<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Business Intelligence Systems Optimization to Enable Better Self-Service Business Users</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Safwan Sulaiman</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jorge Marx Gómez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joachim Kurzhöfer</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Very Large Business Applications / University of Oldenburg</institution>
        </aff>
      </contrib-group>
      <fpage>35</fpage>
      <lpage>46</lpage>
      <abstract>
        <p>The success of the enterprise depends heavily on its decisions. Therefore, companies use Business Intelligence (BI) systems to support managers in their decision making process. However, the acceptance and usage of BI systems by end-users (business users) don't reach the expected goals. This is because of the high complexity and the irrelevance of delivered information. Business users can't use these systems to get the right information without relying on power users. The financial and time costs behind the communication between business and power users are high. The goal of this work is to develop a new BI architecture to reduce the complexity of using BI systems and optimize their usage by business users. The proposed solution offers suggestions to business users during their navigation in BI systems. Offering suggestions helps inexperienced business users in performing complex analysis. This is done by transferring the knowledge of power users to business users.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        2 Lufthansa Systems
The enterprises adopt Business Intelligence (BI) systems to assist the decision makers in
their decision making process. They don’t only assist this process, but also they ease and
improve the overall management decisions
        <xref ref-type="bibr" rid="ref14 ref5">(Laudon, Laudon, &amp; Schoder, 2010, p. 736)</xref>
        .
Nowadays, the demands for information as a production factor increase. Based on
        <xref ref-type="bibr" rid="ref5">(Chamoni &amp; Gluchowski, 2010, p. 4)</xref>
        , the reasons why these demands are inevitable include
that the internal and the external conditions of the current economic life are rapidly
changing and they are often very complex. According to
        <xref ref-type="bibr" rid="ref18">(Ranjan, 2009)</xref>
        , enterprises
consider information as their second important resource after their people. BI systems
provide enterprises with timely and accurate information, which allows them to make
decisions and react quickly on customer needs and market changes. Therefore, BI systems
promote the enterprises that apply them with superiority above their other counterparts.
        <xref ref-type="bibr" rid="ref3">(Bain &amp; Company, 2011)</xref>
        stated that the effective decision-making processes are the key
to the company’s success. In other words, the success of any enterprise depends heavily
on its decisions and BI systems, in this context, play an important role to support the
information-based decisions.
      </p>
      <p>
        In 2011, the report conducted by
        <xref ref-type="bibr" rid="ref7">(Gartner, 2012)</xref>
        shows the worldwide sales of BI
platforms, analytical applications and performance management software. The market
volume exceeded 12 billion U.S. dollars. Alone, the sales of BI platforms amounted to more
than 7.7 billion U.S. dollars, with an increase of 16.3% in 2011. According to this
CIOsurvey, the important reasons for this strong growth is that BI and analytical systems have
the highest priority for CIOs
        <xref ref-type="bibr" rid="ref7">(Gartner, 2012)</xref>
        .
      </p>
      <p>
        However, the wide applications of BI systems in enterprises have still some drawbacks
and don’t fully meet the requirements of their utilization. Due to the high complexity and
irrelevance of the supplied information, less than 30% of potential users can fully benefit
from BI systems
        <xref ref-type="bibr" rid="ref13">(Kurzlechner, 2011)</xref>
        . Moreover, despite the large investments in BI
systems,
        <xref ref-type="bibr" rid="ref19 ref5">(Schmaltz, 2010, p. 2)</xref>
        shows in his dissertation that acceptance and usage of BI
systems do not often reach the expected results. Additionally, the willingness today of the
decision makers to attend advanced trainings for complex BI systems is very low
        <xref ref-type="bibr" rid="ref11">(Knopf
&amp; Wortmann, 2011)</xref>
        .
