Business Process Engineering: Comprehensive BPM Review Essay Analysis
VerifiedAdded on 2023/03/20
|10
|2787
|56
Essay
AI Summary
This essay provides a comprehensive review of business process reengineering (BPR), analyzing articles on process compliance, deviations, and predictive monitoring. The essay examines the importance of temporal workflows, visual monitoring of compliance, and the role of predictive monitoring in BPR. The discussion includes insights from articles by Knuplesch, Reichert, and Kumar; Kumar, Sabbella, and Barton; and Leontjeva, Conforti, Di Francescomarino, Dumas, and Maggi. The review highlights challenges in ensuring process conformance, the use of visual languages for compliance monitoring, and the application of predictive methods for runtime efficiency. Findings cover the complexities of forecasting outcomes, the extraction of characteristics from event logs, and the evolution of predictive monitoring techniques. The essay concludes with a synthesis of the research, emphasizing the importance of compliance monitoring and the potential of predictive approaches in enhancing business process performance.

Running head: BUSINESS PROCESS ENGINEERING
BUSINESS PROCESS ENGINEERING
Name of student
Name of university
Author’s note:
BUSINESS PROCESS ENGINEERING
Name of student
Name of university
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
BUSINESS PROCESS ENGINEERING
Introduction
This essay targets to debate the various articles regarding the various aspects of the
business process reengineering as well as discuss some of sub sections of business process
reengineering along with it. The articles that are being reviewed are the “Visually Monitoring
Multiple Perspectives of Business Process Compliance” by David Knuplesch, Manfred
Reichert, and Akhil Kumar, “Managing Controlled Violation of Temporal Process
Constraints” by Akhil Kumar, Sharat R. Sabbella, and Russell R. Barton and “Complex
Symbolic Sequence Encodings for Predictive Monitoring of Business Processes” by Anna
Leontjeva, Raffaele Conforti, Chiara Di Francescomarino, Marlon Dumas, and Fabrizio
Maria Maggi. These articles majorly discusses the Process Compliance and Deviations in the
business process reengineering. Lastly, this report concludes with the appropriate conclusion
for the report.
Discussion
According to Kumar, Sabbella and Barton (2016), the temporal workflows have been
observed to be growing increasingly crucial in the several real time application. In the
workflows like this, the activity times and the durations are mentioned specifically and it has
been considered to be crucial for ensuring that both the design time as well as the execution
time that acts as the temporal constraints have not been violated. Moreover, in the workflows
that are working in the real time, like in the medical procedure or the emergency
circumstances, some of the defilements are significantly inevitable. Therefore, the increased
nuanced opinion of the defilements must be taken. According to Knuplesch, Reichert and
Kumar (2016), the major challenge for the enterprises is the ensuring the proper conformance
of the business processes of the business with the imposed rules of the compliance.
Commonly the latter might constrain the several perspectives of any business process that
BUSINESS PROCESS ENGINEERING
Introduction
This essay targets to debate the various articles regarding the various aspects of the
business process reengineering as well as discuss some of sub sections of business process
reengineering along with it. The articles that are being reviewed are the “Visually Monitoring
Multiple Perspectives of Business Process Compliance” by David Knuplesch, Manfred
Reichert, and Akhil Kumar, “Managing Controlled Violation of Temporal Process
Constraints” by Akhil Kumar, Sharat R. Sabbella, and Russell R. Barton and “Complex
Symbolic Sequence Encodings for Predictive Monitoring of Business Processes” by Anna
Leontjeva, Raffaele Conforti, Chiara Di Francescomarino, Marlon Dumas, and Fabrizio
Maria Maggi. These articles majorly discusses the Process Compliance and Deviations in the
business process reengineering. Lastly, this report concludes with the appropriate conclusion
for the report.
Discussion
According to Kumar, Sabbella and Barton (2016), the temporal workflows have been
observed to be growing increasingly crucial in the several real time application. In the
workflows like this, the activity times and the durations are mentioned specifically and it has
been considered to be crucial for ensuring that both the design time as well as the execution
time that acts as the temporal constraints have not been violated. Moreover, in the workflows
that are working in the real time, like in the medical procedure or the emergency
circumstances, some of the defilements are significantly inevitable. Therefore, the increased
nuanced opinion of the defilements must be taken. According to Knuplesch, Reichert and
Kumar (2016), the major challenge for the enterprises is the ensuring the proper conformance
of the business processes of the business with the imposed rules of the compliance.
