样式: 排序: IF: - GO 导出 标记为已读
-
Assessing the Impact of Accounting Analytic Capabilities on Firm Performance J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-03-15 Ashish Varma, Anuj Sharma
This study establishes the relevance of accounting analytic capabilities (AAC) as a predictor of firm performance (FP) in a controlled environment characterized by strong informal controls (IC) and...
-
Sustainability Affected by ICT Adoption in Enterprises J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-02-23 Ewa Wanda Ziemba, Dariusz Grabara
While the potential of Information and Communication Technology (ICT) to enhance sustainable development is recognized, research on its contribution to sustainability remains fragmented. This study...
-
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-02-16 Surbhi Choudhary, Neeraj Kaushik, Brijesh Sivathanu, Nripendra P. Rana
The study aims to assess the factors that engage and accentuate usage pertaining to consumers with artificial intelligence-based voice assistants. Drawing on the Behavioral Reasoning Theory (BRT), ...
-
The Impacts of Traceability Systems on Consumer Trust J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-02-15 Tri Lam, Jon Heales, Nicole Hartley
The question of how the quality of traceability information using traceability systems contributes to consumer trust is of interest to scholars and practitioners. Commitment-trust theory was used t...
-
Relating Technostress and Turnover Intention: A Three-Wave Study J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-02-14 Yuanjie Bao, Xiuzhi Zhang, Min Hua
Based on the Job Demand-Resource theory, this study explores the relationship between technostress and turnover intention focusing on the mediating role of work engagement and the moderating role o...
-
Risk Assessment on Green Supply Chains in Manufacturing J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-02-09 Weibin Wang, Jonah Ji, Caihong Liu, June Wei
A green manufacturing supply chain can improve ecological environments and resource utilization in enterprises. The objective of this paper is to assess green supply chain (GSC) risks in manufactur...
-
Correction J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-02-08
Published in Journal of Computer Information Systems (Ahead of Print, 2024)
-
How to Support Health Care Professionals in Emergencies J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-30 Bowen Zheng, Xiaodie Pu, Alain Yee Loong Chong, Zhao Cai
In recurring emergencies, frontline health care professionals (HCPs) have taken on a dual responsibility of not only serving as medical professionals for patients but also disseminating medical kno...
-
Machine Learning Ensures Quantum-Safe Blockchain Availability J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-31 Jongho Seol, Jongyeop Kim
This study explores quantum computing and blockchain, focusing on quantum-safe algorithms. As quantum computing progresses, it threatens blockchain cryptography, necessitating quantum-resistant/saf...
-
Understanding the Motivations for Continuance Usage of Mobile Apps J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-19 Rodrigo Correia, Carlos Tam
The evolution of mobile technology has contributed to the growth seen in mobile applications (m-apps) usage. Since businesses have accelerated their development of mobile platforms for their servic...
-
Hotspots and Prospects of Metaverse: An International Comparison J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-19 Yan Chen, Chaonan Wu, RuiQian Zhang
The metaverse, a revolutionary concept shaping the future of the Internet, has aroused concern and discussion among governments, the business sector, and ordinary netizens. While there is abundant ...
-
The Role of AI in Financial Services: A Bibliometric Analysis J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-19 Oluwafemi Ayotunde Oke, Nadire Cavus
Financial Services (FS) and its integration of Artificial Intelligence (AI) has led to an improvement in various aspects of the field, such as fraud detection, investment performance, and risk mana...
-
Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-08 Jerald K. Hughes, Juan A. Chavarría, Francis K. Andoh-Baidoo
IS researchers’ interest in interdisciplinary research is strong, given the widespread use of IT across disciplines. IS researchers have challenges identifying topics in the IS literature that offe...
-
Exploring the Connections: Ambidexterity, Digital Capabilities, Resilience, and Behavioral Innovation J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-09 Pedro M. Veiga, João J. Ferreira, Justin Z. Zhang, Yulong (David) Liu
This study investigates the impact of pre-COVID-19 organizational ambidexterity, digital capabilities, and organizational resilience on firms’ innovation behavior post the second COVID-19 wave. Uti...
