Towards an Evaluation Framework to Structure Business Intelligence Project Patterns as Enhancement of Business Intelligence Maturity Models

Author(s):  
Carsten Felden ◽  
Claudia Koschtial ◽  
Peter Chamoni
2015 ◽  
Vol 16 (2) ◽  
pp. 133-144 ◽  
Author(s):  
Remigiusz Tunowski

AbstractBased on the literature review, significant benefits have been identified out of the implementation of Business Intelligence. However, risks have been also discovered, and they were mainly connected with an improper change management during the process of the BI systems implementation. Further direction for a development of BI system has been discussed, focusing in particular on maturity models available in the literature. The paper highlights the fact that maturity models currently available in the literature do not take comprehensively into account all aspects of the development of BI in organizations. Therefore, there is a need for further research in this field of science.


10.28945/2170 ◽  
2015 ◽  
Author(s):  
Rimvydas Skyrius

Among developments in the field of business intelligence (BI), the notion of maturity has gained considerable interest for defining the directions to expected value, for summarizing the experience available, and for defining the possible avenues of BI development. There is considerable experience in creating and implementing BI systems, and many gaps separating the declared goals from the achieved results have been discovered. The time distance from the early stages of BI development allows more or less objective evaluation of these stages, while the current state of BI field is often controversial and ill-defined. A set of concepts called BI maturity models have been presented in the academic and professional sources, carrying basically the same mission – to evaluate the experience and extrapolate the future developments. The models, being more or less uniform in assessing the experience, are mostly different in their attitudes towards current state and especially the future (mature) developments of BI, creating controversy in the expectations regarding the future value of BI. The goal of this paper is to define the controversial elements in the existing maturity models, and to suggest a different position on the concept of business intelligence maturity, using most common dimensions of BI features to evaluate maturity expectations.


Information ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 128
Author(s):  
Moses Moyo ◽  
Marianne Loock

The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 SMEs from the Limpopo Province were surveyed using an online questionnaire. The study found that: (1) the level of cybersecurity threats awareness among decision-makers was high; (2) decision-makers preferred simple checklists and guidelines over conventional security policies, standards, and frameworks; and (3) decision-makers considered financial risks, data and application security, and cloud service provider reliability as the main aspects to consider when evaluating Cloud BI applications. The study conceptualised a five-component security framework for evaluating Cloud BI applications, integrating key aspects of conventional security frameworks and methodologies. The framework was validated for relevance by IT specialists and acceptance by SME owners. The Spearman correlational test for relevance and acceptance of the proposed framework was found to be highly significant at p < 0.05. The study concluded that SMEs require user-friendly frameworks for evaluating Cloud BI applications. The major contribution of this study is the security evaluation framework conceptualised from the best practices of existing security standards and frameworks for use by decision-makers from small towns in Limpopo. The study recommends that future research consider end-user needs when customising or proposing new solutions for SMEs in small towns.


2004 ◽  
Author(s):  
Jeff Worst ◽  

Sign in / Sign up

Export Citation Format

Share Document