{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:26:07Z","timestamp":1773235567040,"version":"3.50.1"},"reference-count":53,"publisher":"Emerald","issue":"7","license":[{"start":{"date-parts":[[2009,8,21]],"date-time":"2009-08-21T00:00:00Z","timestamp":1250812800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8,21]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to develop a risk identification checklist for facilitating user companies to surface, organise and manage potential risks associated with the post\u2010adoption of enterprise resource planning (ERP) systems.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A desktop study, based on the process of a critical literature review, is conducted by the researchers. The critical review focuses on information systems and business research papers, books, case studies and theoretical articles, etc.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>By systematically and critically analysing and synthesising the literature review, the researchers identify and propose a total of 40 ERP post\u2010implementation risks related to diverse operational, analytical, organisation\u2010wide and technical aspects. A risk ontology is subsequently established to highlight these ERP risks, as well as to present their potential causal relationships.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>For researchers, the established ERP risk ontology represents a starting point for further research, and provides early insights into a research field that will become increasingly important as more and more companies progress from implementation to exploitation of ERPs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>For practitioners, the risk ontology is an important tool and checklist to support risk identification, prevention, management and control, as well as to facilitate strategic planning and decision making.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>There is a scarcity of studies focusing on ERP post\u2010implementation in contrast with an over abundance of studies focusing on system implementation and project management aspects. This paper aims to fill this significant research gap by presenting a risk ontology of ERP post\u2010adoption. It represents a first attempt in producing a comprehensive model in its area. No other such models can be found from the literature review.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635570910982283","type":"journal-article","created":{"date-parts":[[2009,10,5]],"date-time":"2009-10-05T10:33:01Z","timestamp":1254738781000},"page":"926-942","source":"Crossref","is-referenced-by-count":55,"title":["Surfacing ERP exploitation risks through a risk ontology"],"prefix":"10.1108","volume":"109","author":[{"given":"Guo","family":"Chao Peng","sequence":"first","affiliation":[]},{"given":"Miguel","family":"Baptista Nunes","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012320094367200_b1","doi-asserted-by":"crossref","unstructured":"Boehm, B.W. (1991), \u201cSoftware risk management: principles and practices\u201d, IEEE Software, Vol. 8 No. 1, pp. 32\u201041.","DOI":"10.1109\/52.62930"},{"key":"key2022012320094367200_b4","doi-asserted-by":"crossref","unstructured":"Burrows, G.R., Drummond, D.L. and Martinsons, M.G. (2005), \u201cKnowledge management in China\u201d, Communication of the ACM, Vol. 48 No. 4, pp. 73\u20106.","DOI":"10.1145\/1053291.1053322"},{"key":"key2022012320094367200_b5","doi-asserted-by":"crossref","unstructured":"Caglio, A. (2003), \u201cEnterprise resource planning systems and accountants: towards hybridization?