SlideShare a Scribd company logo
Mr. Traitet Thepbandansuk                     Student ID: 20043132                                Module: RPP



                         Assessment 1 - Critical review of aresearch article

         Identification and assessment of risks associatedwith ERP post-implementation in China

                                     By Traitet Thepbandansuk, ID: 20043132




    Introduction

    In the article titled “Identification and assessment of risks associated with ERP post-implementation in
    China,” which appeared in the 2009 Journal of Enterprise Information Management (JEIM),Volume 22,
    Issue 5, was written by Guo Chao Peng and Miguel Baptista Nunes. The purpose of this article was to
    identify, assess and explore potential risks associated with ERP post-implementation. The authors had
    carried out their empirical research using a quantitative approach. They adopted a deductive research
    design based on a cross-sectional questionnaire survey for 118 large companies to examine risks of
    ERP post-implementation. However, some limitations should be considered. This critical review,including
    the critique of theresearch,is divided into four sections; Research question, Research literature,
    Research methods, tools and techniques, and Research process and outcome.


    Research Question

    The purpose of this research is clearly stated, and narrowly focused.It is to identify, access and explore
    potential risks that Chinese companies may encounter when using, maintaining and enhancing their
    enterprise resource planning (ERP) systems in the post-implementation phase. Although there are no
    research questions in this article,the authors wereable to show the understandable picture of the whole
    content of the study in their purposeof research. Both the primary and secondary research aims are
    defined.The primary aim is mentioned similarly to its purpose in the abstract. The secondary aimisto
    explore the impacts, probability, and frequency of occurrence of identified ERP risk events, as well as to
    investigate the correlations between those risks. The researchers supposed that their findings would
    benefit people whose work is related to ERP systems for strategic planning and decision-making.

    Furthermore, the authors claim that their research was distinctive from prior studies. The wider fields of
    interestin ERP systems had been mainly focused on ERP implementation and project management
    aspects (e.g. Oliver et al. 2005; Ehie and Madsen 2005; Yusuf et al. 2004), and those aboutERP risks
    had been addressed in ERP business issues and aspectse.g. Kleim and Ludin (2000, p3).In contrast,
    the research topic of ERP post-implementation was extremely limited. Therefore, they specifically
    concentrated on risks in ERP post-implementation to fulfil this research gap.However, most recently,
    there have been more researchers who have become interested in this area, such as ERP post-
    implementation performance in the Chinese manufacturing Industry(Yan et al. 2010).




Course: Enterprise Systems ProfessionalsPage 1 of 5                              Assessment 1 – Critical Review
Mr. Traitet Thepbandansuk                     Student ID: 20043132                                  Module: RPP



    Research Literature

    The abstract is concise and clear with the primary conclusion. The literature review presented in this
    paper provides a synthesis of previous research,which leads to the performance of study. The authors
    could extract important information from various sources by using the funnel approach. This approach
    helped researchers conduct the literature review into more specific issues that, ultimately lead to the
    direction proposed for the research program (Toncich 1999). For this reason, the authors could retrieve
    valuable literature related to their particulartopic in order to identify, access and explore risks in the
    critical analysis and survey processes.

    In addition, there are more up-to-datearticles providingboth similar and different aspects. For example,
    both the authors and Yan et al. (2010) indicate similarly that ERP vendors and software are not crucial
    risks in the ERP post-implementation stage. In contrast, the authors mention that the most significant
    factor is containing inaccurate inventory records, whereas Yan et al. (2010) claims that support by top
    management is the most important factor. Furthermore, Sobyanina and Ilona (2011) also differently
    indicate that losing IT experts and ERP know-how is the potential risk in ERP post-implementation.
    However, some different findings may be discovered by because of conducting surveyswith different
    sample groups, such as regions and industrial sectors.

    Although some research indicates the level of risks different from this article, the 40 ERP exploitation
    risks identified in this article are quite useful for both people whose workis related to ERP systems and
    researchers studying in evaluation of risks in ERP post-implementation. ERP Risks can help ERP
    stakeholders to reduce costs, obtain full benefits, and prevent potential problems (Grabski 2001).
    Moreover, this article is cited by other researchers to extend the research area. For example,
    Salmeron(2011) brought some risks identified in this article to forecast risk impact on ERP maintenance
    by using his own model.

    Even though this research wasn’t explicitly extended into new areas of risks associated with ERP post-
    implementation, after the researchers successfully assessed ERP risks, they additionally studied to find
    relationships between those ERP risks. As a result, the outcomes not only had the ERP risks assessed,
    but also had the potential relationships, which were able to extend the research context. Ultimately, the
    authors could summarise that the impact of risks plays a fundamental role in the failure of ERP due to
    the potential casual effects between risks.