      </p>
      <p>This paper suggests a new approach to optimize the usage of BI systems for wide variety
of users based on transferring the knowledge from the skilled users to those who are less
experienced. This is done by applying tracing methods on the skilled users to extract their
analysis paths, which are used afterwards as recommendation to the less experienced
ones.</p>
      <p>The next section of this paper lists the basic foundations that are necessary to make the
clear distinction of BI users and applications. Section 3 states the problem that the
research behind this paper addresses. The followed research methodology is then explained
in the fourth section. Details of the suggested approach are then explained in section 5. A
list of related works to the proposed approach is then placed in section 6. Finally, section
7 concludes the main ideas presented in this paper and shows the potential future
directions that can be derived from this research.</p>
    </sec>
    <sec id="sec-2">
      <title>Basic Foundations</title>
      <p>In order to have a common understanding of the used terms in this paper, the following
two sections clarify the types of BI users, provide a classification of BI applications and
explain the complexity of their usage.</p>
      <sec id="sec-2-1">
        <title>2.1 Users of the BI Systems</title>
        <p>
          In the literature, there are several contributions to classify BI users. On the one hand,
          <xref ref-type="bibr" rid="ref8">(Gluchowski, Gabriel, &amp; Dittmar, 2008, pp. 105 – 107)</xref>
          identified three user groups from
the usage of BI systems perspective. These groups are information consumers, analysts
and specialists. On the other hand,
          <xref ref-type="bibr" rid="ref11">(Knopf &amp; Wortmann, 2011, p. 29)</xref>
          distinguished three
different user profiles based on their abilities of using BI systems. These profiles are user,
power user and analyst. Finally, based on style of interacting with information for
decision making,
          <xref ref-type="bibr" rid="ref6">(Eckerson, 2011)</xref>
          classified BI users into power users and casual users. This
paper tries to make a consensus among the aforementioned classifications of BI users.
Thereby, two factors are taken into account to classify BI users. These factors are the user
ability of using BI systems and the user’s informative behavior1. Accordingly, two types
of BI users are identified:
1. Power Users or Information Producers: These are business analysts, analytical
modelers and IT professionals. They have the ability to generate reports, analyze
data and perform flexible navigation options in the multidimensional data
models
          <xref ref-type="bibr" rid="ref8">(Gluchowski et al., 2008, p. 106)</xref>
          . Such users are considered as information
producers and they generate information that can be used either for their own
decision or for the decisions of business users.
2. Business Users or Information Consumers: These are executives, managers and
operations staff. They are considered more as information consumers. The main
source of their information is the information provided by the power users. They
consume this information to make their decisions. Furthermore, these users can
only use the predefined standard reports or dashboards that don’t require any
technological or methodological knowledge.
        </p>
        <p>The main argument behind the aforementioned classification of BI Users is that the issues
that are researched in this work are directly or indirectly related either to the power or to
the business users. Based on that, we will propose an approach to transfer the power
users’ knowledge (skilled users) to the business users (unskilled users).
1 What is meant by user’s informative behavior is how BI user handles the information? The approach behind this
paper answers this question and classifies BI users as either information consumer or information producer.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2 Business Intelligence Tools</title>
        <p>
          This section gives short overview of the key BI tools. These tools cover a set of diverse
requirements for different sets of user groups. The different types of these BI tools
include scorecards/dashboards, ad-hoc reporting, complex analysis (OLAP) and data
mining. Figure 1 illustrates the relationship between the user’s analysis freedom degree and
the usage complexity of these BI tools.
          <xref ref-type="bibr" rid="ref4">(Bange, 2010)</xref>
          indicated that the application usage complexity grows with the analysis
freedom degree given to the user. Thus, business users can only use dashboards and
standard reports, since its usage complexity is relatively lower than other BI tools.
Consequently, business users are limited in their analysis freedom degree. In contrast to that,
power users have the ability to use the different kinds of BI tools with higher usage
complexity and more analysis freedom degree. Examples of such tools include complex
analysis (OLAP) and data mining.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Research Statement</title>
      <p>
        One of the main strategic business goals of any enterprise is to have a reliable reporting
platform in which quality data are provided for analysis and decision making purposes.
Having such platforms in production helps enterprises in overcoming traditional
challenges in data integration among heterogeneous information systems and in dealing with
data redundancy. Overcoming such challenges by the employment of one of these new
reporting platforms makes this latter more complex due to data and application
interdependencies
        <xref ref-type="bibr" rid="ref12">(Kulkarni, 2012)</xref>
        . As observed by
        <xref ref-type="bibr" rid="ref16">(Mertens &amp; Krahn, 2012)</xref>
        , the flexibility
and powerfulness of BI systems let business users still face significant difficulties in
carrying out ad-hoc analysis reports.
