A Framework for Broadband Adoption in Buffalo City Metropolitan Municipality to Enable Citizen Access to e-Government
- Twetwa-Dube, Sithandile Pornelia
- Authors: Twetwa-Dube, Sithandile Pornelia
- Date: 2020
- Subjects: Electronic government information
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/18963 , vital:43003
- Description: E-government has been adopted as one of the cornerstones of the government‘s strategy for making services accessible to its citizens. The aim of this broadband adoption is to provide high quality public sector services via digital channels to improve cost-efficiency and generate benefits to municipality employees and citizen. A major challenge that municipalities face is the lack of public participation which restricts levels of communication between governments and municipalities and the citizen where public misses out on information and services available online, which results in further inequality. This has a devastating impact on service delivery because participatory democracy would be non-existent. Limited IT infrastructure, resistance to change, cultural barriers and exposure of malpractice are main themes related to IT usage or facilitating IT access for the wider public. Furthermore, lack of meaningful participation and freedom of association emerged as themes related to governance effectiveness. A mixed approach within a case study was considered, and data was collected through an online questionnaire and review of current literature. The study collected primary data by conducting web based questionnaires comprising sixty respondent’s citizens and fifteen municipal employees, including Information and Communication Technology (ICT) employees and broadband task team members. Statistical Package for the Social Science (SPSS) to analyse data from questionnaires. The selected BCMM employees of the population were known to have the relevant knowledge, time and experience to participate. Responses to each question developed the framework further based on the findings. Respondents were selected based on their appropriate knowledge and experience of the problem domain. Six experts were selected for final evaluation of the research findings. Firstly, the findings provided on barriers impact on the adoption of e-government. Secondly, on the techniques available to ensure access to e-government within BCMM. Thirdly, on the availability of technologies currently in the Buffalo City Metropolitan Municipality. Finally, on the elements of a Buffalo City Metropolitan Municipality broadband adoption strategy. This study evaluates barriers of e-government adoption, assessing strategies and techniques for accessing e-government services, examines current technologies to support e-government service within municipalities and analyses elements of Buffalo City Metropolitan Municipality broadband adoption strategy. A broadband adoption model was proposed based on empirical findings. Key adoption factors include adoption benefits and drivers, concerns and barriers and adoption interventions. These factors provide an essential foundation for the development of the proposed broadband adoption framework. The contribution of this study is a framework based on the Unified Theory of Acceptance and Use of Technology (UTAUT) and Technology Organisation Environment (TOE) framework to determine factors that influence or restrict a citizen’s intention to use and adopt technology, specifically broadband, in e-government services as a tool for citizen engagement. The proposed framework aims to overcome barriers to broadband adoption 4 Final Submission of Thesis, Dissertation or Research Report/Project, Conference or Exam Paper in municipalities, specifically Buffalo City Metropolitan Municipality (BCMM) to enable citizens’ access to e-government services.
- Full Text:
- Date Issued: 2020
- Authors: Twetwa-Dube, Sithandile Pornelia
- Date: 2020
- Subjects: Electronic government information
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/18963 , vital:43003
- Description: E-government has been adopted as one of the cornerstones of the government‘s strategy for making services accessible to its citizens. The aim of this broadband adoption is to provide high quality public sector services via digital channels to improve cost-efficiency and generate benefits to municipality employees and citizen. A major challenge that municipalities face is the lack of public participation which restricts levels of communication between governments and municipalities and the citizen where public misses out on information and services available online, which results in further inequality. This has a devastating impact on service delivery because participatory democracy would be non-existent. Limited IT infrastructure, resistance to change, cultural barriers and exposure of malpractice are main themes related to IT usage or facilitating IT access for the wider public. Furthermore, lack of meaningful participation and freedom of association emerged as themes related to governance effectiveness. A mixed approach within a case study was considered, and data was collected through an online questionnaire and review of current literature. The study collected primary data by conducting web based questionnaires comprising sixty respondent’s citizens and fifteen municipal employees, including Information and Communication Technology (ICT) employees and broadband task team members. Statistical Package for the Social Science (SPSS) to analyse data from questionnaires. The selected BCMM employees of the population were known to have the relevant knowledge, time and experience to participate. Responses to each question developed the framework further based on the findings. Respondents were selected based on their appropriate knowledge and experience of the problem domain. Six experts were selected for final evaluation of the research findings. Firstly, the findings provided on barriers impact on the adoption of e-government. Secondly, on the techniques available to ensure access to e-government within BCMM. Thirdly, on the availability of technologies currently in the Buffalo City Metropolitan Municipality. Finally, on the elements of a Buffalo City Metropolitan Municipality broadband adoption strategy. This study evaluates barriers of e-government adoption, assessing strategies and techniques for accessing e-government services, examines current technologies to support e-government service within municipalities and analyses elements of Buffalo City Metropolitan Municipality broadband adoption strategy. A broadband adoption model was proposed based on empirical findings. Key adoption factors include adoption benefits and drivers, concerns and barriers and adoption interventions. These factors provide an essential foundation for the development of the proposed broadband adoption framework. The contribution of this study is a framework based on the Unified Theory of Acceptance and Use of Technology (UTAUT) and Technology Organisation Environment (TOE) framework to determine factors that influence or restrict a citizen’s intention to use and adopt technology, specifically broadband, in e-government services as a tool for citizen engagement. The proposed framework aims to overcome barriers to broadband adoption 4 Final Submission of Thesis, Dissertation or Research Report/Project, Conference or Exam Paper in municipalities, specifically Buffalo City Metropolitan Municipality (BCMM) to enable citizens’ access to e-government services.
