Vous êtes sur la page 1sur 12

This article was downloaded by: [202.62.121.

66] On: 14 February 2012, At: 01:07 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK

Information Systems Management


Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/uism20

Business Intelligence: An Analysis of the Literature


Zack Jourdan , R. Kelly Rainer & Thomas E. Marshall
a a a a

Department of Management, College of Business, Auburn University, Auburn, Alabama, USA

Available online: 07 Apr 2008

To cite this article: Zack Jourdan, R. Kelly Rainer & Thomas E. Marshall (2008): Business Intelligence: An Analysis of the Literature , Information Systems Management, 25:2, 121-131 To link to this article: http://dx.doi.org/10.1080/10580530801941512

PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and-conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.

Information Systems Management, 25: 121131 Copyright Taylor & Francis Group, LLC ISSN: 1058-0530 print/1934-8703 online DOI: 10.1080/10580530801941512
UISM

Business Intelligence: An Analysis of the Literature1


Business Intelligence: An Analysis of the Literature

Zack Jourdan, R. Kelly Rainer, and Thomas E. Marshall Department of Management, College of Business, Auburn University, Auburn, Alabama, USA

Abstract This research collects, synthesizes, and analyzes 167 articles on a variety of topics closely
related to business intelligence (BI) published from 1997 to 2006 in ten leading Information Systems (IS) journals. We found a generally increasing level of activity during the 10-year period and a focus on exploratory research methodologies. We noted that several methodologies were either underrepresented or absent from the pool of BI research. We also identified several subject areas that need further exploration.

Downloaded by [202.62.121.66] at 01:07 14 February 2012

Keywords business analytics, business intelligence, competitive intelligence, data


mining, data warehousing, literature review, content analysis

Managers and researchers alike have been working to develop IS that provide business intelligence (BI). BI is both a process and a product. The process is composed of methods that organizations use to develop useful information, or intelligence, that can help organizations survive and thrive in the global economy. The product is information that will allow organizations to predict the behavior of their competitors, suppliers, customers, technologies, acquisitions, markets, products and services, and the general business environment with a degree of certainty (Vedder, Vanecek, Guynes, & Cappel, 1999). The stakes are high for organizations to develop successful BI implementations. Winning companies, such as Continental Airlines, have seen investments in BI generate increases in revenue and produce cost savings equivalent to a 1000% return on investment (ROI) (Watson, Wixom, Hoffer, Anderson-Lehman, & Reynolds, 2006). On the other hand, losing companies have spent more resources than their competitors with a smaller ROI, all while watching their market share and customer base continuously shrink (Gessner & Volonino, 2005). Two related needs provide the motivation for this paper. First, the growing body of BI research necessitates a review of this literature with the intent of identifying

critical knowledge gaps and thus motivate researchers to close this breach (Webster and Watson, 2002). Second, as noted by Scandura & Williams (2000), in order for research to advance, the methods used by researchers must periodically be evaluated to provide insights into the methods utilized and thus the methods which should also be used in a given research field. This study analyzes the BI literature and then proposes an agenda for future research efforts. The remainder of the paper is organized as follows. Section 2 describes the approach to the analysis of BI research, Section 3 contains the results of the research, and Section 4 discusses the limitations of the project and possible future research efforts.

Research Study
We examined the number and distribution of BI articles published in leading journals, the methodologies employed in BI research, and the research topics being addressed in BI research. During our analysis, we identified gaps in the research which would allow us to propose and discuss a research agenda that will facilitate the progression of BI research (Webster & Watson, 2002). We hope to paint a representative landscape of the current BI literature base in order to influence the direction of future research efforts in this important field. In order to examine the current state of research on BI, we conducted a literature review and analysis in three phases. First, we accumulated a representative pool of
121

Note: For the full bibliography of the 167 articles, please contact Kelly Rainer at rainer@business.auburn.edu 1 For the full bibliography of the 167 articles, please contact Kelly Rainer at rainer@business.auburn.edu Address Corresspondence to R. Kelly Rainer, Jr., Department of Management, College of Business, Auburn University, Auburn, Alabama 36849, USA. E-mail: rainer@business.auburn.edu

122

Jourdan, Rainer, and Marshall

articles, then classified the articles by research method, and finally classified the articles by research topic.

Phase 1 Accumulation of Article Pool

Phase 2 Categorization by Research Strategy


Conceptualize/ Define Strategies

Phase 3 Categorization by BI Category

Accumulation of Article Pool


Because BI research is typically published in many IS journals, we searched through a ten year period (19972006) of ten leading IS journals. In order to decide which journals to search, we chose four recent rankings for IS journals (Rainer & Miller, 2005; Lowry, Romans, & Curtis, 2004; Katerattanakul, Han, & Hong, 2003; Peffers & Ya, 2003). By selecting the top journals in each of these four rankings, we created a list of ten journals (see Table 1). We deliberately did not search journals devoted to one particular area of business intelligence because we wanted general, mainstream journals, rather than specialized journals. We then used the ABI/INFORM database to search for the research articles by searching the titles and abstracts of each of the ten journals using phrases such as business analytics, business intelligence, data mining, and data warehousing. Because we were looking for research articles in the topic area of BI, we eliminated any result that was a book review or an editorial.

Determine Journal Pool

Conceptualize/ Define Categories

Extract Articles from Journals

Create Codebook & Coding Form

Create Codebook & Coding Form

Develop Pilot & Train Coders Delete Irrelevant Articles Discuss Disagreements

Develop Pilot & Train Coders

Discuss Disagreements

Refine Definitions & Codebook

Refine Definitions & Codebook

Code by Research Strategy

Code by Research Category

Downloaded by [202.62.121.66] at 01:07 14 February 2012

Resolve Disagreements using Arbitrator

Calculate Intercoder Reliability

Resolve Disagreements using Arbitrator

Calculate Intercoder Reliability

Calculate Results

Calculate Results

Figure 1.

Overview of literature analysis.