\u201d, European Accounting Review, Vol. 12 No. 1, pp. 123\u201053.","DOI":"10.1080\/0963818031000087853"},{"key":"key2022012320094367200_b6","doi-asserted-by":"crossref","unstructured":"Carr, M.J., Konda, S.L., Monarch, I., Ulrich, F.C. and Walker, C.F. (1993), Taxonomy\u2010based Risk Identification, CMU\/SEI\u201093\u2010TR\u20106, ESC\u2010TR\u201093\u2010183, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.","DOI":"10.21236\/ADA266992"},{"key":"key2022012320094367200_b7","doi-asserted-by":"crossref","unstructured":"Catt, P.M., Barbour, R.H. and Robb, D.J. (2008), \u201cAssessing forecast model performance in an ERP environment\u201d, Industrial Management & Data Systems, Vol. 108 No. 5, pp. 677\u201097.","DOI":"10.1108\/02635570810876796"},{"key":"key2022012320094367200_b8","doi-asserted-by":"crossref","unstructured":"Chen, I.J. (2001), \u201cPlanning for ERP systems: analysis and future trend\u201d, Business Process Management Journal, Vol. 7 No. 5, pp. 374\u201086.","DOI":"10.1108\/14637150110406768"},{"key":"key2022012320094367200_b9","doi-asserted-by":"crossref","unstructured":"Chou, D.C., Tripuramallu, H.B. and Chou, A.Y. (2005), \u201cBI and ERP integration\u201d, Information Management & Computer Security, Vol. 13 No. 5, pp. 340\u20109.","DOI":"10.1108\/09685220510627241"},{"key":"key2022012320094367200_b10","doi-asserted-by":"crossref","unstructured":"Currie, W.L. (2003), \u201cA knowledge\u2010based risk assessment framework for evaluating web\u2010enabled application outsourcing projects\u201d, International Journal of Project Management, Vol. 21 No. 3, pp. 207\u201017.","DOI":"10.1016\/S0263-7863(02)00095-9"},{"key":"key2022012320094367200_b11","doi-asserted-by":"crossref","unstructured":"Davis, D.F. and Mentzer, J.T. (2007), \u201cOrganizational factors in sales forecasting management\u201d, International Journal of Forecasting, Vol. 23 No. 3, pp. 475\u201095.","DOI":"10.1016\/j.ijforecast.2007.02.005"},{"key":"key2022012320094367200_b12","doi-asserted-by":"crossref","unstructured":"Ecklund, E. Jr, Delcambre, L. and Freiling, M. (1996), \u201cChange cases: use cases that identify future requirements\u201d, Proceedings of the 11th ACM SIGPLAN Conference on Object\u2010oriented Programming, Systems, Languages, and Applications, 6\u201010 October, San Jose, CA, pp. 342\u201058.","DOI":"10.1145\/236338.236372"},{"key":"key2022012320094367200_b14","doi-asserted-by":"crossref","unstructured":"Esteves, J., Pastor, J., Rodriguez, N. and Roy, R. (2005), \u201cImplementing and improving the SEI risk management method in a university software project\u201d, IEEE Latin America Transactions, Vol. 3 No. 1, pp. 90\u20107.","DOI":"10.1109\/TLA.2005.1468667"},{"key":"key2022012320094367200_b15","doi-asserted-by":"crossref","unstructured":"Fisher, C.W. and Kingma, B.R. (2001), \u201cCriticality of data quality as exemplified in two disasters\u201d, Information & Management, Vol. 39, pp. 109\u201016.","DOI":"10.1016\/S0378-7206(01)00083-0"},{"key":"key2022012320094367200_b16","doi-asserted-by":"crossref","unstructured":"Fletcher, K. and Wright, G. (1995), \u201cOrganisational, strategic and technical barriers to successful implementation of database marketing\u201d, International Journal of Information Management, Vol. 15 No. 2, pp. 115\u201026.","DOI":"10.1016\/0268-4012(95)00005-R"},{"key":"key2022012320094367200_b17","doi-asserted-by":"crossref","unstructured":"Gargeya, V.B. and Brady, C. (2005), \u201cSuccess and failure factors of adopting SAP in ERP system implementation\u201d, Business Process Management Journal, Vol. 11 No. 5, pp. 501\u201016.","DOI":"10.1108\/14637150510619858"},{"key":"key2022012320094367200_b18","doi-asserted-by":"crossref","unstructured":"Gruber, T.R. (1993), \u201cA translation approach to portable ontology specifications\u201d, Knowledge Acquisition, Vol. 5 No. 2, pp. 