The Impact of Business Intelligence on Strategic Ambidexterity: The Mediating Role of Knowledge Sharing
DOI:
https://doi.org/10.34190/ejbrm.23.1.3719Keywords:
Business intelligence, Strategic ambidexterity, Knowledge sharing, Telecom, JordanAbstract
This study investigates the mediating role of knowledge sharing in the relationship between business intelligence and strategic ambidexterity within Jordanian telecommunication companies. Utilizing a descriptive analytical approach, data were collected through an electronic questionnaire distributed to 350 managers, yielding 269 valid responses analysed via Structural Equation Modelling (SEM) with Smart PLS 4.1. The methodological rigor of employing SEM allows for a nuanced examination of the complex interplay among latent variables, which include business intelligence (with constructs such as Data Mining, Data Warehousing, OLAP, and Reporting) and strategic ambidexterity (focusing on Exploration and Exploitation).Findings reveal that all latent variables exhibit significant importance, with business intelligence positively impacting strategic ambidexterity, mediated by knowledge sharing. These results advocate enhanced knowledge sharing practices within organizations, enabling internal experts to leverage insights into external opportunities through well-structured business intelligence reports. Overall, this research contributes to the advancement of methodology in business and management by establishing a robust framework for analysing the mediating effects of knowledge sharing, while providing actionable insights for enhancing strategic decision-making in the telecommunications sector. Future studies may further explore the dynamics of these relationships across different industries, thereby enriching the field of business management research.
Downloads
Published
License
Copyright (c) 2025 Rakan Alsarayreh, Ola Buraik

This work is licensed under a Creative Commons Attribution 4.0 International License.
Open Access Publishing
The Electronic Journal of Business Research Methods operates an Open Access Policy. This means that users can read, download, copy, distribute, print, search, or link to the full texts of articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. The only constraint on reproduction and distribution, and the only role for copyright in this domain, is that authors control the integrity of their work, which should be properly acknowledged and cited.