Commonly the latter might constrain the several perspectives of any business process that

2
BUSINESS PROCESS ENGINEERING
includes the control flow, time, data, capitals and the connections with the associates of the
business. Alike in the process modelling, the visual languages for specification of the
compliance guidelines are proposed for the monitoring of the compliance. Moreover, the
business process compliance could not be completely definite at the period of the designing
nonetheless it requests to be effectively observed while the run time is being done. In
Knuplesch, Reichert and Kumar (2016), the approach has been introduced for the visual
monitoring of the compliance of the business process. As it has been opposed to the
prevailing ones, the approach provided in this paper comprises of all the connected
perspectives of the process. Moreover, the detection of the violations of the compliance could
not be done easily.
Research
The correctness of the business process is intensively calculated for over than a
decade. Even though the initial work was focussed on the syntactical accurateness and the
reliability, compliance of the business procedures with the semantic restraints is extensively
measured for the past few years. Commonly the rule of the compliance stems from the
requirements that are domain specific that are the legal regulations and the standards of the
corporate and it is required to be guaranteed within all the stages of complete life cycle of the
process. For this particular context, the approaches that are dealing with compliance of the
executing instances of the business processes have been covered by extensive idea of the
monitoring the compliance. Commonly, the events of the executing processes required to be
extensively considered for the detection and then reporting the violations of the run time of
the rules of the compliance. Therefore, the proactive and the reactive monitoring required to
be significantly distinguished. With the regards with former issue, the violations of the
compliance have been only reported as soon as these have occurred. In the turn, the proactive
monitoring intends to pre-emptively prevent any violations like the suggesting any suitable
BUSINESS PROCESS ENGINEERING
includes the control flow, time, data, capitals and the connections with the associates of the
business. Alike in the process modelling, the visual languages for specification of the
compliance guidelines are proposed for the monitoring of the compliance. Moreover, the
business process compliance could not be completely definite at the period of the designing
nonetheless it requests to be effectively observed while the run time is being done. In
Knuplesch, Reichert and Kumar (2016), the approach has been introduced for the visual
monitoring of the compliance of the business process. As it has been opposed to the
prevailing ones, the approach provided in this paper comprises of all the connected
perspectives of the process. Moreover, the detection of the violations of the compliance could
not be done easily.
Research
The correctness of the business process is intensively calculated for over than a
decade. Even though the initial work was focussed on the syntactical accurateness and the
reliability, compliance of the business procedures with the semantic restraints is extensively
measured for the past few years. Commonly the rule of the compliance stems from the
requirements that are domain specific that are the legal regulations and the standards of the
corporate and it is required to be guaranteed within all the stages of complete life cycle of the
process. For this particular context, the approaches that are dealing with compliance of the
executing instances of the business processes have been covered by extensive idea of the
monitoring the compliance. Commonly, the events of the executing processes required to be
extensively considered for the detection and then reporting the violations of the run time of
the rules of the compliance. Therefore, the proactive and the reactive monitoring required to
be significantly distinguished. With the regards with former issue, the violations of the
compliance have been only reported as soon as these have occurred. In the turn, the proactive
monitoring intends to pre-emptively prevent any violations like the suggesting any suitable

3
BUSINESS PROCESS ENGINEERING
tasks that are required to be effected for meeting the instruction of the compliance. While the
initial methods for the observing compliance is solely focussed on the viewpoint of the
control flow, the perspectives of the step-by-step extra process are supported. Specifically,
the perspective of the time, resource and the data and the interactions with the business
partners have been extensively considered. In the turn, the other advanced work significantly
discusses major traceability of the violations of the compliance. Moreover, the prevailing
approaches does not offer the acceptable solution that could help in the effective mixture of
the animated language with the complete traceability. In the paper of Knuplesch, Reichert
and Kumar (2016), the authors utilise the language of the extended Compliance Rule Graph
in order to observe the compliance. eCRG language has been considered as the language that
is visual in approach for the rules of the modelling compliance that is grounded on CRG or
the Compliance Rule Graph. Equally it has been opposed to latter, the eCRG language has
been discovered to be not extensively focussed on perspective of the control flow but it also
offers the combined support for resource, time and the data perspectives and for
communications with the business associates. The section of the eCRG provides the required
introduction to the approach that has been provided by the authors for the visually monitoring
several perspectives of the compliance of business process at runtime. These authors claim
that the monitoring of the compliance is majorly grounded on the streams of the proceedings
that occurs during the execution of the business procedures and it majorly intends to regulate
or even avert the defilements of the compliance.