199\u2010220.","DOI":"10.1006\/knac.1993.1008"},{"key":"key2022012320094367200_b19","doi-asserted-by":"crossref","unstructured":"Hosoda, T., Naima, M.M., Disneya, S.M. and Potter, A. (2008), \u201cIs there a benefit to sharing market sales information? Linking theory and practice\u201d, Computers & Industrial Engineering, Vol. 54 No. 2, pp. 315\u201026.","DOI":"10.1016\/j.cie.2007.07.014"},{"key":"key2022012320094367200_b20","doi-asserted-by":"crossref","unstructured":"Ifinedo, P. and Nahar, N. (2009), \u201cInteractions between contingency, organizational IT factors, and ERP success\u201d, Industrial Management & Data Systems, Vol. 109 No. 1, pp. 118\u201037.","DOI":"10.1108\/02635570910926627"},{"key":"key2022012320094367200_b21","doi-asserted-by":"crossref","unstructured":"Keil, M., Cule, P., Lyytinen, K. and Schmidt, R. (1998), \u201cA framework for identifying software project risks\u201d, Communication of the ACM, Vol. 41 No. 11, pp. 76\u201083.","DOI":"10.1145\/287831.287843"},{"key":"key2022012320094367200_b23","unstructured":"Kleim, R.L. and Ludin, I.S. (2000), Reducing Project Risks, Gower, Aldershot."},{"key":"key2022012320094367200_b24","doi-asserted-by":"crossref","unstructured":"Koh, S.C.L., Jones, M.H., Saad, S.M., Arunachalam, A. and Gunasekaran, A. (2000), \u201cMeasuring uncertainties in MRP environments\u201d, Journal of Logistics Information Management, Vol. 13 No. 3, pp. 177\u201083.","DOI":"10.1108\/09576050010326574"},{"key":"key2022012320094367200_b25","doi-asserted-by":"crossref","unstructured":"Kumar, K. and Hillegersberg, J. (2000), \u201cERP experiences and evolution\u201d, Communications of the ACM, Vol. 43 No. 4, pp. 23\u20106.","DOI":"10.1145\/332051.332063"},{"key":"key2022012320094367200_b26","doi-asserted-by":"crossref","unstructured":"Lientz, B.P. and Larssen, L. (2006), Risk Management for IT Projects: How to Deal with 150 Issues and Risks, Butterworth\u2010Heinemann, Oxford.","DOI":"10.4324\/9780080462509"},{"key":"key2022012320094367200_b27","doi-asserted-by":"crossref","unstructured":"Loh, T.C. and Koh, S.C.L. (2004), \u201cCritical elements for a successful enterprise resource planning implementation in small\u2010and medium\u2010sized enterprises\u201d, International Journal of Production Research, Vol. 42 No. 17, pp. 3433\u201055.","DOI":"10.1080\/00207540410001671679"},{"key":"key2022012320094367200_b28","unstructured":"Martin, M.H. (1998), \u201cAn ERP strategy\u201d, Fortune, Vol. 2, pp. 95\u20107."},{"key":"key2022012320094367200_b29","unstructured":"Musselman, K., O'Reilly, J. and Duket, S. (2002), \u201cThe role of simulation in advanced planning and scheduling\u201d, Proceedings of the 2002 Winter Simulation Conference, 8\u201011 December, San Diego, CA, pp. 1825\u201030."},{"key":"key2022012320094367200_b31","unstructured":"Noy, N.F. and McGuinness, D.L. (2001), \u201cOntology development 101: a guide to creating your first ontology\u201d, available at: http:\/\/protege.stanford.edu\/publications\/ontology_development\/ontology101.pdf (accessed 22 January 2007)."},{"key":"key2022012320094367200_b32","unstructured":"Reimers, K. (2001), \u201cImplementing ERP systems in China: report on a questionnaire survey\u201d, available at: www.kai\u2010reimers.net\/Report.pdf (accessed 15 November 2006)."},{"key":"key2022012320094367200_b33","unstructured":"Sage (2005), \u201cHow to choose a manufacturing system\u201d, available at: http:\/\/physorg.tradepub.com\/free\/w_sg11 (accessed 15 January 2007)."},{"key":"key2022012320094367200_b34","unstructured":"Saunders, M., Lewis, P. and Thornhill, A. (2003), Research Methods for Business Students, 3rd ed., Pearson Education, Harlow."