    Finally, the article is filled with a sufficient number of citations from other sources. The 57 references in
    this research are quite acceptable, and related to the area of research. Both in-text citations and the
    reference list are correct. The references are suitably used to support ideas, arguments, techniques and
    theories in the paper. This information ensures that readers can easily retrieve relevant reference
    articles at a later time.




Course: Enterprise Systems ProfessionalsPage 2 of 5                                Assessment 1 – Critical Review
Mr. Traitet Thepbandansuk                     Student ID: 20043132                                 Module: RPP



    Research Methods, Tools and Techniques

    The methodologies employed in this research are a deductive approach and quantitative study using a
    cross-sectional questionnaire survey. Thissurvey enables data to be gathered at a single point in time,
    and be used to determine the relationship between two factors (University of Texas no date).In this
    article, two different questionnaires for managers and ICT experts were used to collect data of ERP risks
    in terms of business aspects and technical issues, both at the same time.

    Almost all research methods, tools and techniquesare suitable and clearly explained. For example, the
    authors used business analysis techniques, namely PEST (Political, Economic, Social, and
    Technological analysis)and SWOT(Strengths, Weaknesses, Opportunities and Threats), to narrow the
    scope of study in an effective way. As a result, all of state-owned enterprise (SOE) companies in
    Guangdong province in electronics and telecommunications manufacturing sectors were selected
    totalling 118 firms. With regard to PEST analysis, SOE companies were selected because it had played
    an essential role in development of China’s national economy, and Guangdon was selected because this
    region had achieved high levels of ICT. However, the authors didn’t clearly explain how the business
    sectors were selected for SWOT analysis.

    Although the authors didn’t mention what types of sampling method were used, the selected sample
    groups were clearly identified. It seems that they chose a probability sampling method with cluster
    sampling groups (SOE companies in electronics and telecommunication manufacturing sectors in
    Guangdong province)for a large number of companies in China (301,887 companies in 2006). Even
    though surveying only some cluster groupscannot reflect the population diversity, this method can
    reduce thecost,increase thenumber of samples, and be carried out in multiple stages (Slack 2012;
    Ahmed 2009; Albatineh 2011).

    Furthermore, after the survey achieved the response rate of 36.5 per cent, the authors assessed the
    potential risks by using a risk assessment tool, namely risk metrics, from three aspects; probability,
    impact and frequency. Risk metrics is aneffective tool to find out the level of risks (Iomosaic 2009).
    However, Anthony (2008) argues that using this toolis likely to be harmful in risk management decision
    making,for example, when frequencies and impacts are positively or negatively correlated, respectively.

    In summary, although the questionnaire response rate was acceptable, and almost all research methods,
    tools and techniques were effectively used, there are problems that the authorsshould be made aware of.
    Firstly, selecting inadequate number of sample groupsmay insufficiently reflect the diversity of population.
    Secondly, determining and interpreting the level of risksmay be incorrect in some cases. Finally, it is
    difficult for non-technical readers to understand how to calculate risk scores. Therefore, further research
    should consider a suitable number of cluster sampling groups, find a better way to assess risks, and
    show additional examples of calculating risks.




Course: Enterprise Systems ProfessionalsPage 3 of 5                               Assessment 1 – Critical Review
Mr. Traitet Thepbandansuk                     Student ID: 20043132                                Module: RPP



    Research Process and Outcome

    The overall outcomeis directly related to researchers’ findings from thestudy.The purpose of research
    and all of the aims were achieved with sufficient processes and evidence. For example, the scores of
    each risk affecting ERP post-implementation were accessed and identified from the surveyand statistical
    calculation, the top ten identified ERP riskswere explored from the critical literature review process, and
    the correlations between the identified ERP risks were investigated by statistical techniques. However,
    the research is focused on a very specific set of Chinese companies. Therefore, further research may
    apply their identified ERP risks to other types of companies, business sectors or regions.

    It is clear that this research is helpful for researchers and other people whose work is related to ERP
    systems. However, the researchers must be concerned about some ethical issues, especially involving
    risk assessments and conducting surveys. They must be impartial, and should cross referencedwith
    related research because otherwise the results may be harmful to businesses. For example, if
    someimportant eventsare identified as being low or non-risks, business stakeholders may be
    insufficiently concerned about preventing them. In addition, questionnaires must have an opening
    statement informing the participant of the purpose of the research (Heriot-Watt University no
    date).Finally, this research helps me to understanda lot more about research processes, methods,
    techniques and structure in order to provide me with more ideas for my future assignments and
    dissertation.