Findings
In the article of Leontjeva et al. (2016), the unruly of the forecasting all the
consequence of the any continuing case of any business process on the basis of the event logs
is done and the critical evaluation has been provided. While executing this specific setting, all
the consequence of any circumstance might denote for the example for achieving the
BUSINESS PROCESS ENGINEERING
tasks that are required to be effected for meeting the instruction of the compliance. While the
initial methods for the observing compliance is solely focussed on the viewpoint of the
control flow, the perspectives of the step-by-step extra process are supported. Specifically,
the perspective of the time, resource and the data and the interactions with the business
partners have been extensively considered. In the turn, the other advanced work significantly
discusses major traceability of the violations of the compliance. Moreover, the prevailing
approaches does not offer the acceptable solution that could help in the effective mixture of
the animated language with the complete traceability. In the paper of Knuplesch, Reichert
and Kumar (2016), the authors utilise the language of the extended Compliance Rule Graph
in order to observe the compliance. eCRG language has been considered as the language that
is visual in approach for the rules of the modelling compliance that is grounded on CRG or
the Compliance Rule Graph. Equally it has been opposed to latter, the eCRG language has
been discovered to be not extensively focussed on perspective of the control flow but it also
offers the combined support for resource, time and the data perspectives and for
communications with the business associates. The section of the eCRG provides the required
introduction to the approach that has been provided by the authors for the visually monitoring
several perspectives of the compliance of business process at runtime. These authors claim
that the monitoring of the compliance is majorly grounded on the streams of the proceedings
that occurs during the execution of the business procedures and it majorly intends to regulate
or even avert the defilements of the compliance.
Findings
In the article of Leontjeva et al. (2016), the unruly of the forecasting all the
consequence of the any continuing case of any business process on the basis of the event logs
is done and the critical evaluation has been provided. While executing this specific setting, all
the consequence of any circumstance might denote for the example for achieving the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
BUSINESS PROCESS ENGINEERING
performance objective or fulfilment of the compliance rule once the case has been completed.
Provided with the log that consists of the traces of the complete cases, provided with the trace
of any prevailing case and provided with two or more than two probable outcomes (Rinaldi,
Montanari and Bottani 2015). The paper mainly discourses the only tricky of defining
greatest probable consequence for any circumstance in the query. The preceding methods that
have been applied for this approach are majorly dependent on the simple classification in the
symbolic sequence that means that the features are extracted from the traces and these traces
are viewed as the sequences of the event labels and then utilise these specific for the
construction of the classifier for the prediction of the execution time. For the effective
execution of these approaches, data payload that are connected with each of the event has
been ignored by the approach. The process mining could be referred as the family of the
techniques that could be utilised for the effective analysis of the business processes on the
basis of the event logs that consists of the traces and each of them representing the one
execution of each of the process. Any trace comprises of the sequence of the events and each
of them referring to the execution of any activity. The events in any trace might comprise of
the huge payload that consists of the attributes like the resources that are included in the
execution of activity or the other data that is recoding is used for the event monitoring. The
events in any trace might include the payload or the other data that is recorded with client.
The business process reengineering on the basis of the predictive methodology could be
categorised as the process of mining methods of the process that intends to predict the
runtime efficiently and the with the increased efficiency, the outcome of any provided case in
the present incomplete trace (Hammer 2015). While discussing this particular context, any
outcome might be fulfilment of the constraint on the life cycle of circumstance, validity of the
chronological logic limitations or any forecasting over the complete case. The prevailing
approaches for the predictive monitoring performs the essential task of mapping the problem
BUSINESS PROCESS ENGINEERING
performance objective or fulfilment of the compliance rule once the case has been completed.
Provided with the log that consists of the traces of the complete cases, provided with the trace
of any prevailing case and provided with two or more than two probable outcomes (Rinaldi,
Montanari and Bottani 2015). The paper mainly discourses the only tricky of defining
greatest probable consequence for any circumstance in the query. The preceding methods that
have been applied for this approach are majorly dependent on the simple classification in the
symbolic sequence that means that the features are extracted from the traces and these traces
are viewed as the sequences of the event labels and then utilise these specific for the
construction of the classifier for the prediction of the execution time. For the effective
execution of these approaches, data payload that are connected with each of the event has
been ignored by the approach. The process mining could be referred as the family of the
techniques that could be utilised for the effective analysis of the business processes on the
basis of the event logs that consists of the traces and each of them representing the one
execution of each of the process. Any trace comprises of the sequence of the events and each
of them referring to the execution of any activity. The events in any trace might comprise of
the huge payload that consists of the attributes like the resources that are included in the
execution of activity or the other data that is recoding is used for the event monitoring. The
events in any trace might include the payload or the other data that is recorded with client.