Classification by Research Strategy


Once we identified the articles, we examined the research strategy used in each article and categorized it according to that strategy. Due to the subjective nature of method classification, we performed a content analysis of the articles. Figure 1 shows the process we followed, which was adapted from Neuendorf (2002). First, we defined the research method categories utilizing those presented in Scandura and Williams (2000), who extended the research strategies initially described by McGrath (1982). Specifically, we used nine categories of research strategies: Formal theory/literature reviews (FT/LR), sample survey, laboratory experiment, experimental simulation, field

Table 1.
# 1 2 3 4 5 6 7 8 9 10

Journals in Study
Acronym MISQ ISR CACM JMIS MS JACM EJIS IEEETSE I&M HBR

Journal Title MIS Quarterly Information Systems Research Communications of the ACM Journal of Management Information Systems Management Science Journal of the ACM European Journal of Information Systems IEEE Transactions on Software Engineering Information & Management Harvard Business Review

study (primary data), field study (secondary data), field experiment, judgment task, and computer simulation. To guard against the threats to reliability (Neuendorf, 2002), we performed a pilot on unused articles, discussed the results, and refined the definitions. Each research strategy is defined by a specific design approach and each is also associated with certain tradeoffs that researchers must make when designing a study. These trade-offs are inherent flaws that limit the conclusions that can be drawn from a particular research strategy. These trade-offs refer to three aspects of a study that can vary depending on the research strategy employed. These variable aspects include: generalizability from the sample to the target population (external validity); precision in measurement and control of behavioral variables (internal and construct validity); and the issue of realism of context (Scandura & Williams, 2000). Cook and Campbell (1976) stated that a study has generalizability when the study has external validity across times, settings, and individuals. Formal theory/ literature reviews and sample surveys have a high degree of generalizability by establishing the relationship between two constructs and illustrating that this relationship has external validity. A research strategy that has low external validity but high internal validity is the laboratory experiment. In the laboratory experiment, where the degree of precision of measurement is high, cause and effect relationships may be determined, but these relationships may not be generalizable for other

Business Intelligence: An Analysis of the Literature

123

Downloaded by [202.62.121.66] at 01:07 14 February 2012

times, settings, and populations. While the formal theory/ literature reviews and sample surveys have a high degree of generalizability and the laboratory experiment has a high degree of precision of measurement, these strategies have low degree of realism of context. The only two strategies that maximize degree of realism of context are field studies using either primary or secondary data because the data is collected in a field setting (Scandura & Williams, 2000). The other four strategies maximize neither generalizability, nor degree of precision of measurement, nor degree of realism of context. This point illustrates the futility of using only one strategy when conducting IS research. Because no one strategy can maximize all types of validity, it is best for researchers to use a variety of research strategies. Table 2 contains an overview of the nine strategies and their ranking on the three strategy tradeoffs (Scandura & Williams, 2000). We then classified the articles independently as to research strategy. We coded only a few articles at a time to minimize coder fatigue and thus protect intercoder reliability (Neuendorf, 2002). Upon completion of the independent classification, we tabulated agreements and disagreements, intercoder crude agreement (percent of agreement), and intercoder reliability using Cohens kappa (Cohen, 1960). The latter two calculations were
Table 2.

well within the acceptable ranges for intercoder crude agreement and intercoder reliability (Neuendorf, 2002). We calculated the reliability measures prior to discussing disagreements as mandated by Weber (1990). If two reviewers did not agree on how a particular article was coded, a third reviewer arbitrated the discussion of how the disputed article was to be coded. This process resolved the disputes in all cases.

Classification by BI Research Topic


To classify articles by research topic, we held several brainstorming and discussion sessions where we attempted to identify BI topics with the intent to categorize the diverse body of literature. In these discussion sessions, we sought to synthesize the literature and provide a better understanding of the current state of BI research. Once we established the category definitions, we independently placed each article in one BI category. As before, we placed only a few articles at a time to minimize coder fatigue and thus protect intercoder reliability (Neuendorf, 2002). Upon completion of the classification process, we tabulated agreements and disagreements, intercoder crude agreement (percent of agreement), and intercoder reliability using Cohens kappa (Cohen, 1960)

Research Strategies*
Strategy Tradeoffs Degree of Precision of Measurement Low Degree of Realism of Context Low Generalizability to Target Population Maximizes

Research Strategy Formal Theory/Literature Reviews Sample Survey

Description Summarization of the literature in an area of research in order to conceptualize models for empirical testing. The investigator tries to neutralize context by asking for behaviors that are unrelated to the context in which they are elicited. Participants are brought into an artificial setting, usually one that will not significantly impact the results. A situation contrived by a researcher in which there is an attempt to retain some realism of context through use of simulated situations or scenarios. Investigates behavior in its natural setting. Involves collection of data by researchers. Involves studies that use secondary data (data collected by a person, agency, or organization other than the researchers. Collecting data in a field setting but manipulating behavior variables. Participants judge or rate behaviors. Sampling is systematic vs. representative, and the setting is contrived. Involves artificial data creation or simulation of a process.

Low

Low

Maximizes

Laboratory Experiment

Maximizes

Low

Low

Experimental Simulation

Moderate

Moderate

Low

Field study: Primary Data Field Study: Secondary Data

Low Low

Maximizes Maximizes

Low Low

Field Experiment Judgment Task

Moderately high Moderately high

Moderately high Low

Low Moderately high

Computer Simulation

Low

Moderately high

Moderately high

*Source:

Scandura & Williams, 2000.

124

Jourdan, Rainer, and Marshall

for each category. Again, the latter two calculations were well within the acceptable ranges (Neuendorf, 2002). We again calculated the reliability measures prior to discussing disagreements as mandated by Weber (1999). If two reviewers did not agree on how a particular article was coded, a third reviewer arbitrated the discussion of how the disputed article was to be coded. This process also resolved the disputes in all cases.

Table 4.
Journal Name

BI Articles as a Percentage of Total Articles


BI 18 17 21 51 10 12 5 19 10 4 Articles/Year 20 20 32 84 24 44 30 120 90 48 Years 10 10 10 10 10 10 10 10 10 10 Total 200 200 320 840 240 440 300 1200 900 480 % 9.00 8.50 6.56 6.07 4.17 2.73 1.67 1.58 1.11 0.83

Results
Using the described search criteria within the selected journals, we collected a total of 167 articles. (For the complete list of articles in the sample, see Appendix A.) We then analyzed the articles year of publication, journal, and author. Table 3 shows the number of articles per year in our sample. With BI issues becoming more important to researchers and practitioners, we see a generally increasing trend in the number of articles per year. In order to determine the degree to which leading IS journals publish BI research, we calculated the percentage of BI articles based on the total number of articles published in each journal in the ten-year period. Calculating this percentage involved several steps. First, three sample issues of each journal were examined to determine the average total number of articles per issue. We counted any article within the journal over five pages in length to eliminate editors notes, book reviews, and editorial pages. Second, the number of articles per issue was multiplied by the number of issues that each journal publishes in a year. This number gave us the estimated number of total articles for a journal during the ten-year period we were studying. Finally, we calculated the percentage of BI articles by dividing the actual number of BI articles in a journal by the estimated total number of articles in a journal. As shown in Table 4, some top IS journals publish very little BI research while others devote a substantial amount of space to this research.