    Conclusion

    The overall research is quite good. The purpose of this research is clearly stated and narrowly focused.
    The authors could systematically extract important information from the literature review process,and
    use it to fulfill a research gap. Furthermore, this research is quite new and useful for both researchers
    and people whose work is related to ERP systems. However, some research findings are different from
    other more up-to-date articles, such as risk ranking.The methodologies employed are a deductive
    approach and quantitative study using a questionnaire survey. Although almost all research methods,
    tools and techniques were suitable and clearly explained, the authors should consider about population
    diversity more, because their research was focused on very specific sample groups. In addition, the
    overall outcome was directly related to their findings from the study, and the purpose of the research
    was achieved with sufficient processes and evidence. Finally, the ethics used in this research were very
    important. The researchers must be concerned about ethical issues, especially when doing risk
    assessment and using questionnaires.




Course: Enterprise Systems ProfessionalsPage 4 of 5                              Assessment 1 – Critical Review
Mr. Traitet Thepbandansuk                          Student ID: 20043132                                      Module: RPP



REFERENCES

1.   AHMED, Saifuddin (2009). Methods in Sample Surveys: Cluster Sampling. [online]. Last accessed 3 March 2012 at:
     http://ocw.jhsph.edu/courses/statmethodsforsamplesurveys/PDFs/Lecture5.pdf.
2.   ALBATINEH, Ahmed N. (2011). MSC: A method for finding the number of clusters. [online]. Journal of
     Classification.28(2), 184-209. Article from Academia last accessed 6 March 2012 at:
     http://fiu.academia.edu/httpssphfiueduepidemiologyfacultyalbatinehhtml/Papers/787737/MCS_A_Method_for_Findin
     g_the_Number_of_Clusters.
3.   ANTHONY, Louis (2008). What’s wrong with risk matrices? [online]. Risk Analysis, 28 (2), 497-512.Article from Evira
     last accessed 7 March 2012 at:
     http://www.evira.fi/attachments/english/research_on_animal_diseases_and_food/risk_assessment/riskmatrices.pdf.
4.   EHIE, Ike C. and MADSEN, Mogens (2005). Identifying critical issues in enterprise resource planning (ERP)
     implementation. [online]. Computers in industry, 56 (6), 545–557. Article from Zwep last accessed 4 March 2012 at:
     http://zwep.net/articles/Identifying%20critical%20issues%20in%20enterprise%20resource.pdf.
5.   GRABSKI, Severin V. (2001). Risks and Controls in the Implementation of ERP Systems. [online]. The International
     Journal of Digital Accounting Research, 1(1), 47-68. Article from University of Huelva last accessed 6 March 2012 at:
     http://www.uhu.es/ijdar/10.4192/1577-8517-v1_3.pdf.
6.   HERIOT-WATT UNIVERSITY (no date). Research ethical guidelines: Ethical principles for research involving human
     participants. [online]. Last accessed 7 March 2012 at: http://www.macs.hw.ac.uk/~pjbk/cs4/fullEthicsApproval.html.
7.   IOMOSAIC (2009). Design an effective Risk Matrix. [online]. Last accessed 4 March 2012 at:
     http://www.iomosiac.com/docs/whitepapers/risk-ranking.pdf.
8.   KLEIM, Ralph L. and LUDIN, Irwin S. (2000). Reducing Project Risks.Aldersot, Gower Publishing.
9.   OLIVER, Dave, WHYMARK, Greg and ROMM, Celia (2005). Researching ERP adoption: An internet-based
     grounded theory approach. Online information review, 29 (6), 586-603. Article from Emerald Group Publishing last
     accessed 7 March 2012 at: http://www.emeraldinsight.com/journals.htm?articleid=1529865&show=pdf.
10. PENG, Guo Chao and NUNES, Miguel Baptista (2009). Identification and assessment of risks associated with ERP
     post-implementation in China. [online]. Journal of Enterprise Information Management, 22(5), 587-614. Article from
     Emerald Group Publishing last accessed 7 March 2012 at:
     http://www.emeraldinsight.com/journals.htm?articleid=1817313&show=pdf.
11. SALMERON, Jose L. and CRISTINA, Lopez (2011). Forecasting Risk Impact on ERP Maintenance with Augmented
     Fuzzy Cognitive Maps. [online]. IEEE Transactions on Software Engineering. Article from IEEE Xplore last accessed
     6 March 2012 at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5680917.
12. SLACK, Frances (2012). Sampling for research: Two main types of sampling. Held on 24 February 2012. Room 527
     Peak LT, Owen building, Sheffield Hallam University.
13. SOBYANINA, Elena and MOCKUTE, Ilona (2011). ERP post-implementation risk assessment. [online]. Last
     accessed 4 March 2012 at: http://mdh.diva-portal.org/smash/record.jsf?pid=diva2:433002.
14. TONCICH, Dario J (1999). Key factors in postgraduate research: The literature review. [online]. Australia,
     Chrystobel Engineering. Book from Doctortee last accessed 3 March 2012 at:
     http://www.doctortee.net/files/keyfactors00pw.pdf.
15. UNIVERSITY OF TEXAS (no date). Survey Methods:Types of Surveys. [online]. Last accessed 4 March 2012 at:
     http://www.gslis.utexas.edu/~palmquis/courses/survey.html.
16. YUSUF, Yahaya (2004). Enterprise information systems project implementation: A case study of ERP in Rolls-
     Royce. International journal of production economics, 87 (3), 251-266.
17. ZHU, Yan, et al. (2010). What leads to post-implementation success of ERP? An empirical study of the Chinese
     retail industry. [online].International Journal of Information Management, 30(3), 265-276. Article from Mendeley. Last
     accessed 6 March 2012 at: http://www.mendeley.com/research/what-leads-to-postimplementation-success-of-erp-
     an-empirical-study-of-the-chinese-retail-industry.


