Hello everyone, I have an Assignment for you today. This assignment must be DONE by Wednesday, February 19, 2020,no later than 10 pm. By the way, I need this assignment to be PLAGIARISM FREE & a Spell Check when completed. Make sure you READ the instructions CAREFULLY. Now without further ado, the instructions to the assignments are below:
Choose one of the scenarios below (A or B) to complete the assignment.
Scenario A
You are the business owner of a local small engine repair shop, and you have been thinking about implementing a knowledge management system for your customer service technicians. You are thinking about this because there are times when some of your technicians know how to fix certain engine problems and others do not. Providing a central knowledge repository could help share troubleshooting and repair knowledge among your technicians.
Scenario B
You are the business owner of a local cleaning service, and you have been thinking about implementing a knowledge management system for your cleaning technicians, especially for those who troubleshoot and solve cleaning problems, such as removing certain carpet and water stains, addressing mold, and selecting the proper tools and products to use for other types of cleaning issues. You are thinking about this because there are times when some of your cleaning technicians know how to properly clean carpets and others do not. Providing a central knowledge repository could help share cleaning knowledge among your cleaning technicians.
After you chose your scenario (A or B), compose a paper that addresses the elements listed below.
Your paper must be at least two pages in length (not counting the title and reference pages), and you must also use at least two scholarly sources, one of which must come from the CSU Online Library. Any information from a source must be cited and referenced in APA format, and your paper must be formatted in accordance to APA guidelines.
By the way, I’ve attached a Study Guide & several articles (for you to pick from) from the CSU Library to help you with this assignment! You can choose one or more articles from below or take one article below and pick another article from a different source.
BBA 3551, Information Systems Management
Course Learning Outcomes for Unit V
Upon completion of this unit, students should be able to:
2. Explain the similarities and differences of personal knowledge management tools.
2.1 Examine how social media, an information gathering tool, has shaped knowledge and business
intelligence techniques.
5. Evaluate the approaches to developing organizational knowledge management strategies.
5.1 Examine how business intelligence systems are used to manage organizational knowledge.
5.2 Discuss how expert systems and content management systems can benefit a business.
Course/Unit
Learning Outcomes
Learning Activity
2.1
Unit Lesson
Chapter 8
Unit V Scholarly Activity
5.1
Unit Lesson
Chapter 9
Unit V Scholarly Activity
5.2
Unit Lesson
Chapter 9
Unit V Scholarly Activity
Reading Assignment
The following sections from Chapters 8 and 9, which are located in the textbook in uCertify, are not required
for this unit, but the sections still contain beneficial information. You are highly encouraged to read them.
Chapter 8: Social Media Information Systems, Q8-1 – Q8-7
Chapter 9: Business Intelligence Systems, Q9-1 – Q9-8
Unit Lesson
In Unit IV, we discussed the cloud and how the cloud works as well as the types of business processes and
the importance of enterprise resource planning (ERP) systems. In this unit, we will discuss social media
information systems (IS), some innovative applications for social media IS, and the unique applications of
social networking. You will also learn about some practical applications for business intelligence systems,
specifically reporting, the use of animation for reporting on a mobile device, and the advantages of storing
data in the cloud.
After reading the Unit V Reading Assignment, refer back to the Augmented Reality Exercise System (ARES)
scenario at the beginning of Chapter 9. We are introduced to wellness programs, an increasing trend as more
and more people, especially millennials, express the desire to live healthier lives (Hamstra, 2017). Following
this trend are wellness programs sponsored by employers who are looking to help their employees develop
and maintain a healthy lifestyle. Many of the wellness programs can be accessed through mobile applications
(apps), which is a convenient way to review one’s overall health and fitness. One of the most common ways
to monitor one’s health or fitness related metrics is remotely, and some insurance providers offer discounts or
prizes as incentives to their subscribers for participating in an exercise program and recording their metrics
online (“Anthem Blue Cross,” 2017; Satter, 2017).
UNIT V STUDY GUIDE
Social Media Information Systems
and Business Intelligence Systems
BBA 3551, Information Systems Management 2
UNIT x STUDY GUIDE
Title
Because this information is being served from the cloud, it can be accessible by doctors, patients, health
clubs, employers, insurance companies, and others. This is an excellent way to monitor a person’s progress
in a fitness or weight loss program. For example, a physician can monitor a patient recovering from heart
surgery by reviewing the recorded metrics.
Examples of Business Intelligence Systems and Social Media IS
Business intelligence systems take
structured and unstructured data to
produce a source of collective
knowledge that can be used in data
analytics (Kroenke & Boyle, 2017). An
example of this type of technology is in
the use of exercise equipment over the
cloud. In order to maintain an exercise
regimen during extreme weather
conditions, such as high temperatures
during the summer and extreme cold
temperatures during the winter months,
one can purchase a treadmill to help
maintain exercise goals (such as a
minimum of 30 minutes, 5 days per
week). Most exercise equipment has
the ability to download and store
exercise programs to help improve
endurance, increase heart rate,
increase metabolism, and provide other
health advantages. For example, some
treadmills can download virtual
environments that simulate a specific setting such as running a marathon or running along a nature path.
Other programs that exercise equipment can provide are training workouts with specific goals in mind such as
maximum fat burns to help burn calories or cardio exercises to increase blood circulation and to help improve
heart health (Figure 1).
Most computerized exercise equipment, including treadmills, can synchronize with an online app that uploads
activity metrics and translates them into meaningful data such as graphs and charts. This also enables the
treadmill to download user-personalized workouts, track workout results, and track the user’s progress
against other users.
The user can then monitor his or her progress via a mobile app on a compatible phone (e.g., iPhone, Android)
and on the web from a laptop or tablet. In addition to the fitness training programs, there is also a social
community where users can provide motivation to one another.
Social networking allows people to connect with one another and to share content. This network of users is
supported by a social media IS. In the fitness example used above, users can view their fitness information in
the form of digital reports on a mobile device such as a smartphone or tablet. This data is stored on the cloud
so it can be retrieved from just about any computer device. These reports are generated with reporting
applications that use business intelligence. Business intelligence is defined as the manipulation or translation
of data into meaningful information. The purpose of business intelligence reports is to provide useful
information from which observations can be made. This data is obtained when basic reporting operations are
performed such as sorting, filtering, grouping, calculating, and formatting (Kroenke & Boyle, 2017).
Figure 1: Many treadmills use different programs to help users collect data
and maintain goals.
(Sport-Tiedje GmbH, 2017)
BBA 3551, Information Systems Management 3
UNIT x STUDY GUIDE
Title
Microsoft (MS) Excel is one application that can perform all of the basic reporting operations to create reports.
If you are familiar with MS Excel, then you know that you can use this software to create statements such as
monthly sales reports. This is one example of how you can use
reporting applications to develop business intelligence. Therefore,
by evaluating several monthly sales reports, you can gauge how
well the business is doing or not doing. You can also predict future
trends for products or services. If sales for a certain appliance is
dropping, this tells you to reduce the number of reorders, look for
a new or upgraded version of that appliance, or perhaps
discontinue the product altogether.
Let’s look at another example such as a fitness tracker (Figure 2).
There are several brands of fitness trackers, but they all have one
thing in common—to help you keep track of fitness metrics. As
you go about your day, the fitness tracker records physical activity
and stores that data on the device. In order to access that data
from another device, such as a tablet or computer, you will need
to synchronize the device to the fitness application. You
synchronize the data from your fitness tracker to the fitness
application via the cloud. Depending on the brand, the device
could be recording the number of steps you take, your heart rate,
calories burned, and even your sleep patterns. Because this
information is stored on the cloud, you can view the data from just about any computing device such as a
mobile phone, tablet, or computer. You can then review the statistics in a variety of visual forms such as
graphs, charts and even animated diagrams. These reports help you to analyze the data, detect patterns, and
identify potential health issues. Users can also share these statistics on the web in social fitness networks or
chat with health experts or fitness trainers.
Privacy and Security
The availability of cheap cloud processing makes processing consumer data easier and less expensive every
day. The result is more and more data, and that data is processed by more and more sophisticated
algorithms. George Orwell’s book 1984, which was science fiction when published, is becoming closer to
reality. This dystopian story takes place in 1984, where society is ruled by a totalitarian government that
manipulated media to control its population (Fitzpatrick, 2013). North Korea is a good example of a totalitarian
government because the country is isolated from the rest of the world, and its people are oppressed by the
regime of Kim Jong Un through the use of various media such as newspapers, posters, radio, and television.
The Internet, taken for granted by many citizens in the United States, is virtually unheard of in North Korea.
Even for those few who may have access to the Internet, only a few (approved) websites are provided to its
people by the North Korean propaganda bureau. North Korean citizens who are accused of violating its
censorship laws are met with harsh punishment such as jail time, reprogramming, and even death (Kim,
2010).
In North Korea, the government uses mass surveillance to censor its people, severely restricting them of
basic freedoms. There are four basic freedoms in the first amendment of the U.S. Constitution:
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise
thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to
assemble, and to petition the government for a redress of grievance. (National Archives, n.d., para. 6)
In the United States, organizations routinely use surveillance to monitor its employees, and the U.S.
government also uses surveillance to monitor its citizens. So, what is the difference between surveillance in
the United States when compared to North Korea? The difference is that U.S. citizens, unlike the citizens of
North Korea, are protected by the Privacy Protection Act, the Electronic Communications Privacy Act (ECPA),
and the Communications Assistance for Law Enforcement Act, coupled with the fourth amendment of the U.S.
Constitution (Hannon, 2017). So, what does all of this mean? This means that government officials can
monitor electronic communications for potential criminal activity while protecting the privacy of U.S. citizens.
What does this mean for the data that is stored in the cloud? If we use fitness trackers and store information
in the cloud, is our information safe from hackers? If we participate in social networks, what are the risks?
Figure 2: Fitness trackers use technology to
record data.
(BMoreliff, 2016)
BBA 3551, Information Systems Management 4
UNIT x STUDY GUIDE
Title
These are questions we should ask ourselves in regard to expectations of privacy.
In this unit, we examined how social media can be used as an information-gathering tool to increase
knowledge and business intelligence through the use of social media IS. We also examined the expectations
of privacy when using social media. Even though electronic media is monitored by the U.S. government, it is
only to detect and identify potential criminal activity.
References
Anthem Blue Cross unveils engage platform. (2017). Health & Beauty Close – Up, Retrieved from
https://search-proquest-
com.libraryresources.columbiasouthern.edu/docview/1953795804?accountid=33337
BMorellif. (2016). Withings Pulse O2 fitness tracker [Image]. Retrieved from
https://commons.wikimedia.org/wiki/File:Withings_Pulse_O2_fitness_tracker
Fitzpatrick, S. (2013, August). Orwell’s 1984: Are we there yet? Crisis Magazine. Retrieved from
http://www.crisismagazine.com/2013/orwells-1984-are-we-there-yet
Hamstra, M. (2017). Center of the storm. Supermarket News. Retrieved from https://search-proquest-
com.libraryresources.columbiasouthern.edu/docview/1951884195?accountid=33337
Hannon, M. J. (2017). The importance of metadata in digital evidence for legal practitioners. Computer and
Internet Lawyer, 34(10), 1–19. Retrieved from https://search-proquest-
com.libraryresources.columbiasouthern.edu/docview/1941694965?accountid=33337
Kim, S. Y. (2010). Illusive utopia: Theater, film, and everyday performance in North Korea. Ann Arbor, MI:
University of Michigan Press.
Kroenke, D. M., & Boyle, R. J. (2017). Using MIS (10th ed.). New York, NY: Pearson.
National Archives. (n.d.). The Bill of Rights: A transcription. Retrieved from
https://www.archives.gov/founding-docs/constitution-transcript
Satter, M. Y. (2017). After rosy Q3, anthem to launch digital health platform. Benefits Selling. Retrieved from
https://search-proquest-
com.libraryresources.columbiasouthern.edu/docview/1955393869?accountid=33337
Sport-Tiedje GmbH. (2017). Cardiostrong treadmill TX50 [Image]. Retrieved from
https://commons.wikimedia.org/wiki/File:Cardiostrong_treadmill_TX50
Suggested Reading
The following sections from Chapters 8 and 9, which are located in the textbook in uCertify, are not required
for this unit, but the sections still contain beneficial information. You are highly encouraged to read them.
Chapter 8: Social Media Information Systems, Q8-8
Chapter 9: Business Intelligence Systems, Q9-9
Learning Activities (Nongraded)
Nongraded Learning Activities are provided to aid students in their course of study. You do not have to submit
them. If you have questions, contact your instructor for further guidance and information.
BBA 3551, Information Systems Management 5
UNIT x STUDY GUIDE
Title
To test your knowledge of the material covered in this unit, complete the activities listed below.
Chapter 8 Active Review
Chapter 8 Using Your Knowledge
Chapter 8 Collaboration Exercise
Chapter 8 Review Questions
Chapter 8 Cards
Chapter 9 Active Review
Chapter 9 Using Your Knowledge
Chapter 9 Collaboration Exercise
Chapter 9 Review Questions
Chapter 9 Cards
The activities are located within the chapter readings in uCertify. The Chapter 8 and Chapter 9 Active Review
sections, Using Your Knowledge sections, Collaboration Exercises, and Review Questions are located at the
end of each chapter. The cards can be accessed by clicking on the Cards icon within uCertify, which is
located to the right of the chapter title, and the icon in uCertify resembles the image shown below.
SystemsResearchandBehavioralScience
Syst. Res.23,177 1̂90 (2006)
PublishedonlineinWiley InterScience (www.interscience.wiley.com)
DOI:10.1002/sres.752
& ResearchPaper
Knowledge Management in OSS — an
Enterprise Information System for the
Telecommunications Industry
Jiayin Qi1*, Li Da Xu2, Huaying Shu1 and Huaizu Li3
1School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China
2Department of Information Technology and Decision Sciences, Old Dominion University, Norfolk,
Virginia, USA
3School of Management, Xian Jiaotong University, Xian, China
Knowledge management in Enterprise Information Systems (EIS) has become one of the
hottest research topics in the last few years. Operations Support Systems (OSS) is one kind
of EIS, which is becoming increasingly popular in the telecommunications industry.
However, the academic research on knowledge management in OSS is sparse. In this
paper, a knowledge management system for OSS is proposed in the framework of systems
theory. Knowledge, knowledge management, organization and information technology
are the four main interactive elements in the knowledge management system. The paper
proposes that each subsystem of the OSS is to be equipped with knowledge management
capacity, and the knowledge management of the OSS is to be realized through its
subsystems.
Copyright # 2006 John Wiley & Sons, Ltd.
Keywords enterprise information systems; ERP; operations support systems; knowledge
management; management information systems
INTRODUCTIO
N
In recent years, the topic of knowledge economy
has attracted much research interest. As a result,
a substantial number of researches have been
conducted on knowledge management from
both theoretical and empirical perspectives.
Studies show that effective knowledge manage-
ment has a positive effect on enterprise perfor-
mance and competitive advantage (Ahn and
Chang, 2004; Chuang, 2004; Joshi and Sharma,
2004; Tzokas and Saren, 2004; Badii and Sharif,
2003; Cavusgil et al., 2003; Choi and Lee, 2002).
For this reason, more and more enterprises have
emphasized the importance of knowledge man-
agement. Most of them have acquired enterprise
information systems (EIS) such as ERP as an
integrated platform with intended applications
in knowledge management.
Operations Support Systems (OSS) is a main-
stream technology which supports large-scale
network operation, maintenance and management.
Copyright # 2006 John Wiley & Sons, Ltd.
* Correspondence to: Jiayin Qi, School of Economics and Management,
Beijing University of Posts and Telecommunications, Beijing 100876,
China. E-mail: ssqjy@263.net
It was put forward by TeleManagement Forum
(TMF), an international organization that has
been contributing to the information and com-
munications services industry for over 15 years.
So far OSS has been increasingly adopted by
telecom industry with NGOSS (New Generation
Operations and Software Systems) as its next
generation product. If ERP systems are the EI
S
mainly help manufacturing industry achieve
competitive edge in the global market, OSS plays
a similar role in the telecom industry.
Telecommunications industry is a very specific
high-tech service industry. The main feature of
the telecommunications industry is its tight
integration of business process and IT applica-
tions; it is very important to use IT to promote its
competitiveness. OSS is generally considered as
a basic EIS which can also support knowledge
management. OSS market and applications are
growing. Taking the Asia Pacific market as an
example, it generated $8.8 billion of revenues in
2002. Revenues show an increasing trend and
the market for OSS is expected to grow at a
steady pace. The compound annual growth rate
(CAGR) of the revenues for the period 2001–2007
is forecasted to be 6.27 per cent. Industry reven-
ues are forecasted to rise to $11.87 billion by the
year 2007.
Although OSS has been acquired by many
telecom companies, the shortage of scholastic
research on OSS is obvious (Li et al., 2003a).
IEEE Xplore provides full text access to IEEE
transactions, journals, magazines and conference
proceedings since 1998, plus select contents back
to 1950, and all the current IEEE standards. Most
of the academic publications in telecommuni-
cations are included in IEEE Xplore. Using
operations support systems as key word, our
search matched 189 of 1043417 documents. In
these 189 documents, there is only one paper
related to the word knowledge. Searching other
academic journals, such as Decision Support
systems, Expert Systems with Application, Knowl-
edge-Based Systems, Computers in Industry, Expert
Systems, Data & Knowledge Engineering, Advanced
Engineering Informatics, Logistic Information Man-
agement, Information & Management, Telecommu-
nications Policy from 2003 to 2005, no papers on
OSS are found. There are some whitepapers
about OSS at www.tmforum.org, but they are not
typical research papers.
Knowledge may not show its significant value
until it is embedded in software products or
business processes. Only then can its value be
fully utilized. OSS is the basic software platform
to support value chain management for the
telecom industry. OSS should be the enabling
tools to fulfil effective knowledge management.
How could this objective be achieved? The
purpose of this paper is to explore a possible
answer to the question.
The paper is organized as follows. ‘Knowledge
Management in Systems Perspectives’ section
presents the implication of knowledge manage-
ment in systems perspectives. The relationship
among data, information and knowledge, as well
as the relationship between knowledge manage-
ment and EIS is discussed. In ‘Overview of OSS
and Knowledge Management in OSS’ sections,
an overview of OSS and the knowledge manage-
ment in OSS is discussed. ‘Discussion and
Conclusion’ section provides a summary of the
paper and future research.
KNOWLEDGE MANAGEMENT IN
SYSTEMS PERSPECTIVES
A system is made up of a set of interacting
elements sharing a particular purpose within a
boundary. The interaction among elements forms
the structure of a system. Depending on its
boundary, a system can be an economic entity,
an inventory system, or a business organization.
Knowledge management is an element of the
organizational management system (Warfield,
1989). From the point of view of the concept of
whole, a knowledge management system pro-
motes the effective use of knowledge assets of an
enterprise as a whole over time, and is an impetus
to the performance of the enterprise.
Data, Information and Knowledge
Prior to discussing knowledge management, the
terms such as data, information and knowledge
must be defined. The following is a summary of
RESEARCH PAPER Syst. Res.
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
178 Jiayin Qi et al.
the distinction between data, information and
knowledge:
Data are known facts that can be recorded and
that have implicit meaning (Elmasri and
Navathe, 2004). Information is data placed in a
meaningful and useful context after that has been
processed (O’Brien, 2005). Information is user-
aimed, providing values and existing in the eyes
of the beholder (Spiegler, 2003). Knowledge is
information synthesized and contextualized to
provide further value for human activities
(Pearlson and Saunders, 2004).
The relationship among data, information and
knowledge can be depicted as shown in Figure 1.
Data is the abstract description of objects and is
the raw material that is used to generate useful
information and knowledge. Information is a
flow of processed data after being processed.
Knowledge involves the capacity of gathering
and using information. Knowledge becomes
information when it is articulated or commu-
nicated to others in the form of text, computer
outputs, speech or written words (Alavi and
Leindner, 2001; Spiegler, 2003).
Data warehouse is a large-scale storage facility
for data. Knowledge warehousing is an exten-
sion of data warehousing to facilitate the captur-
ing and coding of knowledge and to enhance the
retrieval and sharing of knowledge across the
organization (Nemati et al., 2002). Online Analy-
tical Processing (OLAP) is a software application
used to explore the data in ways that are decision
oriented (Shi et al., 2005). Data mining (DM) tools
allow for the creation of well-defined transfer-
able information (Li and Xu, 2001; Li et al.,
2003b). Knowledge discovery (KD) process
agglomerates information found by such techni-
ques as DM in generating domain knowledge
(Bendoly, 2003).
Implication of Knowledge Management
in Systems Perspective
The implication of knowledge management has
been studied by many authors (Warfield, 1989).
Table 1 summarized the selected findings.
In this paper, knowledge management is
studied in terms of systems theory and the
perspectives listed in Table 1 will be synthe-
sized. It is emphasized in this paper that
knowledge management can be used to effec-
tively manage corporate knowledge assets
especially those knowledge in business pro-
cesses. Therefore, the objective of knowledge
management is considered to promote an
enterprise’s core competency. Such an objective
can be achieved with a systematic process of
creating, maintaining, employing, sharing and
renewing knowledge.
Knowledge Management Framework
in Systems Point of View
Viewing knowledge management as a man-
made system, the boundary of the system and
Data
Information
Knowledge
Data Processing: Organizing, storing,
calculating, Retrieving, Reporting
Information Processing: Reforming,
Quantification, Qualification, Clustering,
learning, Disseminating To be communicated
to others in the form
of text, computer
output, speech and
writing words etc.
Figure 1. Data, information and knowledge
Syst. Res. RESEARCH PAPER
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
Knowledge Management in OSS 179
the elements of the system needs to be deter-
mined. Obviously, the boundary of the knowl-
edge management system is the corporate
business environment, while the elements in
the system include knowledge architecture,
knowledge management process architecture,
organization architecture and IT architecture
(Kim et al., 2003). The other questions of interest
include the interaction among these elements,
the structure of the system, and the function of
the system.
Main Factors Influence Knowledge Management
Knowledge management system is a system to
effectively manage knowledge within an enter-
prise. Two main factors are considered influencing
the needs of practicing knowledge management.
The first factor is competition. If there is a tough
competition in a certain industry sector, managing
knowledge is generally in high demand. The other
factor is the volume of data. If there is a huge
volume of data that exist within an enterprise, the
data resource is available which can help convert
data into information as well as knowledge.
Elements of Knowledge Management System
Knowledge architecture, knowledge manage-
ment process architecture, organization architec-
ture and IT architecture are the four elements of
knowledge management system.
The so-called knowledge architecture is the
result of classifying organizational knowledge by
one or more dimensions. Fernandez et al. distin-
guished knowledge into human knowledge,
organizational knowledge, technological knowl-
edge and relational knowledge (Fernandez et al.,
2000). Human knowledge refers to the knowl-
edge acquired by a person that can increase
productivity and the contribution to the organi-
zation. It also includes other individual qualities
such as experience, judgement and intelligence.
A firm’s organizational knowledge includes
its norms and business guidelines, corporate cul-
ture, organizational procedures, as well as strate-
gic alliance. Technological knowledge includes
knowledge related to the access, use and innova-
tion of production techniques and technology
(Xu et al., 2005a,b). The relational knowledge
consists of the potential derived from the
intangible resources related to marketplace,
such as brands, customer loyalty, long-term
customer relationship, distribution channels, etc
(Kanjanasanpetch and Igel, 2003).
The knowledge management process architec-
ture defines a variety of processes involved in the
life cycle of knowledge, from its creation to
termination. Knowledge creation process, know-
ledge maintenance process, knowledge distribu-
tion process and knowledge review and revision
process are the four steps in the entire knowledge
management process (Bhatt et al., 2005). Creativ-
ity refers to the ability to originate novel
and useful ideas and solution (Marakas, 2003).
An organization creates knowledge through
its employees who are equipped with knowledge
and generate new ideas by breaking down
business thinking that is no longer viable
(Argyris and Schon, 1996; Lynn et al., 1996).
Knowledge maintenance refers to making use of
existing ‘discovered’ knowledge (Bhatt et al.,
2005). Knowledge distribution means the sharing
of knowledge across the organization. Knowledge
Table 1. Existing research on the implication of knowledge management
Author Perspective Implication
Siemieniuch and Sinclair (2004) Process Systematic process of applying expertise
Kwan and Balasubramanian (2003)
Wang and Ariguzo (2004)
Mesaric (2004)
Fowler and Pryke (2003) Capability Building core competencies through know-how
Badii and Sharif (2003)
Tzokas and Saren (2004)
Nemati et al. (2002) Relationship Converting information to knowledge
RESEARCH PAPER Syst. Res.
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
180 Jiayin Qi et al.
review and revision is the modification and
version management of knowledge.
The organization architecture designs organi-
zational structure. Organizational structure defi-
nes the role of each knowledge management team
that is responsible for performing or supporting
knowledge management process.
The IT architecture is a technical infrastructure
for knowledge management. It defines compo-
nents of knowledge management system and
their relationships.
Interactions Among the Elements in
Knowledge Management System
The four elements in knowledge management
system are interrelated to each other. Knowledge
management system can not attain its purpose
without any one of the elements.
The knowledge architecture is the base of the
knowledge management process. The knowl-
edge management process consists of the main
activities in knowledge management. The orga-
nization architecture is responsible for perform-
ing or supporting knowledge management
process. IT architecture is a facilitator for enhan-
cing dynamic capabilities through knowledge
management (Sher and Lee, 2004).
Structure of Knowledge Management System
According to the interaction among the elements
in knowledge management system, the structure
of knowledge management system is shown in
Figure 2.
Both theoretical and empirical researches
have shown that knowledge management can
play a key role in creating sustainable competi-
tive advantages for corporations. In which, the
organization architecture is the guarantee of
knowledge architecture, knowledge manage-
ment process architecture and IT architecture.
Right organization architecture has positive
effects on the other three elements. On the other
hand, knowledge architecture, knowledge man-
agement process, and IT architecture all have
impacts on organization architecture. Organiza-
tion architecture has to be adapted to meet the
needs from the three elements too. Knowledge
architecture is the base of knowledge manage-
ment process. The fundamental function of the
knowledge management system is to improve
the business process and to achieve superior
business performance through effective knowl-
edge management process.
Enterprise Information Systems and
Knowledge Management
Enterprise information system (EIS) is an inte-
grated information system seeking to integrate
every single business process and function in
the enterprise to present a holistic view of the
business with a single IT architecture. It is a
powerful and integrated enterprise-level IT archi-
tecture that is also designed to facilitate knowl-
edge management within an enterprise. The
Knowledge Management system
Organization
Architecture
Knowledge
Architecture
Knowledge
Management
Process
Corporation’s
business
operation
Corporation
with superior
performance
Input
Output
IT Architecture
Figure 2. The framework of knowledge management system
Syst. Res. RESEARCH PAPER
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
Knowledge Management in OSS 181
characteristics of EIS include (Ross and Vital,
2000):
An EIS is composed of a suite of different
modules. Typical modules include accounting,
human resource, manufacturing, logistics, custo-
mer relationship management, etc. An enterprise
can get its EIS solution through integrating a
number of modules.
Each module is business process-specific. The
use of EIS is associated with business process re-
engineering to optimize business processes.
An EIS creates an enterprise-wide transaction
structure by integrating modules, data storing/
retrieving processes, and management and ana-
lysis functionality.
An EIS is not just a software system; it repre-
sents a new kind of managerial thinking. A
successful implementation of ERP is not only
related to software selection, but also enterprise
strategy, enterprise culture, business process
reengineering (BPR), top management support,
training and others.
Considering the relationship between knowl-
edge architecture, knowledge process architec-
ture, organization architecture, IT architecture,
and enterprise operations, an EIS supports
knowledge management that encompasses all
types of knowledge in business operations. The
support provided by an EIS to an enterprise’
knowledge management is embodied in each
module for specific knowledge management.
Each module associates with a specific type of
business process, which corresponds to a specific
knowledge management. The knowledge man-
agement of the entire enterprise is realized
through the integration of individual knowledge
management module.
OVERVIEW OF OSS
Evolution of OSS
In the 1980s, the basic standard of OSS was
determined. The main usage is to manage net-
works. In the beginning of 1990s, OSS standard
has placed emphasis on both network systems
and network management. A substantial amount
of work has been completed by the International
Telecommunications Union (ITU) and the Inter-
national Organization for Standardization (ISO).
The representative standards of OSS are Tele-
communications Management Network (TMN)
and Simple Network Management Protocol
(SNMP). In recent years, the next generation
network (NGN) is coming ever closer. NGN is a
high speed multi-service packet data network
capable of supporting the traditional functions
of voice networks, data networks/internets
and even mobility by providing quality-assured
transmission, switching and services over IP and
ATM cores. The competitiveness is in managing
service, not managing network resources. Thus
the OSS has shifted from network-oriented to
service-oriented. During the process of develop-
ing OSS standards, support has been provided
by service providers (SP), network operation
providers, equipment manufacturing enter-
prises, and software suppliers.
Definition of OSS
OSS stands for Operations Support Systems. OSS
is a common term for the collection of all the
support systems required to run a telecom
operator’s business. OSS is consisted of four
subsystems: Operation Support System (OSS),
Business Support System (BSS), Resource Sup-
port System (RSS), and System Support System
(SSS). The functions of OSS consist of activation,
inventory management, fault management, and
workforce management, etc. BSS includes custo-
mer care, multi-service provisioning, service
assurance, and billing, etc. RSS handles network
resource management, operation information
management, customer basic information man-
agement and customer service information, etc.
SSS deals with log file, system parameters, etc.
Figure 3 provides a framework of OSS in which
OSS and BSS are the main functions.
The main functions of OSS include,
* Customer care: provide an interface to the
customers for all issues related to customer
order, sales, billing, and problem handling.
* Multi-service provision: activate instances of
service for particular customers.
RESEARCH PAPER Syst. Res.
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
182 Jiayin Qi et al.
* Service assurance: monitor and uphold the
quality of the delivered services.
* Billing: charge for the service.
* Planning and administration: plan, design and
administer the services and infrastructures.
* EAI (Enterprise Application Integration):
automate the exchange of data between inter-
nal applications.
* Activation: execute a service in an optimal and
well-defined order
Customer/Market
OSS
BSS
Customer Care
Multiservice
Provision
Service Assurance
Billing
& Planning
Administration
Activation
Inventory
Management
Fault Management
Workforce
Management
RSS
Network resource
management
informationOperation
management
basic
Customer
information management
serviceCustomer
information management
SSS
User Management
System monitoring system parameters Versioning
Backuping Log file
EAI
Figure 3. OSS structure
Syst. Res. RESEARCH PAPER
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
Knowledge Management in OSS 183
* Inventory management: keep track of the
equipment such as where it is, how it is confi-
gured, and its status.
* Fault management: handle alarms.
* Workforce management: manage and sche-
dule teams of technicians, installers and engi-
neers.
In this paper, a network operator is defined as
a telecommunication service provider with a
network infrastructure and provides multiple
services. It could be a network, a fixed-line access
network of any kind, or a mobile 2/2.5/3G
mobile network. This type of network operator is
named as telecom operator throughout the
paper. Of course, the research is related to Ser-
vice Provider (SP) and Content Provider (CP)
with no infrastructure of their own although
their tasks are simpler since they only manage
services and IT infrastructure.
TOM and OSS
OSS is intended to cover TOM (Telecom Opera-
tions Map) provided by the organization
TMForum. TOM model focuses on the opera-
tional processes within the telecommunication
industry. It was designed as a blueprint for pro-
cess direction and a starting point for developing
and integrating OSS. The relationship between
TOM and OSS is shown in Figure 4.
FAB (fulfilment, assurance and billing) is the
core area of operations for telecom operators. FAB
defines the process for fulfilling an order, assuring
the defined level of performance and facilitating
billing for the services provided. FAB is carried
out through the following vertical processes:
Customer interface management process: It is
responsible for the dialogue with customer.
Customer care process: It deals with the custo-
mer needs, ways to identify the needs and how to
achieve it.
Service/product development and operation
process: It handles how the service is offered and
how to achieve it.
Network and systems management process: It
handles resources required for achieving the
service offered to the customer.
Features of OSS
OSS is a kind of EIS, which is applied to tele-
communications industry. Corresponding to the
characteristics of EIS, OSS’ characteristics can be
described as,
The key idea of OSS is the modularization of
telecommunications operation management. Tel-
ecom operators face a lot of uncertainty. The
appearance of new services is very quick. The
modular design of OSS is considered a necessity
(Wade, 2000).