      </p>
      <p>Business users normally lack crucial information to take proper decisions while using BI
tools. This drawback comes from the missed or incomplete methodological and technical
knowledge in using these tools. To help business users to overcome such challenge, the
support of power users is needed in many cases. Figure 2 depicts the major
communications between a business user and a power user. If a business user needs support to
perform a specific task, which he can’t handle, he sends a request to the power user. In turn,
the power user processes the requests, however, with some time delay and then sends the
result back to business users.
Based on discussions with experts, managers, and industrial stakeholders we have
discovered different scenarios after performing the communications in the figure above. These
scenarios include:


</p>
      <p>Business users realize that the information sent by power users does not
exactly meet their expectations.</p>
      <p>Business users don’t understand some of the results’ values.</p>
      <p>Business users require additional information about a specific department or
organizational unit.</p>
      <p>It is noticed that in these three scenarios, business users in most cases should send again
new requests to the power users acquiring new information or asking for support to
provide more meaning for a subset of the information they received. Consequently, such
communication among business and power users can occur in a repeated manner or in
iterations and this creates considerable extra overhead from the power users.
These scenarios have been presented again to some experts, managers in the German
Lufthansa Systems company. The BI experts in this company stated that in every
department or organization unit, there are one or two power users, who are responsible of
supporting many business users. As a result, each power user will be overloaded with a large
number of requests coming from many business users.</p>
      <p>
        High Communication Costs
The above-described communications have high costs on enterprises. These costs can be
classified into the following two types:
 Time costs: Business user should always wait for processing his request by one of
the busy power users. On the one hand, it is always crucial for the managers to
get the information they need in the right time during the decision making
process
        <xref ref-type="bibr" rid="ref20">(Spahn, Kleb, Grimm, &amp; Scheidl, 2008)</xref>
        . On the other hand, power users
must interrupt their own work to process the requests of business users instead of
focusing on activities that are more valuable. Examples of such activities include
developing new applications, expanding data in data warehouses from existing
and new sources, improving data quality processing, or incorporating new
technologies to improve performance
        <xref ref-type="bibr" rid="ref10">(Imhoff &amp; White, 2011)</xref>
        .
 Financial costs: While the time runs, the value of any decision decreases. This
loss can be expressed in companies in term of money. Sales will be reduced, and
more cost in human resources or logistics will increase. Moreover, enterprises
need excessive number of power users to cover the large amount of business
users’ requests. Such situations make pressure on enterprises’ managers to increase
their IT budget accordingly.
      </p>
      <p>
        This kind of cost classification is just to clarify how different kinds of costs might arise.
At the end, every kind of costs is going to be paid in any enterprise in form of money.
Based on the previous discussion about the communication between business and power
users and the accompanying costs, enterprises need to react to such situation by reducing
the number of communications between their business and power users as much as
possible. This requires more innovative alternatives to the actual existing ones. The proposed
approach tries to overcome this challenge by minimizing the communication between
business and power users. This will indirectly decrease the costs by relying on the
harvested knowledge of the existing power users. Another added value in applying such new
approach is to provide business users with the information they need in a timely manner
and without having a direct connection with power users
        <xref ref-type="bibr" rid="ref20">(Spahn et al., 2008)</xref>
        . One of the
central requirements of business managers, as explained in
        <xref ref-type="bibr" rid="ref11">(Knopf &amp; Wortmann, 2011)</xref>
        ,
is the analysis flexibility. However, as discussed before in the second section of this
paper, this flexibility often leads to more usage complexity. Relying on the concepts and
ideas of self-service BI
        <xref ref-type="bibr" rid="ref10">(Imhoff &amp; White, 2011)</xref>
        , the proposed approach tries also to
encounter such situation by empowering business users with necessary knowledge to
perform their analysis and create their reports. The focus here is to move business users to a
higher layer in the BI’s analysis freedom degree (like OLAP in Figure 1). This is done by
promoting more self-service business users with minimal interactions with power users.
