{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:25:28Z","timestamp":1764174328841,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856706","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:16:34Z","timestamp":1487265394000},"page":"250-254","source":"Crossref","is-referenced-by-count":6,"title":["South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review"],"prefix":"10.1109","author":[{"given":"Moses","family":"Moyo","sequence":"first","affiliation":[]},{"given":"Marianne","family":"Loock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5539\/jms.v5n1p115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07863-2_60"},{"key":"ref12","first-page":"1","article-title":"Strategic Business Challenges in Cloud Systems","volume":"5","author":"vasista","year":"2015","journal-title":"Int J Cloud Comput Serv Archit"},{"article-title":"Cloud Security Risk Agreements for Small Businesses, Galois, Inc","year":"2011","author":"potoczny-jones","key":"ref13"},{"key":"ref14","first-page":"231","article-title":"Business Intelligence for Small and Middle-Sised Entreprise","volume":"39","author":"grabova","year":"2010","journal-title":"Special Interest Group Manage Data Rec"},{"key":"ref15","first-page":"25","article-title":"Critical Factors That Affect The Success Of Business Intelligence Systems (BIS) Implementation In An Organization","volume":"2","author":"sangar","year":"2013","journal-title":"Int J Sci Technol Res"},{"key":"ref16","first-page":"2206","article-title":"Reconstructing the giant: On the importance of rigour in documenting the literature search process","author":"vom-brocke","year":"2009","journal-title":"17th European Conference on Information Systems (ECIS 2009)"},{"article-title":"Global Entrepreneurship Monitor, South African Report","year":"0","author":"von broembsen","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4206"},{"journal-title":"Europian Networks and Information Security Agent ENISA","article-title":"Cloud Computing Benefits, risks and recommendations for information security","year":"0","key":"ref19"},{"key":"ref4","first-page":"234","article-title":"A maturity model for Business Intelligence System Project in Small and Medium-sized Enterprises: an empirical investigation","volume":"10","author":"fedouaki","year":"2013","journal-title":"Int J Comput Sci Issues"},{"key":"ref3","first-page":"12","article-title":"A Review on Data Security in Cloud Computing. International","volume":"94","author":"soofi","year":"2014","journal-title":"J Comput Appl"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15611\/ie.2014.3.04"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.scient.2011.11.011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.7763\/LNSE.2015.V3.175"},{"key":"ref7","first-page":"395","article-title":"Cloud Computing Technology-Optimal Solution for Efficient Use of Business Intelligence and Enterprise Resource Planning Applications","volume":"2013","author":"vatuiu","year":"2013","journal-title":"J Knowl Manag Econ Inf Technol"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4102\/sajim.v15i1.545"},{"key":"ref1","first-page":"16","article-title":"A research framework for the adoption of Business Intelligence by Small and Medium-sised enterprises","author":"boonsiritomachai","year":"2014","journal-title":"27th Annual SEAANZ Proceedings for Small Enterprise Associationof Australia and New Zealand Conference"},{"key":"ref9","first-page":"153","article-title":"Business Intelligence System in Banking Industry Case Study of Samam Bank of Iran. Software Engine","volume":"430","author":"marefati","year":"2012","journal-title":"Ering Res Manag Appl 2012 Stud Comput Intell"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-016-0054-z"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856706.pdf?arnumber=7856706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:37:28Z","timestamp":1488389848000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856706\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856706","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}