European Journal of Information Systems MIS Quarterly Information & Management Communications of the ACM Information Systems Research Journal of Management Information Systems Journal of the ACM Management Science Harvard Business Review IEEE Transactions on Software Engineering

Downloaded by [202.62.121.66] at 01:07 14 February 2012

Analysis of Research Strategies in BI Research


The categorization of the 167 articles according to the nine research strategies produced the following results. Ninety-four articles (56%) were classified as Formal Theory/ Literature review making it the most prevalent research strategy. Other categories, in decreasing order, are Field Study-Primary Data (21 articles), Field Study-Secondary Data (19 articles), Sample Survey (13 articles), Computer Simulation (10 articles), Lab Experiment (7 articles), and Field Experiment (3 articles). No articles were classified as either Experimental Simulation or Judgment Task. Analysis of the research strategies over the ten year period from 1997 to 2006 (Table 5) illustrates that Formal Theory/Literature Review, Field StudyPrimary Data, Field Study Secondary Data, and Sample Survey are represented in almost every year of the time frame. These four strategies are exploratory in nature and indicate the beginnings of a body of research (Scandura & Williams, 2000).

BI Research Categories
Table 3. Number of BI Articles per Year
Year 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 Number of BI Articles 5 6 10 24 17 9 26 18 25 27

As we analyzed the articles, five relatively distinct categories emerged. The Artificial Intelligence (AI) category consists of algorithms and applications of AI. The applications of the AI category addressed classification, prediction, web mining and machine learning. The Benefits category details how organizations have used data warehousing, data mining, and/or an enterprise-wide BI systems to achieve some measurable financial benefit. The Decision category contains articles related to improving overall decision making and includes such subjects as data modeling, decision-making, and decision modeling. The Implementation category covers project management issues

Business Intelligence: An Analysis of the Literature

125

Table 5.
1997 Formal Theory/Lit. Review Field Study-Primary Field Study-Secondary Sample Survey Computer Simulation Lab Experiment Field Experiment Experimental Simulation Judgment Task Total 3 2 1998 4 2 1999 6 1 2 1

Research Strategy vs. Year


2000 17 1 1 3 1 1 2001 10 3 3 1 2002 5 2 2 2003 14 2 3 3 2 2 2004 8 4 2 1 2 1 2005 13 1 5 1 2 1 2 2006 14 3 4 1 2 2 1 Total 94 21 19 13 10 7 3 0 0 167

10

24

17

26

18

25

27

in a variety of BI contexts including data warehousing, data mining, customer relationship management (CRM), enterprise resource planning (ERP), knowledge management systems (KMS), and eBusiness projects. The final and most diverse category is Strategies. This category focuses on how to apply BI tools and technologies in the modern business environment. The category covers such diverse topics as improving internal performance (i.e., enterprise agility, marketing, and integrating business functions), working with external partners to improve collaboration in the supply chain, and providing the customer a better experience through customization/personalization and customer relationship management (CRM). BI research covers diverse subjects ranging from practical applications of neural networks (Baesens, Rudy, Mues, & Vanthienen, 2003), to end-user satisfaction (Chen, Soliman, Mao, & Frolick, 2000), to the use of clustering as a business strategy to gain a competitive advantage (Porter, 1998). The researchers conducting BI research have backgrounds as varied as marketing (Cui, Wong, & Lui, 2006), management information systems (Watson, Goodhue, & Wixom, 2002), and computer science (Menzies, Chen, Hihn, & Lum, 2006). To integrate BI research stemming from such disparate backgrounds, we placed the BI literature into research categories. In Table 6, the BI categories are displayed along with some of the topics relevant to each category.
Table 6.
Category Artificial Intelligence Benefits Decisions Implementation Strategies

Downloaded by [202.62.121.66] at 01:07 14 February 2012

These five categories provided a subject-area classification for all of the 167 articles in our research sample. Fifty-nine articles were classified as Strategies, making it the most prevalent BI category. This category was followed by Artificial Intelligence (37 articles), Implementation (35 articles), and Decisions (26 articles). These four research strategies accounted for 94% of the articles in the sample. The category Benefits represented the remaining six per cent (10 articles). These numbers illustrate the categories of BI research that have received the most and least attention in the IS journals.

BI Category vs. Research Strategy


An examination of BI category versus research strategy (Table 7) identifies the research strategies used in articles on the various BI topics. Articles on all five BI topics used the FT/LR research strategy most often. Approximately one-half the articles in the Artificial Intelligence, Benefits, Decisions, and Implementation categories utilized the FT/LR strategy. However, almost three-fourths of the articles in the Strategies topic area used the FT/LR strategy. Other than FT/LR, the technology-focused category of Artificial Intelligence used field-secondary and computer simulations the most frequently. The technology-focused category of Decisions used lab experiments most frequently. On the other hand, the less technical categories of Benefits, Implementation, and Strategies relied more heavily on sample surveys and field studies using both primary and secondary data. The rationale for these findings is as follows. First, the FT/LR strategy is the most appropriate strategy for the early stages of research in any area. In these exploratory years of BI research, formal theory/literature reviews are appropriate for theory formulation and development. Second, researchers in business schools may be more skilled in administering sample surveys and performing field studies, and may not typically employ strategies such as laboratory experiment,

BI Categories
Topics Number of Articles 37

Algorithms, Classification, Machine Learning, Prediction, Web Mining Data Mining, Enterprise-wide IS Data Modeling, Decision Making, Decision Modeling CRM, DM, DSS, DW, eBusiness, ERP, KMS, Project Management Collaboration, Competition, Customization, Integration, etc.

10 26 35 59

126

Jourdan, Rainer, and Marshall

Table 7.
FT/LR Artificial Intelligence Benefits Decisions Implementation Strategies Total 17 5 12 17 43 94 Survey 1 2 1 6 3 13 Lab Exp.

BI Category vs. Research Strategy


Field - Pri. Field - Sec. 10 2 3 2 2 19 Field Exp. 2 Judgment Task Comp. Sim. 7 1 1 3 2 10 Total 37 10 26 35 59 167

Exp. Sim.

1 2 10 8 21

Downloaded by [202.62.121.66] at 01:07 14 February 2012

experimental simulation, judgment task, and computer simulation. For example, the majority of articles found in our search that used the computer simulation research strategy were written by computer scientists and computer engineers, while the majority of articles using sample surveys were written by business researchers. Finally, organizations are often less likely to commit to certain strategies (i.e., primary and secondary field studies and field experiments) because these strategies are more expensive for the organizations. These types of research strategies are very labor intensive to the organization being studied because records will need to be examined, personnel will need to be interviewed, and senior managers will be required to devote large amounts of their time to help facilitate the research project.