- Full Text:
- Date Issued: 2020
Critical Success Factors to Motivate Citizens to Participate in a Public Safety Smart City Project
- Authors: Tuswa, Mbali
- Date: 2020
- Subjects: Information technology -- Security measures City planning
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/18974 , vital:43004
- Description: Currently more people reside in urban areas than previously. The population shift from rural to urban results in increased problems with Public Safety. Public Safety initiatives were introduced to address such issues and help reduce the increasing number of urban problems. It is the citizen's responsibility to report the Public Safety issues they observe or experience for authorities to respond quickly in emergency situations, thus maintaining a safer living environment for all citizens. A Public Safety Smart City Project was introduced in the city of East London, South Africa to help improve Public Safety in the city. However, for this to be successful citizens need to contribute by reporting Public Safety issues and suspicious activities. This study is therefore focused on motivational factors to improve citizen participation in a Public Safety Smart City Project. The Design Science Methodology and a mixed method approach guided this research study. Keller’s (2010) Attention, Relevance, Confidence, Satisfaction (ARCS) Theory of Motivation provided the theoretical base for this study. A questionnaire was used to gather data on the motivational factors for participation in a Public Safety Smart City Project. Five Critical Success Factors were developed to motivate citizens to participate in a Public Safety Smart City Project. These Critical Success Factors are: Ensure user satisfaction by providing a toll-free number, Citizens should be able to participate due to their concerns of safety for others, Citizens should be given the opportunity to make a difference in their community, Public Safety initiatives must provide adequate response to citizens and Citizens should be given incentives after participating. The Critical Success Factors were refined and verified through two rounds of expert review. Five factors were identified in the findings as factors that contribute towards motivating citizens participate. These factors include User Satisfaction, Making a difference, Response from Public Safety initiatives, Concern of safety for others and Incentives. The factors were included on the Critical Success Factors
- Full Text:
- Date Issued: 2020
- Authors: Tuswa, Mbali
- Date: 2020
- Subjects: Information technology -- Security measures City planning
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/18974 , vital:43004
- Description: Currently more people reside in urban areas than previously. The population shift from rural to urban results in increased problems with Public Safety. Public Safety initiatives were introduced to address such issues and help reduce the increasing number of urban problems. It is the citizen's responsibility to report the Public Safety issues they observe or experience for authorities to respond quickly in emergency situations, thus maintaining a safer living environment for all citizens. A Public Safety Smart City Project was introduced in the city of East London, South Africa to help improve Public Safety in the city. However, for this to be successful citizens need to contribute by reporting Public Safety issues and suspicious activities. This study is therefore focused on motivational factors to improve citizen participation in a Public Safety Smart City Project. The Design Science Methodology and a mixed method approach guided this research study. Keller’s (2010) Attention, Relevance, Confidence, Satisfaction (ARCS) Theory of Motivation provided the theoretical base for this study. A questionnaire was used to gather data on the motivational factors for participation in a Public Safety Smart City Project. Five Critical Success Factors were developed to motivate citizens to participate in a Public Safety Smart City Project. These Critical Success Factors are: Ensure user satisfaction by providing a toll-free number, Citizens should be able to participate due to their concerns of safety for others, Citizens should be given the opportunity to make a difference in their community, Public Safety initiatives must provide adequate response to citizens and Citizens should be given incentives after participating. The Critical Success Factors were refined and verified through two rounds of expert review. Five factors were identified in the findings as factors that contribute towards motivating citizens participate. These factors include User Satisfaction, Making a difference, Response from Public Safety initiatives, Concern of safety for others and Incentives. The factors were included on the Critical Success Factors
- Full Text:
- Date Issued: 2020
Critical Success Factors for Enhanced Information Systems Capabilities in Water Billing Processes: A Case Study of Buffalo City Metropolitan Municipality
- Authors: Naki, Avuyile
- Date: 2019
- Subjects: Information networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/13793 , vital:39712