OSS realizes the end-to-end customer business
operation processes. TOM is an important refer-
ence function model for OSS planning. The TOM
model contains a detailed description of the most
important processes involved in running a telecom
operator’s operation. Service fulfilment, service
assurance, and billing are the three basic customer
business operation processes. OSS implementation
will inevitably consider business process reengi-
neering (Wade, 2000; Huang et al., 2003).
OSS is a highly integrated software architec-
ture. Integrating multi-sections’ businesses in a
single software platform efficiently for improv-
ing customer service is one of the aims of OSS.
This task requires a high level of integration
among each subsystem.
OSS is not just a software system, but also
represents managerial thinking. Using TOM as
an important reference model, OSS encourages
telecom operators pay more attention to the
customers rather than just do billing as in the
past (Walsh, 1998).
Generally speaking, OSS can work not only for
telecom operators, but also for those other enter-
prises with characteristics resemble to that of
telecom operators with special network resources,
special service flow, and value chain based on
these network resources and service flows; for
example, large power plants (Feng et al., 2001),
traffic management (Takahashi, 1998), and others
(Miyamoto et al., 1997; Sherif and Ho, 2000).
Objectives of OSS
As for the motivation for OSS’ implementation,
there are six main reasons (Schroter, 1998):
RESEARCH PAPER Syst. Res.
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
184 Jiayin Qi et al.
(1) rapid development and deployment of new
services (Everitt and Virgin, 1996); (2) cost reduc-
tion through operation automation; (3) business
process integration (Xia and Rao, 1997);
(4) uniform software platform (Furley, 1996;
Appel and Polosky, 1988); (5) customer service
level improvement (Giannelli et al., 1990);
(6) efficient network resource and customer
resource management (Appel and Polosky,
1988; Kittel et al., 2000).
The objective of OSS is to achieve superior
performance, which is embodied in higher
TOM
Customer
Customer Interface Management process
Customer Care Process
Service/Product Development and Operations Process
Physical Network and Information
Technology
s
el
a
S
r
ed
r
O
g
ni
ld
na
H
me
lb
or
P
g
ni
l d
na
H
r
e
mo
ts
u
C
so
Q
tn
e
me
ga
n a
M
g
ni
ci
ov
n I
n
oi
tc
el
l
o
C
g
ni
nn
a l
P
ec
iv
re
S
tn
e
mp
ol
ev
e
D
e
ci
vr
e
S
n
oi
ta
ru
gi
f n
o
C
me
lb
o r
P
e
ci
vr
e
S
n
oi
tu
l o
se
R
y
ti
la
u
Q
e
ci
v r
e
S
t
n e
me
ga
na
M
d
n a
g
n i
ta
R
g
ni
tn
uo
cs
i
D
Network and Systems Management Process
g
ni
nn
al
P
k
ro
w t
e
N
t
ne
m p
ol
e v
e
D
k
r o
w t
e
N
g
n i
no
is
iv
or
P
y
ro
tn
ev
nI
k
ro
wt
e
N
t
n e
me
ga
na
M
kr
o
w t
e
N
e
cn
an
et
ni
a
M
n
oi
t a
ro
t s
e
R
&
a
ta
D
k
ro
wt
e
N
t
n e
m e
g a
na
M
S
S
O
Figure 4. TOM and OSS
Syst. Res. RESEARCH PAPER
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
Knowledge Management in OSS 185
average revenue per user (ARPU), better ser-
vices, higher customer satisfaction, and improv-
ed asset utilization, etc.
KNOWLEDGE MANAGEMENT IN OSS
Business Environment in
Telecommunications Industry
The telecommunications environment can be
characterized by its inherent distributive, contin-
uous expansion in the size of network, and
the particular importance of fault-tolerance
requirement. These characteristics are reflected
in the design of software systems. Software sys-
tems in telecommunications have to cope with the
universe of telecommunications protocols, numer-
ous hardware platforms, and network architec-
tures (Cselényi et al., 1998). The characteristics of
telecommunications software systems include
high software cost, concurrency, distributivity,
reliability, diversity and complexity (Patel, 2002).
Except the above-mentioned industry charac-
teristics, telecom operators are facing more and
more challenges nowadays. Factors such as
globalization and technology innovation repre-
sent radical challenges to telecom operators. They
must be more and more competitive to survive.
Today’s telecommunication market introduces
more competitions; meanwhile offers more choi-
ces for customers, lower price and the pressure to
improve service quality for operators. As the
previous monopoly situation is no longer exist,
new entrants come into the market. In emerging
economy, state-owned operators are fully or
partially privatized in order to survive better
(Stienstra et al., 2004).
Globalization promotes the domestic competi-
tion. Global telecommunication market gives
opportunities to some operators because of the
economies of scale in telecommunication net-
work, such as BT and Vodafone. It also brings
radical domestic competition since more new
entrants enter to the market.
Internet technology causes an extraordinary
growth of the Internet and IP services and
applications. Customers are increasingly free
to choose different service components from
different vendors and assemble their own solu-
tion (Li and Whalley 2004).
Industry deregulation, globalization, and IP
make the telecommunication industry full of
intensified competition. The telecommunication
market involves a shift from a stable market to an
increasingly user-driven market place. The suc-
cess of a telecom operator will entirely depend
on the operator’s ability to create services and
applications that are embraced by the users.
Same as the success brought by knowledge
management to the manufacturing sector, know-
ledge management is increasingly helping the
telecomm sector to keep sustainable competi-
tiveness and competency.
Knowledge Management in BSS
BSS focuses on developing the core business by
defining marketing and offering strategies, new
products implementation and managing existing
products. Customer interface management pro-
cess and customer care process are the two major
aspects involved in BSS. Dialogue carrying, ser-
vice ordering, service activation, trouble admin-
istration, and billing account review make up all
the activities in BSS.
Staff knowledge, organizational knowledge,
and relational knowledge form the know-
ledge architecture of BSS. There is a plenty of
staff knowledge involved such as sales staff’s
experience. There are also rich organizational
knowledge existing in the customer interface
management process and customer care process.
Deeper customer knowledge can give rise carriers
an edge in developing pricing models (Limbach,
2004). In addition, relational knowledge exists in
BSS such as reputation, brands, customer loyalty
and distribution channel knowledge. Those are
the important factors influencing CRM.
Successful sales experiences can be acquired
and shared among the employees in the sales
and marketing department. Replication, imitation,
elicitation and innovation will be the main acti-
vities for knowledge creation. Some knowledge on
routine problems, success experience, standard
business process, can be considered as existing
‘discovered’ knowledge to be maintained and
reused. Sharing of existing knowledge distributes
RESEARCH PAPER Syst. Res.
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
186 Jiayin Qi et al.
knowledge at the organizational level. Due to the
fact that the telecommunications industry changes
rapidly, new services, new regulation policies,
new market environments, all require continual
revision of existing knowledge.
BSS is at the front-end in serving customers
for telecom operators. Due to the competition
in telecommunications industry, organizational
structures have increasingly been adjusted to
customer-oriented. All of these request organi-
zational knowledge process.
Telephone call centre, interactive voice
response (IVR), computer telephone integration
(CTI), predictive dialers, wireless agents, e-mail,
web self service, text chat and web collaboration
make up the technology to complete customer
communication. IP based call centre, operational
CRM and interactive CRM, billing system, and
performance management are sets of software to
support the business operation process. The
integration of these technologies and sets of
software forms the IT architecture of BSS.
Knowledge Management in OSS
OSS focuses on planning, developing and
delivering services and products in operation
domain. Service/product development and
operation process are the operational processes.
OSS deals with service generation and network
resource planning.
Human knowledge, organizational knowledge,
technological knowledge and relational knowl-
edge are all involved in OSS. Those previous
service cases, as well as proven cross-selling rules
are human knowledge. How to organize service/
product development, operation process, and
network, is considered as organizational knowl-
edge. In addition, culture, regulations, and
partnerships are considered as organizational
knowledge as well. There are many innovative
techniques and skills involved with these which
are considered as technological knowledge. Inter-
estingly, the greater the scope of services offered,
and the greater the range of quality and price
options, the more efficient (and cost efficient) the
use of the network resources. Service innovation
is a key factor for revenue growth of a telecom
company. For designing a successful marketing
strategy, some intangible resources will inevitably
be used. And a successful strategy will also create
new intangible resources. These intangible
resources are relational knowledge.
Knowledge can be created from studying
previous successful service offering. The enligh-
tening effect can create new types of human,
organizational, technological and relational
knowledge. All of the knowledge can be acquired
and reused. Sharing such knowledge can further
diffuse knowledge across the enterprise.
OSS is operated at the back end which
provides decision support for BSS. Knowledge
sharing and creating are essential to such deci-
sion support function. For reducing ‘noise’ and
eliminating barriers across sectors, smooth com-
munication is required. Organizational structure,
based on traditional command and control, must
shift to an open and collaborative structure.
The analytical CRM is an outstanding compo-
nent to support service/product development
process. Decision support system (DSS) and
expert system (ES) are both common tools.
Knowledge Management in RSS
RSS focuses on planning, developing and deli-
vering resources needed to support services and
products in the operations domain. Network and
systems management process is the operational
process in RSS.
Human knowledge, organizational knowledge
and technological knowledge are the main types
of knowledge. Those previous network resource
planning cases and the accumulated network
resource management strategy form the major
human knowledge. Database, data marts and data
warehouses about services and products represent
the major organizational knowledge. Some inno-
vation techniques are technological knowledge.
Organizational structure has influence on RSS,
but the degree of influence is much weaker than
that to OSS and BSS. Database, data mart and data
warehouse are the three data storages in RSS.
Knowledge Management in SSS
SSS is of significance to OSS as an EIS. A variety of
technological knowledge is involved with this
Syst. Res. RESEARCH PAPER
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
Knowledge Management in OSS 187
system including operating systems methods and
techniques. In general, organizational structure
has relatively minor influence on it.
Summary
BSS, OSS, RSS and SSS are integrated into a single
OSS through system integrator (SI) software.
Knowledge management varies among different
components in OSS. BSS and OSS involve with
types of knowledge throughout the entire knowl-
edge management process, requiring organiza-
tional learning, open organization structure
and certain IT architecture. RSS involves human
knowledge, organizational knowledge and tech-
nological knowledge. Organizational structure
has a less significant influence on it. Data mani-
pulation tools are needed. Technological knowl-
edge is the main type of knowledge involved in
SSS for which organizational structure has minor
effect on it. The summary of knowledge manage-
ment in OSS is described in Table 2.
Table 2. Summary of knowledge management in OSS
OSS\ Knowledge Knowledge Organization IT Function
KM Architecture Management Architecture Architecture
Process
BSS Human knowledge, Create, maintain, Team management, Call centre To provide
organizational distribute and revise project manager, CTI, operational customer
knowledge, knowledge to support communicate with CRM, interactive service
relational customer interface
knowledge management process software vender CRM, billing
effectively
and customer care system, etc
process
OSS Human knowledge, Create, maintain, Team management, Analytical CRM, To support the
organizational distribute and revise project manager, DSS, etc. customer service
knowledge, knowledge to support communicate with provision
technological service/product software vender effectively
knowledge, development and
relational operation process
knowledge
RSS Human knowledge, Create, maintain, Team management Database, data To support the
organizational distribute knowledge mart, warehouse, above activities
knowledge, to support network etc. effectively
technological and systems
knowledge management process
SSS Technological Revise knowledge to Team management OS, such as Unix To support the
knowledge support OSS’ regular operation etc. above activities
effectively
OSS Human knowledge, Create, maintain, Team management, Enterprise To gain superior
In knowledge, distribute and revise project manager, Information advantage
general knowledge, knowledge to support communicate with Systems (EIS) through
organizational the horizontal business software effectively
knowledge, process of fulfilment vendor providing
technological assurance and billing end-to-end
knowledge, (FAB) customer service
relational
knowledge
RESEARCH PAPER Syst. Res.
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
188 Jiayin Qi et al.
DISCUSSION AND CONCLUSION
An integrated OSS is a combination of applica-
tions that interact with each other to enable sup-
port, administration and management of services
for telecom industry. It includes systems that
manage the networking infrastructure, planning
tools, billing systems, customer care, trouble
management tools and the like. It is the funda-
mental integrated software platform for telecom
operators. It is an EIS used in the telecommuni-
cations industry.
Although there are some researches on the
knowledge management in EIS, especially in ERP,
there are only limited researches on knowledge
management in OSS. In this paper, an overview of
knowledge management in OSS and its frame-
work is provided. Future research will be focusing
on knowledge management in OSS implementa-
tion, key knowledge management techniques in
OSS (Liao, 2003; Sher and Lee, 2004), knowledge
version management in OSS, etc.
In this paper, a knowledge management model
in OSS with systems point of view is proposed.
A knowledge management framework for OSS in
systems perspectives is also developed.
REFERENCES
Ahn J, Chang S. 2004. Assessing the contribution
of knowledge to business performance: the KP3
methodology. Decision Support Systems 36(4): 403–
416.
Alavi M, Leidner D. 2001. Knowledge management
and knowledge management systems: conceptual
foundations and research issues. MIS Quarterly
25(1).
Appel J, Polosky M. 1988. Pacific Bell’s network and
systems concept of the 90’s. IEEE Journal on Selected
Areas in Communications 6(4): 627–632.
Argyris C, Schon D. 1996. Organizational Learning.
Addison Wesley: Reading, MA.
Badii A, Sharif A. 2003. Information management and
knowledge integration for enterprise innovation.
Logistics Information Management 16(2): 145–155.
Bendoly E. 2003. Theory and support for process
frameworks of knowledge discovery and data
mining from ERP systems. Information & Manage-
ment 40(7): 639–647.
Bhatt G, Gupta J, Kitchens F. 2005. An exploratory
study of groupware use in the knowledge manage-
ment process. Journal of Enterprise Information Man-
agement 18(1): 28–46.
Cavusgil S, Calantone R, Zhao Y. 2003. Tacit Knowl-
edge transfer and firm innovation capability. Journal
of Business & Industrial Marketing 18(1): 6–21.
Choi B, Lee H. 2002. Knowledge management strategy
and its link to knowledge creation process. Expert
Systems with Application 23(3): 173–187.
Chuang S. 2004. A resource-based perspective on
knowledge management capability and competitive
advantage: an empirical investigation. Expert Sys-
tems with Applications 27(3): 459–465.
Cselényi I, Szabo’’ R, Szabo’’ I, Latour-Henner A,
Bjorkman N. 1998. Experimental platform for tele-
communications resource management. Computer
communications 21(17): 1624–1640.
Elmasri R, Navathe S. 2003. Fundamentals of Database
Systems. Addison Wesley: Boston.
Everitt H, Virgin M. 1996. Full services network
operations and management. Proceedings of IEEE
Network Operations and Management Symposium,
vol. 4, pp. 15–19.
Feng Q, Bai X, Cao Y, Jin Y. 2001. Models of electric
market operation support system based on UML.
Proceedings of IEEE 2001 International Conference on
Computer Networks and Mobile Computing, pp. 13–18.
Fernández E, Montes J, Vázquez C. 2000. Typology
and strategic analysis of intangible resources: a
resource-based approach. Technovation 20(2): 81–92.
Fowler A, Pryke J. 2003. Knowledge management in
public service provision: the child support agency.
International Journal of Service Industry Management
14(3): 254–283.
Furley N. 1996. OSS architecture framework. Proceed-
ings of IEEE Network Operations and Management
Symposium, vol. 3, pp. 15–19.
Giannelli M, Pileri S, Saracco R. 1990. Operations
support systems in Italy: experiences and perspec-
tives of integration. Proceedings of IEEE International
Telecommunication Symposium, pp. 572–576.
Huang T, Lee C, Chen Y, et al. 2003. A new architecture
to operation support systems. Proceedings of IEEE
10th International Conference on Telecommunications,
pp. 1236–1242.
Joshi A, Sharma S. 2004. Customer knowledge devel-
opment: antecedents and impact on new product
performance. Journal of Marketing 68(4): 47–59.
Kanjanasanpetch P, Igel B. 2003. Managing knowledge
in enterprise resource planning (ERP) implementa-
tion. Proceedings of IEEE Engineering Management
Conference, pp. 30–35.
Kim Y, Yu S, Lee J. 2003. Knowledge strategy planning:
methodology and case. Expert Systems with Appli-
cations 24(3): 295–307.
Kittel A, Gudur J, Gundlapudi S, Lederman A. 2000.
GNI-building integrated OSS infrastructure from
the ground up. Proceedings of IEEE Network Opera-
tions and Management Symposium, pp. 945–946.
Syst. Res. RESEARCH PAPER
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
Knowledge Management in OSS 189
Kwan M, Balasubramanian P. 2003. Knowledge scope:
managing knowledge in context. Decision Support
Systems 35(4): 467–486.
Li F, Whalley J. 2004. Deconstruction of the telecom-
munications industry: from value chains to value
networks. Telecommunications Policy 26(9–10): 451–
472.
Li H, Xu L. 2001. Feature space theory-a mathematical
foundation for data mining. Knowledge-Based Systems
14(5–6): 253–258.
Li H, Xu L, Wang J, Mo Z. 2003a. Feature space theory
in data mining. Expert Systems 20(2): 60–71.
Li T, Yang N, Wu H. 2003b. Operation Support
Systems—Theory, Strategy and Practice. Renmin Post
& Communications Press: Beijing.
Liao S. 2003. Knowledge management technologies
and applications-literature review from 1995 to
2002. Expert Systems with Applications 25(2): 155–164.
Limbach I. 2004. Mobile OSS: fitting the bill. Total
Telecom April: 30–31.
Lynn G, Morone J, Paulson A. 1996. Marketing
and discontinuous innovation: the probe and learn
process. California Management Review 38(3): 8–37.
Marakas G. 2003. Decision Support Systems in the
Twenty-first Century. Prentice-Hall: Upper Saddle,
NJ.
Mesaric J. 2004. Knowledge management — necessity
and challenge in small and medium enterprise.
Proceedings of 26th International Conference on Infor-
mation Technology Interfaces, ITI, pp. 481–485.
Miyamoto Y, Hayshi M, Koyano K, et al. 1997.
Development of operation support systems for
refuse incineration plant. IEEE Proceedings of 26th
SICE Annual Conference, pp. 1053–1056.
Nemati H, Steiger D, Iyer L, Herschel R. 2002.
Knowledge warehousing: an architectural integra-
tion of knowledge management, decision support,
artificial intelligence and data warehousing. Decision
Support Systems 33(2): 143–161.
O’Brien J. 2005. Introduction to Information Systems.
McGraw-Hill: Boston.
Patel A. 2002. Current status and future directions of
software architecture for telecommunications. Com-
puter Communications 25(2): 121–132.
Pearlson K, Saunders C. 2004. Managing and Using
Information Systems. Wiley: New York.
Ross J, Vitale M. 2000. The ERP revolution: surviving vs
thriving. Information Systems Frontiers 2(2): 233–241.
Schroter A. 1998. Introduction to the network infra-
structure warehouse. Proceedings of IEEE Network
Operations and Management Symposium, pp. 210–219.
Sher P, Lee V. 2004. Information technology as a
facilitator for enhancing dynamic capabilities
through knowledge management. Information &
Management 41(8): 933–945.
Sherif M, Ho S. 2000. Evolution of operation support
systems in public data networks. Proceedings of
IEEE Symposium on Computers and Commuications,
pp. 72–77.
Shi Z, Huang Y, He Q, Xu L, Liu S, Qin L, Jia Z, Li J,
Huang H, Zhao L. 2005. MSMiner-a developing
platform for OLAP. Decision Support Systems.
Siemieniuch C, Sinclair M. 2004. A framework for
organizational readiness for knowledge manage-
ment. International Journal of Operation & Production
Management 24(1): 79–98.
Spiegler I. 2003. Technology and knowledge: bridging
a ‘‘generating’’ gap. Information & Management 40(6):
533–539.
Stienstra M, Baaij M, Van Den Bosch F, Volberda H.
2004. Strategic renewal of Europe’s largest telecom
operator (1992–2001): from herd behavior towards
strategic choice? European Management Journal 22(3):
273–280.
Takahashi H. 1998. A study on designing driver’s
operation support system using driving environ-
ment-driver-vehicle interaction model. Proceedings
of IEEE World Conference on Computational Intelli-
gence, pp. 177–182.
Tzokas N, Saren M. 2004. Competitive advantage,
knowledge and relationship marketing: where,
what and how? Journal of Business & Industrial
Marketing 19(2): 124–135.
Wade V, Richardson T. 2000. Workflow-a unifying
technology for operational support systems. Proceed-
ings of Network Operations and Management Sympo-
sium, pp. 231–246.
Walsh D. 1998. Operations support systems: caught in
the winds of change. Proceedings of IEEE Network
Operations and Management Symposium, p. 255.
Wang S, Ariguzo G. 2004. Knowledge management
through the development of information schema.
Information & Management 41(4): 445–456.
Warfield J. 1989. Societal Systems. Intersystems Pub-
lications: Salinas, CA.
Xia Q, Rao M. 1997. A hybrid intelligent system for
process operations support. Proceedings of IEEE
International Conference on System Man Cybernetics,
pp. 2097–2102.
Xu L, Li Z, Li S, Tang F. 2005a. A polychromatic sets
approach to the conceptual design of machine tools.
International Journal of Production Research 43(12):
2397–2422.
Xu L, Li Z, Li S, Tang F. 2005b. A decision support
system for product design in concurrent engineer-
ing. Decision Support Systems.
RESEARCH PAPER Syst. Res.
Copyright � 2006 John Wiley & Sons, Ltd. Syst. Res. 23,177 1̂90 (2006)
190 Jiayin Qi et al.
Available online at
http://www.anpad.org.br/bar
BAR, Curitiba, v. 6, n. 3, art. 5,
p. 247-262, July/Sept. 2009
A Proposed Architecture for Implementing a Knowledge
Management System in the Brazilian National Cancer Institute
José Geraldo Pereira Barbosa *
E-mail address: jose.geraldo@estacio.br
Mestrado em Administração e Desenvolvimento Empresarial/Universidade Estácio de Sá
Rio de Janeiro, RJ, Brazil.
Antônio Augusto Gonçalves
E-mail address: augusto@inca.gov.br
Instituto Nacional do Câncer – INCA
Rio de Janeiro, RJ, Brazil.
Vera Simonetti
E-mail address: vera.simonetti@estacio.br
Mestrado em Administração e Desenvolvimento Empresarial/Universidade Estácio de Sá
Rio de Janeiro, RJ, Brazil.
Altino Ribeiro Leitão
E-mail address: altino@inca.gov.br
Instituto Nacional do Câncer – INCA
Rio de Janeiro, RJ, Brazil.
ABSTRACT
Because their services are based decisively on the collection, analysis and exchange of clinical information or
knowledge, within and across organizational boundaries, knowledge management has exceptional application
and importance to health care organizations. This article proposes a conceptual framework for a knowledge
management system, which is expected to support both hospitals and the oncology network in Brazil. Under this
holistic single-case study, triangulation of multiple sources of data collection was used by means of archival
records, documents and participant observation, as two of the authors were serving as INCA staff members, thus
gaining access to the event and its documentation and being able to perceive reality from an insider point of
view. The benefits derived from the present status of the ongoing implementation, so far, are: (i) speediness of
cancer diagnosis and enhanced quality of both diagnosis and data used in epidemiological studies; (ii) reduction
in treatment costs; (iii) relief of INCA’S labor shortage; (iii) improved management performance; (iv) better use
of installed capacity; (v) easiness of massive (explicit) knowledge transference among the members of the
network; and (vi) increase in organizational capacity of knowledge retention (institutionalization of procedures).
Key words: knowledge management; information system; health care; hospital management.
Received 26 October 2007; received in revised form 27 February 2009.
Copyright © 2009 Brazilian Administration Review. All rights reserved, including rights for
translation. Parts of this work may be quoted without prior knowledge on the condition that
the source is identified.
* Corresponding author: José Geraldo Pereira Barbosa
Av. Presidente Vargas 642, 22O andar, Rio de Janeiro, RJ, 20071-001, Brazil.
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
248
INTRODUCTION
Brazil currently has a complex cancer scenario. General incidence and mortality rates are elevated,
with the particularly high incidence of prostate cancer in men and breast cancer in women. Theses
cases have been responsible for over one hundred thousand deaths per year. There are approximately
480,000 new diagnoses of cancer each year in Brazil, and the vast majority of these patients have had
some contact with hospital services. However, research also shows that in several regions of the
country long waiting lists for diagnostics and treatments have become commonplace, which leads to a
situation of people being diagnosed with cancer at a very advanced stage (National Cancer Institute
[INCA], 2008). These sad findings have moved the national health care ministry in recent years to
initiate a series of challenging reforms in order to implement early diagnosing clinical procedures. The
management of cancer treatment is a long and complex process and the reduction of the patient’s
waiting time to start cancer treatment plays an increasingly important role. Therefore, any environment
focusing on the accessibility to the treatment of a chronic illness like cancer should make every effort
to avoid medical errors and fragmentation of care delivery.
The huge number of cancer cases in Brazil means that information is highly sought after by patients
and the clinicians involved in their care and those responsible for cancer services, which opens an
opportunity window for implementing hospital information systems [HIS]. Hoping to bring together
people involved in care planning and delivering – clinicians, managers and patient representatives, the
Instituto Nacional de Cancer (National Cancer Institute [INCA]) has been implementing an oncology
care network. The network, as conceived by the INCA, is a partnership of both private and public
cancer care delivery organizations, whose success will depend heavily on the collection, analysis and
exchange of clinical and managerial information or knowledge within and across the partners’
organizational boundaries. Its intention is to generate valuable information by answering the requests
from patients, government and regulatory bodies with regard to clinical and medical services.
Moreover, the integration of key data would help the evaluation of medical procedures and protocols,
streamlining the organizational processes and bringing improvements to cancer treatment.
Specifically, the network’s objectives are as follows: (i) to improve access to information and
knowledge at all levels (physicians, hospital administrators, patients); (ii) to create a community of
cancer practice knowledge; (iii) to develop an environment of easy and friendly access to relevant
information; and (iv) to collaborate with the decision-making process related to cancer care delivery.
In fact, the oncology care network is increasingly becoming a knowledge-based community of
health services and patients themselves that share their knowledge, helping reduce administrative
bottlenecks and improve the quality of care. As a result, an environment that helps translate
information into knowledge is under construction and constitutes, in itself, a driver for quality
improvements.
All the above comments bring to mind the need for a knowledge management system that will
identify, capture, structure, share and apply an individual’s or organization’s knowledge, which will
result in a competitive advantage and create sources of sustainable development, according to Nonaka
and Takeuchi (1995). Therefore, the purpose of this study is to propose a conceptual framework for a
knowledge management system in the Brazilian National Cancer Institute. To accomplish this,
knowledge management [KM] enabled health care system is envisioned that will integrate clinical,
administrative and financial processes in health care through a common technical architecture, as well
as provide a decision support infrastructure for general decision-making.
A Proposed Architecture for Implementing a Knowledge Management System in the Brazilian
National Cancer Institute
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
249
KNOWLEDGE MANAGEMENT
Knowledge management is associated with intellectual capital and the process of creation and
diffusion of knowledge embedded in business processes (Wigg, 1993), and constitutes a critical
success factor in the current challenging and innovative business scenario. The main premise of
knowledge management is the recognition of knowledge as the central point of organizational
performance (Drucker, 1993).
In order to enhance organizational performance and create value, knowledge management includes
all the processes that deal with the creation, structuring, dissemination and application of knowledge.
In the words of Hedlund (1994), these processes can be analyzed at various levels: the individual,
group or organization. For Nonaka and Takeuchi (1995), knowledge management is predicated on
shared learning, collaboration and the sharing of knowledge at the strategic organizational level.
According to Davenport and Prusak (1998), knowledge management not only involves the production
of information but also the capture, transmission and analysis of data, as well as the communication of
information based on or derived from the data to those who can work on it.
The Nature of Knowledge
Concerning knowledge itself, there are two main kinds: tacit and explicit. Tacit knowledge is the
personal, unarticulated, unexpressed knowledge possessed by an individual. It is the knowledge and
expertise that a person has gained over the years through experience, by interacting with others, and
through a process of trial and error. This knowledge lies in the individual’s brain or in his personal
notes, computer files or desk drawers. It has never been completely articulated, recorded, documented
or written down in a comprehensive format. Generally found in non-structured form, such as an
individual’s ideas, insights, values, experiences and judgments, it is more difficult to identify and to
manage. Thus, it needs to be structured before it may be stored and processed. On the other hand,
knowledge, sometimes, may be explicated, codified and set down in manuals, written procedures,
records, notes, graphic representations, audio and visual materials. Stored in databases, explicit
knowledge is suitable for access and processing (Nonaka & Takeuchi, 1995).
Reber, Nonaka and Takeuchi (1992 as cited in Spender, 1996) picture explicit knowledge as the
small tip of a huge iceberg of pre-conscious collective knowledge. The major part of it would be
formed by tacit knowledge, invisible and completely incorporated into social identity and practice. An
individual will understand a message completely only if he understands the body of his organization
collective tacit knowledge. In other words, the physical reality is socially built. By similar reasoning,
Spender (1996) concludes that interpretation (knowledge) of experience comes from the interaction
among the variables that surround the environment and the individual’s perception enhanced by
experience.
According to Tsoukas (1996), people are co-producers of their own reality, and this will help them
to form their attitudes and behaviours. Attitudes are norms and values that the individual perceives as
favourable or not, and the behaviours are the expression of these attitudes which can be shown as
coherent or incoherent towards its related attitude. Tacit knowledge is one of the main foundations of
the individual’s attitudes. Therefore, detecting tacit knowledge is complicated by the fact that the
individual has the autonomy to decide what and how much should be transmitted to others.
Almost all activities require some combination of explicit and tacit knowledge, and effective
knowledge management is the one that captures both of them. In fact, the real challenges to knowledge
management lie in being able to identify and capture tacit knowledge so that it can be retrieved when
needed. While explicit knowledge is easy to record and transfer, tacit knowledge is difficult to
identify, capture, and transmit. Although converting tacit knowledge to explicit knowledge is difficult,
it is not impossible. The employee’s tacit knowledge is generally transmitted under the form of
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
250
organizational best practices, which are often documented and put into a network, which is
subsequently accessed and used by other employees.
For Spender (1996), the big challenge of management is to distinguish the systemic activities that
really increase the collective tacit knowledge from those that only generate local and limited
knowledge. In the opinion of Hayek (1992 as cited in Spender, 1996), good managers know how to
use organizational knowledge efficiently, the kind of knowledge that, although incorporated into
people and processes, does not belong totally to any collaborator. So managers must build an
organizational space that facilitates the selection of and interaction among different tacit and explicit
knowledge available to the organization, both within its internal and external environment.
The Strategic Value of Knowledge
The health care industry itself is increasingly becoming a knowledge-based community that is
connected to hospitals, clinics and patients for sharing knowledge, reducing administrative costs and
improving the quality of care. Thus, the success of health care depends critically on the collection,
analysis and exchange of clinical information or knowledge within and across organizational
boundaries. It is recognized that the spread of new practices is shaped by multiple influences. In this
process, physicians play an important role. They can be thought of in terms of very sophisticated
knowledge workers (Wickramasinghe, 2000). Like others, (i) physicians “make sense” of this wealth
of knowledge (Borghoff & Pareschi, 1998); (ii) they own the means of production, e. g., their
specialized knowledge; (iii) they possess specialized skills and training, which they have acquired by
investing significant resources towards their education; and (iv) they make decisions that have far-
reaching consequences both for their organizations and their patients (Wickramasinghe, 2000).
Thus, it is the interchange of knowledge that represents the significant change in the present way of
managing knowledge in comparison to the early days of managing knowledge. It means that an
organization’s body of knowledge is considered an asset (intellectual capital) only when shared by its
employees. Ultimately, this implies seeing the organization as a distributed knowledge system, where
managers have to deal with the central question of how to stimulate experts and workers to share their
knowledge without facing resistance and insecurity. The main point is how to create knowledge and
exchange it among partners. The traditional dichotomy of acquiring information either in reactive
mode, to support a specific decision, or in proactive mode, to scan and monitor the environment to
detect problems, is not preemptive.
For Grant (1996), the following conditions, when present in the organization, would be primary for
transforming knowledge into value: the first is the organizational capacity of disseminating explicit
knowledge and of auditing the application of tacit knowledge. The second condition is the capacity of
the workforce to fully understand the received knowledge, what is facilitated by a common
organizational language. The third factor stems from the organization being able to recognize the
collaborator who is responsible for the knowledge creation and to compensate his effort adequately.