Areas for Future Research in Business Intelligence


It is interesting that the Theory Formulation/Literature Review research strategy remains the most prevalent strategy after so many years. The focus of BI researchers could shift to other research strategies. Also notable is that the Survey research strategy has been used so little. Perhaps additional survey research would provide value to this field. In addition, the Benefits topic deserves more attention. One of the reasons for so few articles published in this area is probably the difficulty in quantifying the benefits of improved decision making attributed to BI systems.

In addition, much of the research in our sample addresses new technologies and issues in BI without attempting to explain the fundamental issues of information systems research as it relates to BI. This is to be expected in the exploratory stages of research in a subject area. However, our study indicates that enough research in FT/LR has been done to begin formulating guiding theories in BI research. For researchers to continue to address important questions in BI, future studies need to employ a wider variety of research strategies. Scandura and Williams (2000) stated that looking at research strategies employed over time by triangulation in a given subject area can provide useful insights into how theories are developing. In addition to the lack of variety in research strategy, very little triangulation has occurred during the timeframe used to conduct this literature review. This absence of coordinated theory development causes the research in BI to appear haphazard and unfocused. However, the good news is that many of the categories and research strategies in BI research are open for future research efforts. We hope that this research analysis has laid the foundation for such efforts that will enhance the IS body of knowledge and theoretical progression relative to BI.

Author Bios
Zack Jourdan is an Assistant Professor of Management Information Systems at Georgia Southwestern University. He is a doctoral candidate at Auburn University. His current research interests include various aspects of information security and risk analysis. R. Kelly Rainer, Jr. is George Phillips Privett Professor of Management Information Systems at Auburn University, Auburn, Alabama. He received his Ph.D from the University of Georgia. His current research interests include information security and risk analysis, and healthcare information systems. His most recent book (co-authored with Efraim Turban) is Introduction to Information Systems, 2007, John Wiley and Sons. Thomas E. Marshall is an Associate Professor of Management Information Systems at Auburn University,

Limitations and Directions for Future Research


Our analysis of the BI literature is not without limitations. Future literature reviews could search a broader domain of research outlets. Further, future BI studies should consider the research gaps that we have identified in light of generalizability, precision of measure, and realism of context. Future efforts should also consider the five BI categories with respect to the research strategies.

Business Intelligence: An Analysis of the Literature

127

Auburn, Alabama. He received his Ph.D from the University of North Texas. His current research interests include information security, various aspects of database management, and geographical information systems.

References
Chen, L., Soliman, K. S., Mao, E., & Frolick, M. N. (2000). Measuring User Satisfaction with Data Warehouses: An exploratory study. Information & Management, 37(3), 103110. Cohen, J. (1960). A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement, 20(1), 3746. Cook, T. D., & Campell, D. T. (1976). The Design and Conduct of Quasi-experiments and True Experiments in Field Settings. In Handbook of Industrial and Organizational Psychology, M.D. Dunnette, Ed. Chicago, IL: Rand McNally. Cui, G., Wong, M. L., & Lui, H. (2006). Machine Learning for Direct Marketing Response Models: Bayesian network with evolutionary programming. Management Science, 52(4), 597612. Cumbie, B. A., Jourdan, S. Z., Peachey, T. A., Dugo, T. M. & Craighead, C. W. (2005). Enterprise Resource Planning Research: Where Are We Now and Where Should We Go from Here? Journal of Information Technology Theory & Application, 7(2), 2136. Gessner, G. H. & Volonino, L. (2005). Quick Response Improves Return on Business Intelligence Investments. Information Systems Management, 22(3), 6674. Katerattanakul, P., Han, B., & Hong, S. (2003). Objective quality ranking of computing journals. Communications of the ACM, 46(10), 111114. Lowry, P., Romans, D., & Curtis, A. (2004). Global journal prestige and supporting disciplines: A scientometric study of information systems journals. Journal of the Association of Information Systems, 5(2), 2975. McGrath, J. (1982). Dilemmatics: The study of research choices and dilemmas. In Judgment Calls in Research, J. E. McGrath, J. Martin, & R. A. Kilka, Eds. Beverly Hills, CA: SAGE Publications. Neuendorf, K. A. The Content Analysis Guidebook. Thousand Oaks, CA: SAGE Publications. Peffers, K., & Ya, T. (2003). Identifying and Evaluating the Universe of Outlets for Information Systems Research: Ranking the journals. JITTA: Journal of Information Technology Theory and Application, 5(1), 6384. Porter, M. (1998). Clusters and the New Economics of Competition. Harvard Business Review, 76(6), 7790. Rainer, R. K., Jr. and Miller, M. (2005). Examining differences across journal rankings. Communications of the ACM, (48:2), 9194. Scandura, T. A., and Williams, E. A. (2000). Research Methodology in Management: Current practices, trends, and implications for future research. Academy of Management Journal, 43(6), 12481264. Vedder, R. G., Vanecek, M. T., Guynes, C. S., & Cappel, J. J. (1999). CEO and CIO Perspectives on Competitive Intelligence. Communications of the ACM, 42(8), 108116. Watson, H. J., Goodhue, D. L., & Wixom, B. H. (2002). The Benefits of Data Warehousing: Why some organizations realize exceptional payoffs. Information & Management, 39(6), 491502.

Watson, H. J., Wixom, B. H., Hoffer, J. A., Anderson-Lehman, R., & Reynolds, A. M. (2006). Real-Time Business Intelligence: Best practices at Continental Airlines. Information Systems Management, 23(1), 718. Weber, R. H., (1990). Basic Content Analysis (2nd ed.) Thousand Oaks, CA: Sage Publications. Webster, J., & Watson, R. T. (2002) Analyzing the Past to Prepare for the Future: Writing a literature review. MIS Quarterly, 26(2), xiiixxiii.