- Description: Water is a nation's most precious resource as humans depend upon it for their lives and livelihoods. Water resources, therefore, require efficient and strategic management by those entities tasked with such a responsibility. Municipalities manage the water distribution to local citizens, but experience challenges due to the numerous tasks involved in water management. A major challenge that municipalities face is inefficiencies in water management business processes due to immature information system capabilities. Many studies focus on the infrastructure-related challenges such as ageing pipes, but little emphasis is placed on the information system-based challenges in water management and their relationship to the local water consumer. Therefore, the focus of this research investigation was on the water billing process activities and the information systems involved in these activities. The study collected primary data by conducting a focus group comprising seven respondents working in water billing-related processes and then conducted semi-structured interviews with two managers at the Buffalo City Metropolitan Municipality (BCMM). The Nvivo software tool was used to organise the collected data. Finally, the collected data was analysed using the principles of thematic analysis. Firstly, the primary evidence indicates that the water billing information systems that are used at BCMM are unintegrated. Secondly, that there are numerous manual processes in the water billing-related processes, which lead to mistakes in the capturing of consumer data. Thirdly, the analysis confirms that BCMM is faced with water management challenges. Fourthly, the analysis revealed that there is inadequate communication between various water billing information systems that are used, which results in delays in data capturing, errors and outdated information. The findings conclude that BCMM has immature water billing information system capabilities and that there are problems related to water processes. The research investigation derived several critical success factors (CSFs) for BCMM to action to ensure that their water billing information systems are enhanced. The CSFs were reviewed by the two managers used for the study in order to ascertain their relevance to the context and were considered relevant by the managers. Therefore, the recommendation is that BCMM, and other municipalities with similar contexts, should action the proposed CSFs to enhance their water billing-related information systems capabilities.
- Full Text:
- Date Issued: 2019
- Authors: Naki, Avuyile
- Date: 2019
- Subjects: Information networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/13793 , vital:39712
- Description: Water is a nation's most precious resource as humans depend upon it for their lives and livelihoods. Water resources, therefore, require efficient and strategic management by those entities tasked with such a responsibility. Municipalities manage the water distribution to local citizens, but experience challenges due to the numerous tasks involved in water management. A major challenge that municipalities face is inefficiencies in water management business processes due to immature information system capabilities. Many studies focus on the infrastructure-related challenges such as ageing pipes, but little emphasis is placed on the information system-based challenges in water management and their relationship to the local water consumer. Therefore, the focus of this research investigation was on the water billing process activities and the information systems involved in these activities. The study collected primary data by conducting a focus group comprising seven respondents working in water billing-related processes and then conducted semi-structured interviews with two managers at the Buffalo City Metropolitan Municipality (BCMM). The Nvivo software tool was used to organise the collected data. Finally, the collected data was analysed using the principles of thematic analysis. Firstly, the primary evidence indicates that the water billing information systems that are used at BCMM are unintegrated. Secondly, that there are numerous manual processes in the water billing-related processes, which lead to mistakes in the capturing of consumer data. Thirdly, the analysis confirms that BCMM is faced with water management challenges. Fourthly, the analysis revealed that there is inadequate communication between various water billing information systems that are used, which results in delays in data capturing, errors and outdated information. The findings conclude that BCMM has immature water billing information system capabilities and that there are problems related to water processes. The research investigation derived several critical success factors (CSFs) for BCMM to action to ensure that their water billing information systems are enhanced. The CSFs were reviewed by the two managers used for the study in order to ascertain their relevance to the context and were considered relevant by the managers. Therefore, the recommendation is that BCMM, and other municipalities with similar contexts, should action the proposed CSFs to enhance their water billing-related information systems capabilities.