Course: Enterprise Systems ProfessionalsPage 5 of 5                                        Assessment 1 – Critical Review

More Related Content

PPTX
ERROR ANALYSIS
PPTX
Eugene Nida's Theory of Translation
PPTX
Chapter 3 The Process of Translation Chapter 3
PPSX
Bilingualism types of bilingualism
PPT
Translation quality assessment redefined
PPTX
Technical Writing PowerPoint
PPTX
Translation skills presentation
PPT
literary Translation
ERROR ANALYSIS
Eugene Nida's Theory of Translation
Chapter 3 The Process of Translation Chapter 3
Bilingualism types of bilingualism
Translation quality assessment redefined
Technical Writing PowerPoint
Translation skills presentation
literary Translation

What's hot (20)

PPTX
Applied Linguistics Prescription description
PPTX
Translation theory
PPT
Skills Required To Become a Professional Translator
PPTX
Tu and vous by zahril anasy
PPT
Translation Studies
PPTX
Translation theory before the 20th century
PPTX
Presentación teorías contemporáneas de la traduccion
PPTX
Friedrich schleiermacher
PPT
English for Academic Purposes by Liz Hamp-Lyons
PPTX
Translation theories
PPTX
Pedagogical uses of translation
PPT
Introduction to contemporary translation studies
PPTX
Re-imagining Culture in TESOL
PDF
Nassaji ( 2004)
PPTX
Tools of translation
PPTX
Esl (4)Methods of English Teaching
PPTX
Revising, editing, proofreading
PPSX
Presupposition
PPTX
Translation action model by Holz-Manttari
PPTX
karishma Iqbal Presentation
Applied Linguistics Prescription description
Translation theory
Skills Required To Become a Professional Translator
Tu and vous by zahril anasy
Translation Studies
Translation theory before the 20th century
Presentación teorías contemporáneas de la traduccion
Friedrich schleiermacher
English for Academic Purposes by Liz Hamp-Lyons
Translation theories
Pedagogical uses of translation
Introduction to contemporary translation studies
Re-imagining Culture in TESOL
Nassaji ( 2004)
Tools of translation
Esl (4)Methods of English Teaching
Revising, editing, proofreading
Presupposition
Translation action model by Holz-Manttari
karishma Iqbal Presentation
Ad

Viewers also liked (20)

PDF
Critical review
PPTX
Post ERP Implementation - A Little Goes a Long Way
DOCX
Post Implementation Review Template
PDF
A critique of an argument against patent rights for essential medicines (publ...
 
DOCX
critique osteoarthritis and cartilagefinal4182016
DOC
Pet735 critique wk13
DOCX
Critique Essay
PPT
My Erp Implementation Lifecycle
DOCX
5074288385-1
PPTX
Erp post implementation audit
PPTX
Framework of A Critique Qualitative Research Article
DOCX
Article critique FRIT 7232
DOCX
Unit VIII Article Critique
DOCX
PhilipGuillet.Critique1.PC673
DOC
Wingate article critique summary
PPTX
Article critique assignment help
PDF
Research in Nursing Chapter 2
PDF
Proposal for rolls royce to adapt an erp system
PDF
Research in Nursing Chapter 1
DOCX
Quantitative Research Article Critique
Critical review
Post ERP Implementation - A Little Goes a Long Way
Post Implementation Review Template
A critique of an argument against patent rights for essential medicines (publ...
 