Appendix A. Complete List of BI Articles


Abramson, C., Currim, I. S., & Sarin, R. (2005). An Experimental Investigation of the Impact of Information on Competitive Decision Making. Management Science, 51(2), 195207. Adam, N. R., Atluri, V., & Adiwijaya, I. (2000). SI in Digital Libraries. Communications of the ACM, 43(6), 6472. Adomavicius, G. & Tuzhilin, A. (2005). Personalization Technologies: A process-oriented perspective. Communications of the ACM, 48(10), 8390. Alavi, M. & Leidner, D. E. (2001). Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25(1), 107136. Albert, T. C., Goes, P. B., & Gupta, A. (2004). GIST: A model for design and management of content and interactivity of customer-centric web sites. MIS Quarterly, 28(2), 161182. Allmendinger, G. & Lombreglia, R. (2005). Four Strategies for the Age of Smart Services. Harvard Business Review, 83(10), 131145. Anand, B. & Galetovic, A. (2004). How Market Smarts can Protect Property Rights. Harvard Business Review, 82(12), 7379. Andriole, S. J. (2006). The Collaborate/Integrate Business Technology Strategy. Communications of the ACM, 49(5), 8590. Apte, C., Liu, B., Pednault, E. P. D., & Smyth, P. (2002). Business Applications of Data Mining. Communications of the ACM, 45(8), 4953. Arnott, D. (2004). Decision Support System Evolution: Framework, case study, and research agenda. European Journal of Information Systems, 13(4), 247259. Arraada, B. & Vzquez, X. (2006). When Your Contract Manufacturer Becomes Your Competitor. Harvard Business Review, 84(9), 135144. Baesens, B., Rudy, S., Mues, C., & Vanthienen, J. (2003). Using Neural Network Rule Extraction and Decision Tables for Credit-Risk Evaluation. Management Science, 49(3), 312329. Bakos, J. Y. (1997). Reducing Buyer Search Costs: Implications for electronic marketplaces. Management Science, 43(12), 16761692. Ballou, D. P. & Tayi, G. K. (1999). Enhancing Data Quality in Data Warehousing Environments. Communications of the ACM, 42(1), 7378. Bendoly, E. (2003). Theory and Support for Process Frameworks of Knowledge Discovery and Data Mining from ERP Systems. Information & Management, 40(7), 639647. Bharadwaj, A. S. (2000). A Resource-Based Perspective on Information Technology Capability and Firm Performance: An empirical investigation. MIS Quarterly, 24(1), 169196. Bontempo, C. & Zagelow, G. (1998). The IBM Data Warehouse Architecture. Communications of the ACM, 41(9), 3848.

Downloaded by [202.62.121.66] at 01:07 14 February 2012

128

Jourdan, Rainer, and Marshall

Boonstra, A. (2003). Structure and Analysis of IS Decision-Making Processes. European Journal of Information Systems, 12(3), 195209. Bose, I. & Mahapatra, R. K. (2001). Business Data Mining: A machine learning perspective. Information & Management, 39(3), 211225. Bose, I. & Pal, R. (2005). Auto-ID: Managing anything, anywhere, anytime, in the supply chain. Communications of the ACM, 48(8), 100106. Bose, I. (2006). Deciding the Financial Health of Dot-Coms Using Rough Sets. Information & Management, 43(7), 835846. Bradley, P., Gehrke, J., Ramakrishnan, R., & Srikant, R. (2002). Scaling Mining Algorithms to Large Databases. Communications of the ACM, 45(8), 3843. Chandra, J., March, S.T., Mukherjee, S., Pape, W., Ramesh, R., Rao, H. R., & Waddoups, R O. (2000). Information Systems Frontiers. Communications of the ACM, 43(1), 7179. Chen, L., Soliman, K.S., Mao, E., & Frolick, M.N. (2000). Measuring User Satisfaction with Data Warehouses: An exploratory study. Information & Management, 37(3), 103110. Chenoworth, T., Schuff, D., & St. Louis, R. (2003). A Method for Developing Dimensional Data Marts. Communications of the ACM, 46(12), 9398. Chiasson, M. W. & Davidson, E. (2005). Taking Industry Seriously in Information System Research. MIS Quarterly, 29(4), 591605. Chiu, C. (2003). Towards Integrating Hypermedia and Information Systems on the Web. Information & Management, 40(3), 165175. Choudhury, V. & Sampler, J. L. (1997). Information Specificity and Environmental Scanning: An Economic Perspective. MIS Quarterly, 21(1), 2553. Chung, W., Chen, H., & Nunamaker, J. F., Jr. (2005). A Visual Framework for Knowledge Discovery on the Web: An empirical study of business intelligence exploration. Journal of Management Information Systems, 21(4), 5784. Churilov, L., Bagirov, A., Schwartz. D., Smith, K., & Dally, M. (2005). Data Mining with Combined Use of Optimization Techniques and Self-Organizing Maps for Improving Risk Grouping Rules: Application to prostate cancer patients. Journal of Management Information Systems, 21(4), 85100. Cingil, I., Dogac, A., & Azgin, A. (2000). A Broader Approach to Personalization. Communications of the ACM, 43(8), 136141. Clemons, E. K., Gu, B., & Lang, K. R. (2003). Newly Vulnerable Markets in an Age of Pure Information Products: An analysis of online music and online news. Journal of Management Information Systems, 19(3), 1741. Coltman, T., Devinney, T. M., Latukefu, A. S., & Midgley, D. F. (2002). Keeping E-Business in Perspective. Communications of the ACM, 45(8), 6973. Cooper, B. L., Watson, H. J., Wixom, B .H., & Goodhue, D. L. (2000). Data Warehousing Supports Corporate Strategy at First American Corporation. MIS Quarterly, 24(4), 547567. Cui, G., Wong, M. L., & Lui, H. (2006). Machine Learning for Direct Marketing Response Models: Bayesian network with evolutionary programming. Management Science, 52(4), 597612. Daniel, E. M. & Wilson, H. N. (2003). The Role of Dynamic Capabilities in E-Business Transformation. European Journal of Information Systems, 12(4), 282296. Dennis, A. R., Wixom, B. H., & Vandenberg, R. J. (2001). Understanding Fit and Appropriation Effects in Group Support Systems via Meta-Analysis. MIS Quarterly, 25(2), 167193.

