Abstract
The purpose of this qualitative study was to provide an insight into how small business enterprises from a South African township evaluated cloud business intelligence solutions and the challenges faced. The study found that despite limited knowledge in security evaluation and lack of easy-to-use techniques for small business enterprise, decision makers conducted basic and unsystematic evaluation of cloud business intelligence prior to adoption. Unsystematic security evaluation was mainly on data security, access control functionalities such as authentication, cloud service providers’ security, trust and reliability and financial risks. The study concluded that an easy-to-use security evaluation framework for cloud business intelligence solution tailored for small business enterprises was a necessity to overcome challenges among enterprises in South African townships in order to enhance good security practices when adopting cloud services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wise, L.: Evaluating business intelligence in the cloud (2016). http://www.cio.com/article/3041639/business-intelligence/evaluating-business-intelligence-in-the-cloud.html
Herwig, V., Friess, K.: Integrating business intelligence services in the cloud: a conceptual model. In: Khosrow-pour, M.H. (ed.) Business Intelligence: Concepts, Methodologies, Tools and Applications, pp. 572–584. IGC Global (2016)
Llave, M.R.: Business intelligence and analytics in small and medium-sized enterprises: a systematic literature review. Int. J. Bus. Intell. Res. 10(1), 19–41 (2019)
Moyo, M., Loock, M.: Small and medium-sized enterprises’ understanding of security evaluation of cloud-based business intelligence systems and its challenges. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J. (eds.) ISSA 2018. CCIS, vol. 973, pp. 133–148. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11407-7_10
Indriasari, E., Prabowo, H., Meyliana, K., Hidayanto, A.N.: Key benefits of cloud business intelligence: a systematic literature review. Int. J. Mech. Eng. Technol. 9(13), 819–831 (2018)
Patil, S.S., Chavan, R.: Cloud business intelligence: an empirical study. Stud. Indian Place Names UGC Care J. 27, 747–754 (2020)
Niekerk, B.V.: An analysis of cyber-incidents in South Africa. African J. Inf. Commun. 20(2017), 113–132 (2017)
IBM Security, Cost of a Data Breach Report 2020 (2020). https://www.ibm.com/security/digital-assets/cost-data-breach-report/
TechCentral, South Africa’s vulnerability to cyberattacks (2019). https://techcentral.co.za/south-africas-vulnerability-to-cyberattacks/90051/
Cloud Security Alliance, Cloud Computing Top Threats in 2016 (2016). http://oemhub.bitdefender.com/top-threats-to-securing-the-cloud
Elmalah, K., Nasr, M.: Cloud business intelligence. Int. J. Adv. Netw. Appl. 10(6), 4120–4124 (2019)
Alia, M., Khana, S., Vasilakos, A.: Security in cloud computing: Opportunities and challenges. Inf. Sci. (NY) 2015(305), 357–384 (2015)
Khan, N., Al-Yasiri, A.: Framework for cloud computing adoption: a roadmap for SMEs to cloud migration. Int. J. Cloud Comput. Serv. Archit. 5(56), 258–269 (2015)
Dresner, H.: Cloud Computing and Business Intelligence Market Study Licensed to Domo (2017). https://www.domo.com/blog/wp-content/uploads/2018/04/2018-Wisdom-of-Crowds-Cloud-Computing-BI-Market-Study-Licensed-to-Do.pdf
Encyclopedia.com, Security Evaluation (2020). https://www.encyclopedia.com/computing/dictionaries-thesauruses-pictures-and-press-releases/security-evaluation
Heyszl, J., SchĂĽtte, J.: Security Evaluation (2018). https://www.aisec.fraunhofer.de/en/fields-of-expertise/security-evaluation.html
Bradshaw, C., Atkinson, S., Doody, O.: Employing a qualitative description approach in health care. Res. Glob. Qual. Nurs. Res. 4(1–8) (2017)
Vasileiou, K., Barnett, J., Thorpe, S., Young, T.: Characterising and justifying sample size sufficiency in interview-based studies: systematic analysis of qualitative health research over a 15-year period. BMC Med. Res. Methodol. 18(148), 125–136 (2018)
Kaushik, V., Walsh, C.A.: Pragmatism as a research paradigm and its implications for Social Work research. Soc. Sci. 8(9) (2019)
Polit, D., Beck, T.: Nursing research, generating and assessing evidence for nursing practice, 10th edn. Lippincott Williams and Wilkins, Philadelphia (2017)
Clarke, V., Braun, V.: Teaching thematic analysis: overcoming challenges and developing strategies for effective learning. Psychology 26(2), 120–123 (2013)
Majhi, S.K., Dhal, S.K.: A study on security vulnerability on cloud platforms. Phys. Procedia 78(2016), 55–60 (2016)
Salim, S., Sedera, D., Sawang, S., Alarifi, A., Atapattu, M.: Moving from evaluation to trial: how do SMEs start adopting Cloud ERP? Australas. J. Inf. Syst. 2015(19), S219–S254 (2015)
Agostino, A., Soilen, S.K., Gerritsen, B.: Cloud solution in business intelligence for SMEs –vendor and customer perspectives. J. Intell. Stud. Bus. 3(2013), 5–28 (2013)
Bach, M.P., Celjo, A., Zoroja, J.: Technology acceptance model for business intelligence systems: preliminary research. Procedia Comput. Sci. 100(2016), 995–1001 (2016)
Cloud Industry Forum: 8 criteria to ensure you select the right cloud service provider (2019). https://www.cloudindustryforum.org/content/8-criteria-ensure-you-select-right-cloud-service-provider
Chaudhari, N., Al-Yasiri, A.: A cloud security approach for data at rest. Int. J. Cloud Comput. Serv. Archit. 5(1), 11–16 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Moyo, M., Loock, M. (2020). Evaluation of Cloud Business Intelligence Prior to Adoption: The Voice of Small Business Enterprises in a South African Township. In: Themistocleous, M., Papadaki, M., Kamal, M.M. (eds) Information Systems. EMCIS 2020. Lecture Notes in Business Information Processing, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-63396-7_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-63396-7_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63395-0
Online ISBN: 978-3-030-63396-7
eBook Packages: Computer ScienceComputer Science (R0)