This is not an easy task because, although incorporated into the workforce, most of the knowledge is
generated within the boundaries of the workplace and refer to it specifically. The fourth condition
derives from the limited human capacity to acquire, store and process knowledge, the focus of the
rationality thesis proposed by Simon, Egidi and Marris (1992). That would require the division of
knowledge among specialized organizational areas. And finally, the last condition presumes that
knowledge is the critical input of a production system and the one which generates value into
products.
Sveiby (2001) conceives the body of intangible assets of an organization as formed by the
competence of the professional staff and the internal and external organizational structure. In this
author’s words, the internal structure is the one filled with management staff and information systems,
basically, and its main function is to support the professional staff when delivering services. Secondly,
the internal structure, viewed as the conduction wire connecting the organizational body of knowledge,
would be used to facilitate the transfer of tacit knowledge among the professional staff. One of the
A Proposed Architecture for Implementing a Knowledge Management System in the Brazilian
National Cancer Institute
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
251
most important facets of this process is to provide professionals with the elements for an efficient
conversion of knowledge. By conversion of knowledge, Sveiby (1997) understands those activities of
(i) gathering information (explicit knowledge) about a potential problem, (ii) applying and
transforming it into tacit knowledge, through practice, and finally presenting the problem’s solution in
an explicit form. It must be kept in mind that this explicit knowledge will be impregnated, in the
subtlest ways, by the individuals’ attitudes.
INFORMATION SYSTEMS [IS]
According to Moraes, Silva and Cunha (2004), organizations should make efforts to implement
friendly manageable learning environments and to promote learning by doing because these initiatives
improve performance without increasing education and training costs. There is a rising recognition
that more extensive use of information technologies could do more to improve the performance of
health care systems, within the bounds of appropriate measures to protect the confidentiality of private
health information. Indeed, the remarkable restructuring of cancer care institutions, from independent
local units into regional and national integrated health care delivery organizations, has required a
change in the role performed by information systems. On the other hand, it is important to emphasize
that, like other complex applications, the design of an IS-based oncology network represents a
challenge to health care managers and public authorities.
The Benefits and Limitations
Fleury and Fleury (2006) argue that knowledge is managed by means of organizational learning
processes which can be seen in three dimensions: acquisition and development of knowledge,
dissemination of knowledge and organizational memory building. An important point, raised by
Fleury and Fleury (2001), is the issue of knowledge transfer from individuals to teams, and from these
to the entire organization. According to the authors, while the individual learning process requires
from management the comprehension of positive and negative feelings of employees, the team
learning process requires the mixing, interpretation and integration of individual knowledge and
beliefs into shared collective systems. Regarding the organizational level, individual and team
knowledge may be institutionalized in several ways: structure, procedures, rules and symbolic
elements. Organizational memory is developed to store and retrieve information, e. g., data related to
past experiences, both successful and non-successful, will be easily available to employees. It is not
difficult to perceive that both knowledge dissemination and memory building are substantially
enhanced by information systems. The centralized databases where knowledge is codified and stored
and made available to employees are very effective, especially in the case of explicit knowledge.
The question of information distribution is not a trivial one. Although information technology [IT]
tools, such as databases, intranet and e-mail are helpful, Davenport, Harris and Kohli (2001, p. 71)
warn that:
…distribution involves more than just how to send knowledge. There is also the question of what
kind and how much to send. Several firms try to limit the information and knowledge to those who
interact with clients. One firm uses software technologies that filter the knowledge according to a
user’s predefined categories of importance. The filters select relevant content and distribute the
appropriate parts to the appropriate people. Another firm defines what types of information and
queries are appropriate for a particular communication method (e-mail, voice-mail). Once it
establishes a norm for each communication type, it holds formal training sessions to educate
employees on communication protocols and norms.
Terra (2004) shows that advancements in communication technologies and information systems are
affecting in a significant way the processes of generation, diffusion and storing of organizational
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
252
knowledge. Based on the results of his research with 428 Brazilian companies, the author argues that
in the 166 companies named by him as ‘learning companies’, one can find (i) information systems that
allow efficient communication throughout the whole organization, (ii) employees with wide access to
database and organizational knowledge and (iii) incentives for a systematic documentation of
organizational knowledge. According to Terra (2004), investments in the infrastructure technology
help knowledge management in three aspects:
. Storing of reference materials: codified management can be easily accessed, avoiding efforts
duplication;
. Elaboration of expertise maps: database containing descriptions of individual competences inside
and outside the organizational space, making the sharing of tacit knowledge easier;
. Just in time knowledge: tools that reduce time and space barriers to knowledge access
(videoconference, distance learning etc).
In terms of massive routine and explicit knowledge transfer, Anand, Glick and Manz (2002) point
out that IT based systems are the best way of dealing with it. This kind of data transfer is usually
necessary to support relatively structured decisions where cause and effect relations are well known.
Using the same line of reasoning, Gupta and Govinjaradan (2000, p. 72) affirm “IT is the only viable
mechanism to connect efficiently large numbers of geographically dispersed people”. According to
these authors, intellectual capital is the individual and organizational knowledge stock multiplied by
the speed at which it is circulated inside the organization (or network), which highlights the role of IT
systems as the speed accelerator.
According to Sveiby (2001), the implementation of Intranet, management information systems and
data bases are important initiatives to transfer individual knowledge to the internal structure. On the
other hand, specialist systems, such as the cancer diagnosis system of the INCA, improved man-
machine interface, simulation environment and interactive learning via Internet help translate
organizational learning to the employees.
The process of knowledge conversion, the so called spiral of knowledge in the words of Nonaka
and Takeuchi (1995), is comprised of four steps: socialization, externalization, combination and
internalization. The combination step is the one dealing with the creation of systemic knowledge by
means of new combinations of accumulated knowledge. According these authors, databases and
Internet not only help to systematize concepts but also make the flow of new ideas easy.
On the other hand, knowledge management is not merely a question of sophistication of IT
infrastructure. Concerning the obstacles to the transfer of best practices (tacit knowledge) among
organization co-workers, Szulanski (1996) enumerates the main ones: (i) an inadequate absorption
capacity by the knowledge receiver, (ii) lack of knowledge about the production factors involved in
the practices, as well as the interaction process among these factors, and (iii) the lack of
comprehension, by the receiver, of the organizational context where the practice will be applied, and
finally (iv) the lack of empathy between the provider and receiver of knowledge. Indeed, Szulanski
(1996) lists several reasons that may make people reluctant to accept a system that encourages
knowledge transfer: loss of the power warranted by individual property of specialized knowledge; not
being awarded by the transference of knowledge; spending time and energy in transference and the
‘non-invented here’ (NIH) syndrome that makes people impermeable to knowledge coming from
outside their organization. Compounding these problems there is the fact that people will have to
acquire new competences to move around the paraphernalia of new IT-based procedures and tools. It
is easy to see that those obstacles are beyond IT capability.
Recent research conducted by Meister (2003 as cited in Bertucci, 2005) in 8 private hospitals located
in Belo Horizonte, a Brazilian city, shows a low level of research and development [R&D] activities,
intellectual production and training and development [T&D] activities in the majority of private
hospitals. Again, the implementation of IT-based knowledge system may help alleviate some of those
problems but will not be a substitute for persistent low funding of research and training.
A Proposed Architecture for Implementing a Knowledge Management System in the Brazilian
National Cancer Institute
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
253
It is also important that the manager focuses his attention on knowledge management processes and
structures that directly support the strategic initiatives of organizations, such as cancer research, as in
the case of the INCA. As Zack (2003, p. 70) argues:
Knowledge management has gotten a bad rap lately, but much of it can be attributed to the fact that
most KM initiatives are not focused on strategic knowledge. An organization that defines its strategy
in terms of knowledge and identifies the strategic knowledge leverage points will know where to
focus its KM efforts, will get a long-term return on its investment, and will best the KM efforts of
competitors.
Similarly, Hammer, Leonard and Davenport (2004, p. 17) mention that “technology has immensely
improved access to, and transmission of, information, but it cannot create shortcuts to the most
valuable kinds of knowledge. That dilemma explains much about why organizations still have trouble
managing knowledge”. The authors are clearly speaking of individual and collective tacit knowledge.
A final point to be mentioned concerns the obstacles imposed by organizational culture to strategic
changes such as the implementation of IT-based knowledge management in the INCA. Mintzberg,
Ahlstrand and Lampel (2005) define organizational culture as the body of shared beliefs which are
reflected in traditions, habits, stories, symbols, products etc. Acting as a perceptive filter or lens,
culture interferes with thinking styles (decision making, analysis procedures etc) of the acculturated
people. According to Mintzberg et al. (2005, p. 268), “culture and especially ideology do not
encourage strategic change so much as the perpetuation of existing strategy; at best, they tend to
promote shifts in position within the organization’s overall strategic perspective”. Lorsch (1986)
argues that introducing and nurturing the values of innovation and flexibility in the organization is an
effective way of promoting acceptance of changes. He also mentions that managers should be
submitted to a cultural auditing in order to identify their shared beliefs. The author suggests that these
shared beliefs must be made visible around the organization as a way to make people aware of their
possible prejudices. Naturally, special attention should be paid to the prejudices against IT knowledge
management. However, Hernandez and Caldas (2001) warn that some managers sometimes use
culture resistance as an excuse for problems arising from ill designed change processes. Contrary to
the classical prejudice that human beings are naturally resistant to changes, these authors argue that
human beings resist loss but desire change. For the authors, it is important to treat resistance to
changes from both collective and individual perspectives. Resistance, depending on several situational
and perceptual factors, varies from person to person.
The Foundations of the Proposed Knowledge Management System
Healthcare organizations generate a massive amount of data, such as electronic medical records,
clinical trial data, hospital records and administrative reports, gathered from internal and external
sources, such as clinical practices, hospital information systems, and cancer registries. Usually, this
huge collection effort is incomplete because data are rarely transformed into a strategic decision-
support resource. For this purpose, the emergence of knowledge management tools, such as Data
Mining [DM], represents an opportunity to convert raw data into knowledge (Cheah & Abidi, 1999).
Knowledge management in healthcare can be regarded as the confluence of concepts and techniques to
facilitate the creation, identification, acquisition, development, dissemination and utilization of a
healthcare enterprise’s knowledge assets (O’Leary, 1998).
The proposed knowledge management system incorporates four steps: creating, structuring ,
sharing and applying. Figure 1 presents a short list of procedures and tools included in each step.
This knowledge process is based on Bose (2003), who describes knowledge as a process that extracts,
transforms and disseminates information to be shared and reused by the entire organization.
Additionally, the process includes the contribution of Davenport et al. (2001) when he describes the
four major goals of the knowledge management systems: to create knowledge replacement, to increase
the access of knowledge, to improve the knowledge environment and to manage knowledge as an
intangible asset.
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
254
Figure 1: The Knowledge Process
Source: adapted from Bose (2003, p. 63).
The creating step includes knowledge acquisition and knowledge exhibition. As seen before,
knowledge comes from different sources, such as clinical learning outcomes, best practices and
innovative procedures. The process for acquiring knowledge, from both internal and external sources,
is highly dependent on the hospital staff involved in the cancer treatment. Knowledge exhibition is
understood to be the formal process representation methods developed by the organization.
The structuring step involves defining, storing, indexing and linking documents and digital images.
Mapping existing knowledge, in terms of context and importance, helps classify the knowledge into
taxonomies. Storing the knowledge in appropriate repositories such as the yellow pages of expertise,
clinical guidelines, protocols and best practices, may then be done.
The sharing step concerns the diffusion of knowledge and collaboration among co-workers,
resulting from transfer and dissemination of best practices. Knowledge sharing is accomplished by
different means such as training, intranet, groupware, extranets, communities of practice,
benchmarking and cross-functional teams.
The last step, applying, involves activities related to decision-making support, problem-solving,
developing competency and teamwork, improving productivity, establishing communities of interest,
using process workflow, customer support and training to encourage people to speed up the process.
Decision Support
System (DSS)
Data Mining (DM)
APPLYING
Data acquisition
Identification of Best
Practices
CREATING
Groupware
Extranet
Intranet
SHARING
Clinical Guidelines
Protocols
Data Storage
STRUCTURING
A Proposed Architecture for Implementing a Knowledge Management System in the Brazilian
National Cancer Institute
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
255
METHOD
Research Design
This study was developed through a qualitative research design to present a descriptive analysis of
the conceptual framework of the knowledge management system implemented into the National
Cancer Institute (Instituto Nacional de Cancer [INCA]). This system is expected to support both
hospitals and the national oncology network, the implementation of which has been placed in the
hands of the INCA. The INCA was chosen as a unit of analysis in order to take advantage of the
professional experience of two of the authors while working at its Information Technology Division.
The first author is the INCA’s Chief Information Office [CIO] and associate professor at the graduate
program in Business Administration that has been conducting this study. The second and third authors
are full professors at the same program while the fourth is the systems manager of the INCA´s
Information Technology Division.
This holistic single-case study intends to contribute to the knowledge of organizational phenomena,
presenting a contemporary description of the system implemented, through an empirical inquiry,
answering the questions what, who, where and how (Cooper & Schindler, 2003; Yin, 2003).
Data Collection
Triangulation of multiple sources of data collection was used by means of archival records,
documents and participant observation, as two authors were serving as INCA staff members,
thereby gaining access to the event and its documentation and being able to perceive reality from an
insider point of view, characterizing a comprehensive research strategy, in the words of Yin (2003).
The following table summarizes the sourcing procedures:
Table 1: Data Collection Methods
Source of data Description
Archival Records • Clinical data
• Cancer registries
• Patient admission data (demography, rate etc)
Documents • Hospital Information System manuals and user guides;
• Hospital organizational routines (administration, medical care, operations etc)
• Medical research literature
Interviews • 20 interviews with hospital and administrative staff (nurses, doctors, technicians,
coordinators, managers)
Participant
observation
As stated above, two of the researchers (first and fourth) have strong connections with the
problem under investigation, which required careful attention in order to avoid biases. On
the other hand, this fact enabled access to tacit knowledge through the observation of
people directly involved in the problem (physicians, technicians, system analysts etc).
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
256
Data Analysis
The information was organized in a sequential scheme, under a descriptive approach, crossing
information from records and documents with evidence from observation. Following this, the
proposed knowledge management system used at the INCA was analyzed through the lens of Bose
(2003) and Davenport (2006), Davenport and Prusak (1998), Davenport et al. (2001) and Hammer et
al. (2004), seeking converging evidence of their theoretical outlines with the proposed system.
THE PROPOSED ARCHITECTURE
In most cancer hospitals, multidisciplinary committees discuss their patients’ clinical approach. The
medical experts go to different sources of information in order to make their decisions. First, they
check whether their patients comply with existing guidelines. On the other hand, they can also select
their therapeutic decisions based on the cases of patients that have undergone similar treatment in the
past.
To support the physicians’ activities, several tools, such as tracking mechanisms for keeping the
longitudinal patient history, on-line tools for gathering clinical information and the traditional medical
record, are used. Most of these are patient-centric and make the hospital environment amenable to the
kind of knowledge management system framework, such as the one presented in Figure 2. It can be seen
that Figure 2, being based mainly on the recommendations of Bose (2003) and Davenport et al. (2001),
incorporates components and associated activities related to all four steps presented in Figure 1.
Figure 2: Proposed Framework for Cancer Knowledge Management
Source: adapted from Bose (2003, p. 68).
Clinical
Data
HIS CancerRegistries
Knowledge Management Engine
DSS DM
KDW
Groupware, Intranet, Extranet
Clinical
Analysis
Capacity
Analysis
1. Creating
2. Structuring
3. Sharing
4. Applying
A Proposed Architecture for Implementing a Knowledge Management System in the Brazilian
National Cancer Institute
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
257
The Main Features of the Proposed Architecture
Creating
Clinical Data
The clinical data, to be incorporated into the Knowledge Data Warehouse [KDW], come from HIS
(patients demography) and from physicians, nurses and other health care providers, and fall into three
general categories: (i) the historical information that the patient provides; (ii) the information obtained
from physical examination; and (iii) the results of the tests or procedures performed on the patient
Hospital Information System [HIS]
The goal of a hospital information system is to use computers and communications equipment to
collect, store, process, retrieve, and communicate, e. g., only administrative information for all
hospital activities, and, at the same time, to satisfy the functional requirements of all authorized users.
The system is comprised of patient-oriented modules (admission, discharge, order entry, radiology
modules and laboratory modules) and administrative modules (finance and billing, management
information and decision-support module). In the case of the INCA, Clinical Data is not included in
the HIS since this specific module was customized to fit INCA requirements.
Cancer Registries
The oncology care network aims to develop a national network of cancer registries, which will
collect information about patients with cancer from public and private hospitals. Data will be stored
and updated to produce a history of all cancer patients, which includes primary treatments, stage of
diagnosis, length of survival and subsequent cancers. No matter the patient’s status – inpatient, day
case or outpatient – cancer registries will collect treatment details. Therefore, it is expected that these
registries will play an important role in auditing the quality of cancer services, reducing waiting lists
and improving the patient’s experience.
Structuring
Knowledge Data Warehouse
Data Warehouses act as a repository for current and historical operational data. The health care
industry has a poor record in terms of standardization, so data are widely used (and misused) in an ad
hoc manner. The knowledge data warehouse [KDW] allows the information to be presented in several
formats and to be distributed more widely in communities of practice. At the same time, Online
Analytic Processing [OLAP] functionality can be used to gain a deeper understanding of specific
health care issues. For Bose (2003), the Knowledge Data Warehouse [KDW] provides the means for
business intelligence through ad hoc and managed query environment, OLAP support, statistical
analysis tools, knowledge mining and access to Decision Support Systems [DSS] applications.
Intranet, Extranet, Groupware
By using Intranet/Extranet as a secure access portal, the environment allows for secure, selective
sharing of key information, such as test results, follow-up care and support groups. This strategy
bridges the gap between what the doctor and the manager knows. The key benefits of e-health strategy
adoption and groupware employment are enhanced collaboration between physician and manager,
optimization of physicians’ work and empowered managers, all of them using sophisticated, cost-
effective web applications and architecture. According to Bose (2003), executives in leading health
care organizations are increasingly recognizing that in order to maintain or gain competitive
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
258
advantages, organizational knowledge not only needs to be managed for, but also integrated with, their
corporate systems.
Sharing
Knowledge Management Engine (DSS and DM)
The Data Mining [DM] and Decision Support System [DSS] are among the tools used by physicians
to gain access to KDW. These tools provide the means for business intelligence through ad hoc and
managed query environment, statistical analysis tools, knowledge mining (answers that lead to new
questions), and access to decision support software at all hierarchical levels. Goebel and Gruenwald
(1999) argue that knowledge-mining tools are used to recognize patterns and relationships that may be
valuable for building models that support clinical analysis and capacity analysis. These tools improve
the decision-making process by providing new information that otherwise users would not have been
able to access on a timely basis. The newly extracted knowledge needs to be inserted into one or more
bases to keep them continuously up-to-date and to be of good use for the practice of evidence-based
medicine. The data visualization techniques that facilitate the interpretation process of new knowledge
can be used in conjunction with the knowledge data warehouse.
Concerning DSS, its most powerful feature is the drill-down capability, which allows users to have
access to detailed information, allowing users also to drill up and across. Therefore, the users have
unprecedented capabilities to capture, analyze and present data. Physicians, through the experience of
using such tools and techniques, gain new knowledge related to their health care area. Specific
decision support systems are built using data extracted from various data sources and models.
The data and knowledge necessary for decision-making are spread around the organization. The
DSS is programmed to compare the patient’s case to the corresponding guideline, then to other cases,
and retrieve similar cases. In other words, the system is also designed to be a data warehouse. Thus,
the decision-making process itself results in enhanced understanding of the problem process,
generating new knowledge, indicating the interdependence between the decision-making and
knowledge creation processes.
The Knowledge Management Engine consolidates knowledge from multiple source systems and is
capable of presenting different visions of data in order to match the specific requirements of different
user segments (e.g. disease, clinical areas, geography). Those visions (data marts) must remain
consistent to each other to ensure final report consistency. Furthermore, they must be designed to
match the type of analysis required by target users — online analytical processing [OLAP], querying
etc. Overall, the access tools provide the means for business intelligence through ad hoc and managed
query environment, OLAP support, statistical analysis tools, knowledge mining and access to DSS
applications at all levels.
Applying
Clinical Analysis
Important beneficiaries of the proposed knowledge management are the activities related to clinical
analysis, such as epidemiological and disease analysis and their correspondent management. The
frequently mined knowledge required by these activities comes under the form of associations, classes
(groups with particular profiles), clusters (groups of instances with the same characteristics),
sequences (events linked over a period of time), exceptions (unusual knowledge), forecasts
(estimations of future values of attributes), text (e-mails, news) and Web documents.
A Proposed Architecture for Implementing a Knowledge Management System in the Brazilian
National Cancer Institute
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
259
Capacity Analysis
Another beneficiary is the area of capacity analysis that involves comprehensive analysis of patient
treatment flow and the availability of capacity (people, machines, etc.) to deal with demand, which
often fluctuates. In the course of this kind of analysis, mining of knowledge has frequently been used
to help identify patient populations, lab utilization, operating room utilization and patient flow.
Davenport (2006) mentions that the knowledge management system is a highly supportive
environment for business process analyses.
As seen above, this framework is instrumental to the building of an environment for managing
cancer information that incorporates the patient’s treatment flow, epidemiological aspects and analysis
of installed capacity. These features allow an overview of the national oncology practice which in
several ways is much more accurate than viewing each hospital separately.
Current Status of the System Implementation
In recent years, the INCA has been investing heavily in information technology in order to create
favorable conditions for the implementation of the above proposal. A communication infrastructure
was established and an information architecture, in which the Hospital Information System [HIS] is
one of the most important bases, was implemented. Furthermore, a significant amount of resources has
been assigned to the training of managers and operational staff to work in a web environment.
The operational systems, which are data sources to the data warehouse (KDW), have already been
implemented. The electronic medical record [EMR] is fully operational in all of the INCA’s hospital
units and the physicians have been accessing the patient information in real time in the web
environment. The Hospital Information System [HIS], the Cancer Registries and Clinical Data are
fully implemented. Concerning the Cancer Registries, they have been implemented in more than 100
hospitals around the country and have been generating data to feed the INCA’s data warehouse
(KDW). Currently in implementation are the Data Mining tools to be used to treat the collected data
supporting the epidemiological analysis (clinical and capacity).
FINAL CONSIDERATIONS
This study presented the capabilities, the technical infrastructure and the decision support
architecture to be incorporated into the proposed knowledge management enabled health care
management system. The four steps of the framework proposed, i.e., creating, structuring , sharing
and applying, represent the pillars of a knowledge structure which could promote a security
environment for individuals to express their attitudes through coherent behaviors, facilitating the
dissemination of tacit knowledge, issues which have been studied in detail by Davenport (2006),
Davenport and Prusak (1998), Davenport et al. (2001) and Hammer et al. (2004).
The benefits derived from the present status of the implementation are reflected mainly on the
easiness of knowledge access and on the increase of operational efficiency, not forgetting patient focus
and satisfaction, as well as enhanced knowledge transfer and diffusion processes. Specifically, the
main results, so far, are:
. Speediness of cancer diagnosis and enhanced quality of both diagnosis and data used in
epidemiological studies;
. Reduction in treatment costs;
. Relief of the INCA’S labor shortage;
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
260
. Improved management performance;
. Better use of installed capacity;
. Easiness of massive (explicit) knowledge transference if we think of the dozens of medical records
daily exchanged among the members of the network; and
. Increase in organizational capacity of knowledge retention (institutionalization of procedures).
The implementation has also demonstrated that a clear understanding of the knowledge management
process by professionals and administrative staff is imperative, as mentioned by Lorsch (1986) and
Hernandez and Caldas (2001), who also indicate several practical measures to overcome cultural
barriers to strategic change. Resistance against the new system on the part of some physicians has
been overcome by the development of user-friendly web interfaces, as mentioned by Moraes et al.
(2004). An additional facilitator has been the enthusiastic adhesion of young physicians who are used
to navigating the web environment.
Above all, the ongoing implementation has revealed that this kind of initiative is most likely to be
successful in health care organizations that value organizational learning, pursue strategic goals,
nurture a culture of knowledge sharing, accept new challenges, try original approaches and have the
ability to exploit the power of information technology. It is not less important to stress that
transforming an oncology care network into a knowledge-based community of health services will
require the participation of all players: hospitals, clinics, physicians and communities.
Therefore, the sources of data collection used in this study could be strengthened by using semi-
structured interviews with some staff members, focusing on issues that cannot be examined through
the other sources used. Staff participation could provide important insights into the methodology
implementation, helping to corroborate previous findings from the other sources through verbal
responses.
Finally, Bose (2003) warns that future research on privacy and confidentiality issues of health care
knowledge, including the lifetime health care record of patients, is fundamental to the widespread
adoption of a health care management system. Significant privacy and confidentiality issues emerge
when knowledge from widely disparate sources is brought together and made available in electronic
forms.
REFERENCES
Cheah, Y. N., & Abidi, S. S. R. (1999). Healthcare knowledge management through building and
operationalizing healthcare enterprise memory. In P. Kokol, B. Zupan, J. Stare, M. Premik, & R.
Engelbrecht (Eds.). Medical informatics in Europe (MIE’99) (pp. 726-730). Amsterdam: IOS
Press.
Anand, V., Glick, W. H., & Manz, C. C. (2002). Capital social: explorando a rede de relações da
empresa. Revista de Administração de Empresas, 42(4), 57-73.
Bertucci, J. (2005). Ambiente, estratégia e performance organizacional no setor industrial e de
serviços. Revista de Administração de Empresas, 45(3), 10-24.
Borghoff, U., & Pareschi, R. (1998). Information technology for knowledge management. Berlin:
Springer-Verlag.
Bose, R. (2003). Knowledge management-enabled health care management systems: capabilities,
infrastructure, and decision-support. Expert Systems with Applications, 24(1), 59-71.
A Proposed Architecture for Implementing a Knowledge Management System in the Brazilian
National Cancer Institute
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
261
Cooper, D. R., & Schindler, P. S. (2003). Métodos de pesquisa em administração (7a ed.). Porto
Alegre: Bookman.
Davenport, T. H. (2006). Pense fora do quadrado. São Paulo: Elsevier.
Davenport, T. H., & Prusak, L. (1998). Working knowledge: how organizations manage what they
know. Boston: Harvard Business School.
Davenport, T. H., Harri, J. G., & Kohli, A. K. (2001). How do they know their customers so well?
MIT Sloan Management Review, 42(2), 63-73.
Drucker, P. (1993). Post-Capitalist Society. New York: Harper Collins.
Fleury, M. T. L., & Fleury, A. (2001). Construindo o conceito de competência. Revista de
Administração Contemporânea, 5(Edição Especial), 183-196.
Fleury, M. T. L., & Fleury, A. (2006). Estratégias empresariais e formação de competências (3 ed.).
São Paulo: Atlas.
Goebel, M., & Gruenwald, L. (1999). A survey of data mining and knowledge discovery software
tools. ACM SIGKDD, 1(1), 20-33.
Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management Journal,
17(Special Issue), 109-122.
Gupta, A. K., & Govindarajan, V. (2000). Knowledge management’s social dimension: lessons from
Nucor Steel. Sloan Management Review, 42(1), 71-80.
Hammer, M., Leonard, D., & Davenport, T. (2004). Why don’t we know more about knowledge? MIT
Sloan Management Review, 45(4), 13-19.
Hedlund, G. (1994). A model of knowledge management and the n-form corporation. Strategic
Management Journal, 15, 73-90.
Hernandez, J. M. C., & Caldas, M. P. (2001). Resistência à mudança: uma revisão crítica. Revista de
Administração de Empresas, 41(2), 31-45.
Lorsch, J. W. (1986). Managing culture: the invisible barrier to strategic change. California
Management Journal, 28(2), 95-109.
Mintzberg, H., Ahlstrand, B., & Lampel, J. (2005). Strategy Safari: a guided tour through the wilds of
strategic management. New York: Free Press.
Moraes, L. V. S., Silva, M. A., & Cunha, C. J. C. A. (2004). A dinâmica da aprendizagem gerencial
em um hospital. RAE-eletrônica, 3(2), 1-20. Retrieved October 4, 2007, from
http://www.rae.com.br/eletronica/index.cfm?FuseAction=Artigo&ID=1853&Secao=ORGANIZ
A&Volume=3&Numero=2&Ano=2004
National Cancer Institute. (2008). INCA Estimativas 2008: incidência de câncer no Brasil . Rio de
Janeiro: Author.
Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company. New York: Oxford University
Press.
O’Leary, D. (1998). Knowledge management systems: converting and connecting. IEEE Intelligent
Systems, 13(3), 30-33.
Simon, H. A., Egidi, M., & Marris, R. (1992). Economics, bounded rationality, and the cognitive
revolution. Aldershot, UK: Elgar.
José Geraldo Pereira Barbosa, Antônio Augusto Gonçalves, Vera Simonetti, Altino Ribeiro Leitão
BAR, Curitiba, v. 6, n. 3, art. 5, p. 247-262, July/Sept. 2009 www.anpad.org.br/bar
262
Spender, J. C. (1996). Making knowledge the basis of a dynamical theory of the firm. Strategic
Management Journal, 17(Special Issue), 45-62.
Sveiby, K. E. (1997). The new organizational wealth. San Francisco: Berrett-Koehler.
Sveiby, K. E. (2001). A knowledge-based theory of the firm to guide in strategy formulation. Journal
of Intellectual Capital, 2(4), 344-358.
Szulanski, G. (1996). Exploring internal stickiness: impediments to the transfer of best practice within
the firm. Strategic Management Journal, 17(Special Issue), 27-44.
Terra, J. C. C. (2004). Gestão do conhecimento: aspectos conceituais e estudo exploratório sobre as
práticas de empresas brasileiras. In M. T. L. Fleury & M. M. Oliveira Jr. (Orgs.). Gestão
estratégica do conhecimento. São Paulo: Atlas.
Tsoukas, H. (1996). The firm as a distributed knowledge system: a constructionist approach. Strategic
Management Journal, 17(Special Issue), 11-25.
Wickramasinghe, N. (2000). IS/IT as a tool to achieve goal alignment in the health care industry.
International Journal of Healthcare Technology and Management, 2(1), 163-180.
Wigg, K. (1993). Knowledge management foundations. Arlington, VA: Schema.
Yin, R. K. (2003). Case study research: design and methods (3rd ed.). Thousand Oaks, CA: Sage.
Zack, M. H. (2003). Rethinking the knowledge-based organization. MIT Sloan Management Review,
44(4), 66-71.
S A F E T Y SYSTEMS
Steps to Designing
a S a fe ty M a n a g e m e n t S y s te m
B e i n g p r o a c t i v e a n d p r e d i c t i v e , i n s t e a d o f r e a c t i v e , is k e y t o s u c c e s s
By Susan E. S a g a rra
T h e a n n u a l A M R
S a f e t y C o m p e t it io n
s im u la t e s s it u a t io n s
E M S p r o fe s s io n a ls
e n c o u n t e r e v e r y day.
E
MS agencies have protocols and policies
in place to ensure proper care and safety
of patients. Agencies can also include
p ro g ram s th a t make EMS providers
more m indful of their own safety and the
behaviors that impact that safety. Developing a safety
management system (SMS) can assist field providers
and their supervisors in being proactive, and possibly
even predictive, instead of reactive, to the hazardous
situations they face in the field.
The creation of an SMS can become an integral
p art of the agency’s operational procedures, but it
takes a com m itm ent from leadership to adm inistra
tive staff says Ron Thackery, senior vice president
of professional services & integration for American
Medical Response (AMR).
During the recent EMS World Expo held Septem
ber 15-19 in Las Vegas, NV, Thackery and others
presented ways to create an SMS as part of the EMS
Safety Officer workshop that debuted this year.
According to Thackery everyone in an agency must
understand the role of safety in order to implement
and manage a program. He cautions, however, that
one size does not fit all. Leadership, with strong input
from employees, m ust analyze individual agency
needs and prioritize based on w hat is realistic to
implement. “You can’t boil the ocean,” says Thack
ery. “You might have a list of 10 things you want to
do but realistically, you can’t do all of them. You have
to boil it down to something manageable. Agencies
have to pick th eir top needs and be com m itted to
implementing the most im portant ones.”
2 6 NO VEMBER 2015 | E M S W O R L D . c o m
S A F E T Y SYSTEMS
Thackery and his colleagues at AMR
have extensive knowledge in integrating
safety into every aspect of providers’ duties.
Thackery is responsible for risk manage
m ent and safety, w ith previous executive
oversight for fleet a d m in istra tio n and
clinical services. He serves on the board
of directors for the National Safety C oun
cil and chairs the Professional Standards
and Research Com m ittee of the American
Ambulance Association.