Dewan, R., Jing, B., & Seidmann, A. (2003). Product Customization and Price Competition on the Internet. Management Science, 49(8), 10551070. Dreiling, A., Rosemann, M., van der Aalst, W., Heuser, L., & Schulz, K. (2006). Model-Based Software Configuration: Patterns and Languages. European Journal of Information Systems, 15(6), 583600. Earl, M. (2001). Knowledge Management Strategies: Toward a taxonomy. Journal of Management Information Systems, 18(1), 215233. Eick. S. G. (2001). Visualizing Online Activity. Communications of the ACM, 44(8), 4550. Fadlalla, A. (2005). An Experimental Investigation of the Impact of Aggregation on the Performance of Data Mining with Logistic Regression. Information & Management, 42(5), 695707. Fan, W., Wallace, L., Rich, S., & Zhang, Z. (2006). Tapping the Power of Text Mining. Communications of the ACM, 49(9), 7782. Feelders, A., Daniels, H., & Holsheimer, M. (2000). Methodological and Practical Aspects of Data Mining. Information & Management, 37(5), 271281. Ferson, W. E., Heuson, A., & Su, T. (2005). Weak-Form and Semi-Strong-Form Stock Return Predictability Revisited. Management Science, 51(10), 15821592. Fingar, P. (2000). Component-Based Framework for E-Commerce. Communications of the ACM, 43(10), 6166. Fisher, C. W., Chengalur-Smith, I., & Ballou, D. P. (2003). The Impact of Experience and Time on the Use of Data Quality Information in Decision Making. Information Systems Research, 14(2), 170188. Flajolet, P., Szpankowski, W., & Valle, B. (2006). Hidden Word Statistics. Journal of the ACM, 53(1), 147183. Ganapathy, S., Ranganathan, C., & Sankaranarayanan, B. (2004). Visualization Strategies and Tools for Enhancing Customer Relationship Management. Communications of the ACM, 47(11), 9399. Gardner, S. R. (1998). Building the Data Warehouse. Communications of the ACM, 41(9), 5260. Gasson, S. (2006). A Genealogical Study of Boundary-Spanning IS Design. European Journal of Information Systems, 15(1), 2641. Geoffrion, A. M. & Krishnan, R. (2003). E-Business and Management Science: Mutual impacts (Part 1 of 2). Management Science, 49(10), 12751286. Geoffrion, A. M. & Krishnan, R. (2003). E-Business and Management Science: Mutual impacts (Part 2 of 2). Management Science, 49(11), 14451456. Glassey, K. (1998). Seducing the End User. Communications of the ACM, 41(9), 6269. Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge Management: An organizational capabilities perspective. Journal of Management Information Systems, 18(1), 185214. Gorla, N. (2003). Features to Consider in a Data Warehousing System. Communications of the ACM, 46(11), 111115. Gregg, D. G. & Walczak, S. (2006). Adaptive Web Information Extraction. Communications of the ACM, 49(5), 7884. Grimson, J., Grimson, W., & Hasselbring, W. (2000). The SI Challenge in Health Care. Communications of the ACM, 43(6), 4955. Grover, V. & Ramanlal, P. (1999). Six Myths of Information and Market: Information technology networks, electronic commerce, and the battle for consumer surplus. MIS Quarterly, 23(4), 465495. Grover, V. & Vaswani, P. (2000). Partnership in the U.S. Telecommunications Industry. Communications of the ACM, 43(2), 8089.

Downloaded by [202.62.121.66] at 01:07 14 February 2012

Business Intelligence: An Analysis of the Literature

129

Guan, T. & Wong, K. F. (2003). Nstar: An interactive tool for local web search. Information & Management, 41(2), 213225. Harding, D. & Rovit, S. (2004). Building Deals on Bedrock. Harvard Business Review, 82(9), 121128. Hasselbring, W. (2000). Information System Integration. Communications of the ACM, 43(6), 3338. Hirji, K.K. (2001). Exploring Data Mining Implementation. Communications of the ACM, 44(7), 8793. Horton, K. S. & Wood-Harper, T. A. (2006). The Shaping of I.T. Trajectories: Evidence from the U.K. Public Sector. European Journal of Information Systems, 15(2), 214224. Hosanagar, K., Krishnan, R., Chuang, J., & Choudhary, V. (2005). Pricing and Resource Allocation in Caching Services with Multiple Levels of Quality of Service. Management Science, 51(12), 18441859. Hui, S. C. & Jha, G. (2000). Data Mining for Customer Service Support. Information & Management, 38(1), 113. Indyk, P. (2006). Stable Distribution, Pseudorandom Generators, Embedding, and Data Stream Computation. Journal of the ACM, 53(3), 307323. Irani, Z., Sharif, A. M., & Love, P. E. D. (2001). Transforming Failure into Success Through Organisational Learning: An analysis of a manufacturing information system. European Journal of Information Systems, 10(1), 5566. Jain, K. & Vazirani, V. V. (2001). Approximation Algorithms for Metric Facility Location and k-Median Problems Using the Primal-Dual Schema and Lagrangian Relaxation. Journal of the ACM, 48(2), 274296. Jones, Q., Ravid, G., & Rafaeli, S. (2004). Information Overload and the Message Dynamics of Online Interaction Spaces: A theoretical model and empirical exploration. Information Systems Research, 15(2), 194210. Jukic, N. (2006). Modeling Strategies and Alternatives for Data Warehousing Projects. Communications of the ACM, 49(4), 8388. Kalvenes, J. & Basu, A. (2006). Design of Robust Business-to-Business Electronic Marketplace with Guaranteed Privacy. Management Science, 52(11), 17211736. Keim, D. A. (2001). Visual Exploration of Large Data Sets. Communications of the ACM, 44(8), 3944. Kiang, M. Y. & Kumar, A. (2001). An Evaluation of Self-Organization Map Networks as a Robust Alternative to Factor Analysis in Data Mining Applications. Information Systems Research, 12(2), 177194. Kim, W. C. & Mauborgne, R. (1997). Value Innovation: The strategic logic of high growth. Harvard Business Review, 75(1), 172180. Kim, Y., Street, W. N., Russell, G. J., & Menczer, F. (2005). Customer Targeting: A neural network approach guided by genetic algorithms. Management Science, 51(2), 264276. Kleinberg, J., Papadimitriou, C., & Raghavan, P. (2004). Segmentation Problems. Journal of the ACM, 51(2), 263280. Kudyba, S. & Diwan, R. (2002). Research Report: Increasing returns to information technology. Information Systems Research, 13(1), 104111. Kumar, N. & Benbasat, I. (2004). The Effect of Relationship Encoding, Task Type, and Complexity in Information Representation: An empirical evaluation of 2D and 3D line graphs. MIS Quarterly, 28(2), 255281. Li, X. & Sarkar, S. (2006). Privacy Protection in Data Mining: A perturbation approach for categorical data. Information Systems Research, 17(3), 254270.