critique osteoarthritis and cartilagefinal4182016
Pet735 critique wk13
Critique Essay
My Erp Implementation Lifecycle
5074288385-1
Erp post implementation audit
Framework of A Critique Qualitative Research Article
Article critique FRIT 7232
Unit VIII Article Critique
PhilipGuillet.Critique1.PC673
Wingate article critique summary
Article critique assignment help
Research in Nursing Chapter 2
Proposal for rolls royce to adapt an erp system
Research in Nursing Chapter 1
Quantitative Research Article Critique
Ad

Similar to Critical review of an ERP post-implementation Article (20)

PDF
15. Assessing Risk In Erp Projects Identify And Prioritize The Factors
PDF
Risk Analysis On It Assets Using Case Based Reasoning
PDF
13. Effectiveness Of Erp Systems
DOCX
Running head organizational information system1 organizational
PDF
9. Factors Affecting Erp System Adoption
PDF
An Evaluation Study of General Software Project Risk Basedon Software Practit...
PDF
An Evaluation Study of General Software Project Risk Basedon Software Practit...
PDF
A Process Based Approach To Business Risk Analysis The Royal Navy Experience
PDF
1. An Erp Performance Measurement Framework Using A Fuzzy Integral Approach
PDF
3. Project Management A Case Study Of A Successful Erp Implementation
PDF
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
DOCX
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
PDF
Taubenberger
DOCX
WRITING A CRITICAL REVIEW What is a critical review A .docx
PPTX
NIST 800 30 revision Sep 2012
PDF
Relationship between organizational
PDF
Relationship Between Organizational Factors, Technological Factors and Enterp...
DOCX
Running Head ENTERPRISE RISK MANAGEMENT ANNOTATED BIBLIOGRAPHYE.docx
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PPT
ISTAfrica_Paper_ref_180_7461
15. Assessing Risk In Erp Projects Identify And Prioritize The Factors
Risk Analysis On It Assets Using Case Based Reasoning
13. Effectiveness Of Erp Systems
Running head organizational information system1 organizational
9. Factors Affecting Erp System Adoption
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...
A Process Based Approach To Business Risk Analysis The Royal Navy Experience
1. An Erp Performance Measurement Framework Using A Fuzzy Integral Approach
3. Project Management A Case Study Of A Successful Erp Implementation
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Taubenberger
WRITING A CRITICAL REVIEW What is a critical review A .docx
NIST 800 30 revision Sep 2012
Relationship between organizational
Relationship Between Organizational Factors, Technological Factors and Enterp...
Running Head ENTERPRISE RISK MANAGEMENT ANNOTATED BIBLIOGRAPHYE.docx
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
ISTAfrica_Paper_ref_180_7461

More from Traitet Thepbandansuk (20)

PDF
IT_FOR_BUSINESS_30NOV15
PDF
06 1 st_honour_award_certification.pdf
PPS
Change attitude change life scg
DOCX
01 dissertation_Restaurant e-menu on iPad
DOCX
MSc Dissertation: Restaurant e-menu software on iPad
PPTX
03 outcome navigator
PPTX
O1 research overview
PPTX
D4 recommendation emenu_development
PPTX
D3 users perceptions_emenu
PPTX
D2 users perceptions_features
PPTX
A30 test functional_requirements
PPTX
A22 functions on_web
PPTX
A21 functions on_ipad
PPTX
A2 annotation approach
PPTX
A1 annotation knowledge
PPTX
A1 analysis design
PPTX
10 wrap around_conclusion
PPTX
02 project plan11_aug12
PPTX
00 how to_test_app
PPTX
R01 all references
IT_FOR_BUSINESS_30NOV15
06 1 st_honour_award_certification.pdf
Change attitude change life scg
01 dissertation_Restaurant e-menu on iPad
MSc Dissertation: Restaurant e-menu software on iPad
03 outcome navigator
O1 research overview
D4 recommendation emenu_development
D3 users perceptions_emenu
D2 users perceptions_features
A30 test functional_requirements
A22 functions on_web
A21 functions on_ipad
A2 annotation approach
A1 annotation knowledge
A1 analysis design
10 wrap around_conclusion
02 project plan11_aug12
00 how to_test_app
R01 all references

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Mobile App Security Testing_ A Comprehensive Guide.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The AUB Centre for AI in Media Proposal.docx
A comparative analysis of optical character recognition models for extracting...
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Assigned Numbers - 2025 - Bluetooth® Document
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Critical review of an ERP post-implementation Article

