<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "http://jats.nlm.nih.gov/publishing/1.1d1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">SAJIM</journal-id>
<journal-title-group>
<journal-title>South African Journal of Information Management</journal-title>
</journal-title-group>
<issn pub-type="ppub">2078-1865</issn>
<issn pub-type="epub">1560-683X</issn>
<publisher>
<publisher-name>AOSIS</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">SAJIM-28-2097</article-id>
<article-id pub-id-type="doi">10.4102/sajim.v28i1.2097</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Factors affecting Mobile Business Intelligence readiness in the South African telecom sector</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-5580-1209</contrib-id>
<name>
<surname>Lemekwane</surname>
<given-names>Marothi P.</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4188-3837</contrib-id>
<name>
<surname>Ruxwana</surname>
<given-names>Nkqubela</given-names>
</name>
<xref ref-type="aff" rid="AF0002">2</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-1903-6463</contrib-id>
<name>
<surname>Lavhengwa</surname>
<given-names>Tendani J.</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-7197-8853</contrib-id>
<name>
<surname>Ojo</surname>
<given-names>Sunday O.</given-names>
</name>
<xref ref-type="aff" rid="AF0003">3</xref>
</contrib>
<aff id="AF0001"><label>1</label>Department of Informatics, Faculty of Information and Communication, Tshwane University of Technology, Pretoria, South Africa</aff>
<aff id="AF0002"><label>2</label>Department of Digital Transformation, School of Computer Science, University of Wollongong, Dubai, United Arab Emirates</aff>
<aff id="AF0003"><label>3</label>Department of Information Technology, Faculty of Accounting and Informatics, Durban University of Technology, Durban, South Africa</aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><bold>Corresponding author:</bold> Marothi Lemekwane, <email xlink:href="philiplemekwane@gmail.com">philiplemekwane@gmail.com</email></corresp>
</author-notes>
<pub-date pub-type="epub"><day>24</day><month>02</month><year>2026</year></pub-date>
<pub-date pub-type="collection"><year>2026</year></pub-date>
<volume>28</volume>
<issue>1</issue>
<elocation-id>2097</elocation-id>
<history>
<date date-type="received"><day>25</day><month>09</month><year>2025</year></date>
<date date-type="accepted"><day>14</day><month>01</month><year>2026</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2026. The Authors</copyright-statement>
<copyright-year>2026</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Licensee: AOSIS. This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.</license-p>
</license>
</permissions>
<abstract>
<sec id="st1">
<title>Background</title>
<p>The rapid adoption and accelerated integration of mobile technology into organisational processes have significantly transformed the landscape of data collection and analysis, establishing Mobile Business Intelligence (MBI) as a critical enabler of real time, data-driven decision-making. Mobile Business Intelligence has emerged as a pivotal tool for enhancing the speed and accuracy of strategic business decisions.</p>
</sec>
<sec id="st2">
<title>Objectives</title>
<p>The study investigated and established factors affecting MBI readiness within the South African telecommunications sector.</p>
</sec>
<sec id="st3">
<title>Method</title>
<p>Quantitative research methodology and probability sampling were used to select participants, and closed-ended questionnaires were used. One hundred and twenty-eight responses were received and tested. The factors affecting MBI readiness were validated using quantitative analysis.</p>
</sec>
<sec id="st4">
<title>Results</title>
<p>Fourteen factors affecting MBI readiness were identified, namely: organisational culture, organisational capability, policies and people, infrastructure, security, skills, training, enterprise mobility support, need for change, inhibitors, motivators, and change enablers.</p>
</sec>
<sec id="st5">
<title>Conclusion</title>
<p>The findings of this study may encourage success in leveraging mobility and developing better strategies and approaches for MBI adoption, enabling organisations to realise expected benefits, make well-informed decisions and conserve costs, time and resources. These organisations could achieve a higher success rate with MBI investments.</p>
</sec>
<sec id="st6">
<title>Contribution</title>
<p>This study contributed methodologically, theoretically and practically by identifying critical success factors affecting MBI readiness. Methodologically, the identified factors inform the MBI readiness model and provide guidelines for the successful implementation of MBI solutions.</p>
</sec>
</abstract>
<kwd-group>
<kwd>Mobile Business Intelligence</kwd>
<kwd>Mobile Business Intelligence readiness</kwd>
<kwd>technology readiness</kwd>
<kwd>telecommunications</kwd>
<kwd>Business Intelligence</kwd>
<kwd>mobile technology</kwd>
</kwd-group>
<funding-group>
<funding-statement><bold>Funding information</bold> This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors.</funding-statement>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s0001">
<title>Introduction</title>
<p>In the rapidly evolving digital era and wireless network accessibility, the new generations of mobile devices, such as tablets and smartphones, are swiftly gaining popularity because of their wide range of functionality and portability (Annarumma, Tedesco &#x0026; Vitale <xref ref-type="bibr" rid="CIT0007">2018</xref>; Yang &#x0026; Yao <xref ref-type="bibr" rid="CIT0072">2022</xref>). With more and more organisations within South Africa moving to embrace remote working following the advent of coronavirus disease 2019 (COVID-19), the use of mobile devices can empower mobile workers to access real-time business insights ubiquitously (Chauhan &#x0026; Pandey <xref ref-type="bibr" rid="CIT0016">2023</xref>; Michael et al. <xref ref-type="bibr" rid="CIT0050">2024</xref>). However, it remains a challenge to track these insights as well as dynamic technological and business changes within and outside organisations while maintaining sustainable goals (Tavera et al. <xref ref-type="bibr" rid="CIT0065">2021</xref>).</p>
<p>In today&#x2019;s dynamic environment, the key to success for South African organisations in the telecommunications sector is the ability to make the right decisions timeously (Coelho <xref ref-type="bibr" rid="CIT0019">2024</xref>; Michael et al. <xref ref-type="bibr" rid="CIT0050">2024</xref>). Business Intelligence (BI) can be expanded to Mobile Business Intelligence (MBI) when enabled mobile technologies grow in availability, accessibility and performance. Mobile Business Intelligence refers to the technology solution that enables businesses to access critical business data on mobile devices, providing the flexibility and immediacy required in today&#x2019;s dynamic business environment ubiquitously with greater flexibility to aid agile decision-making (Edirisinghe <xref ref-type="bibr" rid="CIT0025">2022</xref>; Michael et al. <xref ref-type="bibr" rid="CIT0050">2024</xref>; Sultan et al. <xref ref-type="bibr" rid="CIT0063">2024</xref>).</p>
<p>However, the MBI implementations are relatively low in spite of the steady increase in mobile technology adoption (Chi &#x0026; Mahmud <xref ref-type="bibr" rid="CIT0017">2020</xref>; Jaradat et al. <xref ref-type="bibr" rid="CIT0037">2024</xref>). Digitalisation, characterised by digital technologies&#x2019; integration into every vein of business operations, has heightened and highlighted the value of digital transformation and how it can help organisations remain competitive in the ever-changing market conditions, leveraging digital technologies to radically transform corporate processes, operations and customer experiences (Kraus et al. <xref ref-type="bibr" rid="CIT0044">2021</xref>).</p>
<p>Harnessing insights from several data sources allows organisations to comprehensively understand trends, consumer behaviour and operational effectiveness, among others. This enables decision-makers to make informed and timely decisions, increasing organisational agility and responsiveness to market conditions (Adewusi et al. <xref ref-type="bibr" rid="CIT0001">2024</xref>; Mohammed et al. <xref ref-type="bibr" rid="CIT0051">2024</xref>).</p>
<p>Information has become one of the most valuable and important assets for the South African telecommunications sector and requires innovative tools for its retrieval, analysis, transformation and presentation (Tavera et al. <xref ref-type="bibr" rid="CIT0065">2021</xref>; Tomas et al. <xref ref-type="bibr" rid="CIT0066">2024</xref>). The need for data integration across the organisation, as well as integration with third parties, has increased because of the desire for global competitiveness, ever-changing customer needs and a bigger market share (Bharadiya <xref ref-type="bibr" rid="CIT0014">2023b</xref>; Mungoli <xref ref-type="bibr" rid="CIT0052">2023</xref>).</p>
<p>The various opportunities arising within the South African economy and highly volatile business environment require rapid, efficient and flexible decision-making processes. Access to real-time information makes strategic and operational processes easier through MBI and, in turn, enables employees to perform some of their tasks more easily, and improves decision-making (Chauhan &#x0026; Pandey <xref ref-type="bibr" rid="CIT0016">2023</xref>).</p>
<p>Although some organisations in South Africa and globally are adopting mobile technology, MBI implementations remain unexplored and unsupported and usually face high failure rates, leading to unrealised benefits as well as a significant waste of time and resources (Al-Okaily, Ai Ping &#x0026; Al-Okaily <xref ref-type="bibr" rid="CIT0003">2021</xref>). These can be attributed to the lack of MBI readiness within these organisations to guide MBI implementations (Chi &#x0026; Mahmud <xref ref-type="bibr" rid="CIT0017">2020</xref>; Jaradat et al. <xref ref-type="bibr" rid="CIT0037">2024</xref>). Therefore, organisations must be aware and knowledgeable about critical factors that affect their readiness for MBI investments.</p>
<p>To ensure that MBI implementations are acknowledged, accepted and adopted, organisational readiness is the most critical element (Machado et al. <xref ref-type="bibr" rid="CIT0047">2021</xref>). Organisations that need to invest in MBI initiatives need to understand and appreciate critical factors associated with such investments. These organisations should conduct readiness assessments, which will, in turn, save them time, costs and resources (Bharadiya <xref ref-type="bibr" rid="CIT0014">2023b</xref>). This study seeks to establish factors affecting MBI readiness within the South African telecommunications sector.</p>
</sec>
<sec id="s0002">
<title>Literature review</title>
<sec id="s20003">
<title>Mobile Business Intelligence</title>
<p>The rapid proliferation of mobile devices and technologies, as well as MBI&#x2019;s significant potential in organisational decision-making, demonstrates that MBI success requires top management support that enables decision-making in line with organisational objectives, as well as robust security and compliance standards (Jansen <xref ref-type="bibr" rid="CIT0036">2020</xref>; Ngwenya <xref ref-type="bibr" rid="CIT0056">2023</xref>). Mobile Business Intelligence helps the mobile workforce to gain business insights through information analysis utilising mobile-optimised applications (Edirisinghe <xref ref-type="bibr" rid="CIT0025">2022</xref>).</p>
<p>Mobile Business Intelligence is a novel study area for real-time and integrated BI (Chi &#x0026; Mahmud <xref ref-type="bibr" rid="CIT0017">2020</xref>; Jaradat et al. <xref ref-type="bibr" rid="CIT0037">2024</xref>). It combines BI with Internet standards and wireless communication technologies to make BI usage easier on mobile devices such as tablets and smartphones (Edirisinghe <xref ref-type="bibr" rid="CIT0025">2022</xref>; Hendrawan et al. <xref ref-type="bibr" rid="CIT0033">2024</xref>). Mobile Business Intelligence provides improved access capabilities by enabling employees to connect anytime and anywhere to the organisation&#x2019;s back-end systems (Edirisinghe <xref ref-type="bibr" rid="CIT0025">2022</xref>). Furthermore, MBI plays a critical role in cost savings, removes manual processes, enhances correctness, validity and dependability, in that end users will input data directly into the device instead of through paper.</p>
<p>However, while mobility provides more benefits, it can also pose a larger threat to organisations and the mobile workforce if not handled properly. For instance, some of the mobile workers may possibly feel that they are being tracked, and their privacy is compromised. The lack of trust in mobility might become a barrier for organisations looking to employ mobility to gain a competitive advantage and improve business operations.</p>
</sec>
<sec id="s20004">
<title>Mobile Business Intelligence adoption</title>
<p>The adoption of MBI is critical as it provides decision-makers with useful information to make informed decisions, reaching the goal of their organisation (Jaradat et al. <xref ref-type="bibr" rid="CIT0037">2024</xref>). Successful approaches to designing applications for personal computers cannot be applied to mobile devices directly, owing to limitations of the devices&#x2019; screen size and computing power, the characteristic behaviours of mobile users and the dynamic impact of the external environment (Weichbroth, Kowal &#x0026; Kalinowski <xref ref-type="bibr" rid="CIT0070">2022</xref>).</p>
<p>The integration of non-relational databases ensures that these systems remain effective tools for data analysis in the big data era. Organisations throughout the world are battling to benefit from MBI initiatives, resulting in financial loss, waste of time and resources, as well as unrealised benefits (Alali, Nofal &#x0026; Alharafsheh <xref ref-type="bibr" rid="CIT0004">2019</xref>; Al-Okaily et al. <xref ref-type="bibr" rid="CIT0003">2021</xref>). Thus, it is important that organisations looking to adopt MBI solutions be guided by a readiness model that will enable these organisations to explore all factors necessary for the successful adoption of MBI and to understand MBI users&#x2019; behaviours, satisfying their real needs.</p>
<p>The readiness factors will help to ensure that all important factors are considered in a timely manner, which will, in turn, save organisational resources such as time and costs in realising anticipated benefits.</p>
</sec>
<sec id="s20005">
<title>Mobile Business Intelligence benefits</title>
<p>Through the use of handheld devices, MBI gives a mobile workforce access to real-time data and analytics reports at any time and from any location (Michael et al. <xref ref-type="bibr" rid="CIT0050">2024</xref>). Mobile Business Intelligence improves the quality and timeliness of data by embracing a broad range of technologies and applications that acquire, store, evaluate and then make integrated data available for use in making decisions (Bharadiya <xref ref-type="bibr" rid="CIT0013">2023a</xref>; Edirisinghe <xref ref-type="bibr" rid="CIT0025">2022</xref>; Tavera et al. <xref ref-type="bibr" rid="CIT0065">2021</xref>). The effectiveness and promptness of MBI can determine not just the distinction between loss and profit but also whether the organisation survives or fails in the best and worst times.</p>