The business process reengineering on the basis of the predictive methodology could be
categorised as the process of mining methods of the process that intends to predict the
runtime efficiently and the with the increased efficiency, the outcome of any provided case in
the present incomplete trace (Hammer 2015). While discussing this particular context, any
outcome might be fulfilment of the constraint on the life cycle of circumstance, validity of the
chronological logic limitations or any forecasting over the complete case. The prevailing
approaches for the predictive monitoring performs the essential task of mapping the problem

5
BUSINESS PROCESS ENGINEERING
to the classification that has been done in the early stages. The main idea is to provide the
require training to the classifier over sets of the prefixes of any historical hints. This specific
classifier has been utilised at the execution time for the effective forecast of outcome of any
continuing case on the basis of the present trace (Jeston 2014). The crucial step is the
extraction of the characteristics from the prefixes of the historical traces. In the earlier work
that has been done on the predictive monitoring, the prevailing techniques that were
extensively utilised for the business process monitoring that is based on the predictive
approach could be vastly classified on the basis of the kind of the predicted outcome (Vom
Brocke et al. 2014). The set of approaches have been presented by the authors of the previous
researches where the annotated transition systems, that contains the time information that has
been mined from the event records that are used for the checking of the time conformance
although the cases are executed, make the effective prediction of the residual time for
processing of the incomplete cases as well as then provide the required recommendation
regarding the suitable actions to the end users who are employed on the circumstances. The
ad-hoc predictive clustering method has been presented where the execution scenarios that
are related to the context have been discovered and then these are modelled using the
predictors that are state aware performance. The authors also used the stochastic Petri webs
for the effective prediction of the residual execution time of any process. The approach for
predicting the anomalous termination of business processes are presented by the previous
authors who executed the working effectively.
The algorithm for the fault detection has been utilised for the estimation of the
probability of any fault that might occur. The alarms have been delivered for the initial
notification of the possible irregular termination (Christin Jurisch et al. 2014). Several authors
presented the platform for the business operation management that is prepared with the time
sequences predicting the functionalities (Pattanayak and Roy 2015). The platform permits the
BUSINESS PROCESS ENGINEERING
to the classification that has been done in the early stages. The main idea is to provide the
require training to the classifier over sets of the prefixes of any historical hints. This specific
classifier has been utilised at the execution time for the effective forecast of outcome of any
continuing case on the basis of the present trace (Jeston 2014). The crucial step is the
extraction of the characteristics from the prefixes of the historical traces. In the earlier work
that has been done on the predictive monitoring, the prevailing techniques that were
extensively utilised for the business process monitoring that is based on the predictive
approach could be vastly classified on the basis of the kind of the predicted outcome (Vom
Brocke et al. 2014). The set of approaches have been presented by the authors of the previous
researches where the annotated transition systems, that contains the time information that has
been mined from the event records that are used for the checking of the time conformance
although the cases are executed, make the effective prediction of the residual time for
processing of the incomplete cases as well as then provide the required recommendation
regarding the suitable actions to the end users who are employed on the circumstances. The
ad-hoc predictive clustering method has been presented where the execution scenarios that
are related to the context have been discovered and then these are modelled using the
predictors that are state aware performance. The authors also used the stochastic Petri webs
for the effective prediction of the residual execution time of any process. The approach for
predicting the anomalous termination of business processes are presented by the previous
authors who executed the working effectively.
The algorithm for the fault detection has been utilised for the estimation of the
probability of any fault that might occur. The alarms have been delivered for the initial
notification of the possible irregular termination (Christin Jurisch et al. 2014). Several authors
presented the platform for the business operation management that is prepared with the time
sequences predicting the functionalities (Pattanayak and Roy 2015). The platform permits the

6
BUSINESS PROCESS ENGINEERING
forecasts of the metric values on the executing requests of the process and for the prediction
of the integrated metric standards of any forthcoming instances. The predictive monitoring
majorly focussed on the particular kinds of the failures are also applied to the real case
studies (Nohria 2017). The crucial difference among the approaches and the technique that
has been provided by the earlier researchers is that the dependence on control flow or on
perspective of the data for the execution of the predictions at the runtime, where both of them
takes the perspective into the consideration (Laguna and Marklund 2018). These two
perceptions have been combined considered solely where the structure for predictive
monitoring of the limitation fulfilment and the violation are proposed (Huang et al. 2015).