-
Dual Routes of Training on Information Security Policy Compliance J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-05 Qiuyu Chen, Yuxiang Hong
This study aims to explore the mechanisms by which training influences employees’ information security policy compliance (ISPC) through the mediating roles of compliance knowledge and social pressu...
-
Recommendation and Distillation of IoT Multi-Environments J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2024-01-04 Daniel Flores-Martin, Rubén Rentero-Trejo, Jaime Galán-Jiménez, José García-Alonso, Javier Berrocal, Juan M. Murillo Rodríguez
The Internet of Things enhances the quality of life by automating tasks and streamlining human-device interactions. However, manual device management remains time-consuming, especially in multiple ...
-
Mobile Operating Systems’ Impact on Customer Value: IOS vs. Android J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-22 Jiyao Xun, Woon Kian Chong, Les Dolega
Amidst the growing focus on media engagement and customer value in retail marketing literature, mobile commerce (MC) research has gained prominence. This research explores how customers employ mobi...
-
Network Embeddedness and Company Competitiveness J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-22 Marcin Soniewicki, Aleksandra Hauke-Lopes
The purpose of the paper is to create a research model which analyses the impact of companies’ network embeddedness on their competitiveness through the lenses of knowledge cooperation in the netwo...
-
Client Peripheral Knowledge and Outsourcing Project Outcomes J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-21 Akhilesh Bajaj, Lori N. K. Leonard, Li Sun
Client peripheral knowledge is the knowledge residing in the client organization regarding the specific technologies and methodologies needed to successfully complete an IT (information technology)...
-
Live Streaming Commerce: A Review and Research Agenda J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-20 Xi Luo, Weng Marc Lim, Jun-Hwa Cheah, Xin-Jean Lim, Yogesh K. Dwivedi
Live streaming on social media has evolved into live streaming commerce (LSC), a subset of electronic commerce that merges real-time social interaction with digital marketing. LSC is increasingly u...
-
How Agile Feedback Practice Use Impacts Software Quality J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-20 John Tripp, Vallabh Sambamurthy
Although agile methodologies prescribe various practices, they universally focus on obtaining feedback. Agile practitioners argue that this feedback allows teams to better adapt to uncertainty, whi...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-14 Rafał Leszczyna
Recently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a fo...
-
Organizational Sustainability of Generative AI-Driven Optimization Intelligence J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-14 Kalyan Prasad Agrawal
Generative Artificial Intelligence (AI) tools like ChatGPT offer significant potential in the corporate world and organizational leadership. Organizations are actively integrating Generative AI (Ge...
-
BYOA and Security: Examining Perspective-Taking and Self-Determination J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-12 Obi Ogbanufe, Russell Torres, Katia Guerra
Bring your own applications (BYOA) in organizational networks introduces security risks. We examine whether individuals who BYOA at work are motivated to use multi-factor authentication (MFA) to pr...
-
Organizational Traits and Social Badging: Text Mining Application J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-12 Pouyan Eslami, Sateesh V. Shet, Maryam Ghasemaghaei
This paper, employing a deductive research methodology approach, explores the concept of social badging for organizations from employees’ rating perspective in social media job portals (SMJP). This...
-
A Cognitive-Dissonance Theory Perspective in Understanding Online Shopping Journey J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-06 Mohammad Anas, S. M. Fatah Uddin, Mohammed Naved Khan, Mohd Nishat Faisal, Nripendra P. Rana
Online purchase experience is considered an a pivotal antecedent to customer satisfaction. This study explores the dimensions of online purchase experience affecting customer satisfaction while inv...
-
Factors Influencing Customers’ Apparel Shopping Intention in Metaverse J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-12-05 Rajasshrie Pillai, Brijesh Sivathanu, Nripendra P. Rana, Raman Preet, Anubhav Mishra
The emergence of the metaverse has opened an unbelievable online virtual world offering real-life immersive experiences to consumers. This study examines customers’ fashion apparel shopping intenti...
-
Factors Influencing ChatGpt Adoption for Product Research and Information Retrieval J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-11-21 Vinayaka Gude
In recent months, Generative AI-based systems have become increasingly prevalent for public use. Traditionally, people use Google and other search platforms to research a product before purchasing....