- Full Text:
- Date Issued: 2019
A framework for implementation of ICT4D initiatives in the Eastern Cape province of South Africa
- Authors: Phingilili, Gcotyelwa
- Date: 2014
- Subjects: Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11146 , http://hdl.handle.net/10353/d1017789 , Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Description: South Africa’s rural communities have received Information and Communication Technologies services through initiatives such as tele-centres, living labs, Thusong service centres and donations of computer applications. There is need, with little plans in place to ensure that the rural communities will benefit from those initiatives. As a result of this, it is necessary to establish a framework for implementing Information and Communication Technologies for development initiatives in order to ensure successful implementation of these initiatives in rural communities. Literature shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of Information and Communication Technologies policies, presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Current literature on ICT developments shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of ICT policies, and presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Unstructured interviews were used as a research method to collect primary data that was used as a basis to develop the proposed framework. Findings from the studies carried out indicated that several ICT4D initiatives which were abandoned due to challenges such lack of proper resources, trainings, lack of local content, access, lack of ownership and lack of stakeholders’ involvement. This study presents a framework for implementing ICT for development initiatives in rural communities which has been developed in order to reduce the number of initiatives that are abandoned or which end up not serving their intended purpose in rural communities of South Africa.
- Full Text:
- Date Issued: 2014
- Authors: Phingilili, Gcotyelwa
- Date: 2014
- Subjects: Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11146 , http://hdl.handle.net/10353/d1017789 , Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Description: South Africa’s rural communities have received Information and Communication Technologies services through initiatives such as tele-centres, living labs, Thusong service centres and donations of computer applications. There is need, with little plans in place to ensure that the rural communities will benefit from those initiatives. As a result of this, it is necessary to establish a framework for implementing Information and Communication Technologies for development initiatives in order to ensure successful implementation of these initiatives in rural communities. Literature shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of Information and Communication Technologies policies, presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Current literature on ICT developments shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of ICT policies, and presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Unstructured interviews were used as a research method to collect primary data that was used as a basis to develop the proposed framework. Findings from the studies carried out indicated that several ICT4D initiatives which were abandoned due to challenges such lack of proper resources, trainings, lack of local content, access, lack of ownership and lack of stakeholders’ involvement. This study presents a framework for implementing ICT for development initiatives in rural communities which has been developed in order to reduce the number of initiatives that are abandoned or which end up not serving their intended purpose in rural communities of South Africa.
- Full Text:
- Date Issued: 2014
A model for attaining extended e-commerce adoption and use by hospitality smmes in the Eastern Cape Province
- Authors: Maoneke, Pardon Blessings
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11147 , http://hdl.handle.net/10353/d1017897
- Description: There is a slow adoption and use of electronic commerce or e-Commerce by Small, Medium and Micro-sized Enterprises based in the hospitality sector (hospitality SMMEs). Only a few hospitality SMMEs that have adopted e-Commerce show the migration of value adding activities to their e-Commerce platforms. As such, this study developed and proposed a model that shows how hospitality SMMEs in the Eastern Cape Province can attain extended e-Commerce adoption and use. Extended e-Commerce platforms are characterised by the institutionalization of e-Commerce that includes Search Engine Marketing activities and/or listing services on intermediary websites, and engaging through social media websites. Tourism and hospitality customers’ information needs and buying behaviour were used to guide the requirements of extended e-Commerce platforms for hospitality businesses. The proposed model outlined factors determining extended e-Commerce adoption, extended e-Commerce characteristics and the anticipated e-Commerce adoption outcomes. The model was evaluated in the Eastern Cape using a multiple-case study methodology. The study’s use of a multiple-case study was applied within the interpretivist paradigm and four cases were considered. Triangulation through document analysis, interviews and observation was used for collecting data regarding factors determining the transition to extended e-Commerce adoption. A questionnaire was used for evaluating extended e-Commerce use. Within and cross-case analysis with the aid of coding was used for data analysis. Data collection and analysis validated the proposed model as a model that shows how hospitality SMMEs can attain extended e-Commerce adoption and use. The proposed model concedes that, successful adoption and use of e-Commerce by hospitality SMMEs would result in e-Commerce adoption outcomes namely online sales, reservations and customer service. These e-Commerce adoption outcomes are the criteria against which the level of extended e-Commerce adoption is measured.