The major objective of this work is the conception and development of an enhanced BI
system in which the knowledge of power users is extracted and transferred to business
users. This new BI system should offer suggestions to business users to help them in their
analysis. This work will concentrate on OLAP as a complex analysis application2.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Research Methodology</title>
      <p>
        Our research follows the design science research, which has its roots in engineering
science. In contrast to behavioral science research that seeks to develop and justify theories
that explain human or organizational behavior, design science is fundamentally a
problem-solving paradigm. It seeks extending the boundaries of human and organizational
capabilities by creating new and innovative artifacts
        <xref ref-type="bibr" rid="ref9">(Hevner, March, Park, &amp; Ram,
2004)</xref>
        . Business Intelligence as a research field of Business Information Systems is
especially marked in Germany with a strong practical relevance as well as a design-oriented
research discipline
        <xref ref-type="bibr" rid="ref2">(Baars, 2011)</xref>
        .
      </p>
      <p>
        The boundary of our research will be explained based on the information systems
research framework of
        <xref ref-type="bibr" rid="ref9">(Hevner et al., 2004)</xref>
        . In this framework, the problem space is
defined in the environment, which includes people, organizations and their exiting and
planed technologies. In this context, both BI business and power users represent the
different roles of the people in any organization or enterprise that use BI systems as a
decision support technology. The business need, which is defined in Section 3, assures the
relevance of our research. Design science addresses research through the building and
evaluation of artifacts designed to meet the identified business needs. The enhanced
architecture of BI Systems is considered as the resulted artifact of the research. The
research rigor is achieved by appropriately applying foundations and methodologies from
the exiting knowledge base. To evaluate this artifact, the proposed architecture should be
implemented as a proof of the concept. The last phase is the evaluation of the results
prototypical implementation using some evaluation methods like the evaluation research
2 OLAP stands for Online Analytical Processing. It is widely used in enterprises as part of business intelligence
and data warehousing suits
        <xref ref-type="bibr" rid="ref5">(Chamoni &amp; Gluchowski, 2010, p. 199)</xref>
        .
method of (Österle et al., 2010). This phase is realized via discussions with BI experts
from different organizations.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Enhanced BI Architecture</title>
      <p>This section explains the proposed approach in details. The main idea is the conception
and development of a new architecture for BI systems. This architecture extends the
typical existing architectures. New components are added to implement new functionalities
that are not available in the existing architectures. Figure 3 illustrates the proposed
architecture of BI systems.
In the following, the main components of the depicted architecture and the main
interactions between them are described. Besides the typical BI architecture’s components:
source systems, ETL3, data warehouse, analysis tools and presentation layer the enhanced
architecture has the following new components:



</p>
      <p>Tracing System: This component is responsible of tracing the actions of the
power and business users while they use a BI system. The power user’s actions
should be stored in a proper storage medium like a database or log file. Two
important points must be taken into consideration in the design time of this
component. Firstly, after applying a proper observation on power users’ actions, what
are the criteria to select specific actions to extract the knowledge from power
users? Secondly, the representation of the actions in from of storage shall be
identified to enable the application of a proper knowledge extraction algorithm to
power users’ actions. This data representation includes basic information, such as
timestamp, unique identifier, and name or description of the action.</p>
      <p>Analysis System: This component applies a set of algorithms to the tracing data
collected by the tracing system. The output of these algorithms is specific
patterns that represent the knowledge of the power user (based on a predefined
business needs). Each pattern represents one analysis path 4 . In this way, the
knowledge of each power user can be collected after aggregating all his/her
possible analysis paths. To do so, the intention is to use time series analysis or to
develop new algorithms, if the result of the time series algorithms is not
appropriate.</p>
      <p>
        Power User Knowledge Repository: This component stores the power users’
analysis paths extracted by the analysis system. To enhance the quality of the
analysis paths, they should be classified into active or inactive analysis paths
based on their repetition. The analysis path is considered active, if the power user
repeats it for at least five times. Otherwise, the analysis path is considered
inactive and it will be ignored as long as it is not repeated more than five times.
Typical Domain Analysis Repository: This component is responsible of
providing recommendations to business users regarding a specific domain if the tracing
system component detects information related of such domain while the user
executes some actions in the BI tools. Typical domain example is the human
resources domain that includes information about salaries, training costs, travelling
costs, etc.
3 ETL stands for “Extraction, Transformation, and Loading”. The ETL process is the sequence of applications
that extract data sets from the various sources, bring them to a data staging area, apply a sequence of processes to
prepare the data for migration into the data warehouse, and actually load them
        <xref ref-type="bibr" rid="ref15">(Loshin, 2012)</xref>
        .
