Effective Execution of Mergers and Acquisitions for IT Supply Chain

  IJCTT-book-cover
 
         
 
© 2022 by IJCTT Journal
Volume-70 Issue-7
Year of Publication : 2022
Authors : Pradeep Verma
DOI :  10.14445/22312803/IJCTT-V70I7P102

How to Cite?

Pradeep Verma, "Effective Execution of Mergers and Acquisitions for IT Supply Chain," International Journal of Computer Trends and Technology, vol. 70, no. 7, pp. 8-10, 2022. Crossref, https://doi.org/10.14445/22312803/IJCTT-V70I7P102

Abstract
Mergers and acquisitions are the new mantra of today’s growth; Organizations are multiplying using this strategy. This strategy brings opportunity and challenges both at the same time. If integration is not planned carefully and effectively, integration may fail, and profit realization may be delayed or lost. Integration can cause the entire supply chain to be disrupted and have a domino effect on procurement and manufacturing, ultimately impacting customer satisfaction.

Keywords
Mergers and acquisitions, Supply Chain, IT, Integration, Migration Strategy, Governance, Timeline.

Reference

[1] Https://Www.Gartner.Com/Document/4014436?Ref=Qvremail
[2] Https://Www2.Deloitte.Com/Content/Dam/Deloitte/Us/Documents/Mergers-Acqisitions/Us-Ma-Supply-Chains-Role-in-M-and-AAchieving-Value-Creation-Through-Supply-Chain.Pdf
[3] Han-Yu XUE, Shang XIANG, Jun LI,”An Innovative Design of the Internet of Things for Supply Chain Management of Fresh Agricultural Products,” SSRG International Journal of Computer Science and Engineering, vol.7, no.12, pp.1-4, 2020. Crossref, Https://Doi.Org/10.14445/23488387/IJCSE-V7I12P101.
[4] Nguyen Thi Kim Huyen, "Financial Management of Supply Chains in Vietnam: A Case Study of Companies in the Steel Industry," SSRG International Journal of Economics and Management Studies, vol. 7, no. 12, pp. 56-61, 2020. Crossref, Https://Doi.Org/10.14445/23939125/IJEMS-V7I12P108.
[5] R. Surendiran, “Secure Software Framework for Process Improvement,” SSRG International Journal of Computer Science and Engineering, vol. 3, no. 12, pp.19-25, 2016. Https://Doi.Org/10.14445/23488387/IJCSE-V3I12P105.
[6] Kshitij Dashore , Nagendra Sohani, "Green Supply Chain Management: A Hierarchical Framework for Barriers", International Journal of Engineering Trends and Technology (IJCTT), vol.4, no.5, pp.2172-2182 , 2013. ISSN:2231-5381. Www.Ijettjournal.Org. Published By Seventh Sense Research Group.
[7] Jun LI, Shang XIANG, “Intelligent Control of Urban Fresh Agricultural Products Supply Chain Using Big Data and Internet of Things,” SSRG International Journal of Computer Science and Engineering, vol.7, no.9, pp.1-6, 2020. Crossref, Https://Doi.Org/10.14445/23488387/IJCSE-V7I9P101.
[8] R. Surendiran, K.Alagarsamy, “Skin Detection Based Cryptography in Steganography (SDBCS),” International Journal of Computer Science and Information Technologies, vol. 1, no. 4, pp.221-225, 2010.
[9] Sikender Mohsienuddin Mohammad, "Devops Automation Advances I.for. Sectors With the Strategy of Release Management," International Journal of Computer Trends and Technology, vol.67, no.12, pp.82-88, 2016.
[10] Sheikh Asim, Payal Bhargava, "Analysis of Various Enablers of Sustainable Supply Chain Using MICMAC Analysis," International Journal of Engineering Trends and Technology, vol.67, no.5, pp.13-20, 2019.
[11] R. Surendiran, K. Alagarsamy, “Privacy Conserved Access Control Enforcement in MCC Network With Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp.2217-2224, 2013. Https://Doi.Org/10.14445/22315381/IJCTT-V4I5P174.
[12] V. Rathika, Dr. L. Arcokiam, “Automated Data Validation Framework for Data Quality in Big Data Migration Projects,” SSRG International Journal of Computer Science and Engineering, vol.1, no.10, pp.1-5, 2014.
[13] Satyajeet Das, Thuleshwar Nath , "A Review on the Detailed Experimental Study of Facility Location Techniques Used in Supply Chain Management," International Journal of Engineering Trends and Technology (IJCTT) ,vol.44, no.4, pp.189-194 , 2017. ISSN:2231-5381. Www.Ijettjournal.Org. Published By Seventh Sense Research Group.
[14] S. Gavaskar, E. Ramaraj, R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,” IJCSNS International Journal of Computer Science and Network Security, vol. 12, no. 11, pp.137-140, 2012