Recommendation
The business process compliance is discovered to be increasingly gained the interest
for various years (Chang 2016). While this context has been considered, the various
approaches focusses on the monitoring of the compliance at the execution time. Moreover,
the prevailing approaches have been discovered to be not providing the adequate solution that
could perform the effective combination of the expressive language with the complete
traceability.
Conclusion
Therefore, it can be concluded that the researchers provided the new approach for
monitoring business process compliance with business process reengineering. These
approaches are significantly useful when there is the issue of not meeting the requirements of
the business process reengineering. Alike in the process modelling, the visual languages for
the specification of the compliance rules are proposed for the monitoring of the compliance.
Moreover, the business process compliance could not be completely definite at the period of
the designing nonetheless it requests to be effectively observed while the run time is being
BUSINESS PROCESS ENGINEERING
forecasts of the metric values on the executing requests of the process and for the prediction
of the integrated metric standards of any forthcoming instances. The predictive monitoring
majorly focussed on the particular kinds of the failures are also applied to the real case
studies (Nohria 2017). The crucial difference among the approaches and the technique that
has been provided by the earlier researchers is that the dependence on control flow or on
perspective of the data for the execution of the predictions at the runtime, where both of them
takes the perspective into the consideration (Laguna and Marklund 2018). These two
perceptions have been combined considered solely where the structure for predictive
monitoring of the limitation fulfilment and the violation are proposed (Huang et al. 2015).
Recommendation
The business process compliance is discovered to be increasingly gained the interest
for various years (Chang 2016). While this context has been considered, the various
approaches focusses on the monitoring of the compliance at the execution time. Moreover,
the prevailing approaches have been discovered to be not providing the adequate solution that
could perform the effective combination of the expressive language with the complete
traceability.
Conclusion
Therefore, it can be concluded that the researchers provided the new approach for
monitoring business process compliance with business process reengineering. These
approaches are significantly useful when there is the issue of not meeting the requirements of
the business process reengineering. Alike in the process modelling, the visual languages for
the specification of the compliance rules are proposed for the monitoring of the compliance.
Moreover, the business process compliance could not be completely definite at the period of
the designing nonetheless it requests to be effectively observed while the run time is being
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
BUSINESS PROCESS ENGINEERING
done. In Knuplesch, Reichert and Kumar (2016), the approach has been introduced for the
visual monitoring of the compliance of the business process. The correctness of the business
process is intensively calculated for over than a decade. Even though the initial work was
focussed on the syntactical accurateness and the reliability, compliance of the business
procedures with the semantic restraints is extensively measured for the past few years.
Commonly the rule of the compliance stems from the requirements that are domain specific
that are the legal regulations and the standards of the corporate and it is required to be
ensured within all the phases of complete life cycle of the process. . eCRG language has been
considered as the language that is visual in approach for the rules of the modelling
compliance that is grounded on CRG or the Compliance Rule Graph.
BUSINESS PROCESS ENGINEERING
done. In Knuplesch, Reichert and Kumar (2016), the approach has been introduced for the
visual monitoring of the compliance of the business process. The correctness of the business
process is intensively calculated for over than a decade. Even though the initial work was
focussed on the syntactical accurateness and the reliability, compliance of the business
procedures with the semantic restraints is extensively measured for the past few years.
Commonly the rule of the compliance stems from the requirements that are domain specific
that are the legal regulations and the standards of the corporate and it is required to be
ensured within all the phases of complete life cycle of the process. . eCRG language has been
considered as the language that is visual in approach for the rules of the modelling
compliance that is grounded on CRG or the Compliance Rule Graph.

8
BUSINESS PROCESS ENGINEERING
Bibliography
Chang, J.F., 2016. Business process management systems: strategy and implementation.
Auerbach Publications.
Christin Jurisch, M., Palka, W., Wolf, P. and Krcmar, H., 2014. Which capabilities matter for
successful business process change?. Business process management journal, 20(1), pp.47-67.