<p>Mobile Business Intelligence improves the ability to access, analyse and act on data from anywhere, leading to better business outcomes and more flexible and informed decision-making processes (Jaradat et al. <xref ref-type="bibr" rid="CIT0037">2024</xref>). Mobile Business Intelligence lowers expenses, increases operational effectiveness and improves customer happiness, giving a competitive edge, offering real-time information and improving network performance and service delivery (Roberts <xref ref-type="bibr" rid="CIT0060">2022</xref>). Ensuring that the organisation has real-time insights at its fingertips.</p>
</sec>
<sec id="s20006">
<title>Challenges of Mobile Business Intelligence adoption</title>
<p>South African organisations have limited Internet access, particularly in remote areas where there is no infrastructure, and there is a scarcity of critical services such as electricity, water and Internet (Musonda et al. <xref ref-type="bibr" rid="CIT0055">2024</xref>). The exorbitant cost of data and mobile devices in South Africa is also a hurdle, as organisations must invest in data and mobile devices so as to make MBI solutions accessible to their employees. Other challenges include political and regulatory aspects, inadequate knowledge and skills, inadequate infrastructure, primitive user interface, MBI implementation failures, lack of readiness and more (Al-Okaily et al. <xref ref-type="bibr" rid="CIT0003">2021</xref>).</p>
<p>Furthermore, insufficient skills and knowledge, complexities of mobile devices, lack of in-house expertise, high cost and data irregularities continue to discourage many organisations from adopting MBI solutions (Matoza et al. <xref ref-type="bibr" rid="CIT0048">2021</xref>). Adopting a cloud computing paradigm that delivers MBI solutions as a service over the Internet will dramatically remove the obstacles of high costs and lack of in-house expertise and assist in speeding the adoption of mobile solutions (Muriithi &#x0026; Kotz&#x00E9; <xref ref-type="bibr" rid="CIT0054">2013</xref>).</p>
<p>It is imperative for organisations seeking to invest in MBI solutions to be knowledgeable and adept at factors affecting MBI readiness. This will assist in ensuring that organisations make informed decisions towards MBI investments. Knowing and understanding factors affecting MBI readiness will potentially save organisations a considerable amount of time and resources, as well as ensure the return on investments. Although the established factors are based on the South African telecommunications sector, other organisations in other industries can adapt factors relevant to their specific environment.</p>
</sec>
<sec id="s20007">
<title>Mobility, cybersecurity and privacy</title>
<p>There is a need for increased privacy and security of organisational data on mobile devices and applications.</p>
<p>With these portable devices (i.e. laptops, smartphones, Personal Digital Assistant [PDA] etc.), data transmitted can be intercepted with ease, and working in public places increases the risk of ubiquitous access and accidental dissemination of information to unauthorised parties.</p>
<p>Ensuring that data usage respects user privacy and security requirements is critical for retaining trust (Hutt, Das &#x0026; Baker <xref ref-type="bibr" rid="CIT0035">2023</xref>). As data in high-security contexts becomes more open and accessible, it is crucial to prioritise improving privacy so as to preserve the integrity, confidentiality and availability of data on MBI solutions (Zaerens <xref ref-type="bibr" rid="CIT0075">2023</xref>).</p>
<p>Organisational personnel may be a significant security vulnerability, whether or not they are aware of it; therefore, it is imperative that all personnel receive security awareness, policy and practice training to safeguard organisations against security threats and vulnerabilities and to bridge the digital divide (Aljedaani et al. <xref ref-type="bibr" rid="CIT0006">2020</xref>). Implementing MBI becomes more secure and seamless when employees comprehend and adhere to mobile-security requirements and cybersecurity measures employed by the organisation.</p>
<p>Cybersecurity is a multi-faceted domain that refers to professional practices, tested processes and technologies designed to protect networks, systems, devices, information, programmes and data from unauthorised access, damage or attack (Ahmad et al. <xref ref-type="bibr" rid="CIT0002">2024</xref>; Peslak &#x0026; Hunsinger <xref ref-type="bibr" rid="CIT0059">2019</xref>). Mobile devices such as tablets and smartphones are the most highly used smart devices across the globe and are considerably pervasive in society.</p>
<p>Notably, hackers or cybercriminals gradually develop malware (malicious software) to compromise mobile devices, consequently making mobile devices the main targets for malware attacks (Ahmad et al. <xref ref-type="bibr" rid="CIT0002">2024</xref>; Alazab et al. <xref ref-type="bibr" rid="CIT0005">2020</xref>).</p>
<p>Malware compromises information stored on mobile devices by spreading onto these devices. Cybercriminals can undermine businesses by installing malicious apps on mobile devices that pose as trustworthy apps (Ferdous et al. <xref ref-type="bibr" rid="CIT0026">2025</xref>). Mobile devices can further be used to launch Distributed Denial of Service attacks against corporate networks (Ahmad et al. <xref ref-type="bibr" rid="CIT0002">2024</xref>; Siris <xref ref-type="bibr" rid="CIT0062">2020</xref>). This can cause enormous financial losses and negatively affect the integrity, confidentiality and availability of mobile devices (Alazab et al. <xref ref-type="bibr" rid="CIT0005">2020</xref>; Gao &#x0026; Zhuang <xref ref-type="bibr" rid="CIT0028">2020</xref>).</p>
<p>The telecommunication sector is overwhelmingly becoming more susceptible to cyberattacks with the rise of the Internet of Things extending to interconnected devices such as smart buildings, driverless cars, digitalised home appliances, smart devices, drones, etc. (Ahmad et al. <xref ref-type="bibr" rid="CIT0002">2024</xref>). Traditional protection mechanisms are ineffective and incapable. Thus, there is a need to employ modern security measures that will empower organisations to identify, protect, detect and timeously respond to and recover from security breaches (Kamoun et al. <xref ref-type="bibr" rid="CIT0040">2020</xref>).</p>
<p>Recent studies identified some key dimensions that are likely to influence cybersecurity, such as digital literacy, security awareness and support availability (Vrhovec et al. <xref ref-type="bibr" rid="CIT0068">2024</xref>). It is, therefore, fundamental that organisations seeking to invest in MBI technology are guided on critical factors for such investments in order to ascertain their level of readiness. Furthermore, this will ensure that the correct measures are employed suitable to the organisational needs, thus saving time and resources.</p>
</sec>
</sec>
<sec id="s0008">
<title>Research methods and design</title>
<sec id="s20009">
<title>Study design</title>
<p>The study employed a descriptive design, distinguished by research questions beginning with or including &#x2018;What&#x2019;, &#x2018;Who&#x2019;, &#x2018;When&#x2019;, &#x2018;How&#x2019; or &#x2018;Where&#x2019; (Saunders, Lewis &#x0026; Thornhill <xref ref-type="bibr" rid="CIT0061">2019</xref>). According to Leedy and Ormrod (<xref ref-type="bibr" rid="CIT0046">2016</xref>), descriptive research investigates a situation rather than changing or modifying it. The study extensively reviewed literature relating to MBI. The questionnaire&#x2019;s measuring items were then designed using the information that had been gathered. Following data collection, Statistical Package for Social Sciences (SPSS) version 20 (IBM Corporation, Armonk, NY, United States) was used to code and transcribe the questionnaire for analysis. Quantitative analysis and validation were carried out.</p>
<p>Furthermore, the quantitative research design was adopted in this study, which provides an in-depth understanding of the present state of MBI readiness in the South African telecommunication sector. The design provided deeper knowledge related to the research. This led to critical factors that are significantly affecting MBI readiness within South Africa (Bentouhami, Casas &#x0026; Weyler <xref ref-type="bibr" rid="CIT0012">2021</xref>).</p>
</sec>
<sec id="s20010">
<title>Study setting</title>
<p>The research was conducted with a focus on the South African telecommunications sector, which is dominated by Vodacom, MTN, Telkom, Cell C and newer entrants, including Rain and several Mobile Virtual Network Operators. The participants were chosen using a probability random sampling method; the study also ensured that the survey was as inclusive as possible, including employees from various business units such as information and communications technology, communications, marketing, strategic enablement, operations, human resources management, governance risk and compliance, finance, supply chain management, audit and so on. The total number of 128 questionnaire responses was received and tested and was found to be valid and reliable.</p>
<p>Employees who were deemed to understand BI and MBI participated in the study with a background in the telecommunications industry. Executives, managers, specialists, analysts, architects, developers, testers, support and BI users were among the workers.</p>
</sec>
<sec id="s20011">
<title>Participants&#x2019; demographics</title>
<p>Demographics, knowledge and experience with computers or mobile devices, the Internet and BI, general experience, occupation and BI involvement, as well as their impressions of BI concepts and effects on preparation, were all collected as shown in <xref ref-type="table" rid="T0001">Table 1</xref>. Furthermore, to confirm the relevance and correctness of the obtained data, participants were asked to indicate whether or not they were familiar with MBI.</p>
<table-wrap id="T0001">
<label>TABLE 1</label>
<caption><p>Participants&#x2019; demographics.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Factor</th>
<th valign="top" align="left">Category</th>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">&#x0025;</th>
<th valign="top" align="center">Cumulative &#x0025;</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" rowspan="3" valign="top">Gender</td>
<td align="left">Male</td>
<td align="center">90</td>
<td align="center">70.3</td>
<td align="center">70.3</td>
</tr>
<tr>
<td align="left">Female</td>
<td align="center">38</td>
<td align="center">29.7</td>
<td align="center">100.0</td>
</tr>
<tr>
<td align="left">Total</td>
<td align="center">128</td>
<td align="center">100.0</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left" rowspan="7" valign="top">Education level</td>
<td align="left">Below grade 12</td>
<td align="center">2</td>
<td align="center">1.6</td>
<td align="center">1.6</td>
</tr>
<tr>
<td align="left">Grade 12</td>
<td align="center">1</td>
<td align="center">0.8</td>
<td align="center">2.3</td>
</tr>
<tr>
<td align="left">Diploma</td>
<td align="center">28</td>
<td align="center">21.9</td>
<td align="center">24.2</td>
</tr>
<tr>
<td align="left">Degree</td>
<td align="center">55</td>
<td align="center">43.0</td>
<td align="center">67.2</td>
</tr>
<tr>
<td align="left">Masters</td>
<td align="center">39</td>
<td align="center">30.5</td>
<td align="center">97.7</td>
</tr>
<tr>
<td align="left">PhD</td>
<td align="center">3</td>
<td align="center">2.3</td>
<td align="center">100.0</td>
</tr>
<tr>
<td align="left">Total</td>
<td align="center">128</td>
<td align="center">100.0</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left" rowspan="7" valign="top">Overall work experience (years)</td>
<td align="left">0&#x2013;3</td>
<td align="center">15</td>
<td align="center">11.7</td>
<td align="center">11.7</td>
</tr>
<tr>
<td align="left">4&#x2013;7</td>
<td align="center">24</td>
<td align="center">18.8</td>
<td align="center">30.5</td>
</tr>
<tr>
<td align="left">8&#x2013;11</td>
<td align="center">39</td>
<td align="center">30.5</td>
<td align="center">60.9</td>
</tr>
<tr>
<td align="left">12&#x2013;15</td>
<td align="center">23</td>
<td align="center">18.0</td>
<td align="center">78.9</td>
</tr>
<tr>
<td align="left">16&#x2013;19</td>
<td align="center">14</td>
<td align="center">10.9</td>
<td align="center">89.8</td>
</tr>
<tr>
<td align="left">&#x2265; 20</td>
<td align="center">13</td>
<td align="center">10.2</td>
<td align="center">100.0</td>
</tr>
<tr>
<td align="left">Total</td>
<td align="center">128</td>
<td align="center">100.0</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left" rowspan="13" valign="top">Business unit</td>
<td align="left">Information technology</td>
<td align="center">88</td>
<td align="center">68.8</td>
<td align="center">68.8</td>
</tr>
<tr>
<td align="left">Communications</td>
<td align="center">9</td>
<td align="center">7.0</td>
<td align="center">75.8</td>
</tr>
<tr>
<td align="left">Finance</td>
<td align="center">5</td>
<td align="center">3.9</td>
<td align="center">79.7</td>
</tr>
<tr>
<td align="left">Supply chain management</td>
<td align="center">1</td>
<td align="center">0.8</td>
<td align="center">80.5</td>
</tr>
<tr>
<td align="left">Governance, risk and compliance</td>
<td align="center">5</td>
<td align="center">3.9</td>
<td align="center">84.4</td>
</tr>
<tr>
<td align="left">Audit</td>
<td align="center">3</td>
<td align="center">2.3</td>
<td align="center">86.7</td>
</tr>
<tr>
<td align="left">Human resources</td>
<td align="center">2</td>
<td align="center">1.6</td>
<td align="center">88.3</td>
</tr>
<tr>
<td align="left">Marketing</td>
<td align="center">2</td>
<td align="center">1.6</td>
<td align="center">89.8</td>
</tr>
<tr>
<td align="left">Operations</td>
<td align="center">5</td>
<td align="center">3.9</td>
<td align="center">93.8</td>
</tr>
<tr>
<td align="left">Strategic enablement</td>
<td align="center">2</td>
<td align="center">1.6</td>
<td align="center">95.3</td>
</tr>
<tr>
<td align="left">Support</td>
<td align="center">2</td>
<td align="center">1.6</td>
<td align="center">96.9</td>
</tr>
<tr>
<td align="left">Other</td>
<td align="center">4</td>
<td align="center">3.1</td>
<td align="center">100.0</td>
</tr>
<tr>
<td align="left">Total</td>
<td align="center">128</td>
<td align="center">100.0</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left" rowspan="9" valign="top">Occupation</td>
<td align="left">Executive</td>
<td align="center">6</td>
<td align="center">4.7</td>
<td align="center">4.7</td>
</tr>
<tr>
<td align="left">Senior management</td>
<td align="center">10</td>
<td align="center">7.8</td>
<td align="center">12.5</td>
</tr>
<tr>
<td align="left">Management</td>
<td align="center">26</td>
<td align="center">20.3</td>
<td align="center">32.8</td>
</tr>
<tr>