4 Analysis path in this paper represents a specific sequence of steps accomplished by the user while interacting
with a BI-System.
Recommendation Engine: This component has the responsibility of offering
suggestions to business users based on the stored actions in the power user’s
knowledge repository and typical domain analysis repository. This component
has an interface with the tracing system to get information about the last steps
done by the business user (the system consider now just the last three steps).
Then it compares these steps with the stored analysis paths in the power user’s
knowledge repository. The result of this comparison should lead to one analysis
path. Based on that, the recommendation system should offer the business user
suggestions following the found analysis path. These suggestions will help the
business user to advance in performing the analysis.
6
      </p>
    </sec>
    <sec id="sec-6">
      <title>Related Works</title>
      <p>
        It was explained in the article of
        <xref ref-type="bibr" rid="ref1">(Baars, 2006)</xref>
        how to distribute BI knowledge. The
analysis result and templates should be accessed from other users in the enterprise using
knowledge management systems. Analysis result can avoid the double works by the same
information need. Analysis template includes basic information that enables BI users
performing the analysis in any context. This approach has several technical and
organizational challenges. These include the requirement of combining different interfaces and
formats. However, this work lacks the need to motivate users to explain and distribute
her/his skills to the knowledge management system.
      </p>
      <p>
        The approach of
        <xref ref-type="bibr" rid="ref16">(Mertens &amp; Krahn, 2012)</xref>
        “Knowledge based business intelligence for
business user information self-service” is based on a semantic metadata layer which is
capable to import and manage modeled semantic metadata. The provided metadata is
supposed to be used for further analysis in order to allow the self-service business user.
This approach requires an explicit deriving and modeling of analysis and domain
knowledge of experts and power users. Then this knowledge has to be imported to the
Analytical Information System.
      </p>
      <p>Advantages of the proposed BI architecture over existing work:
The first advantage of our approach is the automatic extracting of power users’
knowledge in which the knowledge repository sub-system of the proposed architecture is
kept always up-to-date. This knowledge extraction process was done in some of other
related works like (Mertens et al.) in a manual manner. In addition, there will be minimal
dependencies among business and power users. The second advantage is the real time
offering of suggestions to business users. In many cases, business users are stuck in
processing complex analysis in BI tools and they are in a need for some aid by power users.
Embedding the knowledge of power users in the knowledge repository will enhance the
overall BI architecture to provide this knowledge in form of suggestions. This will
decrease the overhead on the power users and expose implicitly their knowledge to the
business users to perform complex analyses independently.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions and future work</title>
      <p>In this paper, the focus was to introduce a new BI architecture that enables business users
in getting information and performing complex analysis without interacting with power
users. This is done by extracting the knowledge of power users by applying tracing
method on their actions while using the BI tools. This knowledge is then offered, in from of
suggestions, to business users while they try to perform complex analysis.
In our future works, the provided suggestions to the business user will be evaluated.
Besides that, we will consider the issue of refining the proposed architecture. Moreover, as a
proof of concept, a prototype will be implemented to show the practicability of the overall
concept. For this purpose, we will concentrate on open Source BI systems to extend it to
conform to the objectives of this work.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Baars</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Distribution von Business-Intelligence-Wissen</article-title>
          . In Analytische Informationssysteme (pp.
          <fpage>409</fpage>
          -
          <lpage>424</lpage>
          ). Berlin: Springer.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Baars</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Impulse für die Forschung oder Impulse durch die Forschung: Entwicklungsperspektiven der BI-Forschung in Deutschland. Presented at the 3</article-title>
          . Workshop Business Intelligence der
          <string-name>
            <surname>GI-Fachgruppe</surname>
            <given-names>WI</given-names>
          </string-name>
          -BI.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Bain</surname>
          </string-name>
          &amp; Company. (
          <year>2011</year>
          ).
          <article-title>Effektive Entscheidungsprozesse sind Schlüssel für den Unternehmenserfolg</article-title>
          .
          <source>Retrieved July 17</source>
          ,
          <year>2012</year>
          , from http://www.process.vogel.de/management_und_it/branchen_maerkte/marktbarometer/articles/301345/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Bange</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Werkzeuge für analytische Informationssysteme</article-title>
          .