- Full Text:
- Date Issued: 2014
- Authors: Maoneke, Pardon Blessings
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11147 , http://hdl.handle.net/10353/d1017897
- Description: There is a slow adoption and use of electronic commerce or e-Commerce by Small, Medium and Micro-sized Enterprises based in the hospitality sector (hospitality SMMEs). Only a few hospitality SMMEs that have adopted e-Commerce show the migration of value adding activities to their e-Commerce platforms. As such, this study developed and proposed a model that shows how hospitality SMMEs in the Eastern Cape Province can attain extended e-Commerce adoption and use. Extended e-Commerce platforms are characterised by the institutionalization of e-Commerce that includes Search Engine Marketing activities and/or listing services on intermediary websites, and engaging through social media websites. Tourism and hospitality customers’ information needs and buying behaviour were used to guide the requirements of extended e-Commerce platforms for hospitality businesses. The proposed model outlined factors determining extended e-Commerce adoption, extended e-Commerce characteristics and the anticipated e-Commerce adoption outcomes. The model was evaluated in the Eastern Cape using a multiple-case study methodology. The study’s use of a multiple-case study was applied within the interpretivist paradigm and four cases were considered. Triangulation through document analysis, interviews and observation was used for collecting data regarding factors determining the transition to extended e-Commerce adoption. A questionnaire was used for evaluating extended e-Commerce use. Within and cross-case analysis with the aid of coding was used for data analysis. Data collection and analysis validated the proposed model as a model that shows how hospitality SMMEs can attain extended e-Commerce adoption and use. The proposed model concedes that, successful adoption and use of e-Commerce by hospitality SMMEs would result in e-Commerce adoption outcomes namely online sales, reservations and customer service. These e-Commerce adoption outcomes are the criteria against which the level of extended e-Commerce adoption is measured.
- Full Text:
- Date Issued: 2014
A public safety, participatory crowdsourcing smart city model for a developing country
- Authors: Cilliers, Liezel
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11144 , http://hdl.handle.net/10353/d1015305
- Description: Worldwide the population in cities is increasing. It is the responsibility of local government to provide public safety services in order to ensure the safety of their citizens and, yet, the local government often have inadequate resources to do this. ‘Smart Cities’ is a new and innovative concept that has emerged during the past few years and which involves using current infrastructure and resources more effectively and efficiently. One of the methods used to collect data in a smart city is participatory crowdsourcing but, in order to ensure effectiveness and efficiency, it is essential that a large amount of data be collected from the participants in such a project, who are generally citizens residing in the city. This study was conducted in the city of East London, which is part of the Buffalo City Metropolitan Municipality (BCMM). The study made use of a Design Science approach with a mixed method data collection method. The quantitative data collection comprised a questionnaire that was completed by 394 participants, while the qualitative data collection included a detailed literature review, conversational analysis and observations arising from the building of the crowdsourcing system prototype. The design artefact produced by this research is a model based on the literature, conversational analysis and the principles and concepts learnt from the prototype. Thus, this model represents what must be incorporated in the prototype to assist with the implementation of a public safety, participatory crowdsourcing smart city in a developing country. The model includes three areas ‒ the crowdsourcing system, the city (Buffalo City Metropolitan Municipality) and the citizens of East London. The crowdsourcing system incorporates factors of information security, specifically the CIA triad, and the usability of the crowdsourcing system. Usability includes characteristics such as the quality of the system and interface, as well as the usefulness of the public safety, participatory crowdsourcing system which was used to measure the confidence of the East London citizens in the system. Three steps were identified in the literature as being necessary for the implementation of a smart city project by a city. These steps include the planning, development and delivery of the smart city project. Finally, the trustworthiness of the public safety participatory crowdsourcing system is determined by the ability, reliability and benevolence of the system. These three characteristics were included in the citizen factor of the model.