<td align="left">Specialist</td>
<td align="center">57</td>
<td align="center">44.5</td>
<td align="center">77.3</td>
</tr>
<tr>
<td align="left">Operations and support</td>
<td align="center">15</td>
<td align="center">11.7</td>
<td align="center">89.1</td>
</tr>
<tr>
<td align="left">Administration</td>
<td align="center">4</td>
<td align="center">3.1</td>
<td align="center">92.2</td>
</tr>
<tr>
<td align="left">End-user</td>
<td align="center">1</td>
<td align="center">0.8</td>
<td align="center">93.0</td>
</tr>
<tr>
<td align="left">Staff</td>
<td align="center">9</td>
<td align="center">7.0</td>
<td align="center">100.0</td>
</tr>
<tr>
<td align="left">Total</td>
<td align="center">128</td>
<td align="center">100.0</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left" rowspan="10" valign="top">BI involvement</td>
<td align="left">Manager</td>
<td align="center">24</td>
<td align="center">18.8</td>
<td align="center">18.8</td>
</tr>
<tr>
<td align="left">Specialist</td>
<td align="center">16</td>
<td align="center">12.5</td>
<td align="center">31.3</td>
</tr>
<tr>
<td align="left">Analyst</td>
<td align="center">21</td>
<td align="center">16.4</td>
<td align="center">47.7</td>
</tr>
<tr>
<td align="left">Architect</td>
<td align="center">5</td>
<td align="center">3.9</td>
<td align="center">51.6</td>
</tr>
<tr>
<td align="left">Developer</td>
<td align="center">12</td>
<td align="center">9.4</td>
<td align="center">60.9</td>
</tr>
<tr>
<td align="left">Tester</td>
<td align="center">5</td>
<td align="center">3.9</td>
<td align="center">64.8</td>
</tr>
<tr>
<td align="left">Bi user</td>
<td align="center">9</td>
<td align="center">7.0</td>
<td align="center">71.9</td>
</tr>
<tr>
<td align="left">Support</td>
<td align="center">20</td>
<td align="center">15.6</td>
<td align="center">87.5</td>
</tr>
<tr>
<td align="left">Staff</td>
<td align="center">16</td>
<td align="center">12.5</td>
<td align="center">100.0</td>
</tr>
<tr>
<td align="left">Total</td>
<td align="center">128</td>
<td align="center">100.0</td>
<td align="center">-</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>PhD, Doctor of Philosophy; BI, Business Intelligence.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>There was a total number of 128 participants. The male participants contributed 70.3&#x0025;, while female participants contributed 29.7&#x0025;. The respondents were grouped into different factors such as gender, education level, work experience, business unit, occupation and their involvement in BI.</p>
</sec>
<sec id="s20012">
<title>The approach of the study and strategy</title>
<p>The quantitative approach was employed to effectively achieve the study objectives. This approach allowed the researchers to gather large-scale data and to use statistical techniques to analyse trends, correlations, and the influence of variables (Saunders et al. <xref ref-type="bibr" rid="CIT0061">2019</xref>; Watson, Kim &#x0026; Liu <xref ref-type="bibr" rid="CIT0069">2023</xref>). The quantitative research provides objectivity, control and accurate measurement.</p>
<p>This strategy was the best option for providing unambiguous, data-driven insights regarding MBI readiness across a broad sector in which objectivity, generalisability and scalability are essential (Dos Santos et al. <xref ref-type="bibr" rid="CIT0023">2021</xref>).</p>
</sec>
<sec id="s20013">
<title>Data collection and analysis</title>
<p>The data for this study were collected using the quantitative technique; namely, a survey was conducted using closed-ended questionnaires based on a five-point ordinal scale. The selected data-collection method (i.e. closed-ended questionnaires) empowered the researcher to accomplish the goals of the study, which is considered the best method for the study, particularly when examining specialised phenomena such as MBI readiness in the telecom industry. This method ensured that the study is more objective, is cost-efficient, saves time and is easy to complete; the data are easy to analyse; the method speeds up the process of collecting data and coding it using statistical packages (Babbie <xref ref-type="bibr" rid="CIT0011">2020</xref>).</p>
<p>The use of this method assisted in reducing respondent bias by limiting the potential for being too subjective or giving long responses, which may be influenced by personal interpretation (Creswell <xref ref-type="bibr" rid="CIT0020">2021</xref>). This method provides a form of standardisation that facilitates ensuring that all respondents answer the same set of questions in the same way, thus improving the reliability of results (Fink <xref ref-type="bibr" rid="CIT0027">2017</xref>). The collected data were coded and transcribed using the SPSS version 20, and Cronbach&#x2019;s alpha was used for reliability testing (Ghanem <xref ref-type="bibr" rid="CIT0029">2023</xref>).</p>
<p>Furthermore, the study employed quantitative analysis because it makes it possible to extrapolate findings from a sample to a larger population, providing findings that are accurate, quantifiable and amenable to statistical analysis, making it easier to compare groupings over time and eliminating bias (Taherdoost <xref ref-type="bibr" rid="CIT0064">2021</xref>). A large number of participants could be readily reached using quantitative data-collection methods, such as online surveys, which make them appropriate for extensive evaluations. The efficiency and representativeness of research are enhanced by extensive data collection, especially in MBI readiness-assessment contexts (Pallant <xref ref-type="bibr" rid="CIT0058">2020</xref>).</p>
<p>According to Johnson and Christensen (<xref ref-type="bibr" rid="CIT0038">2014</xref>), one of the main advantages of quantitative research is its reproducibility, which enhances its legitimacy and decision-making value. Thus, this method is particularly useful for this study in that it allows organisations to objectively test readiness, compare results across units and forecast the influence of readiness factors on MBI readiness. The scalability and statistical rigour of quantitative research render it indispensable for evidence-based decision-making.</p>
<p>Data screening was performed to uncover potential mistakes, miscoding, missing data and normalcy, as well as to guarantee that statistical analysis processes were precise and estimations had a solid foundation. A normality assessment was performed to identify how to handle nonnormality. To eliminate biased results, the data were checked for univariate and multivariate outliers. Furthermore, all items were checked for accuracy. Microsoft Excel 2013 (Microsoft Corporation, Redmond, WA, United States) and SPSS version 20 were further used to check the missing data in the questionnaires, and the incomplete questionnaires were discarded.</p>
</sec>
<sec id="s20014">
<title>Descriptive statistics</title>
<p>Descriptive statistics were used to summarise data in a manner that explains the correlation between variables in a population. This was a necessary first step towards computing statistics, which is undertaken during research, and it is always recommended to carry out prior to making inferential statistical comparisons (Kaur, Stoltzfus &#x0026; Yellapu <xref ref-type="bibr" rid="CIT0043">2018</xref>). The variables were descriptively analysed, and the minimum, maximum, mean, standard deviation and skewness were determined. The questionnaire used for the variables was based on a five-point Likert scale.</p>
</sec>
<sec id="s20015">
<title>Reliability and validity of constructs</title>
<p>Reliability testing strengthens and ensures the replicability and validity of study findings, enhances credibility and relevancy and ensures that the construct represents the concept being studied, enabling meaningful and trustworthy conclusions. It ensures that constructs assess what they should measure throughout time or across diverse settings (DeVellis <xref ref-type="bibr" rid="CIT0021">2016</xref>). Before testing for the validity and reliability of constructs, each item was evaluated for its reliability and validity. The validity and reliability of the collected data were then examined to ensure that it was dependable and could be utilised to derive reasonable conclusions.</p>
<p>Cronbach&#x2019;s alpha was used to assess questionnaire reliability. The surveys have an aggregate &#x03B1;-coefficient of 0.960, exceeding the minimum value of 0.7. As a result, the surveys were proven to be reliable and usable. Furthermore, the reliability and validity of each construct were assessed. Ninety-five per cent (95&#x0025;) of constructs exceeded the minimum &#x03B1;-coefficient of 0.7. Five per cent (5&#x0025;) of constructions with &#x03B1;-coefficient values below 0.7 were abandoned.</p>
</sec>
<sec id="s20016">
<title>Ethical considerations</title>
<p>Ethical clearance to conduct this study was obtained from the Faculty of Research Ethics, Tshwane University of Technology (No. FCRE/ICT/2017/05/002[2]).</p>
</sec>
</sec>
<sec id="s0017">
<title>Results</title>
<p>The study identified 14 critical factors for MBI readiness within the South African telecommunications sector, as shown in <xref ref-type="table" rid="T0002">Table 2</xref>.</p>
<table-wrap id="T0002">
<label>TABLE 2</label>
<caption><p>Mobile Business Intelligence readiness factors.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Factor</th>
<th valign="top" align="center">Cronbach&#x2019;s alpha</th>
<th valign="top" align="center">Significance value (<italic>p</italic>-value)</th>
<th valign="top" align="center">Cronbach&#x2019;s alpha (Standardized items)</th>
<th valign="top" align="center">No. of items</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Culture</td>
<td align="center">0.876</td>
<td align="center"><italic>p</italic> = 0.000 &#x003C; 0.05</td>
<td align="center">0.876</td>
<td align="center">3</td>
</tr>
<tr>
<td align="left">Policies</td>
<td align="center">0.835</td>
<td align="center"><italic>p</italic> = 0.001 &#x003C; 0.05</td>
<td align="center">0.834</td>
<td align="center">5</td>
</tr>
<tr>
<td align="left">People</td>
<td align="center">0.807</td>
<td align="center"><italic>p</italic> = 0.003 &#x003C; 0.05</td>
<td align="center">0.811</td>
<td align="center">2</td>
</tr>
<tr>
<td align="left">Infrastructure</td>
<td align="center">0.866</td>
<td align="center"><italic>p</italic> = 0.021 &#x003C; 0.05</td>
<td align="center">0.867</td>
<td align="center">2</td>
</tr>
<tr>
<td align="left">Security</td>
<td align="center">0.773</td>
<td align="center"><italic>p</italic> = 0.001 &#x003C; 0.05</td>
<td align="center">0.803</td>
<td align="center">6</td>
</tr>
<tr>
<td align="left">Skills/capability</td>
<td align="center">0.852</td>
<td align="center"><italic>p</italic> = 0.000 &#x003C; 0.05</td>
<td align="center">0.852</td>
<td align="center">2</td>
</tr>
<tr>
<td align="left">Training</td>
<td align="center">0.940</td>
<td align="center"><italic>p</italic> = 0.001 &#x003C; 0.05</td>
<td align="center">0.940</td>
<td align="center">4</td>
</tr>
<tr>
<td align="left">Need for change</td>
<td align="center">0.842</td>
<td align="center"><italic>p</italic> = 0.000 &#x003C; 0.05</td>
<td align="center">0.847</td>
<td align="center">6</td>
</tr>
<tr>
<td align="left">Motivators</td>
<td align="center">0.775</td>
<td align="center"><italic>p</italic> = 0.002 &#x003C; 0.05</td>
<td align="center">0.798</td>
<td align="center">8</td>
</tr>
<tr>
<td align="left">Inhibitors</td>
<td align="center">0.763</td>
<td align="center"><italic>p</italic> = 0.001 &#x003C; 0.05</td>
<td align="center">0.767</td>
<td align="center">9</td>
</tr>
<tr>
<td align="left">Organisational capability</td>
<td align="center">0.830</td>
<td align="center"><italic>p</italic> = 0.000 &#x003C; 0.05</td>
<td align="center">0.831</td>
<td align="center">3</td>
</tr>
<tr>
<td align="left">Enterprise mobility</td>
<td align="center">0.851</td>
<td align="center"><italic>p</italic> = 0.033 &#x003C; 0.05</td>
<td align="center">0.860</td>
<td align="center">4</td>
</tr>
<tr>
<td align="left">Support</td>
<td align="center">0.915</td>
<td align="center"><italic>p</italic> = 0.013 &#x003C; 0.05</td>
<td align="center">0.916</td>
<td align="center">4</td>
</tr>
<tr>
<td align="left">Change enablers</td>
<td align="center">0.788</td>
<td align="center"><italic>p</italic> = 0.000 &#x003C; 0.05</td>
<td align="center">0.789</td>
<td align="center">2</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>These factors were classified into three major sections, namely:</p>
<list list-type="bullet">
<list-item><p><italic>Organisational readiness:</italic> Focuses on various organisational aspects such as organisational culture, people and policies;</p></list-item>
<list-item><p><italic>Technology readiness:</italic> Focuses on various technological factors such as infrastructure, security, training and skills and</p></list-item>
<list-item><p><italic>Core readiness:</italic> Focuses on various critical aspects such as inhibitors, motivators and need for change.</p></list-item>
</list>
<p>Several theories were used in identifying these factors, including the literature, namely the Technology Readiness Index, McKinsey 7s model and change-management theories.</p>
<sec id="s20018">
<title>Organisational readiness</title>
<sec id="s30019">
<title>Organisational culture</title>
<p>Every organisation has its own uniqueness in how it conducts its business and operates, which is a mark of distinction when defining or describing that organisation. The same uniqueness can also be attributed to different countries. The culture of South African organisations in conducting their business and operations is different from the culture of other organisations in other countries. In other instances, the same organisation that is operating in different countries will need to have a culture unique to its business and the country in which it is operating.</p>
<p>Although the organisation might have, among others, relevant structures, strategies, systems and processes in place to enable MBI readiness, these will remain ineffective and insignificant unless the culture of the organisation is conducive. The phrase by Peter Drucker, &#x2018;Culture eats strategy for breakfast, lunch, and dinner&#x2019;, remains a reality in most South African organisations, particularly in the telecommunications sector.</p>
<p>Organisations that fail to embrace the importance and impact of culture put their success at risk. The diverse workforce demands a culture emphasising creativity and inclusivity.</p>
<p>This study found that it is of utmost importance to maintain cultural coherence throughout the organisation, which, in turn, enables strategic alignment and MBI implementation among others. A supportive culture that embraces innovation, policies that align with MBI goals and a workforce capable of adapting to MBI demands are non-negotiables for organisations seeking to leverage MBI implementations. According to Kalema, Olugbara and Kekwaletswe (<xref ref-type="bibr" rid="CIT0039">2012</xref>), organisations must involve employees in planning and change-management processes so as to embrace change and avoid resistance.</p>
</sec>
<sec id="s30020">
