Hammer, M., 1996. Beyond reengineering: How the process-

centered organization is changing our work and our lives.

Harper Collins, New York.

Hammer, M., Champy, J., 1993. Reengineering the corporation:

A manifesto for business revolution. HarperCollins Publish-

ers Inc, New York.

Hansen, G.A., 1994. Tools for business-process reengineering.

IEEE Software 11 (5), 131–134.

Harrington, H., 1991. Business Process Improvement. McGraw-

Hill, New York.

Holland, D., Kumar, S., 1995. Getting past the obstacles to

successful reengineering. Business Horizons, 79–85.

Irani, Z., Sharp, J.M., Race, P., 1997. A case experience of new

product introduction within a once traditional subcontract

manufacturing environment. Production and Inventory Man-

agement Journal 38 (2), 47–51.

Jablonski, S., Bussler, C., 1996. Workflow Management: Model-

ing Concepts, Architecture and Implementation. Interna-

tional Thomson Computer Press, London.

Johansson, H., McHugh, P., Pendlebury, J.A., Wheeler, W.,

1993. Business Process Reengineering: Breakpoint Strategies

for Market Dominance. Wiley, West Sussex.

Kettl, D.F., 1993. Toward new governance: Making process a

priority. The LaFollette Policy Report 5 (2), 1–2, 18–19.

Klein, M.M., 1993. IEs fill facilitator role in benchmarking

operations to improve performance. Industrial Engineering 25

(9), 40–43.

Malhotra, Y., 1998. Business process redesign: An overview.

IEEE Engineering Management Review 26 (3).

Manganelli, R.L., Klein, M.M., 1994. The Re-engineering

Handbook: A Step-by-step Guide to Business Transforma-

tion. AMACOM, New York.

Mansar, S.L., Reijers, H.A., 2005. Best practices in business

process redesign: Validation of a redesign framework.

Computers in Industry 56, 457–471.

Mikel, H., Schroeder, R., 2000. Six sigma—The breakthrough

management strategy revolutionizing the world’s top corpora-

tions. Doubleday, New York.

Milgrom, P., Roberts, J., 1988. Communication and inventories

as substitutes in organizing production. Scandanavian Jour-

nal of Economics 90 (3), 275–289.

Miller, B., 1994. Reengineering government. Government Tech-

nology 7 (5), 1, 46–47.

Moe, R.C., 1994. The ‘Reinventing Government’ exercise:

Misinterpreting the problem, misjudging the consequences.

Public Administration Review 54 (2), 111–222.

Murphy, E., 1994. Cultural values, workplace, democracy and

organizational change. In: Coulson-Thomas, C. (Ed.), Busi-

ness Process Reengineering: Myth and Reality. Kogan Page,

London.

Orlikowski, W., Hofman, D., 1996. An improvisational model of

change management: The case of groupware technologies.

Sloan Management Review.

Ovans, A., 1995. Should you take the re-engineering risk?

Datamation 41 (17), 38–42.

Pande, P.S., Neuman, R.P., Cavenaugh, R.R., 2000. The Six

Sigma Way: How GE, Motorola, and Other top Companies

are Honing their Performance. McGraw-Hill, New York.

Seidmann, A., Sundararajan, A., 1997a. The effects of task and

information symmetry on business process redesign. Interna-

tional Journal of Production Economics 50 (2–3), 117–128.

Seidmann, A., Sundararajan, A., 1997b. Competing in informa-

tion intensive services: Analyzing the impact of task

consolidation and employee empowerment. Journal of

Management Information Systems 4 (2), 33–56.

Thong, J.Y.L., Yap, C.S., Seah, K.L., 2000. Business process

reengineering in the public sector: The case of the housing

development board in Singapore. Journal of Management

Information Systems 17 (1), 245–270.

Tomasko, M.R., 1993. Rethinking the Corporation: The

Architecture of Change. AMA, New York.

Venkatraman, N., 1994. IT-enabled business transformation:

From automation to business scope redefinition. Sloan

Management Review 35 (2), 73–87.