},{"key":"key2022012320094367200_b35","doi-asserted-by":"crossref","unstructured":"Scapens, R.W. and Jazayeri, M. (2003), \u201cERP systems and management accounting change: opportunities or impacts? A research note\u201d, European Accounting Review, Vol. 12 No. 1, pp. 201\u201033.","DOI":"10.1080\/0963818031000087907"},{"key":"key2022012320094367200_b36","unstructured":"Scott, J.E. and Vessey, I. (2000), \u201cImplementing enterprise resource planning systems: the role of learning from failure\u201d, Information Systems Frontiers, Vol. 2 No. 2, pp. 213\u201032."},{"key":"key2022012320094367200_b37","doi-asserted-by":"crossref","unstructured":"Shang, S. and Seddon, P.B. (2002), \u201cAssessing and managing the benefits of enterprise systems: the business manager's perspective\u201d, Information Systems Journal, Vol. 12, pp. 271\u201099.","DOI":"10.1046\/j.1365-2575.2002.00132.x"},{"key":"key2022012320094367200_b39","unstructured":"Slack, N., Chambers, S. and Johnston, R. (2004), Operations Management, 4th ed., Pearson Education, Harlow."},{"key":"key2022012320094367200_b40","doi-asserted-by":"crossref","unstructured":"Soh, C., Sia, S.K. and Tay\u2010Yap, J. (2000), \u201cCultural fits and misfits: is ERP a universal solution\u201d, Communications of the ACM, Vol. 43 No. 4, pp. 47\u201051.","DOI":"10.1145\/332051.332070"},{"key":"key2022012320094367200_b41","doi-asserted-by":"crossref","unstructured":"Sumner, M. (2000), \u201cRisk factors in enterprise\u2010wide\/ERP projects\u201d, Journal of Information Technology, Vol. 15, pp. 317\u201027.","DOI":"10.1177\/026839620001500407"},{"key":"key2022012320094367200_b42","doi-asserted-by":"crossref","unstructured":"Tsai, W.H., Chien, S.W., Fan, Y.W. and Cheng, J.M.S. (2005), \u201cCritical management issues in implementing ERP: empirical evidence from Taiwanese firms\u201d, International Journal of Services and Standards, Vol. 1 No. 3, pp. 299\u2010318.","DOI":"10.1504\/IJSS.2005.005802"},{"key":"key2022012320094367200_b43","doi-asserted-by":"crossref","unstructured":"Umble, E.J., Haft, R.R. and Umble, M.M. (2003), \u201cEnterprise resource planning: implementation procedures and critical success factors\u201d, European Journal of Operational Research, Vol. 146 No. 2, pp. 241\u201057.","DOI":"10.1016\/S0377-2217(02)00547-7"},{"key":"key2022012320094367200_b44","doi-asserted-by":"crossref","unstructured":"van Scoy, R.L. (1992), Software Development Risk: Opportunity, Not Problem, CMU\/SEI\u201092\u2010TR\u201030, ADA 258743, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.","DOI":"10.21236\/ADA258743"},{"key":"key2022012320094367200_b45","unstructured":"Vidalis, S. (2003), \u201cA critical discussion of risk and threat analysis methods and methodologies\u201d, available at: www.comp.glam.ac.uk\/staff\/svidalis\/Technical%20Reports\/Threat%20&%20Risk%20TR.doc (accessed 20 January 2007)."},{"key":"key2022012320094367200_b46","unstructured":"Wider, C. and Davis, B. (1998), \u201cFalse starts \u2013 strong finishes\u201d, Information Week, Vol. 7 No. 11, pp. 41\u201053."},{"key":"key2022012320094367200_b47","doi-asserted-by":"crossref","unstructured":"Wilding, E. (2003), \u201cCorporate cybercrime trends\u201d, Computer Fraud & Security, Vol. 6, pp. 4\u20106.","DOI":"10.1016\/S1361-3723(03)06007-X"},{"key":"key2022012320094367200_b49","doi-asserted-by":"crossref","unstructured":"Yosha, O. (1995), \u201cInformation disclosure costs and the choice of financing source\u201d, Journal of Financial Intermediation, Vol. 4 No. 1, pp. 3\u201020.","DOI":"10.1006\/jfin.1995.1001"},{"key":"key2022012320094367200_b50","unstructured":"Zhang, L., Lee, M.K.O., Zhang, Z. and Banerjee, P. (2002), \u201cCritical success factors of enterprise resource planning systems implementation success in China\u201d, Proceedings of the 36th Hawaii International Conference on System Sciences, Big Island, HI."