<title>Policies</title>
<p>Policies that align with organisational strategy, support a data-driven culture, enforce compliance, allow for structural alterations and encourage constant innovation are critical for the effective implementation of MBI solutions. These policy-driven reforms foster an atmosphere in which MBI may thrive, ultimately offering a competitive advantage in a rapidly changing industry. It is essential that security policies and procedures are well -defined, documented and incorporated into the enterprise&#x2019;s overall organisational strategy. Such policies and procedures should also be widely accessible and understood by all employees and users, and they must be rigorously enforced.</p>
<p>Based on researchers Karanja, Njeru and Otieno (<xref ref-type="bibr" rid="CIT0041">2023</xref>), a policy-driven approach ensures that required resources (e.g. financial, human, technological, etc.) are provided and that organisational culture, strategy and structure are ready to comply with regulatory obligations while implementing MBI technologies. This is fundamental to avert potential legal concerns while also assuring that the organisation can leverage MBI capabilities without infringing data privacy standards and regulations; this applies particularly in the South African telecommunications sector, where resources are limited and budgets are constrained.</p>
<p>Organisational personnel may be a significant security vulnerability, whether or not they are aware of it; therefore, it is imperative that all personnel receive security awareness, policy and practice training to safeguard organisations against security threats and vulnerabilities and to bridge the digital divide (Aljedaani et al. <xref ref-type="bibr" rid="CIT0006">2020</xref>). Implementing MBI becomes more secure and seamless when employees comprehend and adhere to mobile-security policy requirements.</p>
</sec>
<sec id="s30021">
<title>People</title>
<p>Every aspect of culture, structure, strategy, policy and process needs people to foster collaboration, make informed decisions and ensure that MBI technologies are efficiently and effectively integrated into organisational operations. It is vital for organisations to focus on developing a workforce that is both technically skilled and strategically aligned in order to achieve MBI readiness. Mobile Business Intelligence preparedness is largely dependent on the organisation&#x2019;s roles and duties being clearly defined and assigned.</p>
<p>People who hold leadership positions must build an atmosphere conducive to embracing new technology, such as MBI, ensuring that staff at all levels understand the need to employ MBI for strategic decision-making and operational efficiencies (Matthysee &#x0026; Nzuza <xref ref-type="bibr" rid="CIT0049">2019</xref>). Furthermore, people involved in MBI strategy development must ensure that the MBI tools improve, among others, decision-making, customer insights, operational efficiencies, service delivery and market competitiveness (Chong, Chan &#x0026; Goh <xref ref-type="bibr" rid="CIT0018">2019</xref>).</p>
</sec>
</sec>
<sec id="s20022">
<title>Technological readiness</title>
<sec id="s30023">
<title>Infrastructure</title>
<p>Infrastructure plays a crucial role in shaping the dimensions of the organisation. The integral role of infrastructure in supporting the strategic framework of an organisation is fundamental. Mobile Business Intelligence systems require a secure infrastructure to prevent data loss or unwanted access. This encompasses network security, server security and data storage solutions. As explained by Van der Merwe (<xref ref-type="bibr" rid="CIT0067">2021</xref>), organisations must invest in secure, scalable infrastructure capable of handling the growing volume and complexity of MBI data.</p>
<p>This includes implementing intrusion detection systems, firewalls and secure cloud storage to protect data at rest, in use and in transit. The influence on infrastructure underscores its relevance in ensuring operational effectiveness and efficiency, depicting its critical role in optimising workflows and enhancing technological alignment with organisational goals. On the authority of Hlatshwayo (<xref ref-type="bibr" rid="CIT0034">2024</xref>), secure infrastructure is critical for safeguarding sensitive data for MBI.</p>
</sec>
<sec id="s30024">
<title>Security</title>
<p>Organisations that are looking to implement MBI solutions must foster a security-first culture. In organisations, where MBI delivers real-time data insights, security awareness must be ingrained in the organisational culture.</p>
<p>This entails cultivating a culture of trust and responsibility in which all employees are aware of the risks related to MBI solutions, such as data breaches and cyberattacks. According to Olivier (<xref ref-type="bibr" rid="CIT0057">2023</xref>), building a security-conscious culture reduces internal security risks and aligns employee behaviour with organisational security policy.</p>
<p>Security has a significant impact on the MBI readiness in organisations. To secure sensitive data and ensure operational integrity, security measures must be integrated into all parts of the organisation, from culture to device management. According to Zhang and Liu (<xref ref-type="bibr" rid="CIT0076">2022</xref>), mobile device management is critical for ensuring the overall security of MBI systems, especially in contexts where workers regularly work remotely or on the go. Organisations can mitigate security risks and successfully adopt and implement MBI solutions by prioritising security across culture, structure, strategy, policy, process, people, infrastructure, systems and device management, as well as ensuring legal compliance and customer trust.</p>
</sec>
<sec id="s30025">
<title>Skills</title>
<p>Skills development is critical to the readiness and success of MBI investments. Inadequate skills expose organisations to various risks such as illegal access, data breaches, regulatory violations and more, all of which can seriously harm customer trust and organisational reputation. Organisations can maximise the efficiency of MBI solutions and improve organisational performance by ensuring that staff have the necessary skills (Govender <xref ref-type="bibr" rid="CIT0030">2023</xref>). Investing in ongoing skill development not only enables employees to make more data-driven decisions but also improves the overall security and efficiency.</p>
<p>Employees should also be equipped with the necessary mobile technology skills and expertise. Training, experience, observations, organisations (such as professional bodies and mentorship), self-learning and other methods can all be used to gain these skills (Weritz <xref ref-type="bibr" rid="CIT0071">2022</xref>). One of the key technological inhibitors towards mobile technology is the lack of necessary skills or expertise (Heinis, Hilario &#x0026; Meboldt <xref ref-type="bibr" rid="CIT0032">2018</xref>). Organisations must give employees the resources, opportunity and knowledge necessary to use mobile technology effectively (Weritz <xref ref-type="bibr" rid="CIT0071">2022</xref>). According to the study, failure is inevitable when top management does not push its staff or employees to build vital abilities or competence in their particular fields of work.</p>
</sec>
<sec id="s30026">
<title>Training</title>
<p>According to D&#x00ED;az-Arancibia et al. (<xref ref-type="bibr" rid="CIT0022">2024</xref>), organisations must have a clear and mandatory mobile education and training plan, as well as training sessions that employees must attend that are aligned with the organisation&#x2019;s mobile strategy. They assert that mobile technology companies must provide training sessions on mobile technology for businesses, as this will help ensure the availability of the skills required to properly and efficiently adopt MBI technology. Training is essential for ensuring that personnel inside businesses have the requisite skills and knowledge for MBI preparation (Audrin, Audrin &#x0026; Salamin <xref ref-type="bibr" rid="CIT0010">2024</xref>; Za, Scornavacca &#x0026; Pallud <xref ref-type="bibr" rid="CIT0074">2022</xref>). When training is facilitated by adequate support systems and a high level of MBI readiness, employees are better equipped to adopt new technologies, leading to improved organisational readiness.</p>
<p>Furthermore, education becomes critical from both organisational and personal perspectives. Thus, users must be educated on how to use these mobile devices for organisational advancements in line with the policy directive, while on the other hand, organisations must be educated on the risks and opportunities presented by mobility and how to curb the risks while maximising opportunities.</p>
</sec>
</sec>
<sec id="s20027">
<title>Core readiness</title>
<sec id="s30028">
<title>Need for change</title>
<p>Organisational changes successfully conveyed by top management or leadership to all employees, regardless of rank, are critical. Management and the rest of the organisation&#x2019;s leadership should embrace change rather than fear it (Kasrim et al. <xref ref-type="bibr" rid="CIT0042">2025</xref>). Effective communication is essential for facilitating change. It is therefore necessary that technical updates be communicated to all staff on a regular basis, utilising the many communication channels and platforms available to the organisation (Asare &#x0026; Tony <xref ref-type="bibr" rid="CIT0008">2025</xref>).</p>
<p>This inclusive approach will allow all employees to participate in organisational decision-making, making it easier for these people to embrace change and hence ensure MBI readiness. This indicates that change should be viewed not only as management&#x2019;s job but also as the responsibility of every individual in the business.</p>
</sec>
<sec id="s30029">
<title>Motivators</title>
<p>Mobile technology offers greater mobility and control over day-to-day activities (Yueh, Lu &#x0026; Lin <xref ref-type="bibr" rid="CIT0073">2016</xref>). Organisations with MBI readiness benefit greatly from staying up to date with the latest technological advancements. This allows these organisations to analyse and implement technologies that are appropriate for their needs rather than adopting technologies without taking the environment and anticipated return on investment into account.</p>
<p>Additionally, factors that motivate workers to use mobile technology should be taken into account, such as security, comfort, enhanced control, flexibility, technological efficiency, being the first to adopt a new technology, etc.</p>
</sec>
<sec id="s30030">
<title>Inhibitors</title>
<p>In a similar vein, factors that deter workers from embracing or utilising mobile technology &#x2013; such as mistrust, anxiety, discomfort, insecurities, etc. &#x2013; should be taken into account. Organisational-wide preparedness for MBI is likely to be adversely affected by the belief that mobile technology makes it simpler for firms to spy on individuals or their staff. While some employees think that human interaction is crucial when working with technology, others think that if something is automated, they should make sure the computer or machine is operating correctly.</p>
<p>Furthermore, several participants claimed that information communicated via the Internet or a machine could never be guaranteed to reach its intended destination or the correct location. Thus, when assessing MBI preparedness, businesses must identify potential barriers and mistrust. Failure to identify and evaluate these aspects or inhibitors will have a detrimental impact on the organisation&#x2019;s preparation for MBI adoption.</p>
</sec>
</sec>
<sec id="s20031">
<title>Mediating factors</title>
<sec id="s30032">
<title>Organisational capabilities</title>
<p>Organisations must be able to attract and retain the essential skills in order to achieve their goals and objectives.</p>
<p>Organisations that experience frequent turbulence and rapid change rely on their skill and aptitude to adapt to the new market and environmental demands. These organisations must have staff who are skilled and adept at implementing and managing mobile technologies, as well as systems in place to foster and sustain high levels of employee morale.</p>
<p>Furthermore, companies must be adaptable and capable of generating a competitive advantage, aligning business strategies to directly support organisational goals, introducing new products or services and improving customer connections. These businesses must provide faster and more convenient access to valuable, accurate and reliable internal and external information. The study discovered that organisational mobility enhances corporate efficiency, procedures, new business strategies and models, financial resources, structure, processes, skill levels and capability expansion.</p>
</sec>
<sec id="s30033">
<title>Support</title>
<p>The accomplishment of organisational goals and objectives, MBI readiness and new technology advancements and implementations all depend on top management support as well as assistance from all levels of management. Top management and leadership support during the implementation process of new technology are critical at all times. This is supported by Ashfaq et al. (<xref ref-type="bibr" rid="CIT0009">2023</xref>), who emphasise that empathy, foresight and consideration in dealing with employees foster a sense of value and improve their overall well-being.</p>
<p>Additionally, inadequate funding could lead to the implementation and support of MBI readiness failing or being impossible. To ensure MBI readiness, organisations must have a defined budget and funding plan.</p>
</sec>
<sec id="s30034">
<title>Enterprise mobility</title>
<p>To ensure MBI readiness, organisations must be able to gain a competitive edge, align organisational plans to solutions, strengthen relationships with clients and directly support organisational objectives. These organisations must provide faster and more convenient access to valuable, accurate and trustworthy internal and external data. Enterprise mobility enhances corporate efficiency, business processes, new business plans and models, financial resources, structure, process skill levels and increased capacities.</p>
<p>According to Harris and Patten (<xref ref-type="bibr" rid="CIT0031">2014</xref>), organisations can integrate enterprise mobility to leverage productivity and flexibility into their business strategy so as to employ new policies to address processes, people and technology implications from the mobile way of doing business. Thus, when dealing with MBI readiness, enterprise mobility will be instrumental in measuring levels of end-user convenience, efficiency, productivity, process improvement and decision speed.</p>
</sec>
<sec id="s30035">
<title>Change enablers</title>