-
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-11-20 Miloslava Plachkinova, Lech Janczewski
The number of employees working remotely has grown significantly in recent years, creating new challenges for information security functions within organizations. The increasing threat surface and ...
-
Firm AI Adoption Intensity and Marketing Performance J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-11-08 Jing Chen, Wenkai Zhou, Gary L. Frankwick
This study delves into a firm’s artificial intelligence (AI) adoption intensity, exploring both its antecedents and consequences. The authors posit that technological opportunism, top management su...
-
Social Networking Technologies in SMEs: A Bibliometric Analysis J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-11-02 Sandip Rakshit, Anand Jeyaraj, Tripti Paul, Sandeep Mondal
The increasing popularity of social networking for small-and-medium enterprises (SMEs) has resulted in a significant body of research. This study conducts a bibliometric analysis to identify the in...
-
Recent Advancements in Machine Learning for Cybercrime Prediction J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-10-24 Lavanya Elluri, Varun Mandalapu, Piyush Vyas, Nirmalya Roy
Cybercrime is a growing threat to organizations and individuals worldwide, with criminals using sophisticated techniques to breach security systems and steal sensitive data. This paper aims to comp...
-
Information Security Practices and Intervention Among Teenagers J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-10-26 Satish Radhakrishnan, Lavanya Rajendran
In the digital age, information is drastically exchanged among users. This data exchange paved the way for unsolicited access by cybercriminals, which could lead to psychological and financial loss...
-
Spoofed Email Based Cyberattack Detection Using Machine Learning J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-10-20 Sanjeev Shukla, Manoj Misra, Gaurav Varshney
Cyberattacks on e-mails are of different types, but the most pervasive and ubiquitous are spoofing attacks. Our approach uses memory forensics to extract e-mail headers from live memory to perform ...
-
Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-10-18 Peng Gao, Haotian Zhang, Ming Wang, Weiyong Yang, Xinshen Wei, Zhuo Lv, Zengzhou Ma
Insider threats pose a significant concern for critical information infrastructures. Graph neural networks are widely used for detection due to their ability to model complex relationships among ne...
-
The Potential of Generative Artificial Intelligence Across Disciplines: Perspectives and Future Directions J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-10-05 Keng-Boon Ooi, Garry Wei-Han Tan, Mostafa Al-Emran, Mohammed A. Al-Sharafi, Alexandru Capatina, Amrita Chakraborty, Yogesh K. Dwivedi, Tzu-Ling Huang, Arpan Kumar Kar, Voon-Hsien Lee, Xiu-Ming Loh, Adrian Micu, Patrick Mikalef, Emmanuel Mogaji, Neeraj Pandey, Ramakrishnan Raman, Nripendra P. Rana, Prianka Sarker, Anshuman Sharma, Ching-I Teng, Samuel Fosso Wamba, Lai-Wan Wong
In a short span of time since its introduction, generative artificial intelligence (AI) has garnered much interest at both personal and organizational levels. This is because of its potential to ca...
-
Legal and Privacy Concerns of BYOD Adoption J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-10-02 Kenan Degirmenci, Michael H. Breitner, Ferry Nolte, Jens Passlick
We investigate legal concerns in privacy calculus, which are currently not given enough attention in privacy research. Legal aspects can lead to liability issues in various information systems scen...
-
Post-Quantum Cryptography Research Landscape: A Scientometric Perspective J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-29 Priya Sharma, Vrinda Gupta, Sandeep Kumar Sood
Post-quantum cryptography (PQC) is under development to guard against the threats of quantum computers by implementing a new class of cryptosystems. In this direction, much work has been done since...
-
IoT and Blockchain: A Review and a Technical-Legal-Social Acceptance Model J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-29 Katia Guerra, Chang Koh, Victor Prybutok, Vess Johnson
Internet of Things (IoT) and blockchain are complex digital technologies characterized by a strong connection and dependency between individuals, data, and information technology (IT). A socio-tech...
-
Job Performance in Digital Work: Do Personality Traits Matter? J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-27 Sophia Xiaoxia Duan, Hepu Deng
This paper investigates whether personality traits matter in job performance in digital work. A conceptual model is developed within the background of the big five personality traits theory and the...