Lim, A., Rodrigues, B., & Zhang, X. (2004). Metaheuristics with Local Search Techniques for Retail Shelf-Space Optimization. Management Science, 50(1), 117131. Lin, Q., Chen, Y., Chen, J., & Chen, Y. (2003). Mining InterOrganizational Retailing Knowledge for an Alliance Formed by Competitive Firms. Information & Management, 40(5), 431442. Little, J. D. C. (2004). Models and Managers: The concept of a decision calculus. Management Science, 50(12), 18411853. Little, R. G., Jr., & Gibson, M. L. (2003). Perceived Influences on Implementing Data Warehousing. IEEE Transactions on Software Engineering, 29(4), 290296. Liu, D. & Shih, Y. (2005). Integrating AHP and Data Mining for Product Recommendation Based on Customer Lifetime Value. Information & Management, 42(3), 387400. Looney, C. A. & Chatterjee, D. (2002). Web-Enabled Transformation of the Brokerage Industry. Communications of the ACM, 45(8), 7581. MacKay, N., Parent, M., & Gemino, A. (2004). A Model of Electronic Commerce Adoption by Small Voluntary Organization. European Journal of Information Systems, 13(2), 147159. Maes, P., Guttman, R. H., & Moukas, A. G. (1999). Agents that Buy and Sell. Communications of the ACM, 42(3), 8191. Magnusson, C., Arppe, A., Eklund, T., Back, B., Vanharanta, H., & Visa, A. (2005). The Language of Quarterly Reports as an Indicator of Change in the Companys Financial Status. Information & Management, 42(4), 561574. Makadok, R. & Barney, J. B. (2001). Strategic Factor Market Intelligence: An application of information economics to strategy formulation and competitor intelligence. Management Science, 47(12), 16211638. Malhorta, A., Gosain, S., & El Sawy, O. A. (2005). Absorption Capacity Configurations in Supply Chains: Gearing for partner-enabled market knowledge creation. MIS Quarterly, 29(1), 145187. Marble, R. P. (2004). Technological Switchbacks: The transition to Western information system in privatised firms of the former East Germany. European Journal of Information Systems, 13(2), 115132. Markus, M. L. (2001). Toward a Theory of Knowledge Reuse: Types of knowledge reuse situations and factors in reuse success. Journal of Management Information Systems, 18(1), 5793. McCarthy, J. (2000). Phenomenal Data Mining. Communications of the ACM, 43(8), 7579. McGahan, A. (2004). How Industries Change. Harvard Business Review, 82(10), 8794. McNulty, E. (2003). They Bought In. Now They Want to Bail Out.. Harvard Business Review, 81(12), 2838. Melville, N., Kraemer, K., & Gurbaxani, V. (2004). Review: Information technology and organizational performance: An integrative model of IT business value. MIS Quarterly, 28(2), 283322. Mendona, M. G. & Basili, V. R. (2000). Validation of an Approach for Improving Existing Measurement Framework. IEEE Transactions on Software Engineering, 26(6), 484499. Mennecke, B. E., Crossland, M.D., & Killingsworth, B.L. (2000). Is a Map More than a Picture? The role of SDSS technology, subject characteristics, and problem complexity on map reading and problem solving. MIS Quarterly, 24(4), 601629. Menon, S., Sarkar, S., & Mukherjee, S. (2005). Maximization Accuracy of Shared Databases when Concealing Sensitive Patterns. Information Systems Research, 16(3), 256270.

Downloaded by [202.62.121.66] at 01:07 14 February 2012

130

Jourdan, Rainer, and Marshall

Menzies, T., Chen, Z., Hihn, J., & Lum, K. (2006). Selecting Best Practices for Effort Estimation. IEEE Transactions on Software Engineering, 32(11), 883895. Merali, Y. (2002). The Role of Boundaries in Knowledge Processes. European Journal of Information Systems, 11(1), 4760. Mitchell, T. M. (1999). Machine Learning and Data Mining. Communications of the ACM, 42(11), 3136. Mobasher, B., Cooley, R., & Srivastava, J. (2000). Automatic Personalization Based on Web Usage Mining. Communications of the ACM, 43(8), 142151. Murthi, B.P. & Sarkar, S. (2003). The Role of the Management Science in Research on Personalization. Management Science, 49(10), 13441362. Nelson, R. R., Todd, P. A., & Wixom, B. H. (2005). Antecedents of Information and System Quality: An Empirical Examination Within the Context of Data Warehousing. Journal of Management Information Systems, 21(4), 199235. Orr, K. (1998). Data Quality and Systems. Communications of the ACM, 41(2), 6671. Osei-Bryson, K. & Ko, M. (2004). Exploring the Relationship between Information Technology Investments and Firm Performance using Regression Splines Analysis. Information & Management, 42(1), 113. Overby, E., Bharadwaj, A., & Sambamurthy, V. (2006). Enterprise Agility and the Enabling Role of Information Technology. European Journal of Information Systems, 15(2), 120131. Padmanabhan, B. & Tuzhilin, A. (2003). On the Use of Optimization for Data Mining: Theoretical interactions and eCRM opportunities. Management Science, 49(10), 13271343. Padmanabhan, B., Zheng, Z., & Kimbrough, S. O. (2006). An Empirical Analysis of the Value of Complete Information for eCRM Models. MIS Quarterly, 30(2), 247267. Pan, S. L. & Lee, J. (2003). Using e-CRM for a Unified View of the Customer. Communications of the ACM, 46(4), 9599. Park, Y. (2006). An Empirical Investigation of the Effects of Data Warehousing on Decision Performance. Information & Management, 43(1), 5161. Pendharkar, P. (2004). An Exploratory Study of Object-Oriented Software Component Size Determinants and the Application of Regression Tree Forecasting Models. Information & Management, 42(1), 6173. Perkowitz, M. & Etzioni, O. (2000). Adaptive Web Sites. Communications of the ACM, 43(8), 152158. Piccoli, G. & Ives, B. (2005). Review: IT-Dependent strategic initiatives and sustained competitive advantage: A review and synthesis of the literature. MIS Quarterly, 29(4), 747776. Porter, M. (1998). Clusters and the New Economics of Competition. Harvard Business Review, 76(6), 7790. Prieto, I. M. & Easterby-Smith, M. (2006). Dynamic Capabilities and the Role of Organizational Knowledge: An exploration. European Journal of Information Systems, 15(5), 500510. Prokesch, S. (1997). Unleashing the Power of Learning: An interview with British Petroleums John Browne. Harvard Business Review, 75(5), 147168. Puschmann, T. & Alt, R. (2005). Developing an Integration Architecture for Process Portals. European Journal of Information Systems, 14(2), 121164. Rittgen, P. (2006). A Language-Mapping Approach to ActionOriented Development of Information Systems. European Journal of Information Systems, 15(1), 7081.