<p>Change involves aligning activities with organisational strategy, fulfilling goals and objectives and actively engaging stakeholders when adopting MBI solutions. Maintaining normal operations and collaboration during the changeover period is a priority. Communication is essential during a transformation for maintaining stakeholder involvement and responding to staff concerns. According to Larkin and Atkinson (<xref ref-type="bibr" rid="CIT0045">2024</xref>), a communication plan that includes all stakeholders, delivers vital messages and is timely and engaging is essential for change enablement, as well as for sustaining relationships and understanding of the task for MBI readiness.</p>
<p>Change enablers contribute significantly to MBI readiness by facilitating and supporting the adoption and deployment of MBI solutions. Organisations can overcome barriers to MBI readiness, accelerate deployment timelines and maximise the value of MBI solutions by leveraging change enablers. The enablers work together to support a comprehensive approach to successfully integrate MBI into organisational strategy and operations.</p>
</sec>
</sec>
<sec id="s20036">
<title>Key findings</title>
<p>Mobile Business Intelligence solutions have the potential to improve decision-making, but adoption challenges remain; these include, among others, high costs, limited skills, perceived complexity and technology distrust. Furthermore, the MBI adoption process is hampered by a reluctance to change, inadequate resources and a lack of support from relevant stakeholders, including the organisational leadership, as well as data security and privacy concerns.</p>
<p>There is a need for more economical and user-friendly solutions and a culture that values technology, teamwork, continuous learning, innovation and data-driven approaches to improve the adoption and use of MBI.</p>
<p>South African organisations continue to struggle with the integration of MBI technologies, which is worsened by a lack of qualified personnel. According to Dube and Ruxwana (<xref ref-type="bibr" rid="CIT0024">2022</xref>), the difficulty of comprehending the unique requirements and challenges encountered by South African organisations when implementing MBI solutions is further compounded by the lack of local research. This is mainly because mobility brings about various challenges as well as opportunities, which the telecommunications sector needs to embrace.</p>
<p>The challenges presented by mobility include among others: Security and privacy of proprietary information; limited processing, graphics, display, etc.; lack of standardisation in mobile offerings from mobile platform vendors; lack of adoption of globally available mobility solutions; fragmented mobile platforms and diversity issues, e.g., different types of mobile browsers, inputs methods, operating systems, inter alia; adherence to policies and standards and lack of MBI readiness factors that will enable organisations to make informed decisions in adopting MBI solutions.</p>
<p>Fourteen critical factors that affect MBI readiness were identified, which will aid in improving the adoption of MBI within organisations. South African organisations are lagging behind in terms of the adoption of MBI compared with other countries. This is exacerbated by the fact that South Africa is plagued by high levels of poverty, an unequal society, a high cost of mobile data, unequal access to technology and a persistent digital divide, among other factors. Internet connectivity remains a dream in some poor and disadvantaged communities despite MBI&#x2019;s heavy reliance on Internet access.</p>
<p>The adoption of MBI within the South African telecommunications sector will most likely increase significantly in the future. The anticipated increase will be attributed to, among others, unprecedented culture change, government programmes, increased MBI models and the prevalence of rare diseases such as the outbreak of COVID-19, which forced most businesses and workforce locally and across the globe to operate remotely.</p>
<p>The policy landscape assists organisations in navigating compliance and security challenges while implementing mobile technologies. South Africa continues to focus on digital literacy and technical capability improvements. A large part of MBI adoption is dependent on employee readiness, which encompasses training employees to effectively utilise MBI solutions. It is anticipated that South Africa will be particularly deliberate about upskilling and reskilling programmes and continue to employ various measures to fight the high levels of poverty, positioning MBI as a critical tool for improving data-driven decision-making.</p>
<p>The use of mobile technology can be a beacon of hope, enabling billions of people across the world to connect. Since the reign of COVID-19, most organisations in South Africa and across the globe have adapted so as to conduct their businesses remotely. It is vital for organisations to focus on designing and integrating mobile solutions that are specifically tailored to local demands. According to Botha and Smit (<xref ref-type="bibr" rid="CIT0015">2020</xref>), MBI solutions must be customised to address the unique issues and challenges that each organisation faces, including cultural diversity, varied languages and industry-specific requirements.</p>
<p>To increase the adoption of MBI, organisations must continue to focus on various initiatives, such as improving mobile infrastructure, building capacity through training, fostering government and policy support, encouraging industry-specific adoption and addressing security concerns. Together, these initiatives create a more conducive atmosphere for the adoption of MBI, enabling organisations to use real-time data to make decisions and boost operational effectiveness.</p>
</sec>
<sec id="s20037">
<title>Strengths, limitations and future work</title>
<p>The study focused on South Africa, with data gathered especially from South African organisations in the telecommunications sector. As a result, it does not accurately reflect all countries around the world. Although some readiness factors may be comparable across countries and industries, generalisation of the results should be approached with care. Future research should consider a broader range of industries to gain a more comprehensive knowledge and understanding of the problem and its implications across sectors.</p>
<p>A cross-sectional survey was used in the study; data were gathered at a specific time. The results of this study may not be as useful in predicting future trends; results could be attributed to a variety of circumstances, including the increasing use of the Internet, rapid technological advancements, natural or man-made disasters, rare disease outbreaks (e.g., COVID-19), cultural shifts and the increasing automation of business operations.</p>
</sec>
<sec id="s20038">
<title>Future research could therefore focus on longitudinal studies</title>
<p>The study makes a significant theoretical, methodological and practical contribution by providing organisations with a practical guide for assessing their MBI readiness, reflecting opportunities to look into critical readiness factors that will help them realise anticipated benefits and make informed decisions while saving money, time and resources. The identification of the key factors influencing MBI readiness through various theories, literature and surveys makes a substantial theoretical, methodological and practical contribution and has paved the way for future research. Organisations could use the knowledge provided by these critical readiness factors and their impact on practice to design better strategies and tactics for MBI adoption. These organisations could further experience a high success rate on MBI investments and better support while exploring MBI initiatives.</p>
</sec>
</sec>
<sec id="s0039">
<title>Conclusion</title>
<p>Mobile technologies are becoming rapidly accepted in the South African telecommunications sector and are now having a dramatic impact on MBI and decision-making. Mobile Business Intelligence is quickly becoming a valuable management tool that supports organisational decision-making by delivering crucial, real-time information through mobile platforms. This flexibility is extremely useful in South Africa, which has a rapidly evolving business environment in which organisations are using MBI to enhance customer experiences, increase efficiency and augment operational efficiencies.</p>
<p>The implementation of MBI in the value chain is vital for streamlining MBI operations and customers in the ecosystem. It is important for organisations utilising their massive stocks of data as a strategic resource to create critical information that will support business adaptation and differentiation. Nevertheless, issues such as data security and privacy, as well as limited infrastructure, should be strengthened to fully utilise these technologies. The identified factors could be used by organisations as a practical guide for assessing their readiness for MBI.</p>
</sec>
</body>
<back>
<ack>
<title>Acknowledgements</title>
<p>This article is based on research originally conducted as part of Marothi P. Lemekwane&#x2019;s doctoral thesis titled, &#x2018;A Mobile Business Intelligence Readiness Model within the South African Telecommunications Industry&#x2019;, submitted to the Department of Informatics, Faculty of Information and Communication, Tshwane University of Technology in 2025. The thesis is currently unpublished and not publicly available. The thesis was supervised by Nkqubela Ruxwana, Tendani Justice Lavhengwa and Sunday Olusegun Ojo. The thesis was reworked, revised and adapted into a journal article for publication. The author confirms that the content has not been previously published or disseminated and complies with ethical standards for original publication.</p>
<p>This article is also based on data from a larger study. One other article was published from the same thesis. The article focuses on a model for assessing Mobile Business Intelligence readiness within the South African telecommunications industry, which has been published in the Journal of Engineering Research and Sciences, Volume 1 in 2022 available at <ext-link ext-link-type="uri" xlink:href="https://www.jenrs.com/publications/JENRS_0105022.pdf">https://www.jenrs.com/publications/JENRS_0105022.pdf</ext-link>.</p>
<sec id="s20040" sec-type="COI-statement">
<title>Competing interests</title>
<p>The authors declare that they have no financial or personal relationships that may have inappropriately influenced them in writing this article.</p>
</sec>
<sec id="s20041">
<title>CRediT authorship contribution</title>
<p>Marothi P. Lemekwane: Conceptualisation, Methodology, Formal analysis, Investigation, Writing &#x2013; original draft, Visualisation, Project administration, Software, Validation, Data curation, Resources, Writing &#x2013; review &#x0026; editing, Funding acquisition. Nkqubela Ruxwana: Conceptualisation, Methodology, Project administration, Writing &#x2013; review &#x0026; editing, Supervision. Tendani J. Lavhengwa: Writing &#x2013; review &#x0026; editing, Supervision. Sunday O. Ojo: Writing &#x2013; review &#x0026; editing, Supervision. All authors reviewed the article, contributed to the discussion of results, approved the final version for submission and publication and take responsibility for the integrity of its findings.</p>
</sec>
<sec id="s20042" sec-type="data-availability">
<title>Data availability</title>
<p>The data for the study are not publicly available but are available upon reasonable request to the corresponding author, Marothi P. Lemekwane.</p>
</sec>
<sec id="s20043">
<title>Disclaimer</title>
<p>The views and opinions expressed in this article are those of the authors and are the product of professional research. They do not necessarily reflect the official policy or position of any affiliated institution, funder, agency or that of the publisher. The authors are responsible for this article&#x2019;s results, findings and content.</p>
</sec>
</ack>
<ref-list id="references">
<title>References</title>
<ref id="CIT0001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Adewusi</surname>, <given-names>A.O</given-names></string-name>., <string-name><surname>Okoli</surname>, <given-names>U.I</given-names></string-name>., <string-name><surname>Adaga</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Olorunsogo</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Asuzu</surname>, <given-names>O.F</given-names></string-name>. &#x0026; <string-name><surname>Daraojimba</surname>, <given-names>D.O</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Business intelligence in the era of big data: A review of analytical tools and competitive advantage</article-title>&#x2019;, <source><italic>Computer Science &#x0026; IT Research Journal</italic></source> <volume>5</volume>(<issue>2</issue>), <fpage>415</fpage>&#x2013;<lpage>431</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.51594/csitrj.v5i2.791">https://doi.org/10.51594/csitrj.v5i2.791</ext-link></comment></mixed-citation></ref>
<ref id="CIT0002"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahmad</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Zia</surname>, <given-names>M.U</given-names></string-name>., <string-name><surname>Naqvi</surname>, <given-names>I.H</given-names></string-name>., <string-name><surname>Chattha</surname>, <given-names>J.N</given-names></string-name>., <string-name><surname>Butt</surname>, <given-names>F.A</given-names></string-name>., <string-name><surname>Huang</surname>, <given-names>T</given-names></string-name>. <etal>et al</etal></person-group>., <year>2024</year>, &#x2018;<article-title>Machine learning and blockchain technologies for cybersecurity in connected vehicles</article-title>&#x2019;, <source><italic>WIREs Data Mining and Knowledge Discovery</italic></source> <volume>14</volume>(<issue>1</issue>), <fpage>e1515</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/widm.1515">https://doi.org/10.1002/widm.1515</ext-link></comment></mixed-citation></ref>
<ref id="CIT0003"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-Okaily</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Ai Ping</surname>, <given-names>T</given-names></string-name>. &#x0026; <string-name><surname>Al-Okaily</surname>, <given-names>M</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Towards business intelligence success measurement in an organization: A conceptual study</article-title>&#x2019;, <source><italic>Journal of System and Management Sciences</italic></source> <volume>11</volume>(<issue>2</issue>), <fpage>155</fpage>&#x2013;<lpage>170</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.33168/JSMS.2021.0210">https://doi.org/10.33168/JSMS.2021.0210</ext-link></comment></mixed-citation></ref>
<ref id="CIT0004"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alali</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Nofal</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Alharafsheh</surname>, <given-names>M</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Business intelligence implementation success framework: A literature review</article-title>&#x2019;, <source><italic>European Journal of Business and Management</italic></source> <volume>11</volume>(<issue>6</issue>), <fpage>9</fpage>&#x2013;<lpage>14</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7176/EJBM/11-6-02">https://doi.org/10.7176/EJBM/11-6-02</ext-link></comment></mixed-citation></ref>
