2017
DOI: 10.1016/j.procs.2017.12.149
|View full text |Cite
|
Sign up to set email alerts
|

ERP Post Implementation Review with Process Mining: A Case of Procurement Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…Mahendrawathi ER, Shania Zayin and Firman Pamungkas promotes on their paper the use of process mining and root cause analysis from BPM field to make post implementation review of ERP implementation at the level of business process (Mahendrawathi et al, 2017). The case study company is a chemical company that is changing their old ERP system with SAP ERP.…”
Section: Examples Of Implementing Process Mining On Erpmentioning
confidence: 99%
See 2 more Smart Citations
“…Mahendrawathi ER, Shania Zayin and Firman Pamungkas promotes on their paper the use of process mining and root cause analysis from BPM field to make post implementation review of ERP implementation at the level of business process (Mahendrawathi et al, 2017). The case study company is a chemical company that is changing their old ERP system with SAP ERP.…”
Section: Examples Of Implementing Process Mining On Erpmentioning
confidence: 99%
“…The case study company is a chemical company that is changing their old ERP system with SAP ERP. They presented how the event log for the process of procurement is generated from the activities data stored in SAP database (Mahendrawathi et al, 2017). They used the Disco tool to process the event log to conduct more analysis where they applied the fuzzy miner to discover the process model from event log (Mahendrawathi et al, 2017).…”
Section: Examples Of Implementing Process Mining On Erpmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al, 2010), (Rehm et al, 2011), (J. Wang, Wu, Liu, & Xing, 2017), (Guldi, 2004), (Egger, Griitzner, Burmer, & Dudkiewicz, 2007), (Gil et al, 2017), (Chertkov, Disyuk, Pimenov, & Aksenova, 2017), (Luka et al, 2016), (Chuang & Lee, 2004) Business Economics 48 (4,29%) (Isack, Mutingi, Kandjeke, Vashishth, & Chakraborty, 2018), (Mahendrawathi, Zayin, & Pamungkas, 2017), (Samopa, Astuti, & Lestari, 2017), (Wieczerniak, Cyplik, & Milczarek, 2017), (Richter, Aymelek, & Mattfeld, 2017), (Usman & Rendy, 2017), (Aligula, Kok, & Sim, 2017), (Sawalha, 2017), (Claxton & Campbell-Allen, 2017), (Markopoulos & Vanharanta, 2017) Optics 33 (2,95%) (X. Wang et al, 2010), (Giollo, Lam, Gkorou, Liu, & van Haren, 2017), (Schulz, Egodage, Tabbone, Ehrlich, & Garetto, 2017), (Xie, Venkatachalam, Lee, Chen, & Zafar, 2017), (Horvath, Krkos, & Dubravec, 2017), (Tchikoulaeva, Holfeld, Arend, & Foca, 2008), (Mora et al, 2016), (Gutjahr et al, 2016), (McCroskey, Abell, & Chidester, 2000),…”
Section: Primary Objectivementioning
confidence: 99%
“…Log data activity stores the analysis of the process of procurement of goods and services in the company. The storage capacity of the log data is substantial [6]. Therefore, it requires a long time due to the many verification documents that must be provided to all relevant departments to carry out the procurement of goods and services, resulting in the purchase of products and services experiencing a time delay and many procedural misuses.…”
Section: Introductionmentioning
confidence: 99%