Ross, R., Subrahmanian, V. S., & Grant, J. (2005). Aggregate Operators in Probabilistic Databases. Journal of the ACM, 52(1), 54101. Rundensteiner, E. A., Koeller, A., & Zhang, X. (2000). Maintaining Data Warehouses over Changing Information Sources. Communications of the ACM, 43(6), 5762. Sackmann, S., Strker, J., & Accorsi, R. (2006). Personalization in Privacy-Aware Highly Dynamic Systems. Communications of the ACM, 49(9), 3238. Sambamurthy, V., & Zmud, R. W. (2000). Research Commentary: The organizing logic for an enterprises IT activities in the digital era - A prognosis of practice and a call for research. Information Systems Research, 11(2), 105114. Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping Agility through Digital Options: Reconceptualizing the role of information technology in contemporary firms. MIS Quarterly, 27(2), 237263. Sauter, V. L. (1999). Intuitive Decision-Making. Communications of the ACM, 42(6), 109115. Schonberg, E., Cofino, T., Hoch, R., Podlaseck, M., & Spraragen, S.L. (2000). Measuring Success. Communications of the ACM, 43(8), 5357. Sen, A., & Sinha, A. P. (2005). A Comparison of Data Warehousing Methodologies. Communications of the ACM, 48(3), 7984. Sen, A., Dacin, P. A., & Pattichis, C. (2006). Current Trends in Web Data Analysis. Communications of the ACM, 49(11), 8591. Shanks, G. & Darke, P. (1999). Understanding Corporate Data Models. Information & Management, 35(1), 1930. Sheng, Y. P., Mykytyn, P. P., Jr., & Litecky, C. R. (2005). Competitor Analysis and Its Defenses in the E-Marketplace. Communications of the ACM, 48(8), 107112. Shin, B. (2002). A Case of Data Warehousing Project Management. Information & Management, 39(7), 581592. Simester, D. I., Sun, P., & Tsitsiklis, J. N. (2006). Dynamic Catalog Mailing Policies. Management Science, 52(5), 683696. Simon, S. J. (2001). The Art of Military Logistics. Communications of the ACM, 44(6), 6266. Singh, N. (2003). Emerging Technologies to Support Supply Chain Management. Communications of the ACM, 46(9), 243247. Sinha, A. P. & May, J. H. (2005). Evaluating and Tuning Predictive Data Mining Models Using Receiver Operating Characteristic Curves. Journal of Management Information Systems, 21(3), 249280. Smyth, P., Pregibon, D., & Faloutsos, C. (2002). Data-Driven Evolution of Data Mining Algorithms. Communications of the ACM, 45(8), 3337. Spangler, W. E., May, J. H., & Vargas, L. G. (1999). Choosing Data-Mining Methods for Multiple Classification: Representational and performance measurement implications for decision support. Journal of Management Information Systems, 16(1), 3762. Spangler, W. E., Gal-Or, M., & May, J. H. (2003). Using Data Mining to Profile TV Viewers. Communications of the ACM, 46(12), 6772. Speier, C. & Morris, M. G. (2003). The Influence of Query Interface Design on Decision-Making Performance. MIS Quarterly, 27(3), 397423. Spiegler, I. (2003). Technology and Knowledge: Bridging a generating gap. Information & Management, 40(6), 533539.

Downloaded by [202.62.121.66] at 01:07 14 February 2012

Business Intelligence: An Analysis of the Literature

131

Downloaded by [202.62.121.66] at 01:07 14 February 2012

Spiliopoulou, M. (2000). Web Usage Mining for Web Site Evaluation. Communications of the ACM, 43(8), 127134. Stalk, G., Jr. & Lachenauer, R. (2004). Hardball: Five killer strategies for trouncing the competition. Harvard Business Review, 82(4), 6371. Subirana, B. & Bain, M. (2006). Legal Programming. Communications of the ACM, 49(9), 5762. Subramanian, A., Smith, L. D., Nelson, A. C., Campbell, J. F., & Bird, D. A. (1997). Strategic Planning for Data Warehousing. Information & Management, 33(2), 99113. Sung, T. K., Chang, N., & Lee, G. (1999). Dynamics of Modeling in Data Mining: Interpretive approach to bankruptcy prediction. Journal of Management Information Systems, 16(1), 6385. Tam, K. Y., & Ho, S. Y. (2005). Web Personalization as a Persuasion Strategy: An elaboration likelihood model perspective. Information Systems Research, 16(3), 271291. Taylor, W. A. (2004). Computer-Mediated Knowledge Sharing and Individual User Differences: An exploratory study. European Journal of Information Systems, 13(1), 5264. Thatcher, M. E. & Clemons, E. K. (2000). Managing the Cost of Informational Privacy: Pure bundling as a strategy in the individual health insurance market. Journal of Management Information Systems, 17(2), 2957. Thomas, H. & Datta, A. (2001). A Conceptual Model and Algebra for On-Line Analytical Processing in Decision Support Databases. Information Systems Research, 12(1), 83102. Todd, P. & Benbasat, I. (1999). Evaluating the Impact of DSS, Cognitive Effort, and Incentives on Strategy Selection. Information Systems Research, 10(4), 356374. Tuomi, I. (2000). Data is More Than Knowledge: Implications of the reversed knowledge hierarchy for knowledge management and organization memory. Journal of Management Information Systems, 16(3), 103177. van Oosterhout, M., Waarts, E., & van Hillegersberg, J. (2006). Change Factors Requiring Agility and Implications for IT. European Journal of Information Systems, 15(2), 132145.

Vedder, R. G., Vanecek, M. T., Guynes, C. S., & Cappel, J. J. (1999). CEO and CIO Perspectives on Competitive Intelligence. Communications of the ACM, 42(8), 108116. Watson, H. J. & Haley, B. J. (1998). Managerial Considerations. Communications of the ACM, 41(9), 3237. Watson, H. J., Goodhue, D. L., & Wixom, B. H. (2002). The Benefits of Data Warehousing: Why some organizations realize exceptional payoffs. Information & Management, 39(6), 491502. Weick, K. E. (2006). The Role of Imagination in the Organizing of Knowledge. European Journal of Information Systems, 15(5), 446452. Welty, B. & Becerra-Fernandez, I. (2001). Managing Trust and Commitment in Collaborative Supply Chain Relationships. Communications of the ACM, 44(6), 6773. Wixom, B. H. & Watson, H. J. (2001). An Empirical Investigation of the Factors Affecting Data Warehousing Success. MIS Quarterly, 25(1), 1741. Wood, C. A. & Ow, T. T. (2005). Webview: An SQL extension for joining corporate data to data derived from the web. Communications of the ACM, 48(9), 99104. Xanthopulos, Z., Melachrinoudis, E., & Solomon, M. M. (2000). Interactive Multiobjective Group Decision Making with Interval Parameters. Management Science, 46(12), 15851601. Xu, X. M., Kaye, G. R., & Duan, Y. (2003). UK Executives. Vision on Business Environment for Information Scanning: A cross industry study. Information & Management, 40(5), 381389. Zheng, Z. & Padmanabhan, B. (2006). Selective Acquiring Customer Information: A new data acquisition problem and an active learning-based solution. Management Science, 52(5), 697712. Zhu, K., Kraemer, K., & Xu, S. (2003). Electronic Business Adoption by European Firms: A Cross-Country Assessment of the Facilitators and Inhibitors. European Journal of Information Systems, 12(4), 251268. Zimmermann, T., Wei berger, P., Diehl, S., & Zeller, A. (2005). Mining Version Histories to Guide Software Changes. IEEE Transactions on Software Engineering, 31(6), 429445.

Vous aimerez peut-être aussi