<ref id="CIT0005"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alazab</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Alazab</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Shalaginov</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Mesleh</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Awajan</surname>, <given-names>A</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Intelligent mobile malware detection using permission requests and API calls</article-title>&#x2019;, <source><italic>Future Generation Computer Systems</italic></source> <volume>107</volume>, <fpage>509</fpage>&#x2013;<lpage>521</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/J.FUTURE.2020.02.002">https://doi.org/10.1016/J.FUTURE.2020.02.002</ext-link></comment></mixed-citation></ref>
<ref id="CIT0006"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Aljedaani</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Ahmad</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Zahed</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Ali Babar</surname>, <given-names>M</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Security awareness of end-users of mobile health applications: An empirical study</article-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>M.</given-names> <surname>M&#x00FC;hlh&#x00E4;user</surname></string-name>, <string-name><given-names>G.C.</given-names> <surname>Polyzos</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Michahelles</surname></string-name>, <string-name><given-names>A.S.</given-names> <surname>Guinea</surname></string-name> &#x0026; <string-name><given-names>L.</given-names> <surname>Wang</surname></string-name> (eds.)</person-group>, <conf-name>Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2020), MobiQuitous &#x2018;20: Computing, Networking and Services</conf-name>, <conf-loc>Darmstadt, Germany</conf-loc>, <conf-date>December 7&#x2013;9, 2020</conf-date>, pp. <fpage>125</fpage>&#x2013;<lpage>136</lpage>, <publisher-name>Association for Computing Machinery</publisher-name>, <publisher-loc>New York, NY</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0007"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Annarumma</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Tedesco</surname>, <given-names>I</given-names></string-name>. &#x0026; <string-name><surname>Vitale</surname>, <given-names>L</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Mobile generation, digital devices and preschool education</article-title>&#x2019;, <source><italic>International Journal of Digital Literacy and Digital Competence (IJDLDC)</italic></source> <volume>9</volume>(<issue>4</issue>), <fpage>19</fpage>&#x2013;<lpage>32</lpage>.</mixed-citation></ref>
<ref id="CIT0008"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Asare</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Tony</surname>, <given-names>A.O</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>The role of corporate communication in organisational change management</article-title>&#x2019;, <source><italic>Convergence Chronicles</italic></source> <volume>6</volume>(<issue>3</issue>), <fpage>83</fpage>&#x2013;<lpage>94</lpage>.</mixed-citation></ref>
<ref id="CIT0009"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ashfaq</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Abid</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Ilyas</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Binte Mansoor</surname>, <given-names>K</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Perceived organisational support and work engagement among health sector workers during the COVID-19 pandemic: A multicentre, time-lagged, cross-sectional study among clinical hospital staff in Pakistan</article-title>&#x2019;, <source><italic>BMJ Open</italic></source> <volume>13</volume>(<issue>6</issue>), <fpage>e065678</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1136/bmjopen-2022-065678">https://doi.org/10.1136/bmjopen-2022-065678</ext-link></comment></mixed-citation></ref>
<ref id="CIT0010"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Audrin</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Audrin</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Salamin</surname>, <given-names>X</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Digital skills at work &#x2013; Conceptual development and empirical validation of a measurement scale</article-title>&#x2019;, <source><italic>Technological Forecasting and Social Change</italic></source> <volume>202</volume>, <fpage>123279</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.techfore.2024.123279">https://doi.org/10.1016/j.techfore.2024.123279</ext-link></comment></mixed-citation></ref>
<ref id="CIT0011"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Babbie</surname>, <given-names>E.R</given-names></string-name></person-group>., <year>2020</year>, <source><italic>The practice of social research</italic></source>, <publisher-name>Cengage</publisher-name>, <publisher-loc>Boston, Australia</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0012"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bentouhami</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Casas</surname>, <given-names>L</given-names></string-name>. &#x0026; <string-name><surname>Weyler</surname>, <given-names>J</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Reporting of &#x201C;theoretical design&#x201D; in explanatory research: A critical appraisal of research on early life exposure to antibiotics and the occurrence of asthma</article-title>&#x2019;, <source><italic>Clinical Epidemiology</italic></source> <volume>13</volume>, <fpage>755</fpage>&#x2013;<lpage>767</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2147/CLEP.S318287">https://doi.org/10.2147/CLEP.S318287</ext-link></comment></mixed-citation></ref>
<ref id="CIT0013"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bharadiya</surname>, <given-names>J</given-names></string-name></person-group>., <year>2023a</year>, &#x2018;<article-title>A comparative study of business intelligence and artificial intelligence with big data analytics</article-title>&#x2019;, <source><italic>American Journal of Artificial Intelligence</italic></source> <volume>7</volume>(<issue>1</issue>), <fpage>24</fpage>&#x2013;<lpage>30</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.11648/j.ajai.20230701.14">https://doi.org/10.11648/j.ajai.20230701.14</ext-link></comment></mixed-citation></ref>
<ref id="CIT0014"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bharadiya</surname>, <given-names>J</given-names></string-name></person-group>., <year>2023b</year>, &#x2018;<article-title>Machine learning and AI in business intelligence: Trends and opportunities</article-title>&#x2019;, <source><italic>International Journal of Computer (IJC)</italic></source> <volume>48</volume>(<issue>1</issue>), <fpage>123</fpage>&#x2013;<lpage>134</lpage>.</mixed-citation></ref>
<ref id="CIT0015"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Botha</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Smit</surname>, <given-names>E</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Bridging the education and skills gap in Mobile Business Intelligence adoption</article-title>&#x2019;, <source><italic>South African Journal of Information Management</italic></source> <volume>22</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>11</lpage>.</mixed-citation></ref>
<ref id="CIT0016"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chauhan</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Pandey</surname>, <given-names>R</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Unlocking user acceptance in Mobile Business Intelligence: Factors shaping the transition in the digital era</article-title>&#x2019;, <source><italic>International Journal of Scientific Research in Computer Science, Engineering and Information Technology</italic></source> <volume>9</volume>(<issue>6</issue>), <fpage>118</fpage>&#x2013;<lpage>121</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.32628/CSEIT239064">https://doi.org/10.32628/CSEIT239064</ext-link></comment></mixed-citation></ref>
<ref id="CIT0017"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chi</surname>, <given-names>T.W</given-names></string-name>. &#x0026; <string-name><surname>Mahmud</surname>, <given-names>I</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Business intelligence system adoption: A systematic literature review of two decades</article-title>&#x2019;, <source><italic>International Journal of Industrial Management</italic></source> <volume>6</volume>, <fpage>1</fpage>&#x2013;<lpage>8</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.15282/ijim.6.0.2020.5624">https://doi.org/10.15282/ijim.6.0.2020.5624</ext-link></comment></mixed-citation></ref>
<ref id="CIT0018"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Chong</surname>, <given-names>A.Y.L</given-names></string-name>., <string-name><surname>Chan</surname>, <given-names>F.T.S</given-names></string-name>. &#x0026; <string-name><surname>Goh</surname>, <given-names>M</given-names></string-name></person-group>., <year>2019</year>, <source><italic>Business intelligence systems: Theory and applications</italic></source>, <publisher-name>Springer</publisher-name>, <publisher-loc>Cham, Switzerland</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0019"><mixed-citation publication-type="thesis"><person-group person-group-type="author"><string-name><surname>Coelho</surname>, <given-names>J.G.N</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Business intelligence in a data driven bank: Potentiating compliance</article-title>&#x2019;, <comment>Master&#x2019;s thesis</comment>, <publisher-name>Universidade NOVA de Lisboa</publisher-name>.</mixed-citation></ref>
<ref id="CIT0020"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Creswell</surname>, <given-names>J.W</given-names></string-name></person-group>., <year>2021</year>, <source><italic>A concise introduction to mixed methods research</italic></source>, <publisher-name>SAGE Publications</publisher-name>, <publisher-loc>Thousand Oaks, CA, USA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0021"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>DeVellis</surname>, <given-names>R.F</given-names></string-name></person-group>., <year>2016</year>, <source><italic>Scale development: Theory and applications</italic></source>, <edition>4th</edition> edn., <publisher-name>SAGE Publications</publisher-name>, <publisher-loc>Thousand Oaks, CA, USA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0022"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>D&#x00ED;az-Arancibia</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Hochstetter-Diez</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Bustamante-Mora</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Sep&#x00FA;lveda-Cuevas</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Albayay</surname>, <given-names>I</given-names></string-name>. &#x0026; <string-name><surname>Arango-L&#x00F3;pez</surname>, <given-names>J</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Navigating digital transformation and technology adoption: A literature review from small and medium-sized enterprises in developing countries</article-title>&#x2019;, <source><italic>Sustainability</italic></source> <volume>16</volume>(<issue>14</issue>), <fpage>5946</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/su16145946">https://doi.org/10.3390/su16145946</ext-link></comment></mixed-citation></ref>
<ref id="CIT0023"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Dos Santos</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Du Toit</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Faasen</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Quesada</surname>, <given-names>L.L</given-names></string-name>., <string-name><surname>Masenge</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Van Aardt</surname>, <given-names>I</given-names></string-name>. <etal>et al</etal></person-group>., <year>2021</year>, <source><italic>Research methodology: Business and management contexts</italic></source>, <publisher-name>Oxford University Express</publisher-name>, <publisher-loc>Oxford</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0024"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dube</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Ruxwana</surname>, <given-names>N</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Adoption of Mobile Business Intelligence by South African small and medium enterprises</article-title>&#x2019;, <source><italic>South African Journal of Business Management</italic></source> <volume>53</volume>(<issue>2</issue>), <fpage>23</fpage>&#x2013;<lpage>34</lpage>.</mixed-citation></ref>
<ref id="CIT0025"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Edirisinghe</surname>, <given-names>S</given-names></string-name></person-group>., <year>2022</year>, <source><italic>Business intelligence trends: A review of mobile business intelligence</italic></source>, <publisher-name>Technological University Dublin</publisher-name>, <publisher-loc>Dublin, Ireland</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0026"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ferdous</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Islam</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Mahboubi</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Islam</surname>, <given-names>M.Z</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>A survey on ML techniques for multi-platform malware detection: Securing PC, mobile devices, IoT, and cloud environments</article-title>&#x2019;, <source><italic>Sensors</italic></source> <volume>25</volume>(<issue>4</issue>), <fpage>1153</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/s25041153">https://doi.org/10.3390/s25041153</ext-link></comment></mixed-citation></ref>
<ref id="CIT0027"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Fink</surname>, <given-names>A</given-names></string-name></person-group>., <year>2017</year>, <source><italic>How to conduct surveys: A step-by-step guide</italic></source>, <publisher-name>SAGE Publications</publisher-name>, <publisher-loc>Los Angeles, CA, USA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0028"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname>, <given-names>Q</given-names></string-name>. &#x0026; <string-name><surname>Zhuang</surname>, <given-names>J</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model</article-title>&#x2019;, <source><italic>Applied Mathematics and Computation</italic></source> <volume>368</volume>, <fpage>124584</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.amc.2019.124584">https://doi.org/10.1016/j.amc.2019.124584</ext-link></comment></mixed-citation></ref>
<ref id="CIT0029"><mixed-citation publication-type="thesis"><person-group person-group-type="author"><string-name><surname>Ghanem</surname>, <given-names>S.K.R</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>TOE factors and SME&#x2019;s performance: The mediating and moderating roles of social media benefits and organizational culture</article-title>&#x2019;, <comment>Doctoral dissertation</comment>, <publisher-name>Universiti Tun Hussein Onn</publisher-name>.</mixed-citation></ref>