“There are four com ponents to a safety
management system,” says Thackery. “The
three prim ary ones are safety risk manage
ment, safety leadership and safety assur
ance. The fourth is safety promotion, which
is the glue th a t holds it all together. T hat
part is how you communicate to the people
in the field to behave safely. If you remember
the TV show Hill Street Blues, at the end of
every roll call they were told, ‘Let’s be care
ful out there.’ That built a culture of safety
in every show. T hat kind of culture can be
built w ithin any agency.”
Thackery says the message can vary. In
some places the chief or board president
signs a mission statement or pledge that the
agency is com m itted to safety. O thers may
have the entire staff sign the pledge. The
statem ent may be fram ed and placed in a
heavily traveled area of the agency.
“It’s a pledge saying, ‘This is why I work
safe,”’ he says. “A nother idea is to have the
staff provide photos of whatever is impor
ta n t to them in life -a spouse, kids, a pet. It
sends a message that they are committed to
work safely because of the rem inders th at
are posted. It helps build a culture among
the staff because people also learn things
about each other. Then it is up to leadership
to develop policies and program s of what
they expect them to do to behave safely.”
In most agencies:
100%
of providers have
knowledge of safety issues;
of supervisors have
knowledge of safety issues;
of top m anagem ent have
knowledge of safety issues.
D id y o u k n o w t h a t 7 4 %
o f E M S w o r k e r d e a t h s a r e
t r a n s p o r t a t io n – r e la t e d ? *
D on’t let your sta ff becom e part of the statistic. Protect them w ith safety
seating from EVS, Ltd. Since 1993, w e ‘v e produced more safety seating
products than anyone in the EMS industry, through investing in research
and developm ent and dynamic testing.
EVS 1769 Seat with
Mobility Q Tracking System
• Seamless seat with 3-point belting system
• Tracking system allows access to
equipment and patient while belted
• Available in 36″ or 48″ long track
• Seat attachment to base may be
offset to gain additional space
‘ According to the N ational Associatio n o f EMS Physicians.
S E A T O P T I O N S ___
T i l t – f o r w a r d t o t r a n s p o r t a
s e c o n d p a t i e n t o r f l i p – u p
w h e n n o t i n u s e
W h a t are you doing to keep yo u r m edical s ta ff safe?
Specify EVS seating in your next vehicle.
L t d –
E m e rg e n c y V e h ic le S e a tin g
(800)364-3218 ■ International (574)233-5707
E-mail: evssales@evsltd.com ■ www.evsltd.com
O u r o n ly business
is seatin g safety
fo r th e E M S industry!
F o r M o r e I n f o r m a t i o n C ir c le 2 4 o n R e a d e r S e rv ic e C a rd
2 8 NO VEMBER 2015 | E M S W O R L D . c o m
mailto:evssales@evsltd.com
http://www.evsltd.com
Thackery says that the message needs
to be changed on a regular basis: “People
might become numb to the message. Some
organizations update the photos every six
months or every year. I try to push people
to have something personal and to update
with new photos all the time. And really,
people who are committed will keep updat
ing it, and leadership must make sure it
happens.”
Thackery says the aviation industry
implemented safety management systems
in the 1970s. The EMS industry is mim
icking the aviation industry’s research and
policies for its programming.
“It became popular in the EMS profes
sion in the past decade because the air-med
side kept having crashes,” says Thackery.
“We decided we needed to have a frame
work with a tie to EMS. Agencies have a
process and policies, a way to manage their
dispatching, billing, etc. It makes sense to
include a program and policies for safety.
When they do it, it just becomes a part of
the overall way they run the agency.”
The concept is rooted in behavior-based
safety and relies heavily on Herbert Hein
rich’s Pyramid of Safety. Heinrich was an
industrial safety pioneer from the 1930s
who worked for Travelers Insurance Co.
Heinrich’s research is claimed as the basis
for the theory of behavior-based safety,
which holds that as many as 95% of all
workplace accidents are caused by unsafe
acts. Heinrich came to this conclusion after
reviewing thousands of accident reports.
According to Thackery, changing behav
iors to create a culture of safety in the EMS
industry requires a commitment to improve
provider safety, which results in improved
patient safety and, ultimately, improved
community safety. The foundation of an
SMS includes fostering a culture of safety,
coordinated support and resources, safety
data, education initiatives, safety standards
and requirements for reporting and investi
gating incidents that affect safety.
An SMS should examine how paramed
ics are lifting patients, driving ambulanc
es, fatigue levels (analyzing hours of ser
vice), infection control protocols, hazmat
responses, machinery operations and work
space ergonomics. Thackery also says an
F o r M o r e I n f o r m a t i o n C irc le 2 5 o n R e a d e r S e rv ic e C a rd
E M S W O R L D . c o m | NOVEMBER 2015 2 9
“A LOT OF AGENCIES MANAGE
SAFETY IN A REACTIVE MODE;
BUT THEY CAN DEVELOP SYSTEMS
TO BE PRO-ACTIVE OR EVEN
PREDICTIVE.” -R on Thackery
NEW
The MegaMover” Select™
Goes Where Stretchers Can’t
• Transfer, tra n sp o rt, and rescue m
patients th a t can’t be reached #
by stretchers t y
•14 m u lti-p o s itio n e d handles m
provid e e rg o n o m ic liftin g I / 1
• Pull straps fo r situations
w h en p u llin g a p a tie n t B P
is safer th a n liftin g V *
• Durable, nonw oven design V
holds up to 1000 lbs. \
• Light, space-saving, and p o rta b le
m e g a m o v e r
p o rta b le t ra n sp o r t u nits
800 .55 8.6765
G r a h a m M e d ic a l.c o m
The Promise o f P rote ction’
EMS P ro d u cts fr o m G ra h a m M e d ic a l
Move with
Speed & Safety
SAFETY SYSTEMS
SMS can focus on environm ental sustain
ment, contractor safety, off-duty safety, fit
ness for duty, physical agility testing, drug/
alcohol testing and medical m onitoring (of
employees, but also communicable diseases
ABOUT THE AUTHOR
Susan E. Sagarra is a writer,
editor and book author based
in St. Louis, MO.
in the community, such as Ebola).
Thackery says there are three approaches
to managing safety issues:
1. Reactive (past): Respond to events that
have already occurred, such as incidents and
accidents;
2. Proactive (present): Actively identify
hazards through the analysis of the orga
nization’s processes;
3. Predictive (future): Analyze system
processes and cu rre n t en v iro n m en t to
identify potential future problems.
“A lot of agencies manage safety in a reac
A M R h o ld s a n a n n u a l e v e n t In D e n v e r
w h e r e p ro v id e r s c o m p e t e in a s a f e t y
a n d s k ills c o m p e t it io n t h a t s im u la t e s
s it u a t io n s E M S p ro fe s s io n a ls e n c o u n t e r
e v e r y d a y . “ T h e A M R N a t io n a l S a f e t y
C o m p e t it io n is n o t o n ly a v e r y p r e s tig io u s
e v e n t f o r o u r c a r e g iv e r s , i t a ls o in s tills
a c u lt u r e o f s a f e t y a n d an e m p h a s is on
c lin ic a l e x c e lle n c e ,” s a y s T h a c k e r y .
“ T h e c o m p e t it io n in c lu d e s a t im e d d r iv in g
c o u rs e t h a t m e a s u r e s t h e i r a b ilit ie s
t o s a f e ly a n d e f f i c i e n t l y o p e r a t e an
a m b u la n c e , t w o v e r y d i f f i c u l t p a t ie n t
e n c o u n te r s a n d a c lin ic a l s k ills s e c t io n .”
W h i l e t h e c re w s h a v e a lo t o f f u n a n d
t r u l y e n jo y t h e c o m p e t it io n , t h e y also
u n d e r s t a n d t h e im p o r t a n c e o f fo c u s in g
o n s a f e t y a n d c lin ic a l e x c e lle n c e . “ T h e
c re w s a ll t a k e h o m e s o m e t h in g t h e y
h a v e le a r n e d a n d t h e n t h e y p ass i t o n to
t h e o t h e r t e a m m e m b e r s in t h e i r loc al
o p e r a t io n ,” s a y s T h a c k e r y . “ I t ’s t h a t
t y p e o f c o m m it m e n t t o le a r n in g a n d
e x c e lle n c e t h a t e n s u re s o u r c re w s p r o v id e
o u t s t a n d in g p a t i e n t c a re e v e r y d a y .”
tive mode,” says Thackery. “An employee
gets injured and the agency reacts. But they
can develop systems to be pro-active or even
predictive.”
However, that requires leadership to be
more in tune with what is affecting safety
w ithin the agency. Thackery says th a t in
most agencies, the paramedics and EMTs
have 100% knowledge of problem s and
safety issues; supervisors have 74% knowl
edge; mid-level m anagem ent has just 9%
knowledge; and top management has just
4% knowledge.
3 0 N O V E M B E R 2 0 1 5 | E M S W O R L D . c o m
So how does a n EMS agency go a b o u t
an aly z in g its n eed s an d th e n im p le m e n t
ing an d m a in ta in in g a safety m anagem ent
system ? T hackery said agencies should fol
low th e ideas in th e fo u r pillars o f an SMS:
S a fe ty P o licy : E sta b lis h e s
senior m anagem ent’s com m it
m e n t to c o n tin u a lly im prove
safety, d efining th e m ethods,
processes an d o rg an izatio n al
s t r u c t u r e n e e d e d to m e e t
safety goals. It requires:
• C o m m itm e n t o f th e te a m to achieve
high sta n d a rd s and com pliance. T h is also
involves eth ical decision-m aking an d p ro
m oting a c u ltu re o f safety.
• T ran sp aren cy in m anaging safety.
• D o cu m en te d policies/processes.
• O p en rep o rtin g .
• Any policy, program or initiative m ust
pass tw o tests: W ill it mitigate risk if used as
designed, and will the system adversely impact
productivity, safety, efficiency and privacy?2 S a fety R isk M an agem en t: D eterm in es th e need for, and ad eq u acy of, new o r revised
risk controls. The agency m ust
id en tify h a z a rd s an d assess,
analyze an d control th e risks.3 Safety A ssurance: Evaluates th e c o n tin u e d e ffectiv en ess of im p le m e n te d risk c o n tro l
stra te g ie s an d s u p p o r ts th e
identification of new hazards.
T h is e n s u r e s re s u lts m e e t
e x p e c ta tio n s an d co m pliance, a n d facili
ta te s in fo rm a tio n g a th e rin g (via a u d its/
evaluations, em ployee re p o rtin g an d data
analysis). Periodic assessm ent of th e system
is required.
4 Safety P rom otion : Includes tra in in g , c o m m u n icatio n and o th e r actions to create a posi-
tive safety c u ltu re w ith in all
© f l l l P levels of th e w orkforce. T h is
phase is th e glue th a t “b o n d s”
all safety activities. It involves advocating
for a s tro n g safety c u ltu re ; c o m m u n ic a
tio n (includes aw areness, lessons learned,
social m edia); tra in in g an d education; and
elic itin g in p u t, ideas a n d feed b ack from
everyone.
“T h e four categories give agencies th e
ab ility to p u t to g e th e r th e ir ow n SM S,”
says Thackery. “T hey need to th in k ab o u t
w hat they w ant to do in th e ir ow n agencies.
T hey also have to build a process so th a t
people are w illing to com e fo rw ard ab o u t
things they see and get employees to become
engaged in o rder for it to w ork.” ®
MAKE SURE YOUR NEXT
LIFT ISN’T YOUR LAST
62% o f EMS w o rkers’ back injuries are as a result o f p a tie n t lifting.
M oving falle n p e o p le is a re g u la r p a rt o f th e w o rk in g day b u t th e re p e titiv e
n a tu re o f th e w o rk can cause serious back injury. The M angar ELK & Camel
in fla ta b le liftin g cushions p ro v id e a safe lift fro m th e flo o r to a ch a ir or
s tre tc h e r, w h ils t m in im is in g th e risk o f back in ju ry to w orkers.
In fla ta b le liftin g cushions are p ro v e n to:
• R educe risk o f back in ju ry • P ro te c t w o rk e rs
• R educe co sts • M aintain p a tie n t d ig n ity
Emergency services in th e UK, A ustralia, Canada and
th e USA are using liftin g cushions. To fin d o u t w h y
and fo r a FREE d e m o n s tra tio n , please call
8 0 4 .4 0 5 .5 7 0 6 o r em ail info@ mangarusa.com
SAFE PATIENT LIFTING
M a n g a r
□ m a n g a r i n t Q M a n g a r L if tin g C u s h io n s E M S
F o r M o r e In f o r m a t i o n C irc le 2 6 o n R e a d e r S e r v ic e C a rd
E M S W O R L D . c o m | NOVEMBER 2015 31
mailto:info@mangarusa.com
Copyright of EMS World is the property of Cygnus Business Media and its content may not
be copied or emailed to multiple sites or posted to a listserv without the copyright holder’s
express written permission. However, users may print, download, or email articles for
individual use.
Economic REsEaRch-Ekonomska istRaživanja, 2017
voL. 30, no. 1, 911–921
https://doi.org/10.1080/1331677X.2017.1311232
If we implement it, will they come? User resistance in post-
acceptance usage behaviour within a business intelligence
systems context
Aleš Popovič
Faculty of Economics, University of Ljubljana, Ljubljana, slovenia
ABSTRACT
The aim of this article is to examine individual, corporate and
technology-related factors that shape user resistance in business
intelligence systems (BIS) post-acceptance usage behaviour. The
author develops a conceptual framework and a series of propositions,
grounded on previous studies of user resistance to information systems
(IS) and post-acceptance usage. The framework proposes that three
individual-level variables (loss of power, change in decision-making
approach, change of job or job skills), four corporate-level variables
(information culture, communication, user training, service quality)
and a technology-related variable (system issues) can be attributed
to fuel user resistance towards BIS post-acceptance usage stages.
A series of propositions is offered that aims to stimulate empirical
research in this topical subject. Despite wide acknowledgement of
the importance of user resistance for IS implementation success, this
area has been under-researched in the field of BIS. This article draws
insights from theoretical and empirical studies to shed some light on
this area. A framework is presented which transcends previous works
on user resistance to IS by looking at the context of BIS use within the
voluntary use environment.
Today’s increasing market pressures and environmental uncertainty call for implementation
and utilisation of information systems (IS) capabilities having the potential of providing
high quality information to inform decision-making to achieve firm performance (Popovič,
Hackney, Coelho, & Jaklič, 2012). Recognised as one of the four major technological trends
in the 2010s, business intelligence systems (BIS) have been of great interest to several indus-
tries (Chen, Chiang, & Storey, 2012; Işık, Jones, & Sidorova, 2013). These systems are most
commonly identified as technological solutions that provide users with timely access, effec-
tive analysis and intuitive presentation of the information from enterprise-wide IS (Popovič
et al., 2012). BIS are considered enterprise-wide solutions that have some noteworthy
KEYWORDS
Business intelligence
systems; post-acceptance
use; user resistance
JELS CLASSIFICATIONS
D80; o14; o32
ARTICLE HISTORY
Received 30 july 2015
accepted 20 july 2016
© 2017 the author(s). Published by informa Uk Limited, trading as taylor & Francis Group.
this is an open access article distributed under the terms of the creative commons attribution License (http://creativecommons.org/
licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
CONTACT aleš Popovič ales.popovic@ef.uni-lj.si
OPEN ACCESS
http://orcid.org/0000-0002-6924-6119
http://creativecommons.org/licenses/by/4.0/
http://creativecommons.org/licenses/by/4.0/
mailto: ales.popovic@ef.uni-lj.si
http://www.tandfonline.com
http://crossmark.crossref.org/dialog/?doi=10.1080/1331677X.2017.1311232&domain=pdf
912 A. POPOVIČ
features that distinguish them from traditional IS (for a detailed overview, see Popovič et al.,
2012): first, while traditional systems are application-oriented, BIS are data oriented. Second,
the structuredness of the business process where BIS are used is generally lower compared
to the process where operational IS are used. Third, for operational IS, information needs
are identified at the process level whereas for BIS these needs are identified in the context of
process and performance management. Moreover, the methods for identifying information
needs for operational IS are well established while for BIS they are less established. Next,
the level of voluntariness of IS use is higher in the context of BIS compared to operational
IS. Furthermore, operational IS are integrated at the process level and employ data sources
mostly from within the process. BIS, on the other hand, are integrated at the enterprise level
with additional data sources being used. Last, but not least, the level of required reliability
of the IS much higher with operational IS than with BIS.
BIS primarily support analytical decision-making in knowledge-intensive activities, par-
ticularly on the tactical and strategic levels. Nevertheless, the success of BIS continued use
depends largely on the extent and ways in which users are willing to embed them in their
decision-making routines (Grublješič & Jaklič, 2013).
There is broad agreement that acceptance and resistance are vital determinants in IS
acceptance and usage (Klaus & Blanton, 2010; van Offenbeek, Boonstra, & Seo, 2013).
Moreover, van Offenbeek et al. also observe that ‘IS research focusing on resistance is much
scarcer than that on acceptance’ (2013, p. 435). User resistance is defined as an individual’s
behavioural reactions indicating reluctance to a situation perceived as being negative, as
a threat or as a stressful sensation (Lapointe & Rivard, 2005; Meissonier & Houzé, 2010).
Among key issues linked with IS implementation failures, users’ resistance is one of the
most salient as it is associated with human resistance to change (Jiang, Muhanna, & Klein,
2000). Users can expound resistance towards IS actively or passively (Meissonier & Houzé,
2010), at both the group level and the individual level (Lapointe & Rivard, 2005; Markus,
1983). This work focuses on active user resistance at the individual level.
A typical IS implementation in a firm generally evolves through six stages, from initiation
through adoption, adaptation, acceptance and routinisation, to infusion (Cooper & Zmud,
1990). While the first three stages primarily deal with activities at global levels (e.g., firm or
departmental levels), the latter three stages are manifested also at micro levels (Li, Hsieh, &
Rai, 2013). At an individual level, following the commitment to IS use, routinisation depicts
the state in which IS use is integrated as a normal part of the users’ work processes, whereas
infusion refers to embedding IS deeply and comprehensively in work processes (Cooper
& Zmud, 1990). Routinisation and infusion have been typically considered together as the
post-acceptance stage (Po-An Hsieh & Wang, 2007).
From a BIS implementation success perspective, resistance towards BIS use draws atten-
tion from academia for two main reasons, i.e., a largely voluntary usage context (Popovič
et al., 2012) and the ability to address a wide range of evolving user information needs
(Yeoh & Koronios, 2010). Moreover, evidence suggests that enterprise-wide decision sup-
port systems and operational IS are resisted for different reasons (Jiang et al., 2000), thus
suggesting that promotion of IS acceptance also differs. In IS research, an often-emphasised
aspect of IS usage behaviour in the post-acceptance stage is the degree of perceived volitional
control that users have over IS usage. Voluntary and mandatory usage contexts have been
previously highlighted as important factors affecting IS acceptance and usage (Karahanna,
Straub, & Chervany, 1999; Venkatesh & Davis, 2000). Moreover, IS literature often argues
ECONOMIC RESEARCH-EKONOMSKA ISTRAŽIVANJA 913
that meeting or exceeding user information needs reinforces user IS satisfaction, yet failing
to meet current and future user information needs leads to dissatisfaction with an IS and
ultimately results in discontinued use (Bhattacherjee, 2001). Focusing on practice, managers
are, more than ever before, concerned about enabling well-informed decisions through BIS
utilisation (Chen et al., 2012) to organise internal activities, steer inter-firm relationships and
reconfigure internal and external resources to sense and respond to market opportunities
with agility (Dinter, 2013; Işık et al., 2013). Understanding the forces fuelling the resistance
towards BIS use is, therefore, important for firms that rely profoundly on BIS to achieve
their performance goals.
Drawing upon extant models of resistance to IT (for an overview of these models, see
Lapointe & Rivard, 2005), this article presents a conceptual framework of post-acceptance
user resistance to BIS. The resulting conceptual framework attempts to open the black box
of a long-avoided side of BIS implementation success, namely user resistance to BIS. We
encourage scholars to empirically test our propositions in different contexts to advance
theory in this IS domain.
User resistance has been reported as a significant motive for system implementation failures
(Barker & Frolick, 2003; Robey, Ross, & Boudreau, 2002). Studies of enterprise-wide IS
implementation failures indicate that a better understanding of user resistance is needed
(Klaus & Blanton, 2010; Shang & Su, 2004) so as to apply appropriate promotion strategies
for the implemented system (Jiang et al., 2000). User resistance must be curtailed in order
to realise benefits from enterprise-wide IS and reduce the risk of failure (Klaus & Blanton,
2010).
Prior IT resistance studies have explored certain areas of resistance and can partially
explain user resistance in IS implementations. Resistance determinants previously examined
in this literature include job insecurity (Krovi, 1993), loss of power (Smith & McKeen, 1992),
lack of appropriate communication (Marakas & Hornik, 1996), mismatch of the system
with the organisational goals (Gosain, 2004), perceived adoption risk (Zmud, 1979), pro-
cess changes (O’Leary, 2000), lack of understanding (Joshi, 1991) and other issues (Shang
& Su, 2004).
Markus (1983) identifies three viewpoints for investigating user resistance: (1)
system-oriented; (2) people-oriented; and (3) interaction-oriented. The system-oriented
perspective suggests that resistance occurs because of technology-related factors (e.g.,
user interface, performance, ease of use). The people-oriented perspective suggests that
user resistance occurs because of individual or group factors (e.g., traits, attitude towards
the technology). The interaction-oriented perspective suggests that perceived social losses
caused by interaction between people and the technology affect resistance (e.g., changing
power relationships, job structure) (Jiang et al., 2000; Markus, 1983).
3. Determinants of user resistance in post-acceptance usage behaviour
within a business intelligence systems context
This study develops a framework of user resistance in BIS post-acceptance use that expands
on Markus’s (1983) viewpoints to take into consideration BIS specifics. The factors that shape
914 A. POPOVIČ
user resistance in BIS post-acceptance use are, for the purpose of this study, grouped into
three broad categories: corporate determinants, individual determinants and technological
determinants. Through corporate-level factors, the firm itself is seen as the main factor that
fuels users’ resistance, whereas by individual-level factors this work identifies characteris-
tics that relate to the individual as additional determinants of user resistance. Technology
factors relate to the characteristics of the system and its output that draw users towards
resisting post-acceptance use. Such categorisation allows better fit of previously proposed
perspectives with the context under study, namely BIS.
3.1. Corporate-level factors
Organisational culture continues to be cited as an important factor in the success or failure
of IS implementation projects (Cooper, 1994; Jackson, 2011; Leidner & Kayworth, 2006).
On such a subset of organisational culture, particularly relevant for the BIS post-acceptance
context is information culture. Within it, the value and utility of information in achieving
operational and strategic success is recognised and information forms the basis for organisa-
tional decision-making (Curry & Moore, 2003). Early research has established a developed
information culture to be positively associated with organisational practices, such as infor-
mation utilisation, that lead to successful firm performance (Ginman, 1988). To foster the
development of information culture, firms must nurture such values, norms and practices
that have an impact on how information is perceived, created and used (Choo, Bergeron,
Detlor, & Heaton, 2008; G. Oliver, 2003). These information behaviours, norms and values
echo the firm’s environment towards the use of information in a trustful manner, the will-
ingness to use and trust institutionalised information over informal sources, the extent to
which information about performance is continuously presented to people to manage and
monitor their performance, the openness in reporting and presentation of information,
the willingness to provide others with information in an appropriate and collaborative way,
and the active concern to think about how to obtain and apply new information in order to
respond quickly to business changes and to promote innovation in products and services
(Choo et al., 2008; Hwang, Kettinger, & Yi, 2013). Once a BIS is deeply embedded into work
activities and decision-making, the lack of appropriate cultural values, as depicted above, can
decouple users’ motivation towards post-acceptance BIS use from the understanding of the
importance and value BIS bring to firms (Li et al., 2013), resulting in increased likelihood
of user resistance. I, hence, propose that:
P1. Low levels or absence of information culture will increase the chance of user resistance towards
BIS use.
Through the lens of psychological contract theory, Klaus and Blanton (2010) emphasise
communication as an important corporate-level determinant of user resistance in the
implementation of enterprise-wide systems. Specifically, a common part of the psychological
contract between employees and the firm is a belief that management will keep employees
informed (Guest & Conway, 2002). Yet, in an enterprise-wide implementation, a lack of
communication often exists, not informing the users about the benefits of the system and
the reasons for change (D. Oliver & Romm, 2002). However, by communicating a clear
vision, the psychological contract of users becomes more aligned with the reality of the
firm (Klaus & Blanton, 2010). Moreover, frequent communication in post-acceptance stage
ECONOMIC RESEARCH-EKONOMSKA ISTRAŽIVANJA 915
leads to the psychological contract changing incrementally, which is less likely to lead to
a psychological contract breach in the form of user resistance. Therefore, the following
proposition is suggested:
P2. It is expected that lack of communication from management will lead to user resistance
towards BIS use.
Training is another organisational issue relevant for deriving the most value from post-ac-
ceptance BIS use. Prior IS research looking at the causes of user resistance to IS implemen-
tation suggests training can be tricky when users perceive training to be a waste of time,
that trainers are inept, the timing of training is unsuitable, or if there is a lack of training
(Kim & Kankanhalli, 2009; Klaus & Blanton, 2010; Krovi, 1993). Users may expect that
suitable training will complement new job requirements while problematic training may
be considered a cause for resistance (Hirschheim & Newman, 1988). Hence, the following
is proposed:
P3. Lack of appropriate training will likely lead to user resistance towards BIS use.
Last, but not least, IT adoption literature emphasises IS service quality as an important factor
when considering continued IS use and IS effectiveness and has been extensively investigated
over the past three decades (Pitt, Watson, & Kavan, 1995). DeLone and McLean (Petter,
DeLone, & McLean, 2013) extended their IS success model by highlighting the importance
of service quality in IS success. Service quality is often regarded as a multidimensional con-
struct that mimics responsiveness (i.e., willingness to help customers and provide prompt
service and help when needed), assurance (i.e., knowledge and courteousness of support
staff and their ability to inspire confidence), empathy (i.e., individualised attention the sup-
port staff gives to BIS users) and reliability (i.e., the ability to perform the promised service
dependably and accurately) (Pitt et al., 1995; Xu, Benbasat, & Cenfetelli, 2013). When users
perceive service quality to be at insufficient levels, they may put less trust in BIS solutions
to readily service their information needs. Users may expect that good service quality will
complement their BIS use experience while deprived service quality may be contemplated
as a cause for resistance (Pitt et al., 1995). I, hence, propose that:
P4. Lack of appropriate BIS service quality will likely lead to user resistance towards BIS use.
3.2. Individual-level factors
Resistance theory suggests that for resistance of an individual to occur, some threat has to be
perceived. The IS-business relationship literature and resistance literature have long empha-
sised perceived loss of power as a significant determinant of user resistance towards IT use
(e.g., Jiang et al., 2000; Lapointe & Rivard, 2005; Smith & McKeen, 1992). From a decision
support system perspective, integrating the system in work processes will likely result in
increased access to information and information sharing that, in turn, draws control over
information and decision influence away from certain individuals (Borum & Christiansen,
1993; Kim & Kankanhalli, 2009; Robey, 1987). Although IT-enabled information sharing
is generally regarded as a positive contributor to performance (Mithas, Ramasubbu, &
Sambamurthy, 2011), it can also be potentially perceived as curbing an individual’s posi-
tion of control within the decision-making process and further breaking down established
916 A. POPOVIČ
monopolies linking to the dissolution of existing power structures (Griffiths & Light, 2006).
I therefore formulate the following proposition:
P5. If an individual perceives the threat of losing power as a result of routinisation and infusion
of BIS in business processes, user resistance towards BIS use will form.
Another issue concerning the embeddedness of enterprise-wide IS into organisational pro-
cesses is the change in decision-making approach (Smith & McKeen, 1992) they bring
about. There might be problematic changes to existing decision-making approaches and new
approaches not working as expected. Integrating a BIS into some processes may fit some
firms well and not others, forcing them to change their organisational structure to fit the
technology. BIS not fitting well with organisational processes might spark an affective and
emotional experience of disappointment, frustration or even resentment (Klaus & Blanton,
2010), leading to resistance towards employing BIS in the latter stages of IS implementation.
Hence, the following research proposition is suggested:
P6. Changes in existing decision-making approaches resulting from BIS routinisation and infusion
in organisational business processes will spark user resistance towards BIS use if there is lack of
fit between the technology and the processes.
Adoption and further deep integration of BIS in work processes has been suggested to also
have an important impact on decision-makers’ jobs and/or skills (Laursen & Thorlund,
2010). BIS often require that users perform different job tasks or develop new skills and
new ways of thinking for the job. Since employees have certain expectations of their jobs,
a considerable job or job skills change is likely to be considered a burden by the employees
(Jiang et al., 2000; Markus, 1983). Change of job/job skills in post-adoptive IT usage has
been further fought against by users since frequently performed behaviours tend to become
habitual and automatic over time and are hard to adjust (Limayem, Hirt, & Cheung, 2007).
Consistent with this reasoning, it is proposed that:
P7. If an individual perceives the threat of considerable change of job or job skills due to routini-
sation and infusion of BIS in his/her work processes, user resistance towards BIS use will arise.
3.3. Technology-related factors
While corporate-level and individual-level factors contribute to a large portion of user
resistance towards BIS use in post-acceptance stages, technological issues also need to
be considered when evaluating user resistance at the implementation phases. Specifically,
prior studies of enterprise-wide IT implementation success emphasise system issues as a
significant determinant of user resistance (e.g., Hirschheim & Newman, 1988; Markus, 1983;
Martinko, Zmud, & Henry, 1996). It is important to note, however, that system issues have
been considered both through the technological aspect, i.e., the desirable characteristics of
the IS (Petter et al., 2013), as well as in regard to the quality of the information the system
provides, i.e., the desirable characteristics of the IS outputs (Petter et al., 2013). Although
the quality of an IS and its outputs are assessed at the earlier implementation phases (e.g.,
at the acceptance stage), additional challenges may surface at a continuous, deeper level
of use, once the IS gets applied to the full extent of anticipated use (Martinko et al., 1996;
Zhu, Li, Wang, & Chen, 2010). While most of the quality-related problems are accounted
for and addressed, some hidden problems might only appear as the depth and range of
use develops. When BIS become comprehensively integrated into business processes and
ECONOMIC RESEARCH-EKONOMSKA ISTRAŽIVANJA 917
decision-making routines, their ability to efficiently integrate data from various sources,
provide access to it, perform reliably and deliver relevant information that is complete,
accurate, current and in the desired format tend to become important characteristics of BIS
value (Işık et al., 2013; Popovič et al., 2012). Failing to meet user needs and requirements
in the post-acceptance stage will likely result in user frustration and a decrease in use com-
mitment (Kim & Kankanhalli, 2009). In the BIS context, this is particularly relevant since
user needs are deeply knotted with process management and performance management
practices (Popovič et al., 2012). This leads us to formulate the final proposition:
P8. System issues promote the development of user resistance towards BIS post-acceptance use.
The conceptual framework is presented in Figure 1.
In developing the proposed framework, the focus has been placed on theory development
rather than theory testing. I believe that earlier presented propositions will serve as the basis
to stimulate empirical studies and move this field of research forward. Researchers are urged
to test these propositions across different firms, yet a series of potential challenges need to
be considered. First, researchers need to ensure that the antecedent condition is met (that
respondents are aware of the BIS post-acceptance stage) when testing the propositions in
practice. One way forward would be through a free association technique to reveal the
phases that come to individuals’ minds when they think of the post-acceptance stage as
Figure 1. conceptual model of the influence of individual, corporate and technology-related factors on
user resistance in post-acceptance business intelligence systems use. source: author’s own.
918 A. POPOVIČ
defined in this work. A second challenge is that it might be argued that representing a firm
as a closed system (Scott, 2003) does not properly capture the fact that firms are ‘open to
and dependent on flows of personnel, resources, and information from outside’ (Scott, 2003,
p. 28). While it has been suggested that various environmental conditions may have an
effect on user resistance (Rivard & Lapointe, 2010), I contend that the aim of the proposed
framework is to provide an initial understanding of the effect of individual, corporate and
technology-related factors on user resistance to BIS rather than to provide a comprehensive
explanation of the determinants of user resistance to BIS.
