ARCHIVES

Review Article

Maturity Models for Business Intelligence: An Overview

Rafi Ahmad Khan1 Mansoor Farooq2
1 Department of management studies, University of Kashmir, Jammu & Kashmir, India. 2 College of Engineering and Computing, American University of Bahrain, Bahrain.

Published Online: January-April 2025

Pages: 13-16

References

1. Arch, T. (2007). TDWI Research: TDWI Benchmark Guide Interpreting Benchmark Scores Using TDWI'S Maturity Model.
2. CMMI Product Team, T. (2010). CMMI for Development, Version 1.3. (Technical Report CMU/SEI-2010-TR-033).
doi:https://doi.org/10.1184/R1/6572342.v1
3. David, L. (2003). Business Intelligence:The Savvy Managers Guide. Addison Wesley.
4. David, L. (2010). The Benefits Of Embedding High Value Business Intelligence. http://events.businessobjects.com/
forms/Q309/oemctr/ebook/downloads/embedding_high_value_bi.pdf.
5. Deng, R. (2007, March 5). Business Intelligence Maturity Hierarchy. Retrieved from http://www.information-
management.com/infodirect/20070323/1079089-1.html
6. Eckerson, W. (2004, April 29). Gauge Your Data Warehouse Maturity. DM Review, 14(11).
7. Eckerson, W. (2009). TDWI'S Business Intelligence Maturity Model. Chatsworth: The Data Warehousing Institute.
8. Economics, C. (2009, February 19). Business Intelligence: Bright spot in IT Investment. Computer Economics Inc. Retrieved January
19, 2011, from http://www.computereconomics.com/article.cfm?id=1406
9. Humphrey, W. S. (1989). Managing The Software Process. Pittsburgh: Addison-Wesley.
10. Negash, S. (2004). Business Intelligence. Communications of the Association For Information Systems, 13, 177-195.
doi:https://doi.org/10.17705/1CAIS.01315
11. Power, D. J. (2007). A Brief History of Decision Support System. DSSResources.COM, Version 4.0. Retrieved from
http://dssresources.com/history/dsshistory.html,March 10
12. William, N. (April 2009). The Profit Impact Of Business Intelligence. San Francisco: Morgan Kaufmann.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

2025

Restaurant Table Reservation with Food Ordering

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401003

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.