<ref id="CIT0030"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Govender</surname>, <given-names>R</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Device management in South African telecommunications: Infrastructure considerations</article-title>&#x2019;, <source><italic>Journal of Telecommunications and Digital Media</italic></source> <volume>12</volume>(<issue>4</issue>), <fpage>56</fpage>&#x2013;<lpage>68</lpage>.</mixed-citation></ref>
<ref id="CIT0031"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Harris</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Patten</surname>, <given-names>K</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Mobile device security considerations for small- and medium-sized enterprise business mobility</article-title>&#x2019;, <source><italic>Information Management &#x0026; Computer Security</italic></source> <volume>22</volume>(<issue>1</issue>), <fpage>97</fpage>&#x2013;<lpage>114</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/IMCS-03-2013-0019">https://doi.org/10.1108/IMCS-03-2013-0019</ext-link></comment></mixed-citation></ref>
<ref id="CIT0032"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Heinis</surname>, <given-names>T.B</given-names></string-name>., <string-name><surname>Hilario</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Meboldt</surname>, <given-names>M</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Empirical study on innovation motivators and inhibitors of Internet of Things applications for industrial manufacturing enterprises</article-title>&#x2019;, <source><italic>Journal of Innovation and Entrepreneurship</italic></source> <volume>7</volume>(<issue>1</issue>), <fpage>10</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1186/s13731-018-0090-7">https://doi.org/10.1186/s13731-018-0090-7</ext-link></comment></mixed-citation></ref>
<ref id="CIT0033"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hendrawan</surname>, <given-names>S.A</given-names></string-name>., <string-name><surname>Chatra</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Iman</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Hidayatullah</surname>, <given-names>S</given-names></string-name>. <string-name><surname>Suprayitno</surname>, <given-names>D</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Digital transformation in MSMEs: Challenges and opportunities in technology management</article-title>&#x2019;, <source><italic>Jurnal Informasi Dan Teknologi</italic></source> <volume>6</volume>(<issue>2</issue>), <fpage>141</fpage>&#x2013;<lpage>149</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.60083/jidt.v6i2.551">https://doi.org/10.60083/jidt.v6i2.551</ext-link></comment></mixed-citation></ref>
<ref id="CIT0034"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hlatshwayo</surname>, <given-names>M</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>The importance of securing telecommunications infrastructure</article-title>&#x2019;, <source><italic>Journal of Cybersecurity and Technology</italic></source> <volume>15</volume>(<issue>3</issue>), <fpage>67</fpage>&#x2013;<lpage>81</lpage>.</mixed-citation></ref>
<ref id="CIT0035"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Hutt</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Das</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Baker</surname>, <given-names>R.S</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>The right to be forgotten and educational data mining: Challenges and paths forward</article-title>&#x2019;, in <conf-name>Proceedings of the 16th International Conference on Educational Data Mining</conf-name>, <publisher-name>International Conference on Educational Data Mining</publisher-name>, <publisher-loc>Bengaluru, India</publisher-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>9</lpage>.</mixed-citation></ref>
<ref id="CIT0036"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jansen</surname>, <given-names>M</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Management support for Mobile BI adoption in South Africa</article-title>&#x2019;, <source><italic>African Business Review</italic></source> <volume>39</volume>(<issue>3</issue>), <fpage>55</fpage>&#x2013;<lpage>68</lpage>.</mixed-citation></ref>
<ref id="CIT0037"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jaradat</surname>, <given-names>Z</given-names></string-name>., <string-name><surname>Al-Dmour</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Alshurafat</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Al-Hazaima</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Al Shbail</surname>, <given-names>M.O</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Factors influencing business intelligence adoption: Evidence from Jordan</article-title>&#x2019;, <source><italic>Journal of Decision Systems</italic></source> <volume>33</volume>(<issue>2</issue>), <fpage>242</fpage>&#x2013;<lpage>262</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/12460125.2022.2094531">https://doi.org/10.1080/12460125.2022.2094531</ext-link></comment></mixed-citation></ref>
<ref id="CIT0038"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Johnson</surname>, <given-names>R.B</given-names></string-name>. &#x0026; <string-name><surname>Christensen</surname>, <given-names>L.B</given-names></string-name></person-group>., <year>2014</year>, <source><italic>Educational research: Quantitative, qualitative, and mixed approaches</italic></source>, <publisher-name>SAGE Publications</publisher-name>, <publisher-loc>Thousand Oaks, CA, USA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0039"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kalema</surname>, <given-names>M.B</given-names></string-name>., <string-name><surname>Olugbara</surname>, <given-names>O.O</given-names></string-name>. &#x0026; <string-name><surname>Kekwaletswe</surname>, <given-names>M.R</given-names></string-name></person-group>., <year>2012</year>, &#x2018;<article-title>The application of structural equation modeling technique to analyse students priorities in using course management systems</article-title>&#x2019;, <source><italic>International Journal of Computing and ICT Research</italic></source> <volume>5</volume>, <fpage>34</fpage>&#x2013;<lpage>44</lpage>.</mixed-citation></ref>
<ref id="CIT0040"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Kamoun</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Iqbal</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Esseghir</surname>, <given-names>M.A</given-names></string-name>. &#x0026; <string-name><surname>Baker</surname>, <given-names>T</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>AI and machine learning: A mixed blessing for cybersecurity</article-title>&#x2019;, in <conf-name>2020 International Symposium on Networks, Computers and Communications (ISNCC)</conf-name>, <conf-loc>Montreal, Quebec, Canada</conf-loc>, <conf-date>October 20&#x2013;22, 2020</conf-date>, pp. <fpage>1</fpage>&#x2013;<lpage>7</lpage>, <publisher-name>Institute of Electrical and Electronics Engineers (IEEE)</publisher-name>, <publisher-loc>Piscataway, NJ</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0041"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Karanja</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Njeru</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Otieno</surname>, <given-names>J</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Data governance in telecom: Policy challenges and Mobile BI readiness in South Africa</article-title>&#x2019;, <source><italic>Journal of Business Research</italic></source> <volume>138</volume>, <fpage>159</fpage>&#x2013;<lpage>170</lpage>.</mixed-citation></ref>
<ref id="CIT0042"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kasrim</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Murcahyanto</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Yusda</surname>, <given-names>D.D</given-names></string-name>. &#x0026; <string-name><surname>Ghade</surname>, <given-names>F</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>Impact of change management, communication effectiveness, and organizational readiness on digital transformation success</article-title>&#x2019;, <source><italic>Journal Management &#x0026; Economics Review (JUMPER)</italic></source> <volume>3</volume>(<issue>5</issue>), <fpage>547</fpage>&#x2013;<lpage>564</lpage>.</mixed-citation></ref>
<ref id="CIT0043"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kaur</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Stoltzfus</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Yellapu</surname>, <given-names>V</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Descriptive statistics</article-title>&#x2019;, <source><italic>International Journal of Academic Medicine</italic></source> <volume>4</volume>(<issue>1</issue>), <fpage>60</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4103/IJAM.IJAM_7_18">https://doi.org/10.4103/IJAM.IJAM_7_18</ext-link></comment></mixed-citation></ref>
<ref id="CIT0044"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kraus</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Jones</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Kailer</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Weinmann</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Chaparro-Banegas</surname>, <given-names>N</given-names></string-name>. &#x0026; <string-name><surname>Roig-Tierno</surname>, <given-names>N</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Digital transformation: An overview of the current state of the art of research</article-title>&#x2019;, <source><italic>SAGE Open</italic></source> <volume>11</volume>(<issue>3</issue>), <fpage>215824402110475</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/21582440211047576">https://doi.org/10.1177/21582440211047576</ext-link></comment></mixed-citation></ref>
<ref id="CIT0045"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Larkin</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Atkinson</surname>, <given-names>L</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Change implementation &#x2013; Managing the transition of a librarian service towards a sustainable future</article-title>&#x2019;, <source><italic>Journal of the Australian Library and Information Association</italic></source> <volume>73</volume>(<issue>1</issue>), <fpage>55</fpage>&#x2013;<lpage>65</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/24750158.2023.2298188">https://doi.org/10.1080/24750158.2023.2298188</ext-link></comment></mixed-citation></ref>
<ref id="CIT0046"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Leedy</surname>, <given-names>P.D</given-names></string-name>. &#x0026; <string-name><surname>Ormrod</surname>, <given-names>J.E</given-names></string-name></person-group>., <year>2016</year>, <source><italic>Practical research: Planning and design</italic></source>, <edition>11th</edition> edn., <publisher-name>Pearson Merrill Prentice Hall</publisher-name>, <publisher-loc>Harlow, Essex, England</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0047"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Machado</surname>, <given-names>C.G</given-names></string-name>., <string-name><surname>Winroth</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Almstr&#x00F6;m</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Ericson &#x00D6;berg</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Kurdve</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>AlMashalah</surname>, <given-names>S</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Digital organisational readiness: Experiences from manufacturing companies</article-title>&#x2019;, <source><italic>Journal of Manufacturing Technology Management</italic></source> <volume>32</volume>(<issue>9</issue>), <fpage>167</fpage>&#x2013;<lpage>182</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JMTM-05-2019-0188">https://doi.org/10.1108/JMTM-05-2019-0188</ext-link></comment></mixed-citation></ref>
<ref id="CIT0048"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Matoza</surname>, <given-names>R.</given-names>, <suffix>Jr.</suffix></string-name>, <string-name><surname>Miranda</surname>, <given-names>L.M.P</given-names></string-name>., <string-name><surname>Sitoy</surname>, <given-names>J.I</given-names></string-name>. &#x0026; <string-name><surname>Intal</surname>, <given-names>G.L.D</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Mobile Business Intelligence application design for retail micro and small enterprises (MSEs)</article-title>&#x2019;, in <conf-name>Proceedings of the 11th Annual International Conference on Industrial Engineering and Operations Management</conf-name>, <conf-loc>Singapore</conf-loc>, <conf-date>March 7&#x2013;11, 2021</conf-date>, pp. <fpage>3109</fpage>&#x2013;<lpage>3117</lpage>.</mixed-citation></ref>
<ref id="CIT0049"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Matthysee</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Nzuza</surname>, <given-names>M</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Mobile Business Intelligence: A key enabler in South African telecommunications</article-title>&#x2019;, <source><italic>South African Journal of Business Analytics</italic></source> <volume>17</volume>(<issue>2</issue>), <fpage>98</fpage>&#x2013;<lpage>112</lpage>.</mixed-citation></ref>
<ref id="CIT0050"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Michael</surname>, <given-names>C.I</given-names></string-name>., <string-name><surname>Ipede</surname>, <given-names>O.J</given-names></string-name>., <string-name><surname>Adejumo</surname>, <given-names>A.D</given-names></string-name>., <string-name><surname>Adenekan</surname>, <given-names>I.O</given-names></string-name>., <string-name><surname>Adebayo</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Ojo</surname>, <given-names>A.S</given-names></string-name>. <etal>et al</etal></person-group>., <year>2024</year>, &#x2018;<article-title>Data-driven decision making in IT: Leveraging AI and data science for business intelligence</article-title>&#x2019;, <source><italic>World Journal of Advanced Research and Reviews</italic></source> <volume>23</volume>(<issue>1</issue>), <fpage>472</fpage>&#x2013;<lpage>480</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.30574/wjarr.2024.23.1.2010">https://doi.org/10.30574/wjarr.2024.23.1.2010</ext-link></comment></mixed-citation></ref>
<ref id="CIT0051"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mohammed</surname>, <given-names>A.B</given-names></string-name>., <string-name><surname>Manaf</surname>, <given-names>A.-O</given-names></string-name>., <string-name><surname>Dhia</surname>, <given-names>Q</given-names></string-name>. &#x0026; <string-name><surname>Al-Majali</surname>, <given-names>M.K</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Towards an understanding of business intelligence and analytics usage: Evidence from the banking industry</article-title>&#x2019;, <source><italic>International Journal of Information Management Data Insights</italic></source> <volume>4</volume>(<issue>1</issue>), <fpage>100215</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jjimei.2024.100215">https://doi.org/10.1016/j.jjimei.2024.100215</ext-link></comment></mixed-citation></ref>