  • 1. Mr. Traitet Thepbandansuk Student ID: 20043132 Module: RPP Assessment 1 - Critical review of aresearch article Identification and assessment of risks associatedwith ERP post-implementation in China By Traitet Thepbandansuk, ID: 20043132 Introduction In the article titled “Identification and assessment of risks associated with ERP post-implementation in China,” which appeared in the 2009 Journal of Enterprise Information Management (JEIM),Volume 22, Issue 5, was written by Guo Chao Peng and Miguel Baptista Nunes. The purpose of this article was to identify, assess and explore potential risks associated with ERP post-implementation. The authors had carried out their empirical research using a quantitative approach. They adopted a deductive research design based on a cross-sectional questionnaire survey for 118 large companies to examine risks of ERP post-implementation. However, some limitations should be considered. This critical review,including the critique of theresearch,is divided into four sections; Research question, Research literature, Research methods, tools and techniques, and Research process and outcome. Research Question The purpose of this research is clearly stated, and narrowly focused.It is to identify, access and explore potential risks that Chinese companies may encounter when using, maintaining and enhancing their enterprise resource planning (ERP) systems in the post-implementation phase. Although there are no research questions in this article,the authors wereable to show the understandable picture of the whole content of the study in their purposeof research. Both the primary and secondary research aims are defined.The primary aim is mentioned similarly to its purpose in the abstract. The secondary aimisto explore the impacts, probability, and frequency of occurrence of identified ERP risk events, as well as to investigate the correlations between those risks. The researchers supposed that their findings would benefit people whose work is related to ERP systems for strategic planning and decision-making. Furthermore, the authors claim that their research was distinctive from prior studies. The wider fields of interestin ERP systems had been mainly focused on ERP implementation and project management aspects (e.g. Oliver et al. 2005; Ehie and Madsen 2005; Yusuf et al. 2004), and those aboutERP risks had been addressed in ERP business issues and aspectse.g. Kleim and Ludin (2000, p3).In contrast, the research topic of ERP post-implementation was extremely limited. Therefore, they specifically concentrated on risks in ERP post-implementation to fulfil this research gap.However, most recently, there have been more researchers who have become interested in this area, such as ERP post- implementation performance in the Chinese manufacturing Industry(Yan et al. 2010). Course: Enterprise Systems ProfessionalsPage 1 of 5 Assessment 1 – Critical Review
  • 2. Mr. Traitet Thepbandansuk Student ID: 20043132 Module: RPP Research Literature The abstract is concise and clear with the primary conclusion. The literature review presented in this paper provides a synthesis of previous research,which leads to the performance of study. The authors could extract important information from various sources by using the funnel approach. This approach helped researchers conduct the literature review into more specific issues that, ultimately lead to the direction proposed for the research program (Toncich 1999). For this reason, the authors could retrieve valuable literature related to their particulartopic in order to identify, access and explore risks in the critical analysis and survey processes. In addition, there are more up-to-datearticles providingboth similar and different aspects. For example, both the authors and Yan et al. (2010) indicate similarly that ERP vendors and software are not crucial risks in the ERP post-implementation stage. In contrast, the authors mention that the most significant factor is containing inaccurate inventory records, whereas Yan et al. (2010) claims that support by top management is the most important factor. Furthermore, Sobyanina and Ilona (2011) also differently indicate that losing IT experts and ERP know-how is the potential risk in ERP post-implementation. However, some different findings may be discovered by because of conducting surveyswith different sample groups, such as regions and industrial sectors. Although some research indicates the level of risks different from this article, the 40 ERP exploitation risks identified in this article are quite useful for both people whose workis related to ERP systems and researchers studying in evaluation of risks in ERP post-implementation. ERP Risks can help ERP stakeholders to reduce costs, obtain full benefits, and prevent potential problems (Grabski 2001). Moreover, this article is cited by other researchers to extend the research area. For example, Salmeron(2011) brought some risks identified in this article to forecast risk impact on ERP maintenance by using his own model. Even though this research wasn’t explicitly extended into new areas of risks associated with ERP post- implementation, after the researchers successfully assessed ERP risks, they additionally studied to find relationships between those ERP risks. As a result, the outcomes not only had the ERP risks assessed, but also had the potential relationships, which were able to extend the research context. Ultimately, the authors could summarise that the impact of risks plays a fundamental role in the failure of ERP due to the potential casual effects between risks. Finally, the article is filled with a sufficient number of citations from other sources. The 57 references in this research are quite acceptable, and related to the area of research. Both in-text citations and the reference list are correct. The references are suitably used to support ideas, arguments, techniques and theories in the paper. This information ensures that readers can easily retrieve relevant reference articles at a later time. Course: Enterprise Systems ProfessionalsPage 2 of 5 Assessment 1 – Critical Review
