{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T13:49:16Z","timestamp":1771854556834,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,7]],"date-time":"2013-10-07T00:00:00Z","timestamp":1381104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,7]]},"DOI":"10.1145\/2513456.2513502","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:09:20Z","timestamp":1380650960000},"page":"96-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A conceptual framework for delivering cost effective business intelligence solutions as a service"],"prefix":"10.1145","author":[{"given":"G. M.","family":"Muriithi","sequence":"first","affiliation":[{"name":"Central University of Technology, South Africa"}]},{"given":"J. E.","family":"Kotz\u00e9","sequence":"additional","affiliation":[{"name":"University of the Free State, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2013,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Second Edition","author":"Kimball R","year":"2002"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"39","article-title":"Combining business intelligence with cloud computing to delivery agility in actual economy","volume":"45","author":"Mircea M.","year":"2011","journal-title":"Journal of Economic Computation and Economic Cybernetics Studies"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Mell P. & Grance T. (2011). The NIST definition of cloud computing (draft). NIST special publication 800 145.   Mell P. & Grance T. (2011). The NIST definition of cloud computing (draft). NIST special publication 800 145.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_3_2_1_4_1","unstructured":"Wierschem D. McMillen J. and McBroom R.(2003). What Academia Can Gain from Building a Data Warehouse Educause Quarterly Volume 1 2003  Wierschem D. McMillen J. and McBroom R.(2003). What Academia Can Gain from Building a Data Warehouse Educause Quarterly Volume 1 2003"},{"key":"e_1_3_2_1_5_1","unstructured":"Council for Higher Education (CHE)(2009). The State of Higher Education in South Africa Higher Education Monitor No. 8  Council for Higher Education (CHE)(2009). The State of Higher Education in South Africa Higher Education Monitor No. 8"},{"key":"e_1_3_2_1_6_1","unstructured":"Steyn A. G. W. and De Villiers A. P.(2005). Public Funding of Higher Education in South Africa by Means of Formulae. Council for Higher Education.  Steyn A. G. W. and De Villiers A. P.(2005). Public Funding of Higher Education in South Africa by Means of Formulae. Council for Higher Education."},{"key":"e_1_3_2_1_7_1","unstructured":"ITWeb (2012). Oracle BI Survey 2012. Available online: http:\/\/www.itweb.co.za\/index.php?option=com_content&view=article&id=59643  ITWeb (2012). Oracle BI Survey 2012. Available online: http:\/\/www.itweb.co.za\/index.php?option=com_content&view=article&id=59643"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2011.541"},{"key":"e_1_3_2_1_9_1","volume-title":"PACIS 2010 Proceedings. Paper 145","author":"Baars","year":"2010"},{"key":"e_1_3_2_1_10_1","volume-title":"Int. CMG Conference (pp. 407--414)","author":"Menasc\u00e9 D. A.","year":"2005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/248603.248616"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.006"},{"key":"e_1_3_2_1_13_1","unstructured":"Forrester Research(2010) www.forrester.com\/  Forrester Research(2010) www.forrester.com\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Cloud Security Alliance(2009) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 Retrieved on https:\/\/cloudsecurityalliance.org\/csaguide.pdf  Cloud Security Alliance(2009) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 Retrieved on https:\/\/cloudsecurityalliance.org\/csaguide.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2012.79"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"35","article-title":"Using the analytic hierarchy process for decision making in engineering applications: some challenges","volume":"2","author":"Triantaphyllou E.","year":"1995","journal-title":"International Journal of Industrial Engineering: Applications and Practice"},{"key":"e_1_3_2_1_17_1","volume-title":"AMCIS 2012 Proceedings.","author":"Lee Y. C.","year":"2013"},{"key":"e_1_3_2_1_18_1","unstructured":"Bichsel J. (2012). Analytics in Higher Education: Benefits Barriers Progress and Recommendations. EDUCAUSE Center for Applied Research.  Bichsel J. (2012). Analytics in Higher Education: Benefits Barriers Progress and Recommendations . EDUCAUSE Center for Applied Research."},{"key":"e_1_3_2_1_19_1","unstructured":"South Africa Research Network (SANReN) Implementation status (2013). http:\/\/www.sanren.ac.za\/overview\/  South Africa Research Network (SANReN) Implementation status (2013). http:\/\/www.sanren.ac.za\/overview\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Muriithi G. M. & Kotze J. E. (2012). Cloud Computing in Higher Education: Implications for South African Public Universities and FET Colleges. PROCEEDINGS OF THE 14th ANNUAL CONFERENCE ON WORLD WIDE WEB APPLICATIONS Durban South Africa.  Muriithi G. M. & Kotze J. E. (2012). Cloud Computing in Higher Education: Implications for South African Public Universities and FET Colleges. PROCEEDINGS OF THE 14th ANNUAL CONFERENCE ON WORLD WIDE WEB APPLICATIONS Durban South Africa."},{"key":"e_1_3_2_1_21_1","unstructured":"Ponelis S. R. & Britz J. J. (2013). A descriptive framework of business intelligence derived from definitions by academics practitioners and vendors.  Ponelis S. R. & Britz J. J. (2013). A descriptive framework of business intelligence derived from definitions by academics practitioners and vendors."},{"key":"e_1_3_2_1_22_1","unstructured":"Inmon W. H. (1996). Building the data warehouse. John Whiley & Sons: New York.   Inmon W. H. (1996). Building the data warehouse. John Whiley & Sons: New York ."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978542.1978562"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1072"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_26_1","unstructured":"Eckerson W.(2009). Implementing BI in the Cloud. The Data Warehousing Institute (TDWI).  Eckerson W.(2009). Implementing BI in the Cloud. The Data Warehousing Institute (TDWI)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951432"},{"key":"e_1_3_2_1_28_1","unstructured":"Chong F. Carraro G. & Wolter R. (2006). Multi-tenant data architecture. MSDN Library Microsoft Corporation.  Chong F. Carraro G. & Wolter R. (2006). Multi-tenant data architecture. MSDN Library Microsoft Corporation ."}],"event":{"name":"SAICSIT '13: 2013 South African Institute for Computer Scientists and Information Technologists","location":"East London South Africa","acronym":"SAICSIT '13","sponsor":["Amazon Amazon.com","Rhodes Univ. Rhodes University","IBM IBM"]},"container-title":["Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513456.2513502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2513456.2513502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:54Z","timestamp":1750231734000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513456.2513502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,7]]},"references-count":28,"alternative-id":["10.1145\/2513456.2513502","10.1145\/2513456"],"URL":"https:\/\/doi.org\/10.1145\/2513456.2513502","relation":{},"subject":[],"published":{"date-parts":[[2013,10,7]]},"assertion":[{"value":"2013-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}