Hammer, M., 2015. What is business process management?. In Handbook on business
process management 1 (pp. 3-16). Springer, Berlin, Heidelberg.
Huang, S.Y., Lee, C.H., Chiu, A.A. and Yen, D.C., 2015. How business process
reengineering affects information technology investment and employee performance under
different performance measurement. Information Systems Frontiers, 17(5), pp.1133-1144.
Jeston, J., 2014. Business process management. Routledge.
Knuplesch, D., Reichert, M. and Kumar, A., 2016, September. Visually monitoring multiple
perspectives of business process compliance. In International Conference on Business
Process Management (pp. 263-279). Springer, Cham.
Kumar, A., Sabbella, S.R. and Barton, R.R., 2016, September. Managing controlled violation
of temporal process constraints. In International Conference On Business Process
Management (pp. 280-296). Springer, Cham.
Laguna, M. and Marklund, J., 2018. Business process modeling, simulation and design.
Chapman and Hall/CRC.
Leontjeva, A., Conforti, R., Di Francescomarino, C., Dumas, M. and Maggi, F.M., 2016,
September. Complex symbolic sequence encodings for predictive monitoring of business
BUSINESS PROCESS ENGINEERING
Bibliography
Chang, J.F., 2016. Business process management systems: strategy and implementation.
Auerbach Publications.
Christin Jurisch, M., Palka, W., Wolf, P. and Krcmar, H., 2014. Which capabilities matter for
successful business process change?. Business process management journal, 20(1), pp.47-67.
Hammer, M., 2015. What is business process management?. In Handbook on business
process management 1 (pp. 3-16). Springer, Berlin, Heidelberg.
Huang, S.Y., Lee, C.H., Chiu, A.A. and Yen, D.C., 2015. How business process
reengineering affects information technology investment and employee performance under
different performance measurement. Information Systems Frontiers, 17(5), pp.1133-1144.
Jeston, J., 2014. Business process management. Routledge.
Knuplesch, D., Reichert, M. and Kumar, A., 2016, September. Visually monitoring multiple
perspectives of business process compliance. In International Conference on Business
Process Management (pp. 263-279). Springer, Cham.
Kumar, A., Sabbella, S.R. and Barton, R.R., 2016, September. Managing controlled violation
of temporal process constraints. In International Conference On Business Process
Management (pp. 280-296). Springer, Cham.
Laguna, M. and Marklund, J., 2018. Business process modeling, simulation and design.
Chapman and Hall/CRC.
Leontjeva, A., Conforti, R., Di Francescomarino, C., Dumas, M. and Maggi, F.M., 2016,
September. Complex symbolic sequence encodings for predictive monitoring of business

9
BUSINESS PROCESS ENGINEERING
processes. In International Conference on Business Process Management (pp. 297-313).
Springer, Cham.
Nohria, N., 2017. Fast forward: The best ideas on managing business change. Business
Review, 9, p.10.
Pattanayak, S. and Roy, S., 2015. Synergizing business process reengineering with enterprise
resource planning system in capital goods industry. Procedia-Social and Behavioral
Sciences, 189, pp.471-487.
Rinaldi, M., Montanari, R. and Bottani, E., 2015. Improving the efficiency of public
administrations through business process reengineering and simulation: A case
study. Business Process Management Journal, 21(2), pp.419-462.
Vom Brocke, J., Schmiedel, T., Recker, J., Trkman, P., Mertens, W. and Viaene, S., 2014.
Ten principles of good business process management. Business process management
journal, 20(4), pp.530-548.
BUSINESS PROCESS ENGINEERING
processes. In International Conference on Business Process Management (pp. 297-313).
Springer, Cham.
Nohria, N., 2017. Fast forward: The best ideas on managing business change. Business
Review, 9, p.10.
Pattanayak, S. and Roy, S., 2015. Synergizing business process reengineering with enterprise
resource planning system in capital goods industry. Procedia-Social and Behavioral
Sciences, 189, pp.471-487.
Rinaldi, M., Montanari, R. and Bottani, E., 2015. Improving the efficiency of public
administrations through business process reengineering and simulation: A case
study. Business Process Management Journal, 21(2), pp.419-462.
Vom Brocke, J., Schmiedel, T., Recker, J., Trkman, P., Mertens, W. and Viaene, S., 2014.
Ten principles of good business process management. Business process management
journal, 20(4), pp.530-548.
1 out of 10

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.