Nevertheless, the proposed framework also raises a series of opportunities. For instance,
the dynamic and complex nature of individual, corporate and technology-related charac-
teristics influencing the IS post-acceptance stage suggests that user resistance, as depicted
in our framework, may change over time. Therefore, future studies may seek to track this
influence through the use of rich and longitudinal data. Also, in some cases, where volun-
tary IS use is shifting more towards mandatory use, effect size of individual and corporate
factors will be smaller than in firms with a prevailing voluntary nature of IS use (Karahanna
et al., 1999). Last, but not least, recognising the proposed set of factors is not exhaustive,
further research may incorporate additional determinants that shape user resistance (e.g.,
country-level determinants).
The proposed work also has several implications for practice. If a firm’s management aims
to take a proactive approach for regular BIS use among decision-makers and act as a BIS
ambassador, it should convey its support through providing an auspicious environment for
BIS. The degree of user resistance to IT is effectively controlled by establishing a milieu of
implementers’ responsiveness to resistance (Rivard & Lapointe, 2012) that is backed up by
pertinent strategies (Jiang et al., 2000). If a firm plays up the significance of continued BIS
use for firm performance, users will be more likely to establish a link between the value of
BIS and decision outcomes. For firms, it is sensible to pay greater attention to issues relating
to power, social status and job security when implementing BIS. When considering ways of
promoting BIS, ‘participative’ strategies – where users are actively involved in the process
and in making decisions – were previously identified as being most desirable; in contrast,
‘direct management’ methods, such as arranging job transfers and giving separation pay,
were viewed negatively by employees (Jiang et al., 2000). In addition, a sensible user training
strategy, such as conducting orientation sessions and retraining employees to successfully
use BIS, are also important.
Furthermore, lessons learnt from user resistance to BIS can be leveraged to accommo-
date a higher level of employee resistance, namely resistance to organisation-wide change.
The ability of BIS to tie various levels of decision-making and performance make them an
almost ideal candidate to identify resistance risk factors, analyse them and set up appro-
priate actions to ensure that resistance does not result in major organisational disruptions.
The effect of user resistance on IS implementation success is one of the most intriguing,
yet still inadequately addressed fields in IS research. Recently, the need to explore user
resistance factors in different IS contexts and within different IS implementation stages
has been increasingly highlighted. However, user resistance to IT in the post-acceptance
BIS usage behaviour context, has received limited attention. To address this gap, this work
ECONOMIC RESEARCH-EKONOMSKA ISTRAŽIVANJA 919
contributes to the understanding of enterprise-wide IS resistance by offering a conceptual
framework that sheds more light on the resistance factors influencing post-acceptance BIS
usage behaviour. The article identifies individual, corporate and technological determinants
that influence user resistance, and offers a series of relevant propositions grounded in pre-
vious conceptual and empirical studies in IS success, technology acceptance and resistance
to IT literature. On a practical side, several possible strategies to mitigate resistance are also
proposed and discussed.
No potential conflict of interest was reported by the author.
This work was supported by Javna Agencija za Raziskovalno Dejavnost RS [grant number J5-7287];
and the Croatian Science Foundation [grant number IP-2014-09-3729].
ORCID
Aleš Popovič http://orcid.org/0000-0002-6924-6119
Barker, T., & Frolick, M. N. (2003). Erp implementation failure: A case study. Information Systems
Management, 20, 43–49. doi:10.1201/1078/43647.20.4.20030901/77292.7
Bhattacherjee, A. (2001). Understanding information systems continuance: An expectation-
confirmation model. MIS Quarterly, 25, 351–370. doi:10.2307/3250921
Borum, F., & Christiansen, J. K. (1993). Actors and structure in is projects: What makes implementation
happen? Scandinavian Journal of Management, 9, 5–28. doi:10.1016/0956-5221(93)90032-N
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From Big data
to big impact. MIS Quarterly, 36, 1165–1188.
Choo, C. W., Bergeron, P., Detlor, B., & Heaton, L. (2008). Information culture and information
use: An exploratory study of three organizations. Journal of the American Society for Information
Science and Technology, 59, 792–804.
Cooper, R. B. (1994). The inertial impact of culture on IT implementation. Information & Management,
27, 17–31. doi:10.1016/0378-7206(94)90099-X
Cooper, R. B., & Zmud, R. W. (1990). Information technology implementation research: A
technological diffusion approach. Management Science, 36, 123–139. doi:10.1287/mnsc.36.2.123
Curry, A., & Moore, C. (2003). Assessing information culture – An exploratory model. International
Journal of Information Management, 23, 91–110. doi:10.1016/S0268-4012(02)00102-0
Dinter, B. (2013). Success factors for information logistics strategy – An empirical investigation.
Decision Support Systems, 54, 1207–1218. doi:10.1016/j.dss.2012.09.001
Ginman, M. (1988). Information culture and business performance. IATUL Quarterly, 2, 93–106.
Gosain, S. (2004). Enterprise information systems as objects and carriers of institutional forces: The
new iron cage? Journal of the Association for Information Systems, 5, 151–182.
Griffiths, M., & Light, B. (2006, 12-14 June). User resistance strategies and the problems of blanket
prescriptions: A case study of resistance success. Paper presented at the 14th European Conference
on Information Systems, Gothenburg, Sweden.
Grublješič, T., & Jaklič, J. (2013, August 15-17). Conceptualization of BIS embeddedness determinants.
Paper presented at the Nineteenth Americas Conference on Information Systems, Chicago, Illinois,
USA.
http://orcid.org
http://orcid.org/0000-0002-6924-6119
https://doi.org/10.1201/1078/43647.20.4.20030901/77292.7
https://doi.org/10.2307/3250921
https://doi.org/10.1016/0956-5221(93)90032-N
https://doi.org/10.1016/0378-7206(94)90099-X
https://doi.org/10.1287/mnsc.36.2.123
https://doi.org/10.1016/S0268-4012(02)00102-0
https://doi.org/10.1016/j.dss.2012.09.001
920 A. POPOVIČ
Guest, D. E., & Conway, N. (2002). Communicating the psychological contract: An employer
perspective. Human Resource Management Journal, 12, 22–38. doi:10.1111/j.1748-8583.2002.
tb00062.x
Hirschheim, R., & Newman, M. (1988). Information systems and user resistance: Theory and practice.
The Computer Journal, 31, 398–408. doi:10.1093/comjnl/31.5.398
Hwang, Y., Kettinger, W. J., & Yi, M. Y. (2013). A study on the motivational aspects of information
management practice. International Journal of Information Management, 33, 177–184. doi:10.1016/j.
ijinfomgt.2012.09.002
Işık, Ö., Jones, M. C., & Sidorova, A. (2013). Business intelligence success: The roles of BI capabilities
and decision environments. Information & Management, 50, 13–23. doi:10.1016/j.im.2012.12.001
Jackson, S. (2011). Organizational culture and information systems adoption: A three-perspective
approach. Information and Organization, 21, 57–83. doi:10.1016/j.infoandorg.2011.03.003
Jiang, J. J., Muhanna, W. A., & Klein, G. (2000). User resistance and strategies for promoting acceptance
across system types. Information & Management, 37, 25–36. doi:10.1016/S0378-7206(99)00032-4
Joshi, K. (1991). A model of users’ perspective on change: The case of information systems technology
implementation. MIS Quarterly, 15, 229–242.
Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across
time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23,
183–213. doi:10.2307/249751
Kim, H.-W., & Kankanhalli, A. (2009). Investigating user resistance to information systems
implementation: A status quo bias perspective. MIS Quarterly, 33, 567–582.
Klaus, T., & Blanton, J. E. (2010). User resistance determinants and the psychological contract
in enterprise system implementations. European Journal of Information Systems, 19, 625–636.
doi:10.1057/ejis.2010.39
Krovi, R. (1993). Identifying the causes of resistance to IS implementation: A change theory
perspective. Information & Management, 25, 327–335. doi:10.1016/0378-7206(93)90082-5
Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology
implementation. MIS Quarterly, 29, 461–491. doi:10.2307/25148692
Laursen, G., & Thorlund, J. (2010). Business analytics for managers: Taking business intelligence beyond
reporting. Hoboken, NJ: Wiley.
Leidner, D. E., & Kayworth, T. (2006). Review: A review of culture in information systems research:
Toward a theory of information technology culture conflict. MIS Quarterly, 30, 357–399.
Li, X., Hsieh, J. J. P.-A., & Rai, A. (2013). Motivational differences across post-acceptance information
system usage behaviors: An investigation in the business intelligence systems context. Information
Systems Research, 24, 659–682. doi:10.1287/isre.1120.0456
Limayem, M., Hirt, S. G., & Cheung, C. M. K. (2007). How habit limits the predictive power of intention:
The case of information systems continuance. MIS Quarterly, 31, 705–737. doi:10.2307/25148817
Marakas, G. M., & Hornik, S. (1996). Passive resistance misuse: Overt support and covert recalcitrance
in IS implementation. European Journal of Information Systems, 5, 208–219. doi:10.1057/ejis.1996.26
Markus, M. L. (1983). Power, politics, and MIS implementation. Communications of the ACM, 26,
430–444. doi:10.1145/358141.358148
Martinko, M. J., Zmud, R. W., & Henry, J. W. (1996). An attributional explanation of individual
resistance to the introduction of information technologies in the workplace. Behaviour &
Information Technology, 15, 313–330. doi:10.1080/014492996120085a
Meissonier, R., & Houzé, E. (2010). Toward an ‘IT conflict-resistance theory’: Action research during
IT pre-implementation. European Journal of Information Systems, 19, 540–561. doi:10.1057/
ejis.2010.35
Mithas, S., Ramasubbu, N., & Sambamurthy, V. (2011). How information management capability
influences firm performance. MIS Quarterly, 35, 237–256.
van Offenbeek, M., Boonstra, A., & Seo, D. (2013). Towards integrating acceptance and resistance
research: Evidence from a telecare case study. European Journal of Information Systems, 22, 434–454.
doi:10.1057/ejis.2012.29
O’Leary, D. E. (2000). Enterprise Resource planning systems: Systems, life cycle, electronic commerce,
and risk. Cambridge, UK: Cambridge University Press.
https://doi.org/10.1111/j.1748-8583.2002.tb00062.x
https://doi.org/10.1111/j.1748-8583.2002.tb00062.x
https://doi.org/10.1093/comjnl/31.5.398
https://doi.org/10.1016/j.ijinfomgt.2012.09.002
https://doi.org/10.1016/j.ijinfomgt.2012.09.002
https://doi.org/10.1016/j.im.2012.12.001
https://doi.org/10.1016/j.infoandorg.2011.03.003
https://doi.org/10.1016/S0378-7206(99)00032-4
https://doi.org/10.2307/249751
https://doi.org/10.1057/ejis.2010.39
https://doi.org/10.1016/0378-7206(93)90082-5
https://doi.org/10.2307/25148692
https://doi.org/10.1287/isre.1120.0456
https://doi.org/10.2307/25148817
https://doi.org/10.1057/ejis.1996.26
https://doi.org/10.1145/358141.358148
https://doi.org/10.1080/014492996120085a
https://doi.org/10.1057/ejis.2010.35
https://doi.org/10.1057/ejis.2010.35
https://doi.org/10.1057/ejis.2012.29
ECONOMIC RESEARCH-EKONOMSKA ISTRAŽIVANJA 921
Oliver, G. (2003). Cultural dimensions of information management. Journal of Information &
Knowledge Management, 2, 53–61. doi:10.1142/S0219649203000255
Oliver, D., & Romm, C. (2002). Justifying enterprise resource planning adoption. Journal of Information
Technology (Routledge, Ltd.), 17, 199–213. doi:10.1080/0268396022000017761
Petter, S., DeLone, W. H., & McLean, E. R. (2013). Information systems success: The quest for
the independent variables. Journal of Management Information Systems, 29, 7–62. doi:10.2753/
MIS0742-1222290401
Pitt, L. F., Watson, R. T., & Kavan, C. B. (1995). Service quality: A measure of information systems
effectiveness. MIS Quarterly, 19, 173–187. doi:10.2307/249687
Po-An Hsieh, J. J. P.-A., & Wang, W. (2007). Explaining employees’ extended use of complex
information systems. European Journal of Information Systems, 16, 216–227. doi:10.1057/palgrave.
ejis.3000663
Popovič, A., Hackney, R., Coelho, P. S., & Jaklič, J. (2012). Towards business intelligence systems
success: Effects of maturity and culture on analytical decision making. Decision Support Systems,
54, 729–739. doi:10.1016/j.dss.2012.08.017
Rivard, S., & Lapointe, L. (2010, Jan 5-8). A cybernetic theory of the impact of implementers’ actions
on user resistance to information technology implementation. Paper presented at the 43rd Hawaii
International Conference on System Sciences (HICSS).
Rivard, S., & Lapointe, L. (2012). Information technology implementers’ responses to user resistance:
Nature and effects. MIS Quarterly, 36, 897–920.
Robey, D. (1987). Implementation and the organizational impacts of information systems. Interfaces,
17, 72–84.
Robey, D., Ross, J. W., & Boudreau, M. C. (2002). Learning to implement enterprise systems: An
exploratory study of the dialectics of change. Journal of Management Information Systems, 19,
17–46.
Scott, W. R. (2003). Organizations: Rational, natural, and open systems. Upper Saddle River: Prentice
Hall.
Shang, S., & Su, T. (2004). Managing user resistance in enterprise systems implementation. Paper
presented at the Tenth Americas Conference on Information Systems, New York, NY.
Smith, H. A., & McKeen, J. D. (1992). Computerization and management: A study of conflict and
change. Information & Management, 22, 53–64. doi:10.1016/0378-7206(92)90006-2
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four
longitudinal field studies. Management Science, 46, 186–204. doi:10.1287/mnsc.46.2.186.11926
Xu, D., Benbasat, I., & Cenfetelli, R. T. (2013). Integrating service quality with system and information
quality: An empirical test in the E-Service context. MIS Quarterly, 37, 777–794.
Yeoh, W., & Koronios, A. (2010). Critical success factors for business intelligence systems. Journal of
Computer Information Systems, 50, 23–32.
Zhu, Y., Li, Y., Wang, W., & Chen, J. (2010). What leads to post-implementation success of ERP? An
empirical study of the Chinese retail industry. International Journal of Information Management,
30, 265–276. doi:10.1016/j.ijinfomgt.2009.09.007
Zmud, R. W. (1979). Individual differences and MIS Success: A review of the empirical literature.
Management Science, 25, 966–979. doi:10.1287/mnsc.25.10.966
https://doi.org/10.1142/S0219649203000255
https://doi.org/10.1080/0268396022000017761
https://doi.org/10.2753/MIS0742-1222290401
https://doi.org/10.2753/MIS0742-1222290401
https://doi.org/10.2307/249687
https://doi.org/10.1057/palgrave.ejis.3000663
https://doi.org/10.1057/palgrave.ejis.3000663
https://doi.org/10.1016/j.dss.2012.08.017
https://doi.org/10.1016/0378-7206(92)90006-2
https://doi.org/10.1287/mnsc.46.2.186.11926
https://doi.org/10.1016/j.ijinfomgt.2009.09.007
https://doi.org/10.1287/mnsc.25.10.966
Copyright of Economic Research-Ekonomska Istrazivanja is the property of Routledge and its
content may not be copied or emailed to multiple sites or posted to a listserv without the
copyright holder’s express written permission. However, users may print, download, or email
articles for individual use.
1. Introduction
2. User resistance in enterprise-wide system implementation
3.1. Corporate-level factors
3.2. Individual-level factors
3.3. Technology-related factors
4. Discussion
5. Conclusion
Disclosure statement
Funding
References
Mercadosy Negocios
1665-7039 impreso
2594-0163 electrónico
Vol. 1, Núm. 41, enero-junio (2020)
Mercados y Negocios por Departamento Mercadotecnia y Negocios Internacionales. Universidad de Guadalajara se distribuye bajo una Licencia Creative Commons Atribución-NoComercial 4.0 Internacional.
Basada en una obra en http://revistascientificas.udg.mx/index.php/MYN/.
Data and Business Intelligence Systems for Competitive Advantage:
prospects, challenges, and real-world applications
Sistemas de datos e inteligencia empresarial para una ventaja competitiva:
perspectivas, desafíos y aplicaciones del mundo real
Mohamed Djerdjouri
State University of New York at Plattsburgh
(New York)
djerdjm@plattsburgh.edu
Received: October 12th, 2019
Accepted: December 9th, 2019
ABSTRACT
This paper is intended as a short introduction to Business Intelligence (BI) and Analytics
systems. The main aim of the paper is to raise awareness of organizations in the developing
world, about the benefits of these technologies and the crucial role they play in the survival
and competitiveness of the firm in the complex and turbulent global market. For many years,
many small and medium-sized businesses (SMBs) have not followed large organizations in
the implementation of BI technologies. The main reason stated by SMBs is the complexity
and high cost of deploying and managing BI systems. However, according to recent IT
industry survey of SMBs executives, they now realize the crucial role BI systems play in the
company’s performance, and competitiveness and they are now increasingly investing in and
implementing BI technologies.
Keywords: SMBs, turbulent global market, managing BI systems, IT industry.
Jel Code: M15.
Big Data and Business Intelligence Systems for Competitive Advantage: prospects,
challenges, and real-world applications
MERCADOS y Negocios
6
RESUMEN
El objetivo principal del documento es sensibilizar a las organizaciones en desarrollo sobre
los beneficios de la tecnología y el papel crucial que desempeña en la supervivencia y
competitividad de la empresa ante el complejo y turbulento mercado global. Durante muchos
años, las pequeñas y medianas empresas (PYMES) no han seguido a las organizaciones
grandes en la implementación del modelo Business Intelligence (BI). La razón principal
declarada por las pymes es la complejidad y el alto costo de implementar y administrar
sistemas de BI. Sin embargo, según una encuesta reciente de la industria de TI a los ejecutivos
de la PYME, ahora se dan cuenta del papel crucial que juegan los sistemas de BI en el
rendimiento y la competitividad de la empresa y ahora están invirtiendo cada vez más en su
implementación.
Palabras clave: PYME, turbulento mercado global, gestión del Business Intelligence,
Industria IT.
Código Jel: M15.
Djerdjouri, M.
Volumen 1, N. 41, enero-junio 2020: 5-18
7 7
INTRODUCCIÓN
Second to its people, a company’s most valuable asset is information. Information is a critical
resource for any organization. In this rapidly changing global market, consumers are now
demanding quicker, more efficient service from businesses. To stay competitive, companies
must meet or exceed the expectations of consumers. Moreover, the world has witnessed an
information explosion. Data is being generated at a very high pace, and more and more of
this Data is unstructured, which makes its analysis challenging to say the least. Nowadays
Data is seen as a new class of economic assets, just like currency or gold.
Figure 1
The Information Explosion
(zettabyte = unit of information equal to one sextillion (1021) or, strictly, 270 bytes)
Source: Own elaboration.
So to stay competitive and to improve its own performance, a company must make decisions,
often promptly, based on timely and accurate information. To this end, many leading
innovative companies are adopting and relying on Business Intelligence systems to stay
ahead of trends and future events. Also, Business Intelligence (BI) expedites decision
making. This, in turn, helps companies to act quickly and correctly on information before
competing businesses do. The result of all this is a competitively superior performance for
the company, which allows for an appropriate and timely response to customer problems and
primary concerns.
The ultimate achievement is improved customer experience. BI refers to technologies,
applications and approaches practices for the collection, integration, analysis, and
presentation of business information (Hedgebeth, 2007). BI helps managers gain insights into
their own business as well as into the market in general, and it provides them with valuable
facts and information that improves the quality of their decisions. (Chaudhuri, Dayal &
Narasayya, 2011)
Big Data and Business Intelligence Systems for Competitive Advantage: prospects,
challenges, and real-world applications
MERCADOS y Negocios
8
Analytics, on the other hand, is defined as the scientific process of transforming data into
insight for making better decisions. A sound BI system provides the decision-maker with
valuable information, at the appropriate time and in the right format. The ability to mine and
analyze big data gives organizations deeper and richer insights into business patterns and
trends, helping drive operational efficiencies and competitive advantage in manufacturing,
security, marketing, and IT (Ghasemghaei, 2019). Sun and Wang (2017) state that big data
have become a strategic resource for industry, business, and national security. Moreover, Sun
and Wang (2017) affirm that data nowadays have also become a strategic enabler of
exploring business insights and the economics of services.
Figure 2
Data mining
Source: Own elaboration.
BI systems merge data with different formats and from various sources and gather it into
data warehouses or data marts. Then they use Analytics to process these data to provide
historical, current and predictive outlook of business operations and the market in which
they operate. The information is usually presented through a dashboard or analytics
interface. BI software makes analysis and report-making much faster and more reliable.
In her article, Loshin (2012) reported that BI is used to understand and improve
performance and to cut costs and identify new business opportunities, this can include,
among many other things:
o Analyzing customer behaviors, buying patterns, and sales trends
o Identifying opportunities to reduce costs
o Measuring, tracking and predicting sales and financial performance
o Budgeting and financial planning and forecasting
o Tracking the performance of marketing campaigns
o Optimizing processes and operational performance
o Improving delivery and supply chain effectiveness
o Web and e-commerce analytics
o Customer relationship management
o Risk analysis
o Strategic value driver análisis
Djerdjouri, M.
Volumen 1, N. 41, enero-junio 2020: 5-18
9 9
Jennifer Lonoff Schiff (2013), reports that CIO.com surveyed a sample of BI experts and
IT executives about the benefits of investing in BI systems. The consensus among these
experts is that BI improves the bottom line of businesses. And the fundamental reasons
for that are that BI helps organizations: – Get fast answers to critical business questions;
align business activities with corporate strategy; empower employees; reduce time spent
on data entry and manipulation; gain insights into customers; benchmark sales channel
partners; identify areas for cost-cutting; and boost productivity.
BI simplifies information discovery and analysis, making it possible for decision-makers
at all levels of an organization to quickly and more easily access, understand, analyze,
collaborate, and act on information, anytime and anywhere. BI helps move from just
consuming information to developing in-depth contextual knowledge about that
information. By tying strategy to metrics, organizations can gain competitive advantage
by making better decisions faster, at all levels of the organization. BI is the capability
that transforms data into meaningful, actionable information.
BI software consolidates data from different sources and assembles it in “data
warehouses” or “data marts” that eliminate distinctions in data formats. It then presents
the results through a reporting, analytics or dashboard interface. BI software thus serves
as a common platform for shared, company-wide insight. BI software makes analysis
and report making much faster and more reliable.
TECHNOLOGY AND TOOLS
A typical architecture for supporting BI within a firm is shown in figure 3 below. A BI
architecture is a framework for organizing the data, information management, and
technology components that are used to build BI systems for reporting and data analytics.
The underlying BI architecture plays a vital role in BI projects because it affects the
development and implementation of timely decisions. The data over which BI tasks are
performed are typically loaded into a repository called the data warehouse that is managed
by one or multiple data warehouse servers. The data often comes from different sources,
operational databases across departments within the firm, as well as external sources. The
data have different formats and structures. Also, both structured and unstructured data may
be used. All these data need to be standardized and integrated in preparation for BI tasks. The
technologies for preparing the data for BI are known as Extract-Transform-Load (ETL) tools.
Also, a popular engine tool for storing and querying data warehouses is Relational Database
Management Systems (RDBMS). Large data warehouses usually deploy parallel RDBMS
engines so that SQL queries can be executed over large volumes of data.
Big Data and Business Intelligence Systems for Competitive Advantage: prospects,
challenges, and real-world applications
MERCADOS y Negocios
10
Figure 3
Typical Business Intelligence (BI) architecture
Source: Own elaboration.
The technology components, referred to as BI tools in figure 4 above, are used to present
information to business users and enable them to analyze the data. This includes the BI tools
(or BI software suite) to be used within an organization as well as the supporting IT
infrastructure such as hardware, database software, and networking devices. There are
various types of BI applications that can be built into an architecture: – reporting, ad hoc
query, and data visualization tools, as well as online analytical processing (OLAP) software,
dashboards, performance scorecards, data mining engines, and web analytics, to name a few.
Figure 4
Data Integration Architecture
Source: Own elaboration
Reporting tools are an essential way to present data and easily convey the results of analysis.
BI users are increasingly business users who need quick, easy-to-understand displays of
information (Mikalef et al., 2019). And report writers allow users to design and generate
custom reports Ad hoc query tool is an end-user tool that accepts an English-like or point-
and-click request for data and constructs an ad hoc query to retrieve the desired result.
Visualization tools: help users create advanced graphical representations of data via simple
user interfaces. This tool help users uncover patterns, outliers, and relevant facts. Online
Djerdjouri, M.
Volumen 1, N. 41, enero-junio 2020: 5-18
11
11
Analytical Processing (OLAP) tools enable users to analyze different dimensions of
multidimensional data. The OLAP server understands how data is organized in the database
and uses special functions for analyzing the data. Examples of analysis tools are time series
and trend analysis.
Dashboards typically highlight key performance indicators (KPIs), which help managers
focus on the metrics that are most important to them. Dashboards are often browser-based,
making them easily accessible by anyone with permission. Performance scorecards attach a
numerical weight to performance and map progress toward goals. Think of it as dashboards
taken one step further. Scorecards are an effective way to keep tabs on key metrics.
Data mining tools allow users to analyze data from many different dimensions or angles,
categorize it, and summarize the relationships identified. Technically, data mining is the
process of finding correlations or patterns among dozens of fields in large relational databases
Web analytics tools enable users to understand how visitors to a company’s website interact
with the pages (Imhoff, Galemmo & Geiger, 2003; Shen, 2013). They perform the
measurement, collection, analysis, and reporting of Web data for purposes of understanding
and optimizing Web usage. They are also used for business and market research, and to assess
and improve the effectiveness of a web site.
BENEFITS
A well-implemented BI strategy can deliver real insight for an organization. BI systems help
the organization make better decisions with higher speed and confidence; recognize and
maximize the firm’s strengths; shorten marketing efforts; improve customer relationships;
align effort with the firm’s strategy and improve revenues and profits (Williams & Williams,
2010).
Moreover, BI systems help firms quantify the value of relationships with suppliers and
customers, and this gives them more leverage during negotiations. Jennifer Lonoff Schiff
(2013) reports that in a survey of executives of “500” companies, they revealed a variety of
benefits these firms, the main ones include: Eliminate guesswork; get faster answers to your
business questions; get key business metrics reports when and where you need them; gain
insight into customer behavior; identify cross-selling and up-selling opportunities; learn how
to streamline operations; improve efficiency; learn what your real manufacturing costs are;
manage inventory better and; see where your business has been, where it is now and where
it is going.
Big Data and Business Intelligence Systems for Competitive Advantage: prospects,
challenges, and real-world applications
MERCADOS y Negocios
12
Without business intelligence, a firm runs the risk of making critical decisions based on either
insufficient or inaccurate information. Robert Eugene Miller (2013) also reports that
executives that a well-implemented BI strategy helps firms in the following ways:
– Quickly identify and respond to business trends
– Empowered staff using timely, meaningful information and trend reports
– Easily create in-depth financial, operations, customer, and vendor reports
– Efficiently view, manipulate, analyze, and distribute reports using many familiar tools
– Extract up-to-the-minute high-level summaries, account groupings, or detail transactions
– Consolidate data from multiple companies, divisions, and databases
– Minimize manual and repetitive work
It is reported in the literature that successful implementation and usage of BI has shown
excellent results in all sectors of the economy- healthcare, e-commerce, government,
industry, etc. On average, companies have reported an ROI of $10.66 for every dollar spent
on business intelligence/analytics. Real-world applications in different sectors of the
economy will be presented in section 5 below.
CHALLENGES
According to the Garner Analytics firm research, 70% to 80% of corporate BI projects fail.
Firms encounter many challenges when developing and implementing a BI strategy. The two
main ones are: user resistance for adoption, Poor data quality, and Others challenges
User resistance for adoption
Like for any new IT system, user resistance is one significant barrier to BI success. Users
resist changing the way they do things unless their current methods are tedious and time-
consuming. Also, many firms make the mistake of believing that if they implement the
system first, people will use it (build it, and they will come cliché). The way around this
pitfall is for the firm to involve all the stakeholders from the beginning o the project and
throughout the implementation process. Users should define what they really need from a BI
project. When the implementation ends, the majority of the users will already be familiar
with the system and know how to use it. They also feel empowered when their suggestions
are implemented. Thus to ensure success, the firm must high rates of user adoption.
Poor data quality
Without the collection, storage, and access to reliable data, a firm cannot get any valuable
and accurate insights into their business and the business environment. Data is the most
essential component of any BI system. The main challenge here is for the firm to make sure
the data stores and data warehouses are in good working order before they can begin
extracting and acting on insights. The risk is that if that is not done correctly, critical and
Djerdjouri, M.
Volumen 1, N. 41, enero-junio 2020: 5-18
13
13
strategic decisions will be made based on unreliable information. The firm must establish
and maintain an appropriate level of data quality to feed into the BI system.
Others challenges
The other challenges include breaking down departmental knowledge silos; integrating the
BI tool with other operational, performance management and transactional system;
transforming the workplace from a culture of ‘gut feel’ to one of data-based decision-making;
securing executive sponsorship and necessary financial backing,
Finally, measuring the performance of BI is a significant challenge and can be problematic.
The firm should develop and employ a set of key metrics to help evaluate performance and
return on investment. In practice, many firms use metrics such as the time it takes to answer
user queries, the depth, and usability of the information obtained from the BI tool and, the
number and quality of decisions made as a result of insights generated via the BI tool
BUSINESS AND GOVERNMENT APPLICATIONS
Proper implementation of BI technologies can reap many benefits for the firm. Excellent
results have been reported across all sectors of the economy: healthcare, government, and
industry. It is estimated that for each dollar spent in BI technologies and Analytics
technology, there is, on average a ten dollars return on investment. In this section, a few
successful implementations of BI will be presented. The summaries below are “literally”
taken from the articles in which the cases were published.
New York State Department of Taxation and Finance: Using Business Intelligence to
improve tax revenues and citizen equity (IBM Smarter Planet Leadership Series, 2011)
The New York State Department of Taxation and Finance resolved to make its processes
more data-driven. The Tax Audits department has a team of 1600 auditors. Research has
shown that more than half of U.S. taxpayers willing to take liberties with their taxes when
they sense that the government lacks the information to catch them. The core of the deterrent
is the incorporation of more data sources–combined with the use of predictive intelligence
capabilities–to accurately identify potentially questionable returns.
The main flaw with the current process (“pay and then chase”) was that the problems were
often detected only after refund checks had been sent and cashed. Also, the process was time-
consuming, drained valuable resource and was often fruitless. The department wanted to
change the process to catch and rectify such refunds before they were sent out.
Big Data and Business Intelligence Systems for Competitive Advantage: prospects,
challenges, and real-world applications
MERCADOS y Negocios
14
The system: The New York State Department of Taxation and Finance achieved this goal by
developing a BI system called Case Identification and Selection System (CISS). The system
is not merely used to search for questionable returns patterns with historical data stored in
the department’s warehouse.
The analytics are embedded directly into the mainstream return process. The department uses
predictive intelligence to determine dynamically when to process a refund request and when
to set it aside for further analysis or to reject the refund directly. In a nutshell, the system
compares each open case with profiles of past similar cases to recommend which cases
should be pursued and through which means, to maximize the overall amount of revenue
collected. The results were outstanding. The New York State Taxation and Finance
Department reported the following critical results and benefits:
– $1.2 billion reduction in improper or questionable refunds paid from the State of New
York’s coffers, plus another $400 million reduction projected in 2011
– Dramatic reduction in the costs and inefficiencies associated with “pay and chase” policies
– $100 million increase in delinquent tax collections through the use of optimization
algorithms
– Over a 350% increase in criminal tax fraud investigations due to greater interdepartmental
collaboration on cases.
Business Intelligence and Analytics in Politics: The Real story behind President
OBAMA Election Victory (Siegel, 2013)
Barack Obama’s 2012 campaign for a second term employed more than 50 Business
Intelligence/Analytics experts. The traditional political campaigns up to now spent large
amounts of money focusing on trying to sway swing voters in swing states. The Obama
campaign management hired a multi-disciplinary team of statisticians, predictive modelers,
data-mining experts, mathematicians, software programmers, and quantitative analysts. It
eventually built an entire Business Intelligence/Analytics department five times as large as
that of its 2008 campaign.
What the Obama BI team realized is that presidential campaigns must focus even more
narrowly than that. They applied predictive analytics (BI technology) that pinpoints truly
persuadable voters. The BI team moved beyond simple poll analysis. Its real power came
from in trying to influence the future rather than to speculate on it. Forecasting calculates an
aggregate view for each US state, whereas predictive analytics (BI technology) delivers
predictions for each individual voter.
During the six months leading up to the election, the Obama team launched a full-scale and
all-front campaign, leveraging Web, mobile, TV, call, social media, and analytics to directly
micro-target potential voters and donors with tailored messages. Instead of focusing on just
Djerdjouri, M.