-
Developing and Validating a Live Streaming Social Commerce Success Model J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-14 Guan-Yu Lin, Meng-Xuan Lee, Yi-Shun Wang
ABSTRACT The study was designed to explore the determinants affecting consumer online repurchase intention in the context of live-streaming social commerce. A live streaming social commerce success model was developed and verified empirically using data gathered from an anonymous online survey completed by 202 individuals with experience participating in live streaming social-commerce events on the
-
Examining AI and Systemic Factors for Improved Chatbot Sustainability J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-14 Arum Park, Sae Bom Lee
ABSTRACT Chatbots link companies and users, increase conversions, reduce labor costs, and provide answers based on big data. Since COVID-19, demand for non-face-to-face services has increased. Despite expectations, chatbot use is inconsistent and satisfaction is low. This study identifies factors for improving the sustainability of chatbot services by considering artificial intelligence factors (personalization
-
An Integrated Model for Information Adoption&Trust in Mobile Social Commerce J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-11 Fulya Acikgoz, Abdelsalam Busalim, James Gaskin, Shahla Asadi
ABSTRACT Despite the growing importance of mobile social commerce (ms-commerce), little research has been conducted on the effects of informational and social factors on users’ post-adoption behavior. We, therefore, build on the understanding of mobile social commerce in the UK market and how it affects users’ post-adoption behaviors. Our theoretical model leverages the information adoption model,
-
Honest Information Sharing in Social Commerce Based on Ethical Perceptions J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-15 Xiaolin Lin
Consumers are increasingly relying on consumer-generated information when making purchase decisions; therefore, for consumers to make informed and accurate decisions, the honesty of consumer-genera...
-
Value of Analytics for Decision-Making: Role of Managers and Analysts J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-15 Sakshi Srivastava, Gaurav Dixit
Despite the hype and investments, the successful use of analytics demands human-intensive efforts to exploit its full potential. The mixed outcomes of analytics initiatives indicate the need to div...
-
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-11 Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang
National digital identity systems (NDIDs) are increasingly important for users’ authentication and secure access to e-government services. However, there is insufficient research on human-centric c...
-
Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-11 Sibanjan Debeeprasad Das, Pradip Kumar Bala, Arindra Nath Mishra
The trustworthiness of artificial intelligence (AI) has been challenged for quite some time. The AI results will be trustworthy and reliable if trust-related principles are built into the AI system...
-
An Empirical Comparison of Malicious Insiders and Benign Insiders J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-11 Nan Liang, David P. Biros, Andy Luse
Malicious insiders continue to pose a significant threat to organizations. With their knowledge, privilege, and access to organizational resources, malicious insiders can attack the organization ea...
-
Cybersecurity Resilience in SMEs. A Machine Learning Approach J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-01 Juan Carlos Fernandez de Arroyabe, Marta F. Arroyabe, Ignacio Fernandez, Carlos F. A. Arranz
ABSTRACT This study investigates cybersecurity resilience in small and medium-sized enterprises (SMEs), focusing on three key aspects: the capacity to handle potential cyber incidents, the ability to recover from such incidents, and the capability to adapt in the face of possible cyber threats. Grounded in the Resource-Based View (RBV) framework, we conduct an empirical investigation utilizing a survey
-
FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-09-01 Salah AlBenJasim, Tooska Dargahi, Haifa Takruri, Rabab Al-Zaidi
ABSTRACT Winds of change are blowing across the financial systems, with services and advancements in Financial Technology (FinTech) influencing all aspects of the financial sector and generating a continual stream of innovations. Despite benefits offered by FinTech, it creates new challenges that endanger financial institutes’ stability and integrity. As cyber-attacks increasingly threaten the FinTech
-
Multi-Party Secured Collaboration Architecture from Cloud to Edge J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-08-31 Ruti Gafni, Itzhak Aviv, Dror Haim
ABSTRACT Distributed Federated Collaboration Secured Services is a proposed novel secure distributed Unified Communication and Collaboration (UCC) reference architecture planned for multi-environment ecosystems (including hybrid cloud, edge computing for IoT and real-time usages, and portable scenarios). DFCS-RA encourages new businesses and models, connecting people, “things,” and processes in secured
-
A Comprehensive Analysis of Computing Paradigms Leading to Fog Computing: Simulation Tools, Applications, and Use Cases J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-08-31 Sandipkumar Patel, Ritesh Patel
The emerging trend of computing technologies and the Internet of Things (IoT) makes applications optimal and more responsive for real-time data processing. It generates an unprecedented and heterog...
