Data mining as a technique for knowledge management in business process redesign
Information Management & Computer Security
ISSN: 0968-5227
Article publication date: 1 September 2005
Abstract
Purpose
Business process redesign (BPR) is undertaken to achieve order‐of‐magnitude improvements over “old” forms of the organization. Practitioners in academia and the business world have developed a number of methodologies to support this competitive restructuring that forms the current focus of concern, many of which have not been successful. The purpose of this paper is to suggest the use of data mining (DM) as a technique to support the process of redesigning a business by extracting the much needed knowledge hidden in large volumes of data maintained by the organization through the DM models.
Design/methodology/approach
The paper explains how the DM/BPR tool will extract and transfer the much‐needed knowledge necessary for implementing the new business.
Findings
The process of extracting knowledge hidden from large volumes of data (DM) has proved very successful in solving many business or scientific problems to achieve competitive advantage. As suggested in the DM/BPR framework, the DM model can be deployed on the massive data collected from past business processes of the organization which then yields the previously unknown knowledge and trends needed by top managers or decision makers in the organization for effective business process redesigning.
Originality/value
The proposed DM/BPR framework transforms the old business into a new prospect‐oriented business organization by carefully re‐engineering the old system incorporating the new discovered knowledge which helps the manager to make wise and informed business decisions in the area of accountability, business change management expertise, business process analysis, business model design, business model implementation and others.
Keywords
Citation
Folorunso, O. and Ogunde, A.O. (2005), "Data mining as a technique for knowledge management in business process redesign", Information Management & Computer Security, Vol. 13 No. 4, pp. 274-280. https://doi.org/10.1108/09685220510614407
Publisher
:Emerald Group Publishing Limited
Copyright © 2005, Emerald Group Publishing Limited