Volumen 1, N. 41, enero-junio 2020: 5-18
15
15
“swing” voters (mostly independent voters who have not made up their minds and are
persuadable to vote one way or another “swingable.” The Obama BI team realized that a
“persuadable voter” (swingable) is a person who will be influenced to vote for the candidate
by a call, a door knock, flyer, or TV ad?
The benefits: The Obama BI team predicted an entirely new thing. Beyond predicting which
a constituent was destined to vote, they also predicted whether each individual voter would
be persuaded by campaign contact. The best way to do persuasion is to predict it. Beyond
identifying voters who will come out for Obama if contacted, the BI models had to
distinguish those voters who would come out for Obama in any case as well as those who
were at risk of being turned off by campaign contact and switching over to for vote for the
opponent.
The necessity was to learn to discriminate, voter by voter, whether contact would persuade.
There were only four especially close states in the 2012 election. Only Florida, North
Carolina, Ohio, and Virginia were decided by less than 5 percentage points. The smallest
number in 30 years (Reagan vs Mondale).
The results: More voters were convinced to choose Obama, in comparison to traditional
campaign targeting. Most people predicted the election to be very close, but in fact, Obama
won a decisive victory. Obama got 51.1 percent of the popular vote to Mitt Romney’s 47.2
percent, a four-point margin. Moreover, President Obama won 26 states and the District of
Columbia, and he also won 332 electoral votes against 206 for Romney (It takes 270
electorate votes to win the Presidential election). It is widely believed that the use of
BI/Analytics by Obama’s Campaign led to the landslide victory by Barack Obama. (Scherer,
2012)
Improving Financial Reserve Management in the Insurance Industry (Microsoft, 2019)
EM Insurance company located in the state of Iowa employs more than 2100 people. With
assets of approximately $3 billion, it sells its products through independent insurance
agencies throughout the United States. EMC Insurances Companies struggled with
pinpointing the right amount of money to hold in reserve against potential case payouts;
keeping too much or too little could be disadvantageous to the firm’s performance.
After experience a run-up in reserves, EMC took steps to improve its financial reserve
management. The company had a great deal of insurance claim data but a limited ability to
analyze the information. Unexpected fluctuations of financial reserves prompted EMC to use
BI technologies to uncover anomalies, correlations, relationships, and patterns hidden within
the firm’s warehouse of claim data. The BI system included predictive modeling for
improved claim outcomes.
Big Data and Business Intelligence Systems for Competitive Advantage: prospects,
challenges, and real-world applications
MERCADOS y Negocios
16
Results/Benefits: The company can identify casualty and worker’s compensation claims that
are likely to have a negative outcome. There is also an apparent enhancement of the accuracy
and reliability of data. Executive decision making is supported with improved analysis.
Expenses are now more effectively controlled.
There are many more success stories in business and government of organizations which
decision process and quality improved significantly with the appropriate implementation of
BI technologies. The main benefit for these organizations was the improvement of their
competitiveness in the Marketplace.
The Gartner report (2019) mentioned that the benefits of fact-based decision-making are clear
to business managers in a broad range of disciplines, including marketing, sales, supply chain
management, manufacturing, engineering, risk management, and finance and HR. Significant
changes are imminent to the world of BI and analytics, including the dominance of data
discovery techniques, more extensive use of real-time streaming event data, and the eventual
acceleration in BI and analytics spending when big data finally matures, said Roy Schulte,
vice president, and distinguished analyst at Gartner. As the cost of acquiring, storing and
managing data continues to fall, companies are finding it practical to apply BI and analytics
in a more extensive range of situations. Nowadays thousands of businesses in all sizes, in all
industries, all around the world are implementing and utilizing Strategic Business
Intelligence (Stackpole, 2011).
The Chief Information Officers focus on BI, and analytics looks set to continue through 2017,
according to Gartner (2013). Gartner’s user surveys show that “improved decision making”
is the key driver of BI purchases. Capabilities that will evolve BI from an information
delivery system to a decision platform will increase the value of BI and drive its growth
(Gartner Report, 2011 and 2019).
CONCLUSION
According to the 2019 Gartner report, by 2020, the number of data and analytics experts in
business units will grow at three times the rate of experts in IT departments, and by 2021,
analytics and BI adoption will increase from 35% of employees to over 50%, including new
classes of users, particularly front-office workers.
BI is essential for the firm’s growth and decision-making. It gives companies a more
structured way to look at data while providing in-depth interpretations. It aids decision
making via real-time, interactive access to and analysis of vital corporate information. The
Djerdjouri, M.
Volumen 1, N. 41, enero-junio 2020: 5-18
17
17
business and technological advances promised by BI are still being developed, explored, and
enhanced.
For many years, many small and medium-sized businesses (SMBs) have not followed large
organizations in the implementation of BI technologies. The main reason stated by SMBs is
the complexity and high cost of deploying and managing BI systems. However, according
to recent IT industry survey of SMBs executives, they now realize the crucial role BI systems
play in the company’s performance, and competitiveness and they are now increasingly
investing in and implementing BI technologies.
In the majority of developing economies, firms face much more significant and numerous
challenges because most organizations do not have access to the latest technologies.
However, the biggest obstacle to implementing BI systems stems from the lack of reliable
and quality data. As mentioned earlier in this paper, data is the lifeblood of BI systems.
Today’s data-driven business culture has given organizations new resources and competitive
advantages through the integration of data into everyday operations and strategic business
decisions.
However, the managerial culture should change to adopt more a data-driven decision-making
process. Organizations should realize the importance of collecting, storing, and analyzing
internal as well as external data to harness the information obtained from BI systems and
Analytics to improve business processes, uncover insights into customer buying patterns,
internal cots, revenues, and profitability trends and of other critical business issues.
REFERENCES
Chaudhuri, S., Dayal, U., & Narasayya, V. (2011). An overview of business intelligence
technology. Communications of the ACM, 54(8), 88-98.
Deloitte Report (2014). The 2014 Global Report. UK: Deloitte.
Gartner. (2011). Magic Quadrant for Business Intelligence Platforms. Core Research Note
G00210036. Gartner.
Gartner. (2019). Gartner market trends report: how to win as wan edge and security
converge into secure access service edge. Core Research Note G0035476. Gartner.
Ghasemghaei, M. (2019). Does data analytics use improve firm decision making quality?
The role of knowledge sharing and data analytics competency. Decision Support
Systems, 120, 14-24.
Big Data and Business Intelligence Systems for Competitive Advantage: prospects,
challenges, and real-world applications
MERCADOS y Negocios
18
Hedgebeth, D. (2007). Data-driven decision making for the enterprise: an overview of
business intelligence applications. Vine, 37(4), 414-420.
IBM (2011). Smarter Planet Leadership Series. New York: IBM. Link:
ibm.com/smarterplanet
IDC (2014). The Digital Universe of Opportunities: Rich Data and the Increasing Value of
the Internet of Things. Massachusetts: EMC.
Imhoff, C., Galemmo, N., & Geiger, G. (2003). Mastering data warehouse design: relational
and dimensional techniques. John Wiley & Sons.
Lonoff, J. (2013). 8 Ways Business Intelligence Software Improves the Bottom Line. CIO
FEATURE. Link: https://www.cio.com/article/2384577/8-ways-business-
intelligence-software-improves-the-bottom-line.html
Loshin, D. (2012). Business intelligence: the savvy manager’s guide. Massachusetts: Morgan
Kaufmann.
Mikalef, P., Krogstie, J., Pappas, O., & Pavlou, P. (2019). Exploring the relationship between
big data analytics capability and competitive performance: The mediating roles of
dynamic and operational capabilities. Information & Management.
Microsoft (2019). Customer Stories. Toronto: Microsoft. Link:
https://customers.microsoft.com/en-
CA/search?sq=EMC&ff=&p=0&so=story_publish_date%20desc
Scherer, M. (2012) Inside the Secret World of the Data Crunchers Who Helped Obama Win.
Time, Nov. 7, 2012.
Shen, G. (2013) Big Data, Analytics, and Elections. Analytics Magazine, The Fiscal Times,
January 21, 2013).
Stackpole, B. (2011). A midmarket guide to leveraging data as an asset with business
intelligence and analytics. SearchBusinessAnalytics.com.
Sun, Z., & Wang, P. (2017). Big data, analytics and intelligence: an editorial
perspective. Journal of New Mathematics and Natural Computation, 13(2), 75-81.
Sun, Z., Sun, L., & Strang, K. (2018). Big data analytics services for enhancing business
intelligence. Journal of Computer Information Systems, 58(2), 162-169.
Williams, S., & Williams, N. (2010). The Profit Impact of Business Intelligence. San
Francisco: Morgan Kaufmann (Elsevier).
Copyright of Mercados y Negocios is the property of Universidad de Guadalajara, Centro
Universitario de Ciencias Economico Administrativas and its content may not be copied or
emailed to multiple sites or posted to a listserv without the copyright holder’s express written
permission. However, users may print, download, or email articles for individual use.
Business intelligence for social media interaction in the
travel industry in Indonesia
Michael Yuliantoa, Abba Suganda Girsanga* and Reinert Yosua Rumagita
a Computer Science Department, BINUS Graduate Program-Master of Computer Science, Bina
Nusantara University, Jakarta, Indonesia 1148
Corresponding author (*): mailto:agirsang@binus.edu
Received 14 May 2018 Accepted 25 July 2018
ABSTRACT Electronic ticket (eticket) provider services are growing fast in Indonesia, making
the competition between companies increasingly intense. Moreover, most of them have the same
service or feature for serving their customers. To get back the feedback of their customers, many
companies use social media (Facebook and Twitter) for marketing activity or communicating
directly with their customers. The development of current technology allows the company to
take data from social media. Thus, many companies take social media data for analyses. This
study proposed developing a data warehouse to analyze data in social media such as likes,
comments, and sentiment. Since the sentiment is not provided directly from social media data,
this study uses lexicon based classification to categorize the sentiment of users’ comments. This
data warehouse provides business intelligence to see the performance of the company based on
their social media data. The data warehouse is built using three travel companies in Indonesia.
As a result, this data warehouse provides the comparison of the performance based on the social
media data.
KEYWORDS Business intelligence, lexicon based classification, sentiment analysis, social
media
1. INTRODUCTION
The development of air transportation and
airlines in Indonesia is increasing. This is
marked by the growing number of airlines that
have sprung up by offering both domestic and
international travel routes that make the
competition more competitive. With
competitive competition, many airlines offer
promotions that can be an attraction for
consumers. This is certainly a great
opportunity for business people to use
information technology. The development of
telecommunication and computer technology
led to changes in the pattern of instant
purchasing, online reservations, and the
ticketing process, which in the aviation world
is often called the online system or electronic
ticketing (Atmadjati, 2012).
In Indonesia electronic ticketing providers
are becoming more common, so competition is
increasing. Because business competition
requires price matching, companies must
compete to attract consumers as much as
possible in order to survive. Many companies
use media for marketing. This includes social
media, like Facebook and Twitter. With social
media, customers can easily contact the
company (customer service). Businesses start
looking at such technologies as effective
mechanisms to interact more with their
customers (Ali Abdallah Alalwan, et al. 2017).
Social media has become the largest data
source of public opinion (Shuyuan Deng, 2017).
Journal of Intelligence Studies in Business
Vol. 8, No. 2 (2018) pp. 77-84
Open Access: Freely available at: https://ojs.hh.se/
78
Indonesia has the fourth most Facebook users
in the world. Therefore, this study focuses on
the relationship of social media use, namely
Facebook and Twitter, to see the interaction
between companies and consumers.
Data that exist in social media can help us
to do the analysis to help companies get
feedback from consumers. The data that can be
retrieved include “like, comment, and share”
information. Sentiment analysis can be used to
process comments in order to get feedback on
the nature of the comment, good or bad (He,
Zha, & Li, 2013). Poor comments can be used
as advice and input for the company in the
future (Saragih & Girsang, 2017).
In this study, using existing data in social
media Facebook and Twitter is expected to
create business intelligence that can help
analyze travel business companies in
Indonesia with social media data interaction.
2. CONCEPTUAL BACKGROUND
In this chapter, we examine the concept and
characteristics of business intelligence and
sentiment analysis using lexicon based
classification.
2.1 Business Intelligence
Business information and business analysis in
the context of business processes are the key
that leads to decision-making and actions that
lead to improved business performance.
Business intelligence can be defined as “a set of
mathematical models and analytical
methodologies used to exploit the data
available to produce information and
knowledge useful for complex decision-making
processes” (Vercellis,2006, Williams, S., and
Williams, N, 2006).
Advantages of business intelligence:
• Effective decisions: Business
intelligence applications allow users to
use more reliable information and
knowledge. The result is a decision
maker can make better decisions and
match goals with the help of business
intelligence.
• Timely decision: Dynamic, where
decisions can be taken quickly. The
result obtained by the organization is
that the organization will have the
ability to react continuously in
accordance with the movements of
competitors and to change when there
are important new market
circumstances.
• Increase Profits: Business intelligence
can help business clients to evaluate
customer value and desire for short-
term profits and to use the knowledge
used to differentiate between profitable
customers and non-profitable
customers.
• Reduced costs: Reducing the
investment needed to use sales,
business intelligence can be used to
assist in evaluating the organization’s
costs.
• Develop Customer Relationship
Management (CRM): This is essentially
a business intelligence application that
applies customer information collection
analysis to provide responsible
customer service responsibilities that
have been developed.
• Reduce the Risk: Applying the business
intelligence method to enter data can
develop a credit risk analysis, looking
at the analysis of consumer activity,
producers, and reliability can provide
insight into how to shorten the supply
chain
2.2 Sentiment Analysis
Sentiment analysis or opinion mining is a
process of understanding, extracting and
processing textual data automatically to get
sentiment information contained in an opinion
sentence. Sentiment analysis is done to view
opinions or opinion tendency of a problem or
object by someone. Sentiment analysis can be
distinguished based on the data source, some of
the level that is often used in research
sentiment analysis is sentiment analysis at
document level and sentiment analysis at
sentence level (Bo,P et al. 2002)
The lexicon-based approach depends on the
words in the opinion (sentiment), specifically
words that usually expresses a positive
sentiment or negative sentiment. Words that
describe the desired state (e.g. great, good)
have positive polarity, whereas the words
describing the unwanted state have negative
polarity (e.g. bad, horrible). One common
approach used in performing sentiment
analysis is using a dictionary based approach.
Because this research is based on Indonesia,
the dictionary will use Indonesian words.
Figure 1 is a positive dictionary and Figure 2 is
a negative dictionary.
3. METHODOLOGY
79
Research conducted begins based on the
interest of the writer about the data that exist
on social media.
Therefore, through this research, the author
wants to create a data warehouse for social
media data in order to perform analyses
related to social media interactions. These
include an analysis of how actively the
company replies or communicates with its
customers on social media such as Facebook or
Twitter.
3.1 Crawling Data
Data retrieval is done from selected social
media platforms such as Facebook and Twitter
via the social media API available on each
platform.
Data retrieval is done periodically by
crawlers. The data is taken every Wednesday
and Saturday. This is done because the data
provided by the Twitter API only retrieves data
up to seven days old. For example, data
retrieved on October 18, 2017 from Twitter can
only go back as early as October 11, 2017. Data
before that date cannot be retrieved.
From the data that was regularly taken by
the crawler, was stored on in the form of excel
files.
The types of data stored on each social
media platform are different:
• Facebook: post, comment, reply, like
• Twitter: tweet, retweet, mention
Crawling data in this research uses Rstudio,
for crawling Facebook the Library Rfacebook
was used and for Twitter, TwitterR was used.
3.1.1 Crawling Facebook
In this research, will use three months of data,
from September 2017 to December 2017 from
three companies. The pseudocode used to get
data using Rfacebook in Rstudio was:
– Load Rfacebook
– Connect to Facebook API using
fbOauth
– Get Paget from Official Facebook Page
using function GetPage
– Get all post in Page use GetPost
– Get Like and Comment from Post
(post$Likes & post$Comments)
– Get Like and Reply from Comment
using getCommentReplies
– Export to Csv format
3.1.2 Crawling Twitter
TwitterR uses the Twitter API to get the data.
Because of this, there is a seven day limitation
from the day we request data. The pseudocode
to get the data using TwitterR in Rstudio was:
– Load TwitterR
– Connect to Twitter API using
setup_twitter_oauth
– Search @from Twitter@ example
from:traveloka
– Search “@” example @traveloka
– Search “to” tweet example to:traveloka
– Export to csv format
3.2 Sentiment Analysis
3.2.1 Preprocessing
Preprocessing data data comments from
Facebook and Twitter social media is done by
preprocessing before sentiment analysis.
Figure 4 shows the preprocessing stages.
The first step is case folding. Case folding is
the process of converting words into lowercase.
The purpose of turning words into lowercase is
to eliminate case sensitive errors. The next
step is to filter the sentence. Written words are
Figure 1 Positive dictionary.
Figure 2 Negative dictionary.
Figure 3 Methodology
80
punctuation, number, and website address.
The process of separating sentences into
individual words is usually called tokenization.
The easiest way to turn a sentence into words
is to separate them with spaces. Stemming is
the process of converting words into basic
words.
3.2.2 Lexicon Based Algorithm
The lexicon algorithm converts data via a
function that will process every sentence in the
data source. Figure 5 is the pseudocode for the
sentiment analysis using the lexicon based
algorithm (Chopra and Bhatia, 2016).
1. Enter the text as input.
2. Divide this paragraph into tokens and store the words in
an array list.
3. Select the first word from array list.
4. Fetch the words of database in second array named as
database array.
5. Check whether selected paragraph word matched with
each word of database array.
(i) If match found
(a) Find the sentiment of word from database whether it is
positive/negative or neutral.
(b) Find the exact position of word in the paragraph.
(c) Highlight the word according to their sentiment; make it
green if it is positive, red if it is negative and blue if it is
neutral.
(d) Calculate the score of sentence.
(e) Store the results in database.
(ii) Else match not found
(a) Select next word from the array
(b) Go to step 5.
6. Display the result to the user.
7. Plot the graph according to the results.
Figure 5 Pseudocode for the sentiment analysis using the
lexicon based algorithm.
4. RESULTS
Result from the methodology above are shown
in Figure 6. There are two table facts and five
dimension tables. The two fact tables are: the
fact company activity and fact user activity.
The five dimension tables are: dim user, dim
sentiment, dim company, dim media social,
and dim time.
Dashboard admin activity consists of four
reports (Figure 7). The first report is the report
of admin activity trends during the month, the
second report provides an overview of the
activities undertaken by the admin, the third
report is a report of activity per day while the
latter is an hourly activity. Uniquely by using
the business intelligence program tableau all
existing reports can affect each other, for
example when we click on the first report graph
on the line Traveloka and September all
reports on this page will show Facebook
Traveloka data in September.
Dashboard user activity consists of five
reports (Figure 8). The first report is the report
of user activity trends during the month, the
second report is sentiment analysis report, the
third report is the most active user in social
media, the fourth is user activity by day and
the last is an activity report by hour. With this
dashboard we can analyze who is active during
the month or day or time we choose in the
dashboard.
On the dashboard the activity of the
companies assesed can be seen. Facebook social
media shows that the company Pegi Pegi is the
most active compared to other companies. In
September it was found that Pegi-Pegi made a
ocial media strategy change, which can be seen
in October with a rise of almost 368.81%. The
company, Ticket, had the lowest activity. In
this company there is even a decline in October
and December.
On Twitter, Traveloka has the most activity
compared to other companies. Traveloka has
more than 1,000 activities per month. Other
companies have almost 10 times less activity
than Traveloka. Pegi-Pegi and Ticket had an
Figure 4 Preprocessing stages.
81
increase in November and December. In
November there was a decrease in activity.
Figure 9 summarizes the company activity on
social media.
The most frequent Facebook activity by
companies is reply to comments from
customers. This was most frequently done by
Traveloka, followed by Pegi-Pegi and Ticket. At
Pegi-Pegi the most most common activity was
liking comments from its customers. Figure 10
shows activity by hour.
The companies’ Facebook and Twitter
activity peaked at 16:00-16:59. Traveloka’s
activity peaked at 19.00 – 19.59 while Pegi-Pegi
was most active at 16.00 – 16.59 and Ticket was
most active at 12.00 – 12.59 (Figure 11).
Research conducted during four months of
social media data collection on Facebook and
Twitter, obtained 28,445 comments and
Figure 6 Star schema.
Figure 7 Dashboard company activity.
82
2,379,107 liked statuses by the users (Figure
12). This figure is very high, and reflects how
enthusiastic the users with activities
performed by the company. On social media
Facebook, Traveloka has more enthusiastic
users than the other two companies, this is
evidenced by the existence of 1,386,318 user
activity data points, of which 942,769 activities
occurred in October. When viewed in more
detail, Pegi-Pegi has more active users than
Traveloka in the last two months (November
and December).
From 28,445 comments, Traveloka has the
most negative sentiment with an average of
14.26% negative, 34.51% positive sentiment
and 51.23% neutral sentiment on Twitter.
Tickets have the best positive analytical
sentiment with a value of 44.05%, compared
with negative sentiment which is only 14.10%
and a neutral value of 41.85%. Figure 13 shows
the results of the lexicon-based sentiment
analysis.
The last four months’ data got the names of
users who most actively made comments or
liked a status or comment. In every form of
social media there were users who engaged in
more than 100 activities in the last 4 months
(Figure 14). On Traveloka, the top ten people
engaging had an average activity of 200
interactions, while Pegi-Pegi had an average of
168 activities and Ticket has the lowest
average of 84.
5. RECOMMENDIATION
From the dashboard analysis various
recommendations for companies studied were
obtained.
5.1 Traveloka
On Facebook social media needs to be improved
again because from November there was a
significant decline (23%) compared to the
previous month. At 19.00 – 19.59 the activities
of the Traveloka are recommended to have
more human resources in order to help solve
customer problems.
Figure 8 Dashboard user activity.
Figure 9 Summary company activity. Figure 10 Detail company activity.
83
5.2 Ticket
On Facebook, social media needs to be
improved. In September there were 94
activities, but this declined considerably to 74
activities in December. On Twitter,
engagement should be improved again as
compared to Traveloka, as the activity of Ticket
is lagging behind. For Twitter we suggest
human resources should be available in the
early hours, as in December at 00.00 – 07.00
there are only seven activities, compared with
user activity on Ticket’s Twitter feed of as
much as 85 activities.
5.3 Pegi-Pegi
For Twitter, we suggest increased human
resources in early hours. In December at 00.00
– 07.00 there were 55 activities only compared
with user activity on Twitter Pegi – Pegi as
many as 244 activities.
6. CONCLUSION
Based on the results of the research, there are
several conclusions. By using business
intelligence conducted in this research,
Traveloka has the most interaction in social
media, as compared with Pegi-Pegi and
Ticket.com.
This research provides some suggestions for
the development of business intelligence for
social media interaction. The classification
accuracy can be further improved by using
algorithms and machine learning such as naive
baise classification and in the future data could
also be analyzed to include emoticons for more
complete information from Facebook.
Figure 11 Detail company activity in hour.
Figure 12 Summary user activity.
Figure 13 Sentiment analysis.
84
7. REFERENCES
Adriani, M., Asian, J., Nazief, B., Tahaghoghi, S.
M., & Williams, H. E. (2007). Stemming
Indonesian: A confix-stripping approach.
Journal ACM Transactions on Asian
Language Information Processing (TALIP).
Alalwan, A. A., Rana, N. P., Dwivedi, Y. K., &
Algharabatc, R. (2017). Social media in
marketing: A review and analysis of the
existing literature. Telematics and
Informatics, 1177-1190.
Atmadjati, A. (2012). Era Maskapai Saat Ini.
Yogyakarta: Leutika Prio.
Barlow, J., & Maul, D. (2000). Emotional Value:
Creating Strong Bonds with Your Customers.
San Francisco: Berrett-Koehler Pub-lishers,
Inc.
Bo, P., Lee, L., & Vaithyanathan, S. (2002).
Thumbs up? Sentiment Classification Using
Machine Learning Techniques. EMNLP.
Budiwati, S. D., & Setiawan, N. N. (2018).
Experiment on building Sundanese lexical
database based on WordNet. Journal of
Physics: Conference Series.
Chopra, F. K., & Bhatia, R. (2016). Sentiment
Analyzing by Dictionary based Approach.
International Journal of Computer
Applications, 32-34.
Deng, S., Sinha, A. P., & Zhao, H. (2017).
Adapting sentiment lexicons to domain-
specific social media texts. Decision Support
Systems, 65-76.
Girsang, A. S., & Prakoso, C. W. (2017). Data
Warehouse Development for Customer WIFI
Access Service at a Telecommunication
Company. International Journal on
Communications Antenna and Propagation.
He, W., Zha, S., & Li, L. (2013). Social media
competitive analysis and text mining: A Case
study in the pizza Industry. Internasional
Journal of Information Management, 462-472.
Moro, S., Rita, P., & Vala, B. (2016). Predicting
social media performance metrics and
evaluation of the impact on brand building: A
data mining approach. Journal of Business
Research, 3341-3351.
Ray, P., & Chakrabarti, A. (2017). Twitter
sentiment analysis for product review using
lexicon method. International Conference on
Data Management, Analytics and Innovation
(ICDMAI), 211-216.
Saragih, M. H., & Girsang, A. S. (2017).
Sentiment analysis of customer engagement
on social media in transport online.
Sustainable Information Engineering and
Technology (SIET), 24-29.
Vercellis, C. (2009). Business Intelligence: Data
Mining and Optimization for Decision
Making. Politecnico di Milano: Wiley.
Williams, S., & Williams, N. (2006). The Profit
Impact of Business Intelligence. San
Francisco: Morgan Kaufmann.
Figure 14 Most active users.
Copyright of Journal of Intelligence Studies in Business is the property of Adhou
Communications AB and its content may not be copied or emailed to multiple sites or posted
to a listserv without the copyright holder’s express written permission. However, users may
print, download, or email articles for individual use.
Social business intelligence: Review and research
directions
Helena Giotia, Stavros T. Ponisb* and Nikolaos Panayiotoub
a Hellenic Open University, Greece
b School of Mechanical Engineering, Section of Industrial Management and Operations
Research, National Technical University Athens, Greece
Corresponding author (*): staponis@central.ntua.gr
Received 14 June 2018 Accepted 20 August 2018
ABSTRACT Social business intelligence (SBI) is a rather novel discipline, emerged in the
academic and business literature as a result of the convergence of two distinct research
domains: business intelligence (BI) and social media. Traditional BI scientists and practitioners,
after an inevitable initial shock, are currently discovering and acknowledge the potential of user
generated content (UGD) published in social media as an invaluable and inexhaustible source
of information capable of supporting a wide range of business activities. The confluence of these
two emerging domains is already producing new added value organizational processes and
enhanced business capabilities utilized by companies all over the world to effectively harness
social media data and analyze them in order to produce added value information such as
customer profiles and demographics, search habits, and social behaviors. Currently the SBI
domain is largely uncharted, characterized by controversial definitions of terms and concepts,
fragmented and isolated research efforts, obstacles created by proprietary data, systems and
technologies that are not mature yet. This paper aspires to be one of the few -to our knowledge-
contemporary efforts to explore the SBI scientific field, clarify definitions and concepts,
structure the documented research efforts in the area and finally formulate an agenda of future
research based on the identification of current research shortcomings and limitations.
KEYWORDS Βig data, business intelligence, review, social business intelligence, social media
1. INTRODUCTION
In the last decade, business intelligence (BI)
has proved, beyond any doubt, that it is a
rapidly expanding domain in both research and
business terms with the number of BI related
scientific publications and organizations
embracing BI methodologies, techniques, tools
and platforms rapidly increasing year by year.
This remarkable growth is directly connected
with the abundance of customer/user data as a
result of increased bandwidth, technological
advancements in information systems and
mobile applications and the explosion of user
generated content mostly materialized by
social media and other Web 2.0 platforms.
Nowadays, social media and BI are converging
faster than ever before. The confluence of these
two emerging domains is already producing
new added value organizational processes and
enhanced business capabilities utilized by
companies all over the world to effectively
harness social media data and analyze them in
order to produce added value information such
as customer profiles and demographics, search
habits, and social behaviors.
This point of convergence is exactly the
scientific area where this paper sets its focus
and research efforts, i.e. social business
Journal of Intelligence Studies in Business
Vol. 8, No. 2 (2018) pp. 23-42
Open Access: Freely available at: https://ojs.hh.se/
24
intelligence (SBI), a very new concept trying to
capture this transformation of BI systems in
the era of Big Data and amidst the social media
revolution. This paper constitutes the third -to
our knowledge- effort to explore the SBI
scientific field, clarify definitions and concepts,
structure the documented research efforts in
the area and finally formulate an agenda of
future research based on the identification of
current research shortcomings and limitations.
In doing so, this paper follows a structured
literature review approach utilizing data from
one of the most established academic databases
in the world, i.e. Elsevier’s SCOPUS, and
imposing a ‘search and filter’ process based on
a carefully selected set of inclusion and
exclusion criteria described in detail in the next
section. The collected papers were studied
thoroughly with the objective to initially
eliminate duplicates and critically exclude
papers dealing with SBI superficially,
fragmentally or not at all. At the end of the
literature scrutiny process, 83 papers were
selected for further in-depth, full-text
examination with the objective to provide the
reader with an overview of the main themes
and trends covered by the relevant SBI
literature. The review process imposed on the
83 papers included in the final review sample
produced several interesting findings
regarding the current structure of the domain
and the necessary prioritization of the research
activities for the future.
The remainder of this paper is structured as
follows. The next section provides a brief
theoretical background of the two domains
under study, i.e. BI and social media. It aims to
provide the necessary information for
understanding the importance of Big Data for
BI and the potential impact and
transformative nature that social media have
on existing BI research and practice with a
special focus on User Generated Content
(UGC) and trends related to specific social
media platforms. In Section 3, the
methodological approach to the review and the
results of the selection process are presented,
followed by the review of the selected papers
and the synthesis and taxonomization of the
identified research efforts in Section 4. Finally,
Section 5 attempts a critical discussion of the
review findings in Section 4 and concludes with
a proposed SBI domain research taxonomy and
a suggested list of priorities and directions for
future research.
2. BACKGROUND
Business intelligence (BI) is an “umbrella”
term including a wide range of processes,
applications and technologies through which
various data sources can be gathered, stored,
accessed, and analysed in order to gain
meaningful information crucial for decision-
making (Olszak, 2016). The term, although
growing in popularity recently, was first
introduced more than seven decades ago to
describe “an intelligence system utilising data-
processing machines for auto-abstracting, auto-
encoding and profiling of action points in an
organisation” (Luhn, 1958).
However, only recently it turned to a
prevailing field for academics and practitioners
and a leading commercial concern for most
business organisations. According to Chen et
al. (2012), there are several reasons explaining
this incremented popularity. On the one hand,
there is a great opportunity from the rapid
expansion of readily available web data sources
and on the other, BI tools are becoming more
sophisticated, easier to use and find
applications in many business processes.
Meanwhile, intensive competition and global
economic pressures set the success barrier too
high, leading companies to a continuous fight
for improvement, better quality of service
(QoS) and more productive operations.
Chaudhuri et al. (2011) underline the
declining cost of data storage and acquisition
as an additional reason for the extensive
proliferation of BI systems. The same applies
to hardware, which is becoming more
technologically advanced and less expensive,
allowing for more powerful architecture of data
warehouses.
The implementation of BI provides modern
organisations, even SMEs (Ponis et al., 2013),
with the ability to achieve timely and quality
decision-making, which constitutes a crucial
prerequisite to build a stable competitive
advantage. Upon the effective aggregation of
“intelligent” data regarding the internal and
external business environment, executives are
able to take proactive actions preparing their
firms for future economic trends and
conditions. According to Ranjan (2009), BI is
like a “crystal ball” in the hands of managers,
revealing the best course of action depending
on five major parameters: the company’s
position in relation to its rivals; the overall
strengths and weaknesses of the company;
current and future market demographic and
economic trends; social, political and
regulatory environment; competitions’
25
decisions and strategy and finally, customer
preferences and purchasing patterns.
Beyond any shadow of doubt, the business
landscape in the era of a fast paced and
intensively competitive environment is
dominated by the struggle to proactively
respond to changes, satisfy the increasingly
demanding customer needs and timely decision
making on the best courses to action. BI and
sophisticated analytics provide contemporary
enterprises with the tools, methods and
corporate mentality required to survive the
hard business arena and maintain profitable
relationships with the whole value chain
surrounding their activities.
The concept of participation, on which Web
2.0 is based, has also great economic
implications and opens up significant new
potentials for enterprises (Tziralis et al., 2009).