-
The Subjectivity of Data Scientists in Machine Learning Design J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-08-22 Shavindrie Cooray
ABSTRACT In this paper, we explore the questions “How can we make the impact of the data scientists’ subjectivity on the design of machine learning (ML) models more transparent?”. We also argue that it is insufficient to only focus on the technology of ML. We should also design the broader socio-technical system within which the ML model is to be deployed. We draw on philosophers and systems thinkers
-
Are Ranked Journal Lists Effective Determiners of Article Quality? J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-08-10 Michael J. Cuellar, H. Takeda, D. T. Truex III
ABSTRACT This study examines the effectiveness of the method of using the traditional method of counting articles in ranked venues (CARV) to evaluate scholarly output. CARV has been criticized for its lack of theoretical basis and performative effects, but it has never been empirically studied to determine its effectiveness in correctly classifying scholarly output as to its quality. This study fills
-
Predicting Compliance of Security Policies: Norms and Sanctions J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-08-07 Mohammad I. Merhi, Punit Ahluwalia
ABSTRACT This paper is motivated by the need to find reasons for the divergent findings reported in many studies that assessed the effects of social norms on IS security policy compliance, and answers multiple calls for additional research on this subject. In doing so, this paper contributes to the existing information security literature by presenting an integrated model that draws from the General
-
Retail Demand Forecasting Using Spatial-Temporal Gradient Boosting Methods J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-08-02 Jiaxing Wang, Woon Kian Chong, Junyi Lin, Carl Philip T. Hedenstierna
ABSTRACT With the significant growth of the e-commerce business, the retail industry is experiencing rapid developments, leading to the explosion of the number of stock-keeping units (SKUs). Therefore, it calls for forecasting algorithms to forecast a large number of product-level demands over a short forecasting horizon. We developed a novel machine learning algorithm—the spatial-temporal gradient
-
Towards Adoption of Generative AI in Organizational Settings J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-07-28 Kalyan Prasad Agrawal
ABSTRACT As an emerging technology, Generative Artificial Intelligence (AI) holds immense potential for application across various levels of business and management. However, current studies have not yet investigated the elements that impact the acceptance and implementation of generative AI tools, such as ChatGPT, within organizational settings. To fully leverage its benefits, organizations must embrace
-
The Role of Techno-Eustress in Technology-Enhanced IT Learning J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-07-28 Yu (Audrey) Zhao, Yaojie Li, Kakoli Bandyopadhyay
ABSTRACT This research explores the bright side of technostress, contrasting prior studies focusing on its adverse effects. Drawing on the transactional model of stress and coping and the holistic stress model, we investigate how personal and organizational coping resources influence techno-eustress and learning performance in information technology training. Our research model is validated with a
-
Metaverse: Literature Review, Synthesis and Future Research Agenda J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-07-24 Hui Gao, Alain Yee Loong Chong, Haijun Bao
ABSTRACT Metaverse has been a hot topic of discussion among academics and practitioners with the advancements of VR, AR, blockchain, 5G, as well as non-face-to-face communications. This paper intends to give a synthesis and systematic review of the current status of metaverse-related research. The Systematic Literature Review (SLR) has been employed in this study. The review reveals the importance
-
Business-Driven Data Recommender System: Design and Implementation J. Comput. Inform. Syst. (IF 2.8) Pub Date : 2023-07-19 Sarah Pinon, Corentin Burnay, Isabelle Linden
ABSTRACT Self-Service Business Intelligence (SSBI) increases decision-making reactivity of companies by facilitating the data use by non-IT experts. An important SSBI dimension is data querying where businesspeople create their own queries by reducing the technical complexity of formal languages like SQL. However, existing solutions ignore two other key challenges of data querying identified in the