  • 3. Mr. Traitet Thepbandansuk Student ID: 20043132 Module: RPP Research Methods, Tools and Techniques The methodologies employed in this research are a deductive approach and quantitative study using a cross-sectional questionnaire survey. Thissurvey enables data to be gathered at a single point in time, and be used to determine the relationship between two factors (University of Texas no date).In this article, two different questionnaires for managers and ICT experts were used to collect data of ERP risks in terms of business aspects and technical issues, both at the same time. Almost all research methods, tools and techniquesare suitable and clearly explained. For example, the authors used business analysis techniques, namely PEST (Political, Economic, Social, and Technological analysis)and SWOT(Strengths, Weaknesses, Opportunities and Threats), to narrow the scope of study in an effective way. As a result, all of state-owned enterprise (SOE) companies in Guangdong province in electronics and telecommunications manufacturing sectors were selected totalling 118 firms. With regard to PEST analysis, SOE companies were selected because it had played an essential role in development of China’s national economy, and Guangdon was selected because this region had achieved high levels of ICT. However, the authors didn’t clearly explain how the business sectors were selected for SWOT analysis. Although the authors didn’t mention what types of sampling method were used, the selected sample groups were clearly identified. It seems that they chose a probability sampling method with cluster sampling groups (SOE companies in electronics and telecommunication manufacturing sectors in Guangdong province)for a large number of companies in China (301,887 companies in 2006). Even though surveying only some cluster groupscannot reflect the population diversity, this method can reduce thecost,increase thenumber of samples, and be carried out in multiple stages (Slack 2012; Ahmed 2009; Albatineh 2011). Furthermore, after the survey achieved the response rate of 36.5 per cent, the authors assessed the potential risks by using a risk assessment tool, namely risk metrics, from three aspects; probability, impact and frequency. Risk metrics is aneffective tool to find out the level of risks (Iomosaic 2009). However, Anthony (2008) argues that using this toolis likely to be harmful in risk management decision making,for example, when frequencies and impacts are positively or negatively correlated, respectively. In summary, although the questionnaire response rate was acceptable, and almost all research methods, tools and techniques were effectively used, there are problems that the authorsshould be made aware of. Firstly, selecting inadequate number of sample groupsmay insufficiently reflect the diversity of population. Secondly, determining and interpreting the level of risksmay be incorrect in some cases. Finally, it is difficult for non-technical readers to understand how to calculate risk scores. Therefore, further research should consider a suitable number of cluster sampling groups, find a better way to assess risks, and show additional examples of calculating risks. Course: Enterprise Systems ProfessionalsPage 3 of 5 Assessment 1 – Critical Review
  • 4. Mr. Traitet Thepbandansuk Student ID: 20043132 Module: RPP Research Process and Outcome The overall outcomeis directly related to researchers’ findings from thestudy.The purpose of research and all of the aims were achieved with sufficient processes and evidence. For example, the scores of each risk affecting ERP post-implementation were accessed and identified from the surveyand statistical calculation, the top ten identified ERP riskswere explored from the critical literature review process, and the correlations between the identified ERP risks were investigated by statistical techniques. However, the research is focused on a very specific set of Chinese companies. Therefore, further research may apply their identified ERP risks to other types of companies, business sectors or regions. It is clear that this research is helpful for researchers and other people whose work is related to ERP systems. However, the researchers must be concerned about some ethical issues, especially involving risk assessments and conducting surveys. They must be impartial, and should cross referencedwith related research because otherwise the results may be harmful to businesses. For example, if someimportant eventsare identified as being low or non-risks, business stakeholders may be insufficiently concerned about preventing them. In addition, questionnaires must have an opening statement informing the participant of the purpose of the research (Heriot-Watt University no date).Finally, this research helps me to understanda lot more about research processes, methods, techniques and structure in order to provide me with more ideas for my future assignments and