          <source>Analytische Informationssysteme</source>
          ,
          <volume>4</volume>
          ,
          <fpage>131</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Chamoni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gluchowski</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <source>Analytische Informationssysteme (4th ed.)</source>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Eckerson</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>The Secrets of Self-Service BI</article-title>
          . Wayne Eckerson - BeyeNETWORK. Retrieved from http://www.b-eyenetwork.com/blogs/eckerson/archives/2011/01/the_secrets_of.php
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Gartner.</surname>
          </string-name>
          (
          <year>2012</year>
          ).
          <source>Market Share: All Software Markets, Worldwide</source>
          ,
          <year>2011</year>
          . Gartner Business Intelligence Summit. Retrieved from http://www.gartner.com/it/page.jsp?id=
          <fpage>1971516</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Gluchowski</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , Gabriel,
          <string-name>
            <given-names>R.</given-names>
            , &amp;
            <surname>Dittmar</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Management Support Systeme und Business Intelligence (2nd ed</article-title>
          .). Berlin Heidelberg: Springer.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Hevner</surname>
            ,
            <given-names>A. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>March</surname>
          </string-name>
          , S. T.,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Design science in information systems research</article-title>
          .
          <source>Mis Quarterly</source>
          ,
          <volume>28</volume>
          (
          <issue>1</issue>
          ),
          <fpage>75</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Imhoff</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>White</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Self-Service Business Intelligence</article-title>
          .
          <source>TDWI Best Practices Report</source>
          , Third Quarter.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Knopf</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Wortmann</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Frontends für Führungskräfte - endlich zielgruppentauglich? Zeitschrift Hmd-Praxis Der Wirtschaftsinformatik</article-title>
          ,
          <volume>48</volume>
          ,
          <fpage>282</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Kulkarni</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Information Management: Embrace the Future of BI: Self Service</article-title>
          .
          <source>Retrieved August 9</source>
          ,
          <year>2012</year>
          , from http://license.icopyright.net/user/viewFreeUse.act?fuid=MTY0OTAyMjA=
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Kurzlechner</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>3 Ebenen der Konsumerisierung: Gartner: BI vor radikalem Wandel</article-title>
          .
          <source>Retrieved July 19</source>
          ,
          <year>2012</year>
          , from www.cio.de/knowledgecenter/bi/2283277/
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Laudon</surname>
            ,
            <given-names>K. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laudon</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Schoder</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Wirtschaftsinformatik: Eine Einführung</article-title>
          . Pearson Education.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Loshin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Business intelligence: the savvy manager's guide</article-title>
          . Morgan Kaufmann Pub.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Mertens</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Krahn</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Knowledge Based Business Intelligence for Business User Information Self-Service</article-title>
          . In S. Brüggemann &amp; C. d' Amato (Eds.),
          <article-title>Collaboration and the Semantic Web: Social Networks, Knowledge Networks, and Knowledge Resources (pp</article-title>
          .
          <fpage>271</fpage>
          -
          <lpage>296</lpage>
          ).
          <source>IGI Global.</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Österle</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Becker</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frank</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hess</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karagiannis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krcmar</surname>
          </string-name>
          , H., …
          <string-name>
            <surname>Sinz</surname>
            ,
            <given-names>E. J.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Memorandum on design-oriented information systems research</article-title>
          .
          <source>European Journal of Information Systems</source>
          ,
          <volume>20</volume>
          (
          <issue>1</issue>
          ),
          <fpage>7</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Ranjan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <source>Business Intelligence: Concepts</source>
          ,
          <article-title>Components, Techniques and Benefits</article-title>
          .
          <source>Journal of Theoretical and Applied Information Technology</source>
          ,
          <volume>9</volume>
          (
          <issue>1</issue>
          ),
          <fpage>60</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Schmaltz</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Methode zur Messung und Steigerung der individuellen Akzeptanz von Informationslogistik in Unternehmen (DISSERTATION)</article-title>
          .
          <source>Universität St. Gallen.</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Spahn</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kleb</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grimm</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Scheidl</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Supporting business intelligence by providing ontology-based end-user information self-service</article-title>
          .
          <source>In Proceedings of the First international Workshop on ontology-Supported Business intelligence</source>
          (p.
          <fpage>10</fpage>
          ). Retrieved from http://dl.acm.org/citation.cfm?id=
          <volume>1452567</volume>
          .
          <fpage>1452577</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>