preview

Inventory and Ikea

Better Essays

Lund 2009-11-05

Department of Industrial Management & Logistics Production Management

Coordinated inventory control
- A case study on its performance compared to the current system at IKEA
Master’s Thesis project 1002

Silvia Rasmusson and Björn Sunesson

Acknowledgement This master’s thesis is written as a final part of the Master of Science program in Industrial Engineering and Management at Lund University, Lund Institute of Technology. The project corresponds to 30 ECT credits and was performed during a period of 20 weeks in the summer and fall of 2009. The idea to perform a study on inventory control on IKEA came from Paul Björnsson, Process Leader for “Plan and Secure Capacity” at IKEA of Sweden. The suggestion to …show more content…

7 2.1 2.2 2.3 2.4 Objectives .................................................................................................. 8 Delimitations ............................................................................................. 9 Target group .............................................................................................. 9 Report outline ......................................................................................... 10

3

Methodology ................................................................................................. 11 3.1 3.2 3.3 3.4 3.5 3.6 3.7 Procedure ................................................................................................ 11 Research approach .................................................................................. 13 Methodology ........................................................................................... 15 Method of analysis .................................................................................. 17 Sources .................................................................................................... 19 Tools ........................................................................................................ 23 Credibility ................................................................................................ 23

4

Theoretical Frame of

Get Access