},{"key":"key2022012320094367200_b51","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Lee, M.K.O., Huang, P., Zhang, L. and Huang, X. (2005), \u201cA framework of ERP systems implementation success in China: an empirical study\u201d, International Journal of Production Economic, Vol. 98 No. 1, pp. 56\u201080.","DOI":"10.1016\/j.ijpe.2004.09.004"},{"key":"key2022012320094367200_b53","doi-asserted-by":"crossref","unstructured":"Zhou, L., Vasconcelos, A. and Nunes, M.B. (2007), \u201cSupporting decision making in risk management through an evidence\u2010based information systems project risk checklist\u201d, Information Management & Computer Security, Vol. 16 No. 2, pp. 166\u201086.","DOI":"10.1108\/09685220810879636"},{"key":"key2022012320094367200_b52","unstructured":"Zhou, Y., Liu, B. and Zhou, Q. (2005), ERP and Enterprise Management: Theories, Methods and Systems, Tsinghua University Press, Beijing (in Chinese)."},{"key":"key2022012320094367200_frd1","unstructured":"Buckhout, S., Frey, E. and Nemec, J. Jr (1999), \u201cMaking ERP succeed: turning fear into promise\u201d, IEEE Engineering Management Review, Vol. 19, pp. 116\u201023."},{"key":"key2022012320094367200_frd2","doi-asserted-by":"crossref","unstructured":"Buonanno, G., Faverio, P., Pigni, F., Ravarini, A., Sciuto, D. and Tagliavini, M. (2005), \u201cFactors affecting ERP system adoption: a comparative analysis between SMEs and large companies\u201d, Journal of Enterprise Information Management, Vol. 18 No. 4, pp. 384\u2010426.","DOI":"10.1108\/17410390510609572"},{"key":"key2022012320094367200_frd3","doi-asserted-by":"crossref","unstructured":"Ekholm, B. and Wallin, J. (2000), \u201cIs the annual budget really dead\u201d, The European Accounting Review, Vol. 9 No. 4, pp. 519\u201039.","DOI":"10.1080\/09638180020024007"},{"key":"key2022012320094367200_frd4","doi-asserted-by":"crossref","unstructured":"Klaus, H., Rosemann, M. and Gable, G. (2000), \u201cWhat is ERP\u201d, Information Systems Frontiers, Vol. 2 No. 2, pp. 141\u201062.","DOI":"10.1023\/A:1026543906354"},{"key":"key2022012320094367200_frd5","unstructured":"Namjae, C. and Kiho, P. (2003), \u201cExploring a priori and posteriori IS valuation distortion: comparing cases in SCM, ERP, and CRM\u201d, International Journal of Digital Management, available at: http:\/\/digital.re.kr\/ijdm\/past.html (accessed 10 January 2007)."},{"key":"key2022012320094367200_frd6","doi-asserted-by":"crossref","unstructured":"Sherer, S.A. (2004), \u201cManaging risk beyond the control of IS managers: the role of business management\u201d, Proceedings of the 37th Hawaii International Conference on System Sciences, 5\u20108 January, Big Island, HI.","DOI":"10.1109\/HICSS.2004.1265509"},{"key":"key2022012320094367200_frd7","doi-asserted-by":"crossref","unstructured":"Wright, G. and Donaldson, B. (2002), \u201cSales information systems in the UK financial services industry: an analysis of sophistication of use and perceived barriers to adoption\u201d, International Journal of Information Management, Vol. 22, pp. 405\u201019.","DOI":"10.1016\/S0268-4012(02)00032-4"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570910982283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570910982283\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570910982283\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:14Z","timestamp":1753400294000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/109\/7\/926-942\/182025"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,21]]},"references-count":53,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2009,8,21]]}},"alternative-id":["10.1108\/02635570910982283"],"URL":"https:\/\/doi.org\/10.1108\/02635570910982283","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2009,8,21]]}}}