dissertation. Conclusion The overall research is quite good. The purpose of this research is clearly stated and narrowly focused. The authors could systematically extract important information from the literature review process,and use it to fulfill a research gap. Furthermore, this research is quite new and useful for both researchers and people whose work is related to ERP systems. However, some research findings are different from other more up-to-date articles, such as risk ranking.The methodologies employed are a deductive approach and quantitative study using a questionnaire survey. Although almost all research methods, tools and techniques were suitable and clearly explained, the authors should consider about population diversity more, because their research was focused on very specific sample groups. In addition, the overall outcome was directly related to their findings from the study, and the purpose of the research was achieved with sufficient processes and evidence. Finally, the ethics used in this research were very important. The researchers must be concerned about ethical issues, especially when doing risk assessment and using questionnaires. Course: Enterprise Systems ProfessionalsPage 4 of 5 Assessment 1 – Critical Review
  • 5. Mr. Traitet Thepbandansuk Student ID: 20043132 Module: RPP REFERENCES 1. AHMED, Saifuddin (2009). Methods in Sample Surveys: Cluster Sampling. [online]. Last accessed 3 March 2012 at: http://ocw.jhsph.edu/courses/statmethodsforsamplesurveys/PDFs/Lecture5.pdf. 2. ALBATINEH, Ahmed N. (2011). MSC: A method for finding the number of clusters. [online]. Journal of Classification.28(2), 184-209. Article from Academia last accessed 6 March 2012 at: http://fiu.academia.edu/httpssphfiueduepidemiologyfacultyalbatinehhtml/Papers/787737/MCS_A_Method_for_Findin g_the_Number_of_Clusters. 3. ANTHONY, Louis (2008). What’s wrong with risk matrices? [online]. Risk Analysis, 28 (2), 497-512.Article from Evira last accessed 7 March 2012 at: http://www.evira.fi/attachments/english/research_on_animal_diseases_and_food/risk_assessment/riskmatrices.pdf. 4. EHIE, Ike C. and MADSEN, Mogens (2005). Identifying critical issues in enterprise resource planning (ERP) implementation. [online]. Computers in industry, 56 (6), 545–557. Article from Zwep last accessed 4 March 2012 at: http://zwep.net/articles/Identifying%20critical%20issues%20in%20enterprise%20resource.pdf. 5. GRABSKI, Severin V. (2001). Risks and Controls in the Implementation of ERP Systems. [online]. The International Journal of Digital Accounting Research, 1(1), 47-68. Article from University of Huelva last accessed 6 March 2012 at: http://www.uhu.es/ijdar/10.4192/1577-8517-v1_3.pdf. 6. HERIOT-WATT UNIVERSITY (no date). Research ethical guidelines: Ethical principles for research involving human participants. [online]. Last accessed 7 March 2012 at: http://www.macs.hw.ac.uk/~pjbk/cs4/fullEthicsApproval.html. 7. IOMOSAIC (2009). Design an effective Risk Matrix. [online]. Last accessed 4 March 2012 at: http://www.iomosiac.com/docs/whitepapers/risk-ranking.pdf. 8. KLEIM, Ralph L. and LUDIN, Irwin S. (2000). Reducing Project Risks.Aldersot, Gower Publishing. 9. OLIVER, Dave, WHYMARK, Greg and ROMM, Celia (2005). Researching ERP adoption: An internet-based grounded theory approach. Online information review, 29 (6), 586-603. Article from Emerald Group Publishing last accessed 7 March 2012 at: http://www.emeraldinsight.com/journals.htm?articleid=1529865&show=pdf. 10. PENG, Guo Chao and NUNES, Miguel Baptista (2009). Identification and assessment of risks associated with ERP post-implementation in China. [online]. Journal of Enterprise Information Management, 22(5), 587-614. Article from Emerald Group Publishing last accessed 7 March 2012 at: http://www.emeraldinsight.com/journals.htm?articleid=1817313&show=pdf. 11. SALMERON, Jose L. and CRISTINA, Lopez (2011). Forecasting Risk Impact on ERP Maintenance with Augmented Fuzzy Cognitive Maps. [online]. IEEE Transactions on Software Engineering. Article from IEEE Xplore last accessed 6 March 2012 at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5680917. 12. SLACK, Frances (2012). Sampling for research: Two main types of sampling. Held on 24 February 2012. Room 527 Peak LT, Owen building, Sheffield Hallam University. 13. SOBYANINA, Elena and MOCKUTE, Ilona (2011). ERP post-implementation risk assessment. [online]. Last accessed 4 March 2012 at: http://mdh.diva-portal.org/smash/record.jsf?pid=diva2:433002. 14. TONCICH, Dario J (1999). Key factors in postgraduate research: The literature review. [online]. Australia, Chrystobel Engineering. Book from Doctortee last accessed 3 March 2012 at: http://www.doctortee.net/files/keyfactors00pw.pdf. 15. UNIVERSITY OF TEXAS (no date). Survey Methods:Types of Surveys. [online]. Last accessed 4 March 2012 at: http://www.gslis.utexas.edu/~palmquis/courses/survey.html. 16. YUSUF, Yahaya (2004). Enterprise information systems project implementation: A case study of ERP in Rolls- Royce. International journal of production economics, 87 (3), 251-266. 17. ZHU, Yan, et al. (2010). What leads to post-implementation success of ERP? An empirical study of the Chinese retail industry. [online].International Journal of Information Management, 30(3), 265-276. Article from Mendeley. Last accessed 6 March 2012 at: http://www.mendeley.com/research/what-leads-to-postimplementation-success-of-erp- an-empirical-study-of-the-chinese-retail-industry. Course: Enterprise Systems ProfessionalsPage 5 of 5 Assessment 1 – Critical Review