<ref id="CIT0052"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Mungoli</surname>, <given-names>N</given-names></string-name></person-group>., <year>2023</year>, <source><italic>Adaptive ensemble learning: Boosting model performance through intelligent feature fusion in deep neural networks</italic></source>, <fpage>arXiv</fpage>, <publisher-name>Cornell University Library</publisher-name>, <publisher-loc>Ithaca, NY, USA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0053"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mungoli</surname>, <given-names>N</given-names></string-name></person-group>., <year>2023</year>, <source><italic>Adaptive ensemble learning: Boosting model performance through intelligent feature fusion in deep neural networks</italic></source>.</mixed-citation></ref>
<ref id="CIT0054"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Muriithi</surname>, <given-names>G.M</given-names></string-name>. &#x0026; <string-name><surname>Kotz&#x00E9;</surname>, <given-names>J.E</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>A conceptual framework for delivering cost effective business intelligence solutions as a service</article-title>&#x2019;, in <conf-name>SAICSIT &#x2018;13: 2013 South African Institute for Computer Scientists and Information Technologists</conf-name>, <conf-loc>East London, South Africa</conf-loc>, <conf-date>October 7&#x2013;9, 2013</conf-date>, pp. <fpage>96</fpage>&#x2013;<lpage>100</lpage>, <publisher-name>Association for Computing Machinery</publisher-name>, <publisher-loc>New York, United States</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0055"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Musonda</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Mwanaumo</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Onososen</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Kalaoane</surname>, <given-names>R</given-names></string-name></person-group>., <year>2024</year>, <source><italic>Development and infrastructure in developing countries: A 10-year reflection</italic></source>, <publisher-name>CRC Press</publisher-name>, <publisher-loc>Boca Raton, Florida</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0056"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ngwenya</surname>, <given-names>P</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Technological infrastructure and Mobile BI readiness in South African organizations</article-title>&#x2019;, <source><italic>South African Journal of Technology and Development</italic></source> <volume>31</volume>(<issue>2</issue>), <fpage>78</fpage>&#x2013;<lpage>91</lpage>.</mixed-citation></ref>
<ref id="CIT0057"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Olivier</surname>, <given-names>M</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Building a security-first culture for Mobile BI</article-title>&#x2019;, <source><italic>Journal of Organizational Security</italic></source> <volume>22</volume>(<issue>1</issue>), <fpage>88</fpage>&#x2013;<lpage>102</lpage>.</mixed-citation></ref>
<ref id="CIT0058"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Pallant</surname>, <given-names>J</given-names></string-name></person-group>., <year>2020</year>, <source><italic>SPSS survival manual: A step by step guide to data analysis using IBM SPSS</italic></source>, <publisher-name>Routledge</publisher-name>, <publisher-loc>New York, USA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0059"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Peslak</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Hunsinger</surname>, <given-names>D.S</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>What is cybersecurity and what cybersecurity skills are employers seeking?</article-title>&#x2019;, <source><italic>Issues in Information Systems</italic></source> <volume>20</volume>(<issue>2</issue>), <fpage>62</fpage>&#x2013;<lpage>72</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48009/2_iis_2019_62-72">https://doi.org/10.48009/2_iis_2019_62-72</ext-link></comment></mixed-citation></ref>
<ref id="CIT0060"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Roberts</surname>, <given-names>J</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Competitive pressure and Mobile BI adoption in South African telecom companies</article-title>&#x2019;, <source><italic>Technology and Business Review</italic></source> <volume>16</volume>(<issue>5</issue>), <fpage>125</fpage>&#x2013;<lpage>138</lpage>.</mixed-citation></ref>
<ref id="CIT0061"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Saunders</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Lewis</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Thornhill</surname>, <given-names>A</given-names></string-name></person-group>., <year>2019</year>, <source><italic>Research methods for business students</italic></source>, <edition>8th</edition> edn., <publisher-name>Pearson</publisher-name>, <publisher-loc>Harlow, England, United Kingdom</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0062"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Siris</surname>, <given-names>V.A</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Popularity-aware mobile content management: When is knowing less better?</article-title>&#x2019;, <source><italic>Computer Networks</italic></source> <volume>170</volume>, <fpage>107080</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.comnet.2019.107080">https://doi.org/10.1016/j.comnet.2019.107080</ext-link></comment></mixed-citation></ref>
<ref id="CIT0063"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sultan</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Chan</surname>, <given-names>L.-K</given-names></string-name>., <string-name><surname>Siew</surname>, <given-names>P.-H</given-names></string-name>. &#x0026; <string-name><surname>Lee</surname>, <given-names>C.K</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Factors influencing cloud business intelligence adoption and use at organisational level</article-title>&#x2019;, <source><italic>ITM Web of Conferences</italic></source> <volume>67</volume>, <fpage>01019</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1051/itmconf/20246701019">https://doi.org/10.1051/itmconf/20246701019</ext-link></comment></mixed-citation></ref>
<ref id="CIT0064"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Taherdoost</surname>, <given-names>H</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Data collection methods and tools for research: A step-by-step guide to choose data collection technique for academic and business research projects</article-title>&#x2019;, <source><italic>International Journal of Academic Research in Management (IJARM)</italic></source> <volume>10</volume>(<issue>1</issue>), <fpage>10</fpage>&#x2013;<lpage>38</lpage>.</mixed-citation></ref>
<ref id="CIT0065"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tavera</surname>, <given-names>R.C.A</given-names></string-name>., <string-name><surname>Ortiz</surname>, <given-names>J.H</given-names></string-name>., <string-name><surname>Khalaf</surname>, <given-names>O.I</given-names></string-name>. &#x0026; <string-name><surname>R&#x00ED;os Prado</surname>, <given-names>A</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Business intelligence: Business evolution after Industry 4.0</article-title>&#x2019;, <source><italic>Sustainability</italic></source> <volume>13</volume>(<issue>18</issue>), <fpage>10026</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/su131810026">https://doi.org/10.3390/su131810026</ext-link></comment></mixed-citation></ref>
<ref id="CIT0066"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Tomas</surname>, <given-names>C.M.M</given-names></string-name>., <string-name><surname>Amsler</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Pinto-L&#x00F3;pez</surname>, <given-names>I.N</given-names></string-name>. &#x0026; <string-name><surname>Montaudon-Tom&#x00E1;s</surname>, <given-names>I.M</given-names></string-name></person-group>., <year>2024</year>, <source><italic>Evolution of business intelligence</italic></source>, pp. <fpage>57</fpage>&#x2013;<lpage>80</lpage>, <publisher-name>IGI Global</publisher-name>, <publisher-loc>Hershey, Pennsylvania</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0067"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Van der Merwe</surname>, <given-names>A</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Infrastructure security in Mobile BI systems</article-title>&#x2019;, <source><italic>Journal of Network and Information Security</italic></source> <volume>33</volume>(<issue>5</issue>), <fpage>202</fpage>&#x2013;<lpage>219</lpage>.</mixed-citation></ref>
<ref id="CIT0068"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Vrhovec</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Bernik</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Fujs</surname>, <given-names>D</given-names></string-name>. &#x0026; <string-name><surname>Vavpoti&#x010D;</surname>, <given-names>D</given-names></string-name></person-group>., <year>2024</year>, <source><italic>Cybersecurity competence of older adult users of mobile devices</italic></source>, <publisher-name>Association for Computing Machinery</publisher-name>, <publisher-loc>Xanthi, Greece</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0069"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Watson</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Kim</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Liu</surname>, <given-names>T</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Digital survey methods in higher education: Quantitative insights into student engagement</article-title>&#x2019;, <source><italic>Educational Technology Research and Development</italic></source> <volume>7</volume>(<issue>1</issue>), <fpage>88</fpage>&#x2013;<lpage>102</lpage>.</mixed-citation></ref>
<ref id="CIT0070"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Weichbroth</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Kowal</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Kalinowski</surname>, <given-names>M</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Toward a unified model of Mobile Business Intelligence (m-BI) acceptance and use</article-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>T.X.</given-names> <surname>Bui</surname></string-name> (ed.)</person-group>, <conf-name>Proceedings of the 55th Hawaii International Conference on System Sciences</conf-name>, <conf-date>January 3&#x2013;7, 2022</conf-date>, pp. <fpage>304</fpage>&#x2013;<lpage>313</lpage>, <publisher-name>IEEE Computer Society,Honolulu</publisher-name>, <publisher-loc>Hawaii, USA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0071"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Weritz</surname>, <given-names>P</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Hey leaders, it&#x2019;s time to train the workforce: Critical skills in the digital workplace</article-title>&#x2019;, <source><italic>Administrative Sciences</italic></source> <volume>12</volume>(<issue>3</issue>), <fpage>94</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/admsci12030094">https://doi.org/10.3390/admsci12030094</ext-link></comment></mixed-citation></ref>
<ref id="CIT0072"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Yang</surname>, <given-names>F</given-names></string-name>. &#x0026; <string-name><surname>Yao</surname>, <given-names>Z</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<chapter-title>Methodology for mobile phone location data mining</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>F.</given-names> <surname>Yang</surname></string-name> &#x0026; <string-name><given-names>Z.</given-names> <surname>Yao</surname></string-name> (eds.)</person-group>, <source><italic>Travel behavior characteristics analysis technology based on mobile phone location data</italic></source>, pp. <fpage>65</fpage>&#x2013;<lpage>93</lpage>, <publisher-name>Springer</publisher-name>, <publisher-loc>Singapore</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0073"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yueh</surname>, <given-names>H.-P</given-names></string-name>., <string-name><surname>Lu</surname>, <given-names>M.-H</given-names></string-name>. &#x0026; <string-name><surname>Lin</surname>, <given-names>W</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>Employees&#x2019; acceptance of mobile technology in a workplace: An empirical study using SEM and fsQCA</article-title>&#x2019;, <source><italic>Journal of Business Research</italic></source> <volume>69</volume>(<issue>6</issue>), <fpage>2318</fpage>&#x2013;<lpage>2324</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jbusres.2015.12.048">https://doi.org/10.1016/j.jbusres.2015.12.048</ext-link></comment></mixed-citation></ref>
<ref id="CIT0074"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Za</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Scornavacca</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Pallud</surname>, <given-names>J</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Enhancing workplace competence acquisition through a persuasive system</article-title>&#x2019;, <source><italic>Information Systems and E-Business Management</italic></source> <volume>20</volume>(<issue>4</issue>), <fpage>819</fpage>&#x2013;<lpage>846</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10257-022-00571-6">https://doi.org/10.1007/s10257-022-00571-6</ext-link></comment></mixed-citation></ref>
<ref id="CIT0075"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Zaerens</surname>, <given-names>K</given-names></string-name></person-group>., <year>2023</year>, <source><italic>Privacy preserving data mining in high security public authority environment</italic></source>, <publisher-name>Finnish National Defence University</publisher-name>, <publisher-loc>Helsinki, Finland</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0076"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname>, <given-names>L</given-names></string-name>. &#x0026; <string-name><surname>Liu</surname>, <given-names>T</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Mobile device management for secure Mobile BI access</article-title>&#x2019;, <source><italic>International Journal of Mobile Computing</italic></source> <volume>26</volume>(<issue>3</issue>), <fpage>157</fpage>&#x2013;<lpage>172</lpage>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn><p><bold>How to cite this article:</bold> Lemekwane, M.P., Ruxwana, N., Lavhengwa, T.J. &#x0026; Ojo, S.O., 2026, &#x2018;Factors affecting Mobile Business Intelligence readiness in the South African telecom sector&#x2019;, <italic>South African Journal of Information Management</italic> 28(1), a2097. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/sajim.v28i1.2097">https://doi.org/10.4102/sajim.v28i1.2097</ext-link></p></fn>
</fn-group>
</back>
</article>