Bennis and Mische also invite us to bear in mind that we are attentive to the possible failure of re engineering, which hampers the success and some pitfalls to this quote: 1. Inappropriate use. This can occur because the organization is reinventing itself, as happens a lot in our environment, “Instead of looking for systematic changes and process innovation, re-engineering attempt to resolve specific problems. Therefore take into account the warning signs, that the organization is heading for an inappropriate use of re-engineering: .- is being applied too broadly or as a cure for the chronic problems of leadership and management .- The organization shows overconfidence and tries to implement too many processes simultaneously re-engineering .- re engineering is being used selectively without making corresponding organizational changes. .- There is a myopia about the people, the people and the challenges involved. 2. Lack of vision and notices can be found as: .- The department now focuses on specific tasks rather than functional; .- There are no clear statement of vision and defined objectives .- It is limited to procedures that take place within traditional organizational borders.
3. Groups of re-engineering ineffective, highlighting: .- The management supports and protects the group responsible; .- inadequate resources were allocated to the program; .- The group has organized in the traditional way of the project groups. 4. Inadequate empowerment, highlighting: .- E power of attorney is so considerable that the leadership and the administration eventually diluted .- In some cases it presents an empowerment fantasy, today and tomorrow there disappears. .- When the level of empowerment is very low, traditional doctrines can not be defeated.
5. Rationalization of the process. In this regard stresses that often, leaders of the organization support the re-engineering does not affect their areas. When they perceive a threat, managers can respond to streamline the arguments for and against re-engineering, so that their activities, their scopes and their staff are protected. 6. Based solely on the information technology 7. Use of geographic and organizational boundaries to demarcate the differences. 8. Lack of understanding of the processes of restructuring and its implications.