Skip to main content
Top

2020 | OriginalPaper | Chapter

Evaluation of Cloud Business Intelligence Prior to Adoption: The Voice of Small Business Enterprises in a South African Township

Authors : Moses Moyo, Marianne Loock

Published in: Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The purpose of this qualitative study was to provide an insight into how small business enterprises from a South African township evaluated cloud business intelligence solutions and the challenges faced. The study found that despite limited knowledge in security evaluation and lack of easy-to-use techniques for small business enterprise, decision makers conducted basic and unsystematic evaluation of cloud business intelligence prior to adoption. Unsystematic security evaluation was mainly on data security, access control functionalities such as authentication, cloud service providers’ security, trust and reliability and financial risks. The study concluded that an easy-to-use security evaluation framework for cloud business intelligence solution tailored for small business enterprises was a necessity to overcome challenges among enterprises in South African townships in order to enhance good security practices when adopting cloud services.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Herwig, V., Friess, K.: Integrating business intelligence services in the cloud: a conceptual model. In: Khosrow-pour, M.H. (ed.) Business Intelligence: Concepts, Methodologies, Tools and Applications, pp. 572–584. IGC Global (2016) Herwig, V., Friess, K.: Integrating business intelligence services in the cloud: a conceptual model. In: Khosrow-pour, M.H. (ed.) Business Intelligence: Concepts, Methodologies, Tools and Applications, pp. 572–584. IGC Global (2016)
3.
go back to reference Llave, M.R.: Business intelligence and analytics in small and medium-sized enterprises: a systematic literature review. Int. J. Bus. Intell. Res. 10(1), 19–41 (2019)CrossRef Llave, M.R.: Business intelligence and analytics in small and medium-sized enterprises: a systematic literature review. Int. J. Bus. Intell. Res. 10(1), 19–41 (2019)CrossRef
4.
go back to reference Moyo, M., Loock, M.: Small and medium-sized enterprises’ understanding of security evaluation of cloud-based business intelligence systems and its challenges. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J. (eds.) ISSA 2018. CCIS, vol. 973, pp. 133–148. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11407-7_10CrossRef Moyo, M., Loock, M.: Small and medium-sized enterprises’ understanding of security evaluation of cloud-based business intelligence systems and its challenges. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J. (eds.) ISSA 2018. CCIS, vol. 973, pp. 133–148. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-11407-7_​10CrossRef
5.
go back to reference Indriasari, E., Prabowo, H., Meyliana, K., Hidayanto, A.N.: Key benefits of cloud business intelligence: a systematic literature review. Int. J. Mech. Eng. Technol. 9(13), 819–831 (2018) Indriasari, E., Prabowo, H., Meyliana, K., Hidayanto, A.N.: Key benefits of cloud business intelligence: a systematic literature review. Int. J. Mech. Eng. Technol. 9(13), 819–831 (2018)
6.
go back to reference Patil, S.S., Chavan, R.: Cloud business intelligence: an empirical study. Stud. Indian Place Names UGC Care J. 27, 747–754 (2020) Patil, S.S., Chavan, R.: Cloud business intelligence: an empirical study. Stud. Indian Place Names UGC Care J. 27, 747–754 (2020)
7.
go back to reference Niekerk, B.V.: An analysis of cyber-incidents in South Africa. African J. Inf. Commun. 20(2017), 113–132 (2017)CrossRef Niekerk, B.V.: An analysis of cyber-incidents in South Africa. African J. Inf. Commun. 20(2017), 113–132 (2017)CrossRef
11.
go back to reference Elmalah, K., Nasr, M.: Cloud business intelligence. Int. J. Adv. Netw. Appl. 10(6), 4120–4124 (2019) Elmalah, K., Nasr, M.: Cloud business intelligence. Int. J. Adv. Netw. Appl. 10(6), 4120–4124 (2019)
12.
go back to reference Alia, M., Khana, S., Vasilakos, A.: Security in cloud computing: Opportunities and challenges. Inf. Sci. (NY) 2015(305), 357–384 (2015)MathSciNetCrossRef Alia, M., Khana, S., Vasilakos, A.: Security in cloud computing: Opportunities and challenges. Inf. Sci. (NY) 2015(305), 357–384 (2015)MathSciNetCrossRef
