Advertisement

Information Systems Frontiers

, Volume 12, Issue 4, pp 443–455 | Cite as

Increasing the efficiency of business processes using a theory of constraints

  • Seung-Hyun Rhee
  • Nam Wook ChoEmail author
  • Hyerim Bae
Article

Abstract

In this study, a Theory of Constraints (TOC)-based method was developed to enhance the efficiency of business processes. Whereas the TOC has been employed in manufacturing processes, the present paper shows that it can be effective also for Business Process Management (BPM). In order to apply the TOC to business processes, a Drum-Buffer-Rope (DBR) scheduling method for a Business Process Management System (BPMS) was developed. A procedure by which business process efficiency can be improved using these concepts is presented. To validate our approach, a series of simulations of a real banking process was conducted, on the basis of which the applicability of the proposed method was analyzed. Based on the analysis results, we show that the TOC-based method can improve business process efficiency, particularly under heavy workloads with limited resources. And we suggest, accordingly, several guidelines that can be followed for the efficient management of business processes.

Keywords

Business process efficiency Business process management Theory of constraints Drum-Buffer-Rope Simulation 

Notes

Acknowledgments

This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD) and The Regional Research Universities Program/Research Center for Logistics Information Technology.

References

  1. Anupindi, R., et al. (2006). Managing business process flows (2nd ed.). New Jersey: Prentice Hall.Google Scholar
  2. Apte, U. M., & Mason, R. O. (1995). Global disaggregation of information-intensive services. Management Science, 41(7), 1250–1262.CrossRefGoogle Scholar
  3. Baldwin, C., & Clark, K. (1997). “Managing in an age of modularity”. Harvard Business Review.Google Scholar
  4. Blinder, A. (2006). “Offshoring: the next industrial revolution?” Foreign Affairs, March/April.Google Scholar
  5. Chang, D., Son, J. H., & Kim, J. H. (2002). Critical path identification in the context of a workflow. Information and Software Technology, 44(7), 405–417. doi: 10.1016/S0950-5849(02)00025-3.CrossRefGoogle Scholar
  6. Friedman, T. (2005). “It’s a flat world, after all” The New York Times, April 3.Google Scholar
  7. Goldratt, E. M. (1991). The haystack syndrome. New York: North River.Google Scholar
  8. Goldratt, E. M. (1992). The goal. New York: North River.Google Scholar
  9. Ha, B., Bae, J., Park, Y., & Kang, S. (2006). Development of process execution rules for workload balancing on agents. Data & Knowledge Engineering, 56(1), 64–84. doi: 10.1016/j.datak.2005.02.007.CrossRefGoogle Scholar
  10. Hammer, M. (2006). The agenda: What every business must do to dominate the decade. New York: Crown Business.Google Scholar
  11. Hellinger, M., Fingerhut, S. (2002). Business activity monitoring: EAI meets data warehousing. eAI Journal, 18–21, JulyGoogle Scholar
  12. Hur, W., Bae, H., & Kang, S. (2003). Customizable workflow monitoring. Concurrent Engineering–Research and Applications, 11(4), 313–326.Google Scholar
  13. Iansiti, M., & Levien, R. (2004). “Strategy as ecology”. Harvard Business Review, March.Google Scholar
  14. Kim, J., & Segev, A. (2005). A web services-enabled marketplace architecture for negotiation process management. Decision Support Systems, 40(1), 71–87. doi: 10.1016/j.dss.2004.04.005.CrossRefGoogle Scholar
  15. Kim, Y., Bae, J., Bae, H., & Kang, S. (2004). Automatic control of workflow processes using ECA rules. IEEE Transactions on Knowledge and Data Engineering, 16(8), 1010–1023. doi: 10.1109/TKDE.2004.20.CrossRefGoogle Scholar
  16. Kim, Y., Kang, S., Kim, D., Bae, J., & Ju, K. (2000). WW-flow: web-based workflow management with runtime encapsulation. IEEE Internet Computing, 4(3), 55–64. doi: 10.1109/4236.845391.CrossRefGoogle Scholar
