An evaluation of business intelligence tools: a cluster analysis of users’ perceptions
DOI:
https://doi.org/10.37380/jisib.v6i1.152Keywords:
business intelligence, cluster analysis, TAM model, TTF model, user perceptionAbstract
The purpose of this paper is to discuss and evaluate the use of business
intelligence (BI) tools by professionals and students to help designers of these tools get the most
efficiency out of a monitoring process. This paper explores the business and competitive
intelligence literature. BI is considered to be a new area in information systems, so literature
research was conducted in the area of management information systems (MIS) with two
evaluation models: task-technology fit and technology acceptance to evaluate BI tools. A
questionnaire was sent to users of business intelligence tools addressed to French companies in
different trades and engineering students and the most pertinent replies were examined. The
responses were analyzed using the statistical software SPAD. Results showed a typology from
the various profiles of users of this technology using the method of classification. We note
different perceptions between professional and student users (the clients). Although this study
remains focused on individual perspective, it requires more examination of the organizational
impact of the use of BI tools. The identification of the different user profiles was done by using
a cluster analysis. For the designers of BI tools these results highlight the importance of user
perception, suggesting designers take into account the perception of all user types. As these
tools develop, more and more companies will be looking for skills for monitoring and
management of strategic information.
References
Abzaltynova, Z. and Williams, J. (2013)
Developments in Business Intelligence
Software, Journal of Intelligence Studies in
Business, No. 2: 40-54.
Adamala, S. and Cidrin, L. (2011) Key success
factors in business intelligence. Journal of
Intelligence Studies in Business, Vol. 1, No. 1:
-127.
Aguilar, F. J. (1967) Scanning the business
environment. Macmillan, NY: Macmillan.
Amara, Y., Solberg Soilen, K., Vriens, D., (2012)
Using the SSAV model to evaluate Business
Intelligence Software, Journal of Intelligence
Studies in Business, No. 3: 29-40.
Benbasat, I., Nault, B.R., (1990) An evaluation of
empirical research in managerial support
systems, Decision Support Systems, Vol. 6.
Blanco, S. (1998) Gestion de l'information et
Intelligence stratégique : cas de la sélection
des signes d'alerte précoce de Veille
Stratégique. Th. Doctorat Sciences de Gestion,
Grenoble 2 UPMF, CERAG.
Choo, C.W. (1998) Information management for
the intelligent organization: the art of the
scanning the environment, Medford, NJ:
Information today Inc.
Davis, F.D., (1989) Perceived usefulness,
perceived ease of use, and user acceptance of
information technologies, MIS Quarterly, Vol.
, No. 3.
Delone, W.H. and McLean, E.R., (2003) The
Delone and McLean model of information
success: A ten-Year update, Journal of
Management Information Systems, Vol. 19,
No. 4.
Doll, W. J. and Torkzadeh, G., (1998) Developing
a multidimensional measure of system-use in
an organizational context, Information and
Management, Vol. 33.
Giald, B., and Giald, T. (1988) The business
intelligence system, a new tool for competitive
advantage, New York: AMACOM.
Goodhue, D. L. and Thompson R. L., (1995) Task-
Technology Fit and Individual Performance,
MIS Quarterly, Vol. 19, No. 2.
Grublješič, T., and Jaklič, J., (2014) Customer
oriented Management practices leading to BIS
embeddedness, Online Journal of applied
Knowledge Management, Vol. 2, Issue 1: 11-
Herring, J. P., (1998) What is intelligence
analysis?, Competitive Intelligence Magazine,
Vol.1, No 2
http://www.scip.org/news/cimagazine_article.
asp?id=196 (current September 1, 2003)
Kahaner, L. (1998) Competitive Intelligence:
How to gather, analyze and use information to
move your business to the top, Touchstone.
Lesca, H., and Chokron, M., (2000) Intelligence
d’entreprise : retours d’expériences, AIM.
Lesca, H., (2001) Veille stratégique pour le
management stratégique. Etat de la question
et axes de recherche, in Economies et Sociétés,
Série Sciences de Gestion, SG No. 20.
Lesca, H., (2003) Veille stratégique, La méthode
LESCAnning. EMS.
Lesca, N. and Caron-Fasan M-L (2006) Veille
anticipative, une autre approche de
l’intelligence économique, Lavoisier, Paris.
Marmuse, C. (1992) Politique générale: langage,
intelligence, modèles et choix stratégiques,
Paris, Economica.
Morin J. (1985) L’excellence technologique, Publi-
Union, Paris.
Nyblom, M., Behrami, J., Nikkilä, T., Solberg
Soilen, K., (2012). An evaluation of Business
Intelligence Software systems in SMEs-a case
study, Journal of Intelligence Studies in
Business, No. 2: 51-57.
Rogers E., (2003) Diffusion of innovations, The
Free Press, New York, 5th edition.
Ruach, D. and Santi, P., (2001) Competitive
Intelligence Adds Value: Five Intelligence
Attitudes, European Management Journal,
Vol. 19, No. 5.
Sabanovic, A., (2012) Customers’ expectations
and need in the Business Intelligence
Software Market, Journal of Intelligence
Studies in Business, No. 2: 5-20.
Sakys, V. and Butleris, R. (2011) Business
Intelligence tools and technology for the
analysis of university studies management.
Transformations in Business and Economics,
Vol. 10, No. 2: 125-136.
Seddon, P.B., (1997) A respecification and
extension of the Delone and McLean model of
IS success, Information Systems Research,
Vol. 8.
Solberg Soilen, K., (2015) A place for intelligence
studies as a scientific discipline, Journal of
Intelligence Studies in Business Vol 5, No. 3:
-46.
Solberg Soilen, K., and Hasslinger, A., (2012)
Factors shaping vendor differentiation in the
Business Intelligence Software industry,
Journal of Intelligence Studies in Business,
No. 3: 48-54.
Thietart, R-A, Vivas, R., (1981) Strategic
Intelligence activity: the management of the
sales forces as a source of strategic
information, Strategic Management Journal,
Vol. 2.
Venkatesh, V., Morris, MG., Davis, GB, Davis,
FD, (2003) User acceptance of information
technology: toward a unified view. MIS
Quarterly, Vol. 27, No. 3: 425-478.
Walls, J.G., Widmeyer, G.R., El Sawy, O.A.,
(1992). Building an information system design
theory for vigilant EIS, Information System
Research, Vol. 3, No. 1.
Wierenga, B., and Van Bruggen, G.H., (2000)
Marketing Management Support Systems:
Principles, Tools and Implementation,
International Series in Quantitative
Marketing.
Wilensky, H., (1967) Organizational intelligence:
knowledge and policy in government and
industry, New York: Basic Books.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).