In this very demanding and fiercely
competitive environment, businesses have
found a powerful ally in the face of social media
applications and their fast-paced advancement
and prevalence in the business and internet
ecosystem. Social media are online platforms
through which users can communicate, share
content and connect with each other. Since
their first appearance in the early 2000s, social
media are constantly increasing in numbers,
types and popularity. According to the
academic literature, social media constitute a
reasonable aftereffect of Web 2.0, an argument
that is summarised in Kaplan and Haenlein’s
(2010) definition: “Social media is a group of
Internet-based applications that build on the
ideological and technological foundations of
Web 2.0, which allows the creation and
exchange of user-generated content”. However,
what clearly distinguishes social media from
other Web 2.0 applications is the element of
social connectivity on a personal level. Within
such sites, users pre-select their connections
and own privacy control over the content they
share (Heijnen et al., 2013).
When it comes to classification, there is no
systematic way in which social media can be
categorised. Indicatively, Diamantopoulou et
al. (2010), propose a rational social media
segmentation based on their major activity (i.e.
communication, collaboration, share, rate and
opinions’ expression) and purpose of use
(leisure, work/business, democratic
engagement). Kaplan and Haenlein (2010),
however, suggest a matrix categorisation
consisting of two social media dimensions,
namely; self-presentation/ self-disclosure and
social presence/media richness.
The outburst of social media and their
increasing popularity has led to an era of fast
and immense internet data generation.
Consequently, the notion of social media
analytics and its utilisation in BI systems has
become a dominant trend in the
entrepreneurial world, due to its huge
potential in added-value applications (Fan et
al., 2015). In the next sections an attempt to
structure the current research domain on the
intersection of these two disciplines is made,
following a systematic literature review
approach.
3. RESEARCH METHOD
According to Hart (1998) a literature review is
an objective, thorough summary and critical
analysis of the relevant available research
literature on the topic being studied. A review
of prior and relative literature of a scientific
area is an essential feature of academic
progress and theory development, since it
creates a solid foundation for understanding
the current research status quo, while at the
same time highlights underdeveloped or
unexplored areas as candidates for future
research. The literature review should contain
processed information from all available
sources, be unbiased to the highest possible
extent, be free from jargon terminology and
supported by a well-defined and consistent
search and selection strategy (Hart, 1998).
This review examines literature
contributions directly addressing SBI, i.e. the
use of social media for BI purposes between
2006 and 2016. Expanding the search before
2006 was deemed unproductive since the
advent of social media in its current form is
connected with the launch of Facebook in 2004.
Previous efforts, like Friendster and MySpace,
are not taken into consideration in this study,
since they never managed to establish their
social media presence and were either defunct
(Friendster) or forced to pivot their offerings
(MySpace).
In this paper, we utilize a systematic
literature review (SLR) approach, which is a
trustworthy, rigorous and auditable
methodology for evaluating and interpreting
all available research relevant to a particular
research question, topic, area or phenomenon
of interest (Keele, 2007). The selection process
was straightforward. Initially, it was decided
that the SCOPUS academic database was
adequate in order to provide this study with a
representative list of relevant contributions,
within the context of this paper. Second, the
26
list of keywords was kept to a representative
minimum by using the strings: “social business
intelligence”, “social media AND business
intelligence”. The keywords were applied to the
title, abstract and keywords sections of
scrutinized publications included in the
SCOPUS database. The search includes
publications in scientific journals, peer-
reviewed conference proceedings and book
chapters. The research focus of our approach
led us to the decision to eliminate books and
editorial reviews. We decided not to exclude
publications in peer-reviewed conference
proceedings, since SBI is a rather new and
emerging scientific area and will be populated
by more than a few first stage publications in
the conference dissemination channel. Other
types of publications such as notes and short
surveys, are also excluded from the study.
The keyword search described above
returned 131 papers published from 2006 to
2016, as shown in Table 1 and Table 2 below.
These initial results show that contributions
using SBI as a term are scarce (14) implying
that, indeed, SBI is a scientific area in its
infancy.
The collected papers were studied
thoroughly with the objective to eliminate
duplicates and then critically exclude the ones
dealing with SBI issue superficially,
fragmentally or not at all, in the case of the
publications included in Table 3. Contributions
that were included in the initial sample
fulfilling the keyword string criteria but not
directly dealing with the study subject were
excluded from the database. Finally, a sum of
83 relevant papers was selected for in-depth,
full-text examination with the objective to
provide the reader with an overview of the
main themes and trends covered by the
relevant SBI literature.
Table 1 Search results for keyword string ‘social business intelligence’.
Table 2 Search results for keyword string “social media AND business intelligence”.
Year of Publication
Source Type
20
06
20
07
20
08
20
09
20
10
20
11
20
12
20
13
20
14
20
15
20
16
Journal Paper 1 1 2 5 6 8 12 16
Conference Paper 1 2 5 8 8 11 13 1
1
Book Chapter 2 3 1 1
Sum = 117 papers 2 3 7 15 17 20 25 28
4. LITERATURE REVIEW
4.1 Descriptive Analysis
As stated in the previous section, the main
body of literature identified comprises 83
papers. While 2006 is the first year of
publication where contributions were sought,
the first published papers found were from the
year 2010, further validating the decision not
to extend the study period prior to 2006. The
allocation of the publications within the
researched period (2006-2016) is presented in
Figure 1.
The allocation of papers in the three source
types, i.e. journal papers, papers in conference
proceedings and book chapters, is presented in
Figure 2. It is noted that contrary to what was
expected there seems to be an even distribution
between journal papers (44.6%) and conference
Year of Publication
Source Type
20
06
20
07
20
08
20
09
20
10
20
11
20
12
20
13
20
14
20
15
20
16
Journal Paper 1
Conference Paper 2 1 1 4 2
Book Chapter 1 2
Sum = 14 papers 2 1 2 7 2
27
proceedings (44.6%), with book chapters
corresponding to the smallest share (10.8%) of
the work published on SBI between 2006 and
2016.
A closer look in the data set shows that a
significant part of the publications (14
documents or 16.9%) originate from the
Institute of Electrical and Electronics Engineer
(IEEE) association (10 conference papers, 3
Journal papers and 1 book chapter). This is no
surprise, since IEEE is a leading organization
with a wide scientific area coverage including
the technical background and information
systems infrastructure necessary for SBI to be
facilitated in companies and other
organizations. In the same direction,
Association for Computing Machinery (ACM)
leads the item count when it comes to
publications in peer reviewed scientific
journals, with its cross-discipline journal
entitled “ACM Transactions on
Management
Information Systems” leading the relative list
with four publications. In Table 3, the number
of papers per journal in the dataset is
presented. The journals are presented in four
categories depending on their main focus and
thematic interest, i.e. information systems in
management, information and computer
science, social networks and miscellaneous. It
is interesting to note the absence of any special
issues dedicated to SBI and the scarcity of
papers’ appearance in more specific domains,
such as social networks and journals.
4.2 Thematic Analysis
SBI, as evidenced from the descriptive
statistics in the previous section, is a relatively
new area, with the first publications referring
explicitly to the term dating back to 2010. For
those critically standing before the rapid
emergence of the subject, SBI is nothing but
the next logical step of BI evolution, providing
enhanced collaborative capability in the
decision-making process of an organization by
adding the analytical capability pertaining to
social media. For others, SBI is a BI paradigm
revolution, especially when combined with the
emergence of Big Data and the ever increasing
variety, volume and velocity with which they
arrive in front of business systems’ queues for
further processing in order to effectively
support decision making. Needless to say that
this duality of perspectives, coupled with the
initial triggering of the term from the IT
business area, has led to a plurality of terms
describing SBI, still serving different business
needs or marketing of IT products, thus
creating confusion and reduced clarity on its
definition. On the academic front, Dinter &
Lorenz (2012), who according to our knowledge
provide the single academic reference
attempting to develop a framework of research
in the SBI area, along the same lines as this
paper, argue that lack of definition clarity for
SBI might lie in the ongoing use of diverse
related terms, coming mostly from industry
literature freely accessible on the web. Zeng et
al. (2010) provide one of the few available
definitions of the term as a set of tools and
techniques that “derive actionable information
from social media in context rich application
settings, in order to develop corresponding
decision-making frameworks and provide
architectural designs and solution frameworks
for existing and new business applications”. In
this paper, the term SBI is explored in
literature and used as the term of focus for the
following study.
In that direction, thematic analysis of
available literature in the SBI research field is
organized into the four following distinct
sections: the use of social media data in BI
systems, SBI tools and techniques, BI
applications in prevalent social media and
finally, industry-specific SBI applications.
Figure 2 Distribution of publications per year across the
study period.
Figure 1 Allocation of publications in source types.
Table 3 Number of papers per scientific peer-reviewed journal.
Journal Title # of Publications
Main
Thematic
Focus
ACM Transactions on Management Information Systems 4
Information
Systems in
Management
Decision Support Systems 1
Journal of Enterprise Information Management 1
Journal of the University of Pardubice 1
Management Decision 1
Production and Operations Management 1
Technology Analysis & Strategic Management 1
Journal of Decision Systems 1
Journal of Destination Marketing & Management 1
International Journal of Services Technology and
Management
1
Intelligent Systems in Accounting, Finance and Management 1
Procedia Manufacturing 1
15
Information Systems 1
Information &
Computer
Science
International Journal of Computer Technology and
Applications
1
Information Systems Frontiers 1
Frontiers in Artificial Intelligence and Applications 1
IEEE Computer Graphics and Applications 1
IEEE Transactions on Knowledge and Data Engineering 1
International Journal of Engineering & Technology 1
IEEE Transactions on Visualization and Computer Graphics 1
KSII Transactions on Internet and Information Systems 1
Knowledge and Information Systems 1
Scandinavian Journal of Information Systems 1
Knowledge-Based Systems 1
Mobile Networks and Applications 1
Sensors 1
Information Visualization 1
Journal of Computer Information Systems 1
Procedia Computer Science 1
17
Journal of Internet Social Networking & Virtual
Communities
1
Social Networks International Journal of Sociotechnology and Knowledge
Development
1
Social Network Analysis and Mining 1
3
The Decision Sciences Journal of Innovative Education 1 Miscellaneous The Scientific World Journal 1
2
4.2.1 The use of social media data in
BI systems
Meredith and O’Donnell (2010; 2011) and
Sathyanarayana et al. (2012) were among the
first to detect the value of social networks in BI
systems, beyond sales and marketing
applications. They developed a framework to
classify the social media functions that foster
the Web 2.0 core concepts of user collaboration
and contribution, and used it in order to exploit
how it can “create more effective and ‘active’ BI
applications”. Shroff et al. (2011) introduced
29
the term “Enterprise Information Fusion” to
describe an emerging BI need across multiple
industries, such as manufacturing, insurance
and retail. The term includes the publicly
available data, derived from social media, that
can potentially be of immense business value
for the enterprise ecosystem. On the same
account, Ruhi (2014) attempted to outline the
undeniable value of social media analytics,
incorporated in a BI perspective. As he
explains, the advantage of social media
analytics in the business environment is
twofold, as it can help organisations “formulate
and implement measurement techniques for
deriving insights from social media
interactions” and, alongside “evaluate the
success of their own social media initiatives”.
Wongthongtham and Abu-Salin (2015)
emphasise the need of evaluation of traditional
BI warehouses, which are more focused on
handling structured internal enterprise data,
in order to support the tremendous volume of
valuable, yet unstructured, social media
information, such as customer reviews and
brand-related posts. Finally, Ram et al. (2016)
conducted a survey in IT consultants and
managers in various industry sectors of China,
in order to prove the paradigm shift that social
media have dictated in business strategies
globally. With a semi-structured
questionnaire, they managed to identify the
critical issues in creating value through Big
Data and social media analytics for BI systems.
Alongside the prevalence of social media in
BI applications, several traditional business
terms were redefined in academic literature in
order to incorporate the new social trends, i.e.
social customer relationship management
(SCRM), digital marketing (Luo et al., 2015),
voice of customer (VoC) and voice of market
(VoM). Bachmann and Kantorova (2016)
separate the original concept of CRM “based
rather on face-to-face and offline
communication in the physical environment”,
from social CRM which is mainly conducted
“through social networks and relationships
within online communities”. Beverungen et al.
(2014) argue that the global penetration of
social networks constitutes a fertile ground for
novel CRM strategies (Rosemann et al., 2012).
After introducing the social CRM emerging
field of research, the authors propose a
framework to exploit Facebook data in CRM
strategies and testify its applicability by
building management reports for the retail
industry. Berlanga et al. (2014, 2016) use
advances in opinion mining techniques and
sentiment analysis to describe the new
opportunities arising in the VoM and VoC
concepts in BI applications. As they explain,
organisations can take advantage of the wealth
of sentiment data in massive social media (e.g.,
social networks, product review blogs, forums)
to ‘listen’ to their customers’ needs and extract
valuable business insights. In the same
context, Lotfy et al. (2016) propose a
framework to integrate customer opinion
streams extracted from social media, with pre-
existing corporate data, so as to constitute an
integrated data warehouse. According to them,
such a multidimensional data base “can
perform advanced analytical tasks and lead to
better insights that would not have been
possible to gain without this integration”.
Chan et al. (2015) deliberately examine the
challenges faced by contemporary BI systems,
associated with user-generated content (UGC)
derived from social media communication
channels. According to them, the available
social data is not fully exploited for three main
reasons: its unstructured format, its subjective
nature and tremendous volume. On that
account, they propose a systematic approach to
social media data analysis, which
counterbalances the aforementioned
challenges and captures the real value of online
social content for BI applications. Likewise,
Tayouri (2015) also draws attention to risks
associated with social media in the corporate
environment, highlighting cyber security
issues, such as fraud through social media
activities, leakage of sensitive business
information and damages to a firm’s
reputation. Hence, he suggests a consistent
cyber security training framework supported
by social media site monitoring tools, able to
assist companies in building a robust SBI
strategy by keeping track of correlated
malicious activities and threats.
4.2.2 SBI Tools and Techniques
SBI tools and techniques is a predominant
research field in academic literature. Data
visualization tools; online analytical processing
(OLAP); UGC and natural language processing
(NLP) techniques; sentiment and opinion
mining in the social media context; and user
profiling and personalized marketing tools are
some of the core thematic areas associated with
contemporary SBI practices.
4.3 Visual Analytics
Zimmerman et al. (2015), Zimmerman &
Vatrapu (2015) and Sigman et al., (2016)
30
highlight the importance of visual analytics
(VA) toolkits in assisting the interpretation of
the unstructured data derived from social
media into meaningful business or educational
insights. Their research project provides a
series of visual dashboards able to
comprehensively project the analytics related
to a brand and its marketing campaigns
outcomes. The technical architecture and the
specific characteristics of this set of dashboards
is further explained and defined in ‘Social
Newsroom’, a prototype VA tool for SBI, which
was developed to “provide practitioners with
user interfaces that can assist them in
interpreting social media data and taking
decisive actions” (Zimmerman et al., 2015). Lu
et al. (2014) proposed a VA toolkit able to
handle “noisy, unstructured data and use it for
trend analysis and prediction” in sales
forecasting and advertisement analysis. Their
data visualization tool was successfully applied
in Twitter users, in order to predict movie
revenue and ratings. Moreover, Pu et al. (2016)
focused on the valuable geo-location data
available in social media applications by
introducing the ‘Social Check-in
Fingerprinting (Sci-Fin)’ tool which offers
organisations “the opportunity to capture and
analyze users’ spatial and temporal behaviors”
through social network check-in data.
Respectively, Wen et al. (2016) suggested an
alternative VA system, called ‘SocialRadius’
that can interactively explore spatio-temporal
features and check-in activities, in a variety of
applications, ranging from BI applications to
transportation and information
recommendation systems. Meanwhile, Kucher
et al. (2014; 2016) presented a VA tool for social
media textual data that “can be used to
investigate stance phenomena and to refine the
so-called stance markers collection” with
respect to sentiment and certainty. Lastly, Wu
et al. (2014) introduced ‘OpinionFlow’ a VA
system detecting opinion propagation patterns
and providing gleaned insights in government
and BI applications.
4.4 OLAP techniques, UGC and NLP
tools
Gallinucci et al. (2013; 2015) defined SBI as the
“discipline of combining corporate data with
user-generated content (UGC) to let decision-
makers improve their business, based on the
trends perceived from the environment”. In
order to enable contextual topics extraction
and aggregation at different levels, they
introduced ‘Meta-Stars’, a model based on UGC
and real-time OLAP techniques. Golfarelli
(2014) demonstrated an empirical application
of a prototype demo of the model in real-world
marketing campaigns, in order to prove its
technical robustness and methodology. He
furthermore presented the available OLAP
solutions, for UGC analysis, that enable
decision-makers analyze their business
environment based on trends perceived from
social media. Lin and Goh (2011) proposed a
least-square (LS) algorithm to model sales
performance and business value derived from
social network data, by emphasizing the role of
social marketer-generated content in
influencing UGC sentiment and attitude. The
authors actually suggest that there is a positive
relationship between “the richness of
information embedded in both user-and
marketer-generated content and firm sales
performance”. Finally, Ferrara et al. (2014)
provide a classification of the available UGC
extraction tools in two main categories, namely
the enterprise and social web data extraction
(WDE) tools, through a structured literature
review. In a natural language processing (NLP)
context, Dey et al. (2011) discuss a series of
methodologies that can be followed in order to
“obtain competitive intelligence from different
types of web resources, including social media,
using a wide array of text mining techniques”.
As they explain, social media do not only
provide valuable competition insights but also
constitute an open forum where customers
express their opinions about different brands’
offerings. Sleem-Amer et al. (2012) introduce
‘DoXa’, a semantic search engine for the French
language, with NLP capabilities and social BI
application. Centering their work on two
separate business cases, the authors explain
how ‘DoXa’ can be applied to discover “hidden
patterns in social media data, using rich
linguistic resources”. Lastly, Bjurstrom and
Plachkinova (2015) propose a controlled
natural language that does not require
advanced technical skills and can be directly
compiled into executable code, for automated
social media data extraction.
4.5 Sentiment Analysis and Opinion
Mining
Sentiment Analysis and Opinion Mining
techniques are two research areas that
attracted the academic interest from the early
stages of introduction of social media as a
powerful leverage for BI systems. Upon the rise
of Web 2.0 and the increasing popularity of
social network sites (SNS), Castellanos et al.
31
(2011), in collaboration with HP and its BI
software solutions, introduced ‘LCI’, a
prototype sentiment analysis platform able to
extract sentiment from textual data in real-
time. The platform’s interface consisted of
multiple chart and visualization options that
dynamically changed as soon as new data was
ingested, exploiting state-of-the art sentiment
analysis algorithms. A year later, Yang and
Shih (2012) proposed a rule-based sentiment
analysis (R-SA) technique “to automatically
discover interesting and effective rules capable
of extracting product features or opinion
sentences for a specific product feature”. That
way, they offered a means of effective and real-
time analysis of the tremendous volume of
data, hidden in social media applications,
regarding customer reviews about business
offerings. In the same direction, Liu and Yang
(2012) developed a buyer behavior prediction
technique, using dynamic social network
analysis and behavior pattern mining
algorithms on e-commerce purchases and viral
marketing applications. Qazi et al. (2014)
focused on the suggestive type of customer
reviews, found on online review forums, by
combining machine learning techniques and
sentiment analysis. Their findings suggested
that sentiment analysis “achieves maximum
performance when employing additional
preprocessing in the form of negation handling
and target masking, combined with sentiment
lexicons”. Later, Colombo et al. (2015)
compared two novel methodologies for
sentiment analysis with cross-industry
application, by using secondary unstructured
textual data from Twitter, Yelp and Cars.com,
while Kim and Jeong (2015) applied their
opinion mining methodology in online reviews
about the oldest instant noodle snack in Korea.
Finally, Nithya and Maheswari (2016)
implemented a scoring system technique to
identify the most promising features of a
product offering, consisted of two rating
attributes, namely the ‘sentiment score’ and the
‘feature score’. Their technique provides
managers with valuable insights regarding
future demand, brand promotion and product
penetration.
4.6 User Profiling and Personalized
marketing tools
SBI tools and techniques for customer-centric
marketing applications constitute another
popular research field in academic circles.
Personalized advertising messages, based on
intelligent user profiling, is top priority for the
contemporary business world, striving to
survive in a highly competitive and globalized
environment. Ranjan et al. (2014), using an
association rules mining (ARM) algorithm,
exploit social media data to locate tie-strength
networks and active friends, in order to be used
as a basis for targeted and relevant advertising
campaigns. Yang and Chen (2014) introduce a
novel profile expansion mechanism which
enhances the effectiveness of personalized
recommendation systems in social
bookmarking sites to assist companies in
developing “effective service offerings that are
better tailored to their customers’ needs”
(Gronroos, 2008). In a more targeted approach
about accurate profiling of social media users,
Liu et al. (2014; 2015) develop ‘HYDRA’, a
solution framework to identify linkages across
multiple social networks and discover
correlations between different user profiles.
The authors argue that ‘HYDRA’ can be a
profitable addition to existing BI solutions, as
it was successfully implemented in a ten-
million data base and correctly identified real
user linkage, across seven dominant social
network platforms, outperforming “existing
state-of-the art algorithms by at least 20%
under different settings”. Finally, Yang and
Chang (2015) highlight the knowledge gained
from social tagging system (also known as
folksonomy) as an invaluable asset for
enhancement and upgrade of existing BI
applications. On that account they employ
Delicious, an established social bookmarking
service, to construct “a statistical-based
thesaurus, which is then applied to support
personalized document clustering”. Their
empirical study indicated that such services
improve the overall quality of SBI systems, and
promote their efficiency in handling targeted
marketing applications.
4.6.1 BI applications in prevalent
social media
A fairly important percentage of existing
academic literature on BI focuses on specific
social media use-cases and their potential
applicability on corresponding systems. Tools
and techniques able to extract value added
data from popular social network platforms,
such as Twitter and Facebook blogs or websites
containing customer review content, are among
the most preferable research subjects.
4.7 Twitter
Rui and Whinston (2011) argue that Twitter
hides a huge business potential as a base
32
platform for BI applications, given its valuable
structural information and the tremendous
volume of data flows that are produced by its
users in real-time. Within this context, they
introduced a Twitter-based BI system for
revenue forecasting, which was successfully
implemented in movie box office revenue
prediction, achieving remarkable results.
Seebach et al. (2012) focused on the corporate
reputation management area and how firms
can use social media intelligence in order to
handle reputation threats timely and
effectively. By using sentiment and manual
content analysis techniques on Twitter,
regarding posts about a large American bank,
they showed “how social media might impact
corporate reputation and what organizations
can do to prepare themselves”. Lee et al. (2013)
used Twitter as a real-time event detection
system for crisis management and BI
applications. Their proposed framework is able
to detect emerging events from social network
streams and “accurately extract ontology
entities associated with specific events for
decision supporting applications”. O’Leary
(2015) highlights ‘Twitter Mining’ as an
invaluable asset for the majority of Fortune
100 companies. In his paper he reviews some of
the most prevailing BI applications of Twitter
data extraction on a prediction, discovery and
informative basis. In the same year, Arora et
al. (2015) applied sentiment analysis tools in
order to investigate whether tweets provide a
sufficient ground to gain useful insights on
competitive brands, using the smart-phone
industry. Their results showed that although
Twitter data is rich regarding costumer
sentiments, the exposure of different brands
varies significantly making their comparison a
rather ambiguous task. In a similar approach,
Chilhare et al (2016) designed a marketing-
driven competition analysis tool to “recognize
specific areas in which businesses are leading
and lagging”. In their paper, they propose a
methodology combining NLP techniques and
sentiment benchmarks, in order to analyze and
structure multilingual Twitter data for
competitive FMCG companies into meaningful
business insights. Sijtsma et al. (2016)
introduced ‘Tweet-viz’, an interactive tool to
assist companies in actionable information
extraction from unstructured textual Twitter
data. In their paper, they prove that Twitter
can provide BI systems, customer preferences,
demographics and location data. Completing
the Twitter BI academic cycle, Piccialli and
Jung (2016) summarize the business-
generated tweet content in three categories;
namely informative, advertising or a hybrid of
the two. According to their estimations, the
hybrid approach increases customer
engagement and promotes UGC activity with
brand related content.
4.8 Facebook
According to scholars, Facebook, apart from
being the most dominant social network on a
global basis, contains such a high volume of
UGC data that it could also turn to an
alternative customer relationship
management (CRM) platform, replacing
traditional in-house corporate software.
Bygstad and Presthus (2013), conducting a
case study on two Scandinavian airliners’
pages on Facebook during the ash crisis in
April 2010, showed that CRM through the
platform proved more effective in terms of
dynamic interaction and customer
engagement. Milolidakis et al. (2014), aiming
to provide a generic framework for social media
data extraction and transformation into
meaningful business insights, used Facebook
fan pages of three Greek communication
service providers as their case study. According
to their findings, Facebook includes data
capturing of all the standard BI indicators, and
moreover provides additional user sentiment
information through artifacts features, such as
the “like” button, that can turn to intelligent
business statistics through visual excavation
tools.
4.9 Blogs and Micro-Blogs
Banerjee and Agarwal (2012) used a nature-
inspired theory to model collective user
behavior from blog-originated data in order to
explore its application on BI systems. Based on
swarm intelligence, “where the goal is to
accurately model and predict the future
behavior of a large population after observing
their interactions during a training phase”,
they concluded in promising results about blog
value in trend prediction applications.
Meanwhile, Kulkarni et al. (2013) draw
attention on the importance of social media
brand propagation enablers. On that basis,
they study the degree of customer engagement
through blog contents and the corresponding
analytics for BI systems. Obradović et al.
(2013), in the context of the ‘Social Media
Miner’ project combined textual analysis
methods with a blog processing technique to
“aggregate blog articles of a specific domain
from multiple search services, analyze the social
33
authorities of articles and blogs and monitor
the attention they receive over time”, in order to
provide a highly automated BI tool. Lastly,
Jingjing et al. (2013), using as a reference the
Chinese micro-blogging platform ‘Sina Weibo’,
conduct a social influence analysis to discover
“information retrieval, recommendations and
businesses intelligence opportunities”.
According to their findings, their proposed
framework can overcome difficulties related to
volume and complexity found on micro-
blogging platforms and can find numerous
applications in BI systems.
4.10 Amazon.com
Social media, based on principles and
technologies deriving from the user-centered
Web 2.0, constitute by definition an open
platform where users can express their
sentiments, share their knowledge and build a
social environment. Within this context,
consumers exchange their opinions towards
different brands, share their experiences
through word-of-mouth (WOM) and provide
their own reviews. The importance of social
activity related to brand offerings and the
added-value of publicly available customer
reviews has naturally attracted the interest of
the business and academic world. Zhang and
Chen (2012) studied the business impact of
social media and UGC in sales and marketing,
by applying text mining techniques and a set of
innovative metrics focusing on customer
reviews on two popular e-commerce websites,
namely BN.com (Barnes&Noble) and
Amazon.com. According to their findings, user-
generated reviews have serious effects on
product sales and should be consistently
processed by BI systems, through carefully
selected measures. Similarly, Ngo-Ye and
Sinha (2012) argue that customer-generated
reviews in e-marketplaces “are playing an
increasingly important role in disseminating
information, facilitating trust, and promoting
commerce”. On that account, they developed an
Amazon.com based tool to automatically
identify the most important reviews and
provide meaningful customer feedback.
Finally, Zhang et al. (2013) in an attempt to
further explain how WOM is affecting product
sales, they combined network analysis with
textual sentiment mining techniques to build
product-comparison networks consisted of
customer reviews. Their empirical study on
Amazon.com suggests that it is imperative for
firms to understand and manipulate the WOM
process taking place in social media, in order to
survive in the increasingly competitive online
landscape.
4.10.1 Industry-specific SBI
applications
The integration of social media analytics in
BI systems is a need soon realized both by
organisations and academia. SBI tools and
techniques are not limited in a specific area but
have rather a cross-industry application, a fact
that is clearly reflected in the existing
literature. Heijnen et al. (2013) argue that the
potential of social medial data is invaluable for
multiple facets of BI systems, yet it is “largely
unused by companies, and it remains unclear
what data can be useful for which industry
sectors”. Their findings indicate that key
performance indicators typically differ between
industry sectors and therefore SBI metrics
should accordingly adapt to their
corresponding needs. The need to approach the
matter from industry-specific perspectives led
to a series of academic publications focusing on
distinct sectors: education, automotive,
pharmaceutical, cosmetics, tourism, fashion,
government and politics.
4.11 Education
Moedeen and Jeerooburkhan (2016) focus on
the higher education sector to explore how
“social media strategies can be aligned with
business strategies to help universities gain a
competitive edge”. Using the Facebook page of
a university as their case study, they argue
that higher education organizations pay
attention solely to advertising and reputation
management aspects, while neglecting other
business objectives that could be met through
a holistic SBI application.
4.12 Government and Politics
Bendler et al. (2014) associate static
environmental characteristics with dynamic
user-generated content from social media to
explain and predict criminal activity in
metropolitan areas. By combining traditional
statistics, such as zero-inflated Poisson
regression and geographically weighted
regression with social media data, they provide
a framework that enhances the accuracy of
criminal activity forecasting. Meanwhile,
Chung et al. (2014) developed an approach to
pinpoint opinion leaders in social networking
sites that could be approached by policy
makers to collaborate and “bring about change
in the communities and the general public
welfare”. In a more generic approach, Golfarelli
34
(2014; 2015) studies SBI options in politics.
According to him, processing of user-generated
content through a robust SBI system could
prove invaluable for political entities in order
to align their governmental decisions with
environmental trends and public opinion.
Finally, Beigi et al. (2016) explore crisis and
disaster management through sentiment
analysis and social media visual analytics.
According to them, individual posts in social
media about natural disasters and
emergencies can be used as inputs in
governmental SBI systems “to improve
situational awareness and crisis management
(…) while assisting in locating people who are
in specific need during emergency situations”.
4.13 Automotive
Abrahams et al. (2012) introduce a decision
support technique for vehicle quality
management designed to identify and
prioritise automotive defects, deriving from
reviews in vehicle enthusiasts’ online forums.
They suggest that conventional sentiment
analysis does not suffice to efficiently detect
customer complaints and therefore, BI systems
should incorporate advanced text mining
algorithms specifically designed for social
media applications. Baur et al. (2015) also
focus on the vehicle industry by exploring
Chinese auto forums as a new proactive means
of market research. According to them,
although the increasing popularity of social
media offers a fertile ground for novel
marketing techniques, there is a number of
arising challenges to be confronted, namely the
tremendous volume of posts, their
unstructured format and the wide range of user
languages requiring complex natural language
processing techniques. On that basis, they
propose ‘MarketMiner’ a novel framework for
“search, integration, and analysis of cross-
language user-generated content”, specifically
designed for the competitive automotive sector.
One year later, Baur (2016) examines
alternative applications for ‘MarketMiner’ in
public administrative bodies and commercial
firms. His results indicate that the tool can
significantly improve the processing of multi-
source and multi-language social media
generated content and apply to cross-industry
SBI systems.
4.14 Pharmaceutical
According to Basset et al. (2012) the social
media sphere is a challenging environment for
the pharmaceutical industry, as it is associated
with a number of ethical and legal issues
imposed by governments globally. However,
SBI systems can prove valuable to such an
antagonistic sector mainly for marketing,
customer relationship management and
competition monitoring applications. Bell and
Shirzad (2013a; 2013b) propose a social media
data extraction model to assist pharmaceutical
companies to effectively position themselves in
new marketplaces. According to them, social
media networks offer a channel of
communication for business-to-business
environments and can enable companies to
connect with all the actors of their value chain
(i.e. customers, partners and even competitors)
on a real-time, global basis. Finally, He et al.
(2016) using the three biggest drugstore chains
in US as their case-study, suggest a model for
competitive strategy formulation by applying
quantitative analysis, sentiment analysis and
text-mining techniques in social media UGC
content. Their findings indicate that such tools
can prove invaluable if adopted by existing BI
systems.