  17. Klein, M., & Dellarocas, C. A. (2000). Knowledge-based Approach to handling exceptions in workflow systems. Computer Supported Cooperative Work, 9, 399–412. doi: 10.1023/A:1008759413689.CrossRefGoogle Scholar
  18. Klusewitz, G., & Rerick, R. (1996). Constraint management through the drum-buffer-rope system. IEEE/SEMI Advanced Semiconductor Manufacturing Conference, 7–12.Google Scholar
  19. Lawrence, P. (1997). Workflow handbook. New York: Wiley.Google Scholar
  20. McCoy, D. (2004). The convergence of BPM and BAM. Gartner Research Note (SPA-20-6074).Google Scholar
  21. Palmisano, S. (2006). “The globally integrated enterprise,” Foreign Affairs, May/June.Google Scholar
  22. Rhee, S., Bae, H., Ahn, D., & Seo, Y. (2003).Efficient workflow management through the introduction of TOC concepts. Proceedings of The 8th Annual International Conference on Industrial Engineering Theory, Applications and Practice (IJIE2003).Google Scholar
  23. Rhee, S., Bae, H., & Choi, Y. (2007). Enhancing the efficiency of supply chain processes through web services. Information Systems Frontiers, 9(1), 103–118. doi: 10.1007/s10796-006-9020-5.CrossRefGoogle Scholar
  24. Rhee, S., Song, H., Won, H. J., Ju, J., Kim, M., & Bae, H. (2005). Process-oriented development of job manual system. Lecture Notes in Computer Science, 3482, 1259–1268.CrossRefGoogle Scholar
  25. Sayal, M., Casati, F., Dayal, U., & Shan, M.-C. (2002). Integrating workflow management systems with business-to-business interaction standards. Proceedings of the 18th International Conference on Data Engineering.Google Scholar
  26. Smith, H., & Fingar, P. (2003). Business process management—The third wave. Florida: Meghan-Kiffer.Google Scholar
  27. Son, J. H., & Kim, M. H. (2001). Improving the performance of time-constrained workflow processing. Journal of Systems and Software, 58(3), 211–219. doi: 10.1016/S0164-1212(01)00039-5.CrossRefGoogle Scholar
  28. van der Aalst, W. M. P., ter Hofstede, A. H. M., Kiepuszewski, B., & Barros, A. P. ( 2000). Advanced workflow patterns. Lecture notes in Computer Science, 1901, 18–19.CrossRefGoogle Scholar
  29. Wegner, P. (1997). Why interaction is more powerful than algorithms. Communications of the ACM, 40(5). doi: 10.1145/253769.253801.
  30. Wei, C., Liu, P. H., & Tsai, Y. C. (2002). Resource-constrained project management using enhanced theory of constraint. International Journal of Project Management, 20(7), 561–567. doi: 10.1016/S0263-7863(01)00063-1.CrossRefGoogle Scholar
  31. Workflow Management Coalition. (1999a). Process definition interchange, WfMC-TC-1016-P. Florida: Lighthouse Point.Google Scholar
  32. Workflow Management Coalition. (1999b). Terminology & glossary, WFMC-TC-1011. Florida: Lighthouse Point.Google Scholar
  33. Workflow Management Coalition. (2003). Pacific rim excellence award: workflow—Korea First Bank.Google Scholar
  34. Yefim, V. (2001). Natis application server scenario: from stovepipes to services, Gartner AV-14-5983.Google Scholar
  35. Zhao, J. L., & Stohr, E. A. (1999). Temporal workflow management in a claim handling system. SIGSOFT: Software Engineering Notes, 24(2), 187–195. doi: 10.1145/295666.295687.CrossRefGoogle Scholar
  36. Zhao, J. L., Tanniru, M., & Zhang, L. J. (2007). Services computing as the foundation of enterprise agility. Information Systems Frontiers, 9(1), 1–8. doi: 10.1007/s10796-007-9023-x.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  1. 1.The School of InformationUniversity of California, BerkeleyBerkeleyUSA
  2. 2.Department of Industrial and Information Systems EngineeringSeoul National University of TechnologySeoulRepublic of Korea
  3. 3.Department of Industrial EngineeringPusan National UniversityBusanRepublic of Korea

Personalised recommendations