13.
go back to reference Khan, N., Al-Yasiri, A.: Framework for cloud computing adoption: a roadmap for SMEs to cloud migration. Int. J. Cloud Comput. Serv. Archit. 5(56), 258–269 (2015) Khan, N., Al-Yasiri, A.: Framework for cloud computing adoption: a roadmap for SMEs to cloud migration. Int. J. Cloud Comput. Serv. Archit. 5(56), 258–269 (2015)
17.
go back to reference Bradshaw, C., Atkinson, S., Doody, O.: Employing a qualitative description approach in health care. Res. Glob. Qual. Nurs. Res. 4(1–8) (2017) Bradshaw, C., Atkinson, S., Doody, O.: Employing a qualitative description approach in health care. Res. Glob. Qual. Nurs. Res. 4(1–8) (2017)
18.
go back to reference Vasileiou, K., Barnett, J., Thorpe, S., Young, T.: Characterising and justifying sample size sufficiency in interview-based studies: systematic analysis of qualitative health research over a 15-year period. BMC Med. Res. Methodol. 18(148), 125–136 (2018) Vasileiou, K., Barnett, J., Thorpe, S., Young, T.: Characterising and justifying sample size sufficiency in interview-based studies: systematic analysis of qualitative health research over a 15-year period. BMC Med. Res. Methodol. 18(148), 125–136 (2018)
19.
go back to reference Kaushik, V., Walsh, C.A.: Pragmatism as a research paradigm and its implications for Social Work research. Soc. Sci. 8(9) (2019) Kaushik, V., Walsh, C.A.: Pragmatism as a research paradigm and its implications for Social Work research. Soc. Sci. 8(9) (2019)
20.
go back to reference Polit, D., Beck, T.: Nursing research, generating and assessing evidence for nursing practice, 10th edn. Lippincott Williams and Wilkins, Philadelphia (2017) Polit, D., Beck, T.: Nursing research, generating and assessing evidence for nursing practice, 10th edn. Lippincott Williams and Wilkins, Philadelphia (2017)
21.
go back to reference Clarke, V., Braun, V.: Teaching thematic analysis: overcoming challenges and developing strategies for effective learning. Psychology 26(2), 120–123 (2013) Clarke, V., Braun, V.: Teaching thematic analysis: overcoming challenges and developing strategies for effective learning. Psychology 26(2), 120–123 (2013)
22.
go back to reference Majhi, S.K., Dhal, S.K.: A study on security vulnerability on cloud platforms. Phys. Procedia 78(2016), 55–60 (2016) Majhi, S.K., Dhal, S.K.: A study on security vulnerability on cloud platforms. Phys. Procedia 78(2016), 55–60 (2016)
23.
go back to reference Salim, S., Sedera, D., Sawang, S., Alarifi, A., Atapattu, M.: Moving from evaluation to trial: how do SMEs start adopting Cloud ERP? Australas. J. Inf. Syst. 2015(19), S219–S254 (2015) Salim, S., Sedera, D., Sawang, S., Alarifi, A., Atapattu, M.: Moving from evaluation to trial: how do SMEs start adopting Cloud ERP? Australas. J. Inf. Syst. 2015(19), S219–S254 (2015)
24.
go back to reference Agostino, A., Soilen, S.K., Gerritsen, B.: Cloud solution in business intelligence for SMEs –vendor and customer perspectives. J. Intell. Stud. Bus. 3(2013), 5–28 (2013) Agostino, A., Soilen, S.K., Gerritsen, B.: Cloud solution in business intelligence for SMEs –vendor and customer perspectives. J. Intell. Stud. Bus. 3(2013), 5–28 (2013)
25.
go back to reference Bach, M.P., Celjo, A., Zoroja, J.: Technology acceptance model for business intelligence systems: preliminary research. Procedia Comput. Sci. 100(2016), 995–1001 (2016)CrossRef Bach, M.P., Celjo, A., Zoroja, J.: Technology acceptance model for business intelligence systems: preliminary research. Procedia Comput. Sci. 100(2016), 995–1001 (2016)CrossRef
27.
go back to reference Chaudhari, N., Al-Yasiri, A.: A cloud security approach for data at rest. Int. J. Cloud Comput. Serv. Archit. 5(1), 11–16 (2015) Chaudhari, N., Al-Yasiri, A.: A cloud security approach for data at rest. Int. J. Cloud Comput. Serv. Archit. 5(1), 11–16 (2015)
Metadata
Title
Evaluation of Cloud Business Intelligence Prior to Adoption: The Voice of Small Business Enterprises in a South African Township
Authors
Moses Moyo
Marianne Loock
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-63396-7_30

Premium Partner