4.15 Tourism
Online social networks, and Web 2.0
applications in general, are rapidly becoming a
significant marketing channel for the tourist
industry which is challenged by new and
emerging business models utilizing social
media and other crowd sourcing and shared
economy applications, such as Airbnb. In this
new and turbulent environment, social BI can
be a source of critical competitive advantage in
a very demanding and customer-service
intensive industry such as tourism. In that
direction, Palacios-Marqués et al. (2015) study
the effect of online social networks on firm
performance and explore ways of adding value
to established market competences. The
authors conduct a large survey in one of the
world’s largest tourist destination, Spain, with
the participation of top managers from 197
four- and five-star hospitality firms. Their
results show that social BI has a significant
positive relationship with firm performance by
enhancing market intelligence and knowledge
management competences, thus leading to the
acquisition of a significant advantage over the
competition. Remaining in the same
geographic territory but penetrating one layer
deeper in the social BI area, Marine-Roig and
Clave (2015) study the usefulness and
applicability of big data analytics for the
industry and specifically for a smart city
tourist destination, Barcelona. The authors
35
study the online image of the city by analyzing
more than a hundred thousand travel blogs
and online travel reviews by people who have
visited the destination in the last decade. By
extracting BI through these large volumes of
user generated content, the authors provide an
efficient decision support tool for industry
executives and city officials to develop and
evaluate competition, marketing, branding and
positioning strategies and policies, which will
enhance the city’s image as a smart tourist
destination.
4.16 Fashion and Luxury
The fashion and luxury products industry has
for many years resisted the adoption of the e-
commerce channel, since they associated
anything digital with malpractices such as
discounting, counterfeiting and brand dilution.
This is not the case anymore and currently
emblematic brands, such as Ferragamo, have
entered the e-market arena, which according to
a report from McKinsey and Altagamma (2015)
has reached €14 billion in 2014, a 50% increase
from 2013. This change has created the need
for managing user-generated content in order
to better understand customer profiles, identify
preferences and determine trends, with the
latter playing a crucial role for product
development of companies in the fashion
industry. In that direction, Petychakis et al.
(2016) turn their research focus on a very
important aspect of social media analysis,
which is the identification of opinion makers
within the social media ecosystem, the
monitoring of their behavior and the extraction
of targeted campaigns utilizing their media
presence. The authors present a platform
providing marketers and product designers
with data analytic services for influencer
identification and trend analysis and evaluate
it in a single case from the fashion industry.
Fourati-Jamoussi (2015) explores the concept
of e-reputation by applying BI practices to
analyze the social media presence of four
companies from the organic cosmetics
industry. The author attempts to compare the
reputation of the participating brands by using
different monitoring tools, conducts user
profiling for each brand and finally proposes
recommendations for enhancing marketing
strategies.
5. CONCLUSIONS
In this paper 83 papers, which were published
in the period from 2006 to 2016 dealing with
SBI concept, management, tools and
applications, were collected. The review of
these papers and the analysis of their content,
presented in the previous chapter, produced
useful information, in order to synthesize a
comprehensive research agenda for SBI
including major directions and identified
shortcomings that seem to shape the future of
research in this area. The core focus of the
research, as expected, seems to be the
unearthing of the currently unused, to its full
potential, value of SBI and put it to good use
for the benefit of businesses and organizations
around the globe. In that direction, academic
literature in the novel research field of SBI is
essentially developed around three main
pillars of research orientation.
The first pillar attempts to provide answers
to the question ‘What is SBI and how can it
help a business or organization”, putting SBI’s
business validation and real-life applications
in the epicenter of research, thus given the title
‘business descriptive’. Papers in this pillar are
attempting to highlight the prevalent
acceptance of social media as a source of
business value and the parallel expanded
usage of BI systems through social media data
for multiple operations within companies, in a
variety of industry-specific applications. In
doing so, they provide mostly definitions,
methods, models and frameworks, which
support a wide range of corporate activities,
spanning but not limited to strategic decision-
making functions, business processes’
optimization, operational efficiency
improvement and revenue management.
Within this pillar, one can identify two discrete
waves of publications that can be organized
together based on their focus and objectives.
The first identified wave of publications
within the business descriptive pillar deals
mostly with determining the current status
quo of BI in contemporary organizations and
provides means of expanding its reach through
the exploitation of social media. The first step
in this direction is the identification and
validation of social media potential and
functionalities to act as a consistent BI
decision-making support tool through solid
argumentation and empirical tools like
surveying experts in interested business areas.
At the same time, the second wave of
publications attempts to deal with SBI by
exploring the enhanced capabilities that it
gives to traditional BI systems and how these
can be rethought and restructured in order to
be ready to absorb and process the abundance
and large variety of data that social media
36
produce. What is interesting at this point is the
determination of SBI usefulness and
transformative impact on other established
business functions such as marketing and
customer relationship management (CRM).
The introduction of novel marketing and CRM
strategies such as social CRM, VoM and VoC
as a result of information harnessed by SBI
practices is explored in depth by many
publications and specific algorithmic SBI
techniques and tools, e.g. opinion mining,
sentiment mining, are mentioned as playing a
critical role for business success and
competitive advantage. Finally, the main
barriers/shortcomings identified in this pillar
of literature are the following:
– Probably the most important issue
identified is that of data security and
privacy. There are major concerns for all
levels of data usage, i.e. data creators
(users), data suppliers (e.g. Facebook or
Telco companies) and businesses in need of
the data. What makes the situation even
more complicated is the fragmentation of
legislation between continents and nations,
which make compliance a cumbersome and
sensitive task, especially in the case of
companies operating at a global level.
– The second most important issue identified
in this pillar of literature is data
governance by businesses. In other words,
the ability of companies to streamline their
processes and systems in order to provide
more accurate information, achieve
increased visibility and in essence better
analytics. There seems to be a consensus
that much more is needed to be
accomplished in this area.
– Finally, the third prominent issue
identified in this pillar is process
governance. The huge impact of social
media data on current established business
processes and its transformative effect on
every-day operations, coupled with the
need for the use of more advanced
analytical systems, creates the need for
research on business process management
and reevaluation of traditional processes
and their efficient transformation.
The second pillar attempts to reveal ‘under
the hood’ knowledge and answer the question
“How does SBI work”. It sets technical
implementation in the epicenter of research,
thus this pillar is given the title, ‘technical
descriptive’. Papers in this pillar provide
mostly technical information on algorithms,
techniques and tools that are used in order for
SBI to process social media data and produce
meaningful information to be used directly or
passed for further processing by traditional BI
systems. The prevalent techniques, which
seem to dominate the research interest in this
pillar are those dealing with three major issues
of SBI at the technical level: user profiling,
user (customer) voice translation into
actionable information and data visualization.
The main shortcomings identified in this pillar
of literature are the following:
– There is an increased demand for new AI
algorithms for the automation of the user
generated content extraction and
translation procedure. Current algorithmic
efforts in research are many. Still their
validation in actual commercial
environments does not commensurate with
the materialized research. The need for a
switch towards an AI based, data-scientist
agnostic SBI process is evident in the
literature.
– User profiling and the underlying targeted
marketing and personalized recommender
systems are very important issues in the
SBI literature especially for companies that
are forced to enter the paid advertising
arena by increased competition and the
need to sustain profitability. Although
profiling models and algorithms present a
rapid increase in numbers and variety of
approaches there are still several
unexplored areas in profiling that need
intensified research and investments.
– Data visualization has seen many advances
in the last few years with the emergence of
the dashboard logic in data presentation
and display. Although there is a fair
number of social media tools already
providing services like data collection,
aggregation and analysis into key
performance indicators, there is still a
deficiency in visualizations, especially
when it comes to standards and design
principles, thus making the support from
data scientists and supplementary systems
mandatory.
Finally, the third trend attempts to answer
the question “Does SBI work in real life?” Real-
37
life cases of SBI applications in practice are the
focus of research in this pillar, which thus is
given the title “case descriptive”. Two discrete
waves of publications can be identified. The
first focuses on industry-specific applications
and describes how SBI can provide valuable
services for businesses operating in these
industries. In doing so, papers in this pillar
explore successful applications of SBI in real
business cases, highlighting the cross-
industrial nature of SBI and its potential
impact for a variety of industries and
governmental organizations. Specifically, they
provide focus on the impact of SBI in
traditional business models and processes and
its operational fit in order to support industry-
particular requirements. The second wave of
publications includes papers focusing on
specific social media use-cases, with Twitter
and Facebook being the platforms most widely
used as data providers and application test
beds. Tools and techniques able to extract
value added data from popular social network
platforms, blogs or websites containing
customer review content, are among the most
preferable research subjects. The main
shortcomings identified in this pillar of
literature are the following:
– Utilizing SBI to support real-life cases is a
cumbersome task demanding a holistic
approach, including technological and
organizational aspects, leading to a
complex transition requiring high
executive competences supported by a
global strategy. This is not the case dealt
within the publications studied in this
pillar. Empirical evidence provided is
rather fragmented and cases seem isolated
from the business ‘big picture’, while
connection with ‘bottom line’ metrics is
loose.
– There is a, to some point justifiable, strong
focus of SBI research on social networking
giants, like Facebook and Twitter. Still,
there is an abundance of social networking
sites and other emerging social media
business models like Snapchat, Vine and
Reddit for example, for which the
possibility of more open data extraction and
enhanced algorithmic testing could take
place, that are currently not sufficiently
explored.
At this point, a research agenda can be
formed including eight discrete research
directions, each one dealing with the
shortcomings identified in literature and
discussed previously in this section. In Table 4,
a summary of the literature review’s main
findings is presented. The three main pillars’
research offerings are shortly described and
specific publications are assigned to each one of
the pillars in accordance with their number in
the reference list at the end of this assignment.
The eight research directions comprising the
future research agenda for SBI are categorized
per pillar and presented in Table 4.
Finally, it has to be noted that adoption of
this paper’s findings should take into account
the inherent limitations of this study, which
are:
– The big difference between current and
published capabilities of academia,
especially coupled with the fast pace of the
SBI scientific field. The author is certain
that several research efforts providing
innovative approaches and empirical use
Table 4 SBI future research directions.
TITLE (MAIN RESEARCH
OFFERINGS) PUBLICATIONS (by Ref. Number)
FIRST
PILLAR
Business Descriptive
(Definitions, Methods, Models
& Frameworks) RD1: Data Security & Privacy RD2: Data Governance RD3: Process Governance
[116], [201], [19 ], [20 ], [55], [163], [128],
[129], [173], [166], [22], [190], [30], [158],
[9], [169], [120 ].
SECOND
PILLAR
Technical Descriptive
(Algorithms, Techniques and
Tools)
RD4: Improvement /
Development of new AI
Algorithms – SBI Process
Automation RD5: User Profiling RD6: Data Visualization
[210 ], [211], [64], [211], [212], [65],
[110], [52], [28], [179], [114], [204], [202],
[118], [160], [206], [157], [103[, [113],
[112], [205], [96], [101], [39], [25], [156],
[139], [199], [103], [176], [92].
THIRD
PILLAR
Case Descriptive (Empirical
Evidence / Industry Focus &
Social media Focus)
RD7: Holistic SBI
Approaches – Enhanced
Validation
RD8: Extend Research
Coverage in Social Media
[135], [71], [167], [1], [12], [138], [11],
[210], [171], [16], [17], [107], [27], [102],
[80], [209], [91], [142], [131], [18], [37],
[63], [122], [140], [13], [14], [8], [145],
RESEARCH DIRECTIONS
38
cases highlighting novel applications of
techniques do exist, that are either in
development or already finished but yet
unpublished. Unfortunately, the academic
publishing pipeline has a lead time of six to
eighteen months in some cases and work in
progress papers are relatively low in
numbers, thus creating problems to
researchers who conduct a literature
review.
– Furthermore, significant research on SBI is
done by or on behalf of big players in this
area, such as social media platforms, big
advertising companies and global brands.
These studies are based on home-grown
methodologies, use proprietary tools and
perhaps focal datasets and thus never
made public, making the task of the
researcher who conducts the review even
more difficult.
– Finally, the reader, before adopting the
results of this study, has to consider its
methodological limitations, related to the
selection of the academic library, i.e.
Elsevier’s SCOPUS, the inclusion of
specific source types, i.e. peer reviewed
journal papers, conference proceedings and
book chapters and finally the selection of
the search keywords for conducting the
review.
6. REFERENCES
Abrahams, A.S., Jiao, J., Wang, G.A. and Fan, W.
2012. Vehicle defect discovery from social
media. Decision Support Systems, 54(1), 87-97.
Arora, D., Li, K.F. and Neville, S.W. 2015.
Consumers’ sentiment analysis of popular
phone brands and operating system
preference using Twitter data: A feasibility
study. In: Proceedings of Advanced
Information Networking and Applications
(AINA) IEEE 29th International Conference,
pp. 680-686.
Bachmann, P. and Kantorová, K. 2016. From
customer orientation to social CRM. New
insights from Central Europe. Scientific
papers of the University of Pardubice, Series
D, Faculty of Economics and Administration,
36/2016.
Banerjee, S. and Agarwal, N. 2012. Analyzing
collective behavior from blogs using swarm
intelligence. Knowledge and Information
Systems, 33(3), 523-547.
Basset, H., Stuart, D. and Silbe, D. 2012. From
Science 2.0 to Pharma 3.0 Semantic Search
and Social Media in the Pharmaceutical
Industry and Stm Publishing. A volume in
Chandos Publishing Social Media Series.
Baur, A., Lipenkova, J., Bühler, J. and Bick, M.
2015. A Novel Design Science Approach for
Integrating Chinese User-Generated Content
in Non-Chinese Market Intelligence.
Baur, A.W. (016. Harnessing the social web to
enhance insights into people’s opinions in
business, government and public
administration. Information Systems
Frontiers, pp.1-21.
Beigi, G., Hu, X., Maciejewski, R. and Liu, H.
2016. An overview of sentiment analysis in
social media and its applications in disaster
relief. Sentiment Analysis and Ontology
Engineering, pp. 313-340, Springer
International Publishing.
Bell, D. and Shirzad, S. R. 2013. Social media
business intelligence: A pharmaceutical
domain analysis study. International Journal
of Sociotechnology and Knowledge
Development (IJSKD), 5(3), pp. 51-73.
Bell, D. and Shirzad, S.R. 2013. Social Media
Domain Analysis (SoMeDoA)-A
Pharmaceutical Study. WEBIST, pp. 561-570.
Bendler, J., Ratku, A. and Neumann, D. 2014.
Crime mapping through geo-spatial social
media activity. In: Proceedings of 35th
International Conference on Information
Systems, Auckland 2014.
Berlanga, R., Aramburu, M.J., Llidó, D.M. and
García-Moya, L. 2014. Towards a semantic
data infrastructure for social business
intelligence. New Trends in Databases and
Information Systems, pp. 319-327, Springer
International Publishing.
Berlanga, R., García-Moya, L., Nebot, V.,
Aramburu, M.J., Sanz, I. and Llidó, D.M.
2016. Slod-bi: An open data infrastructure for
enabling social business intelligence. Big
Data: Concepts, Methodologies, Tools, and
Applications, pp. 1784-1813, IGI Global.
Beverungen, D., Eggert, M., Voigt, M. and
Rosemann, M. 2014. Augmenting Analytical
CRM Strategies with Social BI. Digital Arts
and Entertainment: Concepts, Methodologies,
39
Tools, and Applications, pp. 558-576, IGI
Global.
Bjurstrom, S. and Plachkinova, M. 2015.
Sentiment Analysis Methodology for Social
Web Intelligence.
Bygstad, B. and Presthus, W. 2013. Social Media
as CRM? How two airline companies used
Facebook during the “Ash Crisis” in
2010. Scandinavian Journal of Information
Systems, 25(1), 3.
Castellanos, M., Dayal, U., Hsu, M., Ghosh, R.,
Dekhil, M., Lu, Y., … & Schreiman, M. 2011.
LCI: a social channel analysis platform for live
customer intelligence. In Proceedings of the
2011 ACM SIGMOD International Conference
on Management of data (pp. 1049-1058). ACM.
Chan, H.K., Wang, X., Lacka, E. and Zhang, M.
2015. A Mixed-Method Approach to Extracting
the Value of Social Media Data. Production
and Operations Management.
Chaudhuri, S., Dayal, U. and Narasayya, V. 2011.
An overview of business intelligence
technology. Communications of the ACM,
54(8), 88-98.
Chen, H., Chiang, R.H. and Storey, V.C. 2012.
Business intelligence and analytics: From big
data to big impact. MIS quarterly, 36(4), 1165-
1188. ISO 690
Chilhare, Y.R., Londhe, D.D. and Competiti, E.M.
2016. Competitive Analytics Framework on
Bilingual Da Bilingual Dataset of Amazon
Food Product. IJCTA, 9(21), pp. 179-189.
Chung, W., Zeng, D. and O’Hanlon, N. 2014.
Identifying influential users in social media: A
study of US immigration reform. In:
Proceedings of the 20th Americas Conference on
Information Systems, Savannah, 2014.
Colombo, C., Grech, J.P. and Pace, G.J. 2015. A
controlled natural language for business
intelligence monitoring. Lecture Notes in
Computer Science (including subseries
Lecture Notes in Artificial Intelligence and
Lecture Notes in Bioinformatics), 9103, pp.
300-306.
Dey, L., Haque, S.M., Khurdiya, A. and Shroff, G.
2011. Acquiring competitive intelligence from
social media. In: Proceedings of the 2011 joint
workshop on multilingual OCR and analytics
for noisy unstructured text data, p. 3. ACM.
Diamantopoulou, V., Charalabidis, Y., Loukis, E.,
Triantafillou, A., Sebou, G. Foley, P., Deluca,
A., Wiseman, I. and Koutzeris, T. 2010.
Categorization of Web 2.0 Social Media and
Stakeholder Characteristics. Nomad Project.
EU. pp.19. Available at:
http://www.padgets.eu/Downloads/Deliverabl
es/tabid/75/ctl/Versions/mid/623/Itemid/56/De
fault.aspx [Accessed 2 March 2017]
Dinter, B. and Lorenz, A. 2012. Social business
intelligence: a literature review and research
agenda. In: Proceedings of the 33rd
International Conference on Information
Systems, Orlando 2012.
Fan, S., Lau, R.Y. and Zhao, J.L. 2015.
Demystifying big data analytics for business
intelligence through the lens of marketing
mix. Big Data Research, 2(1), 28-32.
Ferrara, E., De Meo, P., Fiumara, G. and
Baumgartner, R. 2014. Web data extraction,
applications and techniques: A
survey. Knowledge-Based Systems, 70, 301-
323.
Fourati-Jamoussi, F. 2015. E-reputation: A case
study of organic cosmetics in social media. In:
Proceedings of the Information Systems and
Economic Intelligence (SIIE) 6th International
Conference, pp. 125-132, IEEE.
Gallinucci, E., Golfarelli, M. and Rizzi, S. 2013.
Meta-stars: multidimensional modeling for
social business intelligence. In: Proceedings of
the 16th international workshop on Data
warehousing and OLAP, pp. 11-18, ACM.
Gallinucci, E., Golfarelli, M., & Rizzi, S. 2015.
Advanced topic modeling for social business
intelligence. Information Systems, 53, 87-106.
Golfarelli, M. 2014. Social business intelligence:
OLAP applied to user generated contents. In:
Proceedings of the e-Business (ICE-B) 11th
International Conference, pp. IS-11, IEEE.
Golfarelli, M. 2015. Design Issues in Social
Business Intelligence Projects. In European
Business Intelligence Summer School (pp. 62-
86). Springer International Publishing.
Gronroos, C. 2008. Service logic revisited: Who
creates value? And who co-creates? European
Business Review, Vol. 20, No. 4, pp. 298–314.
Hart C. 1998. Doing a Literature Review. Sage
Publications, London
He, W., Tian, X., Chen, Y. and Chong, D. 2016.
Actionable social media competitive analytics
for understanding customer
experiences. Journal of Computer Information
Systems, 56(2), 145-155.
40
Heijnen, J., De Reuver, M., Bouwman, H.,
Warnier, M. and Horlings, H. 2013. Social
media data relevant for measuring key
performance indicators? A content analysis
approach. In: Proceedings of the International
Conference on Electronic Commerce, pp. 74-84,
Springer Berlin Heidelberg.
Jingjing, W., Changhong, T., Xiangwen, L. and
Guolong, C. 2013. Mining Social Influence in
Microblogging via Tensor Factorization
Approach. In: Proceedings of Cloud
Computing and Big Data (CloudCom-Asia),
December 2013 International Conference, pp.
583-591, IEEE.
Kaplan, A. M. and Haenlein, M. 2010. Users of
the world, unite! The challenges and
opportunities of Social Media. Business
horizons, 53(1), 59-68.
Keele, S. 2007. Guidelines for performing
systematic literature reviews in software
engineering. In Technical report, Ver. 2.3
EBSE Technical Report. EBSE.
Kim, Y. and Jeong, S. R. 2015. Opinion-Mining
Methodology for Social Media
Analytics. TIIS, 9(1), 391-406.
Kucher, K., Kerren, A., Paradis, C. and Sahlgren,
M. 2014. Visual analysis of stance markers in
online social media. In: Proceedings of Visual
Analytics Science and Technology (VAST),
2014 IEEE Conference, pp. 259-260, IEEE.
Kucher, K., Schamp-Bjerede, T., Kerren, A.,
Paradis, C. and Sahlgren, M. 2016. Visual
analysis of online social media to open up the
investigation of stance
phenomena. Information Visualization, 15(2),
93-116.
Kulkarni, A. V., Joseph, S., Raman, R., Bharathi,
V., Goswami, A. and Kelkar, B. 2013. Blog
Content and User Engagement-An Insight
Using Statistical Analysis. International
Journal of Engineering and Technology, 5(3),
pp. 2719-2733.
Lee, C., Wu, C., Wen, W. and Yang, H. 2013.
Construction of an event ontology model using
a stream mining approach on social media. In:
Proceedings of the 28th International
Conference on Computers and Their
Applications, 2013, CATA 2013, pp.249-254.
Lin, Z. and Goh, K. Y. 2011. Measuring the
business value of online social media content
for marketers. In: Proceedings of the 32nd
International Conference on Information
Systems, Shanghai.
Liu, S., Wang, S. and Zhu, F. 2015. Structured
learning from heterogeneous behavior for
social identity linkage. IEEE Transactions on
Knowledge and Data Engineering, 27(7), 2005-
2019.
Liu, S., Wang, S., Zhu, F., Zhang, J. and
Krishnan, R. 2014. Hydra: Large-scale social
identity linkage via heterogeneous behavior
modeling. In: Proceedings of the 2014 ACM
SIGMOD international conference on
Management of data, pp. 51-62, ACM.
Liu, X. and Yang, J. 2012. Social buying met
network modeling and analysis. International
Journal of Services Technology and
Management, 18 (1- 2), 46-60.
Lotfy, A., El Tazi, N and El Gamal, N. 2016. SCI-
F: Social-Corporate Data Integration
Framework. In: Proceedings of the 20th
International Database Engineering &
Applications Symposium, June 2016, pp. 328-
333, ACM.
Lu, Y., Wang, F. and Maciejewski, R. 2014.
Business intelligence from social media: A
study from the vast box office challenge. IEEE
computer graphics and applications, 34(5), 58-
69.
Luhn, H. P. 1958. A business intelligence system.
IBM Journal of Research and Development,
2,14-31
Luo, J., Pan, X. and Zhu, X. 2015. Identifying
digital traces for business marketing through
topic probabilistic model. Technology Analysis
& Strategic Management, 27(10), 1176-1192.
Marine-Roig, E., & Clavé, S. A. 2015. Tourism
analytics with massive user-generated
content: A case study of Barcelona. Journal of
Destination Marketing & Management, 4(3),
162-172.
McKinsey and Altagamma 2015. Digital inside:
Get wired for the ultimate luxury experience.
Available at:
https://www.mckinsey.de/files/dle-2015-
global-report [Accessed 5 March 2017]
Meredith, R. and O’Donnell, P. A. 2010. A
Functional Model of Social Media and its
Application to Business Intelligence. In:
Proceedings of the 2010 conference on Bridging
the Socio-technical Gap in Decision Support
Systems: Challenges for the Next Decade,
41
August 2010, pp. 129-140, IOS Press,
Netherlands.
Meredith, R. and O’Donnell, P. A. 2011. A
framework for understanding the role of social
media in business intelligence
systems. Journal of Decision Systems, 20(3),
263-282.
Milolidakis, G., Akoumianakis, D. and Kimble, C.
2014. Digital traces for business intelligence:
A case study of mobile telecoms service brands
in Greece. Journal of Enterprise Information
Management, 27(1), 66-98.
Moedeen, B. W. and Jeerooburkhan, A.S. 2016.
Evaluating the strategic role of Social Media
Analytics to gain business intelligence in
Higher Education Institutions. In:
Proceedings of Emerging Technologies and
Innovative Business Practices for the
Transformation of Societies (EmergiTech),
IEEE International Conference, pp. 303-308.
Ngo-Ye, T. L. and Sinha, A.P. 2012. Analyzing
online review helpfulness using a regressional
ReliefF-enhanced text mining method. ACM
Transactions on Management Information
Systems (TMIS), 3(2), 10.
Nithya, R. and Maheswari, D. 2016. Correlation
of feature score to overall sentiment score for
identifying the promising features. In:
Proceedings of Computer Communication and
Informatics (ICCCI) International Conference,
January 2016, pp. 1-5, IEEE.
O’Leary, D. E. 2015. Twitter Mining for
Discovery, Prediction and Causality:
Applications and Methodologies. Intelligent
Systems in Accounting, Finance and
Management, 22(3), 227-247.
Obradović, D., Baumann, S. and Dengel, A. 2013.
A social network analysis and mining
methodology for the monitoring of specific
domains in the blogosphere. Social Network
Analysis and Mining, 3(2), 221-232.
Olszak, C.M. 2016. Toward better understanding
and use of Business Intelligence in
organizations. Information Systems
Management, 33(2), 105-123.
Palacios-Marqués, D., Merigó, J. M. and Soto-
Acosta, P. 2015. Online social networks as an
enabler of innovation in
organizations. Management Decision, 53(9),
1906-1920.
Petychakis, M., Biliri, E., Arvanitakis, A.,
Michalitsi-Psarrou, A., Kokkinakos, P.,
Lampathaki, F. and Askounis, D. 2016.
Detecting Influencing Behaviour for Product-
Service Design through Big Data Intelligence
in Manufacturing. In: Proceedings of Working
Conference on Virtual Enterprises, pp. 361-
369, Springer International Publishing.
Piccialli, F. and Jung, J. E. 2016. Understanding
Customer Experience Diffusion on Social
Networking Services by Big Data
Analytics. Mobile Networks and Applications,
1-8.
Ponis, S. T., & Christou, I. T. 2013. Competitive
intelligence for SMEs: a web-based decision
support system. International Journal of
Business Information Systems, 12(3), 243-
258.
Pu, J., Teng, Z., Gong, R., Wen, C. and Xu, Y.
2016. Sci-Fin: Visual Mining Spatial and
Temporal Behavior Features from Social
Media. Sensors, 16(12), 2194.
Qazi, A., Raj, R.G., Tahir, M., Cambria, E. and
Syed, K.B.S. 2014. Enhancing business
intelligence by means of suggestive
reviews. The Scientific World Journal, 2014.
Ram, J., Zhang, C. and Koronios, A. 2016. The
Implications of Big Data Analytics on
Business Intelligence: A Qualitative Study in
China. Procedia Computer Science, 87, 221-
226.
Ranjan, J. 2009. Business intelligence: Concepts,
components, techniques and benefits. Journal
of Theoretical and Applied Information
Technology, 9(1), 60-70.
Ranjan, R., Vyas, D. and Guntoju, D. P. 2014.
Balancing the trade-off between privacy and
profitability in Social Media using NMSANT.
In: Proceedings of Advance Computing
Conference (IACC), 2014 IEEE International,
pp. 477-483, IEEE.
Rosemann, M., Eggert, M., Voigt, M. and
Beverungen, D. 2012. Leveraging social
network data for analytical CRM strategies:
the introduction of social BI. In: Proceedings of
the 20th European Conference on Information
Systems (ECIS) 2012, AIS Electronic Library
(AISeL).
Ruhi, U. 2014. Social Media Analytics as a
business intelligence practice: current
landscape & future prospects. Journal of
Internet Social Networking & Virtual
Communities, 2014.
42
Rui, H., & Whinston, A. 2011. Designing a social-
broadcasting-based business intelligence
system. ACM Transactions on Management
Information Systems (TMIS), 2(4), 22.
Sathyanarayana, P., Tran, P.N.K., Meredith, R.
and O’Donnell, P. A. 2012. Towards a Protocol
to Measure the Social Media Affordances of
Web Sites and Business Intelligence
Systems. DSS, pp. 317-322.
Seebach, C., Beck, R. and Denisova, O. 2012.
Sensing Social Media for Corporate
Reputation Management: a Business Agility
Perspective. ECIS, p. 140.
Shroff, G., Agarwal, P. and Dey, L. 2011.
Enterprise information fusion for real-time
business intelligence. In: Proceedings of the
14th International Conference, Information
Fusion (FUSION), pp. 1-8, IEEE.
Sigman, B. P., Garr, W., Pongsajapan, R.,
Selvanadin, M., McWilliams, M. and Bolling,
K. 2016. Visualization of Twitter Data in the
Classroom. Decision Sciences Journal of
Innovative Education, 14(4), 362-381.
Sijtsma, B., Qvarfordt, P. and Chen, F. 2016.
Tweetviz: Visualizing Tweets for Business
Intelligence. In: Proceedings of the 39th
International ACM SIGIR conference on
Research and Development in Information
Retrieval, July 2016, pp. 1153-1156, ACM.
Sleem-Amer, M., Bigorgne, I., Brizard, S., Dos
Santos, L.D.P., El Bouhairi, Y., Goujon, B. and
Varga, L. 2012. Intelligent semantic search
engines for opinion and sentiment mining.
Next Generation Search Engines: Advanced
Models for Information Retrieval, pp. 191-215,
IGI Global.
Tayouri, D. 2015. The Human Factor in the Social
Media Security–Combining Education and
Technology to Reduce Social Engineering
Risks and Damages. Procedia
Manufacturing, 3, 1096-1100.
Tziralis, G., Vagenas, G., & Ponis, S. 2009.
Prediction markets, an emerging Web 2.0
business model: towards the competitive
intelligent enterprise. In Web 2.0 (pp. 1-21).
Springer, Boston, MA.
Wen, C., Teng, Z., Chen, J., Wu, Y., Gong, R. and
Pu, J. 2016. socialRadius: Visual Exploration
of User Check-in Behavior Based on Social
Media Data. In: Proceedings of
the International Conference on Cooperative
Design, October 2016, Visualization and
Engineering, pp. 300-308, Springer
International Publishing.
Wongthongtham, P., & Abu-Salih, B. 2015.
Ontology and trust based data warehouse in
new generation of business intelligence: State-
of-the-art, challenges, and opportunities. In
Industrial Informatics (INDIN), 2015 IEEE
13th International Conference on (pp. 476-
483). IEEE.
Wu, Y., Liu, S., Yan, K., Liu, M. and Wu, F. 2014.
Opinionflow: Visual analysis of opinion
diffusion on social media. IEEE Transactions
on Visualization and Computer
Graphics, 20(12), 1763-1772.
Yang, C. S. and Shih, H. P. 2012. A Rule-Based
Approach for Effective Sentiment Analysis.
PACIS, p. 181).
Yang, C.S. and Chang, P.C. 2015. Mining Social
Media for Enhancing Personalized Document
Clustering. In: Proceedings of
the International Conference on HCI in
Business, pp. 185-196, Springer International
Publishing.
Yang, C.S. and Chen, L.C. 2014. Personalized
Recommendation in Social Media: a Profile
Expansion Approach. PACIS, p. 68.
Zeng, D., Chen, H., Lusch, R. and Li, S.H. 2010.
Social media analytics and intelligence. IEEE
Intelligent Systems, 25(6), 13-16.
Zhang, Z., Guo, C. and Goes, P. 2013. Product
comparison networks for competitive analysis
of online word-of-mouth. ACM Transactions
on Management Information Systems
(TMIS), 3(4), 20.
Zhang, Z., Li, X. and Chen, Y. 2012. Deciphering
word-of-mouth in social media: Text-based
metrics of consumer reviews. ACM
Transactions on Management Information
Systems (TMIS), 3(1), 5.
Zimmerman, C., & Vatrapu, R. 2015. The Social
Newsroom: Visual Analytics for Social
Business Intelligence. In: Proceedings of
the International Conference on Design Science
Research in Information Systems, pp. 386-390,
Springer International Publishing.
Zimmerman, C.J., Wessels, H.T. and Vatrapu, R.
2015. Building a social newsroom: Visual
analytics for social business intelligence. In:
Proceedings of the IEEE 19th International
Conference, Enterprise Distributed Object
Computing Workshop (EDOCW), pp. 160-163,
IEEE.
Copyright of Journal of Intelligence Studies in Business is the property of Adhou
Communications AB and its content may not be copied or emailed to multiple sites or posted
to a listserv without the copyright holder’s express written permission. However, users may
print, download, or email articles for individual use.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.