An evaluation of business intelligence tools: a cluster analysis of users’ perceptions
DOI:
https://doi.org/10.37380/jisib.v6i1.152Keywords:
business intelligence, cluster analysis, TAM model, TTF model, user perceptionAbstract
The purpose of this paper is to discuss and evaluate the use of business intelligence (BI) tools by professionals and students to help designers of these tools get the most efficiency out of a monitoring process. This paper explores the business and competitive intelligence literature. BI is considered to be a new area in information systems, so literature research was conducted in the area of management information systems (MIS) with two evaluation models: task-technology fit and technology acceptance to evaluate BI tools. A questionnaire was sent to users of business intelligence tools addressed to French companies in different trades and engineering students and the most pertinent replies were examined. The responses were analyzed using the statistical software SPAD. Results showed a typology from the various profiles of users of this technology using the method of classification. We note different perceptions between professional and student users (the clients). Although this study remains focused on individual perspective, it requires more examination of the organizational impact of the use of BI tools. The identification of the different user profiles was done by using a cluster analysis. For the designers of BI tools these results highlight the importance of user perception, suggesting designers take into account the perception of all user types. As these tools develop, more and more companies will be looking for skills for monitoring and management of strategic information.
References
Abzaltynova, Z. and Williams, J. (2013) Developments in Business Intelligence Software, Journal of Intelligence Studies in Business, No. 2: 40-54. DOI: https://doi.org/10.37380/jisib.v3i2.68
Adamala, S. and Cidrin, L. (2011) Key success factors in business intelligence. Journal of Intelligence Studies in Business, Vol. 1, No. 1: 107-127. DOI: https://doi.org/10.37380/jisib.v1i1.19
Aguilar, F. J. (1967) Scanning the business environment. Macmillan, NY: Macmillan.
Amara, Y., Solberg Soilen, K., Vriens, D., (2012) Using the SSAV model to evaluate Business Intelligence Software, Journal of Intelligence Studies in Business, No. 3: 29-40. DOI: https://doi.org/10.37380/jisib.v2i3.46
Benbasat, I., Nault, B.R., (1990) An evaluation of empirical research in managerial support systems, Decision Support Systems, Vol. 6. DOI: https://doi.org/10.1016/0167-9236(90)90015-J
Blanco, S. (1998) Gestion de l'information et Intelligence stratégique : cas de la selection des signes d'alerte précoce de Veille Stratégique. Th. Doctorat Sciences de Gestion, Grenoble 2 UPMF, CERAG.
Choo, C.W. (1998) Information management for the intelligent organization: the art of the scanning the environment, Medford, NJ: Information today Inc.
Davis, F.D., (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technologies, MIS Quarterly, Vol. 13, No. 3. DOI: https://doi.org/10.2307/249008
Delone, W.H. and McLean, E.R., (2003) The Delone and McLean model of information success: A ten-Year update, Journal of Management Information Systems, Vol. 19, No. 4. DOI: https://doi.org/10.1080/07421222.2003.11045748
Doll, W. J. and Torkzadeh, G., (1998) Developing a multidimensional measure of system-use in an organizational context, Information and Management, Vol. 33. DOI: https://doi.org/10.1016/S0378-7206(98)00028-7
Giald, B., and Giald, T. (1988) The business intelligence system, a new tool for competitive advantage, New York: AMACOM.
Goodhue, D. L. and Thompson R. L., (1995) Task-Technology Fit and Individual Performance, MIS Quarterly, Vol. 19, No. 2. DOI: https://doi.org/10.2307/249689
Grublješič, T., and Jaklič, J., (2014) Customer oriented Management practices leading to BIS embeddedness, Online Journal of applied Knowledge Management, Vol. 2, Issue 1: 11-27.
Herring, J. P., (1998) What is intelligence analysis?, Competitive Intelligence Magazine, Vol.1, No 2 http://www.scip.org/news/cimagazine_article.asp?id=196 (current September 1, 2003)
Kahaner, L. (1998) Competitive Intelligence: How to gather, analyze and use information to move your business to the top, Touchstone.
Lesca, H., and Chokron, M., (2000) Intelligence d’entreprise : retours d’expériences, AIM.
Lesca, H., (2001) Veille stratégique pour le management stratégique. Etat de la question et axes de recherche, in Economies et Sociétés, Série Sciences de Gestion, SG No. 20.
Lesca, H., (2003) Veille stratégique, La méthode LESCAnning. EMS.
Lesca, N. and Caron-Fasan M-L (2006) Veille anticipative, une autre approche de l’intelligence économique, Lavoisier, Paris.
Marmuse, C. (1992) Politique générale: langage, intelligence, modèles et choix stratégiques, Paris, Economica.
Morin J. (1985) L’excellence technologique, Publi-Union, Paris.
Nyblom, M., Behrami, J., Nikkilä, T., Solberg Soilen, K., (2012). An evaluation of Business Intelligence Software systems in SMEs-a case study, Journal of Intelligence Studies in Business, No. 2: 51-57. DOI: https://doi.org/10.37380/jisib.v2i2.41
Rogers E., (2003) Diffusion of innovations, The Free Press, New York, 5th edition.
Ruach, D. and Santi, P., (2001) Competitive Intelligence Adds Value: Five Intelligence Attitudes, European Management Journal, Vol. 19, No. 5. DOI: https://doi.org/10.1016/S0263-2373(01)00069-X
Sabanovic, A., (2012) Customers’ expectations and need in the Business Intelligence Software Market, Journal of Intelligence Studies in Business, No. 2: 5-20. DOI: https://doi.org/10.37380/jisib.v2i1.27
Sakys, V. and Butleris, R. (2011) Business Intelligence tools and technology for the analysis of university studies management. Transformations in Business and Economics, Vol. 10, No. 2: 125-136.
Seddon, P.B., (1997) A respecification and extension of the Delone and McLean model of IS success, Information Systems Research, Vol. 8. DOI: https://doi.org/10.1287/isre.8.3.240
Solberg Soilen, K., (2015) A place for intelligence studies as a scientific discipline, Journal of Intelligence Studies in Business Vol 5, No. 3: 34-46. DOI: https://doi.org/10.37380/jisib.v5i3.136
Solberg Soilen, K., and Hasslinger, A., (2012) Factors shaping vendor differentiation in the Business Intelligence Software industry, Journal of Intelligence Studies in Business, No. 3: 48-54. DOI: https://doi.org/10.37380/jisib.v2i3.48
Thietart, R-A, Vivas, R., (1981) Strategic Intelligence activity: the management of the sales forces as a source of strategic information, Strategic Management Journal, Vol. 2. DOI: https://doi.org/10.1002/smj.4250020103
Venkatesh, V., Morris, MG., Davis, GB, Davis, FD, (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, Vol. 27, No. 3: 425-478. DOI: https://doi.org/10.2307/30036540
Walls, J.G., Widmeyer, G.R., El Sawy, O.A., (1992). Building an information system design theory for vigilant EIS, Information System Research, Vol. 3, No. 1. DOI: https://doi.org/10.1287/isre.3.1.36
Wierenga, B., and Van Bruggen, G.H., (2000) Marketing Management Support Systems: Principles, Tools and Implementation, International Series in Quantitative Marketing. DOI: https://doi.org/10.1007/978-1-4615-4595-8
Wilensky, H., (1967) Organizational intelligence: knowledge and policy in government and industry, New York: Basic Books.
Downloads
Published
Issue
Section
License
Copyright (c) 2016 Journal of Intelligence Studies in Business
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).