- Full Text:
- Date Issued: 2014
- Authors: Cilliers, Liezel
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11144 , http://hdl.handle.net/10353/d1015305
- Description: Worldwide the population in cities is increasing. It is the responsibility of local government to provide public safety services in order to ensure the safety of their citizens and, yet, the local government often have inadequate resources to do this. ‘Smart Cities’ is a new and innovative concept that has emerged during the past few years and which involves using current infrastructure and resources more effectively and efficiently. One of the methods used to collect data in a smart city is participatory crowdsourcing but, in order to ensure effectiveness and efficiency, it is essential that a large amount of data be collected from the participants in such a project, who are generally citizens residing in the city. This study was conducted in the city of East London, which is part of the Buffalo City Metropolitan Municipality (BCMM). The study made use of a Design Science approach with a mixed method data collection method. The quantitative data collection comprised a questionnaire that was completed by 394 participants, while the qualitative data collection included a detailed literature review, conversational analysis and observations arising from the building of the crowdsourcing system prototype. The design artefact produced by this research is a model based on the literature, conversational analysis and the principles and concepts learnt from the prototype. Thus, this model represents what must be incorporated in the prototype to assist with the implementation of a public safety, participatory crowdsourcing smart city in a developing country. The model includes three areas ‒ the crowdsourcing system, the city (Buffalo City Metropolitan Municipality) and the citizens of East London. The crowdsourcing system incorporates factors of information security, specifically the CIA triad, and the usability of the crowdsourcing system. Usability includes characteristics such as the quality of the system and interface, as well as the usefulness of the public safety, participatory crowdsourcing system which was used to measure the confidence of the East London citizens in the system. Three steps were identified in the literature as being necessary for the implementation of a smart city project by a city. These steps include the planning, development and delivery of the smart city project. Finally, the trustworthiness of the public safety participatory crowdsourcing system is determined by the ability, reliability and benevolence of the system. These three characteristics were included in the citizen factor of the model.
- Full Text:
- Date Issued: 2014
A resource management framework for sustainability of rural ICT4D projects in Zimbabwe
- Authors: Mugoni, Hope
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/689 , vital:26488
- Description: Developing countries are embracing Information Communication Technologies (ICTs) as a tool for alleviating poverty. There are, however, still challenges that developing countries face in trying to establish Information Communication Technology for Development (ICT4D). Among the major challenges is the lack of proper resource management which results in poor sustainability of ICT4D initiatives. If these ICT4D initiatives are to be sustainable for the benefit of current and future generations, proper resource management methods are to be developed and applied. This study proposes a resource management framework that can be applied to the management of ICT4D resources with the aim of achieving sustainability. The framework is informed by theory, and validated through enquiry in the field. Qualitative research methodology was used as a research approach for this study where three rural ICT4D initiatives were used as case studies. The case studies were conducted in rural Zimbabwe to investigate how proper resource management can influence the sustainability of ICT4D initiatives. It was identified from the study that the lack of proper resource management methods adversely affects the initiatives’ sustainability. The proposed resource management framework will guide ICT4D resource management to enhance the initiatives’ sustainability.
- Full Text:
- Date Issued: 2014
- Authors: Mugoni, Hope
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/689 , vital:26488
- Description: Developing countries are embracing Information Communication Technologies (ICTs) as a tool for alleviating poverty. There are, however, still challenges that developing countries face in trying to establish Information Communication Technology for Development (ICT4D). Among the major challenges is the lack of proper resource management which results in poor sustainability of ICT4D initiatives. If these ICT4D initiatives are to be sustainable for the benefit of current and future generations, proper resource management methods are to be developed and applied. This study proposes a resource management framework that can be applied to the management of ICT4D resources with the aim of achieving sustainability. The framework is informed by theory, and validated through enquiry in the field. Qualitative research methodology was used as a research approach for this study where three rural ICT4D initiatives were used as case studies. The case studies were conducted in rural Zimbabwe to investigate how proper resource management can influence the sustainability of ICT4D initiatives. It was identified from the study that the lack of proper resource management methods adversely affects the initiatives’ sustainability. The proposed resource management framework will guide ICT4D resource management to enhance the initiatives’ sustainability.
- Full Text:
- Date Issued: 2014
Towards a framework for enhancing user trust in cloud computing
- Authors: Nyoni, Tamsanqa B
- Date: 2014
- Subjects: Adoption -- Cloud Computing , User Trust
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11142 , http://hdl.handle.net/10353/d1014674 , Adoption -- Cloud Computing , User Trust
- Description: Cloud computing is one of the latest appealing technological trends to emerge in the Information Technology (IT) industry. However, despite the surge in activity and interest, there are significant and persistent concerns about cloud computing, particularly with regard to trusting the platform in terms of confidentiality, integrity and availability of user data stored through these applications. These factors are significant in determining trust in cloud computing and thus provide the foundation for this study. The significant role that trust plays in the use of cloud computing was considered in relation to various trust models, theories and frameworks. Cloud computing is still considered to be a new technology in the business world, therefore minimal work and academic research has been done on enhancing trust in cloud computing. Academic research which focuses on the adoption of cloud computing and, in particular, the building of user trust has been minimal. The available trust models, frameworks and cloud computing adoption strategies that exist mainly focus on cost reduction and the various benefits that are associated with migrating to a cloud computing platform. Available work on cloud computing does not provide clear guidelines for establishing user trust in a cloud computing application. The issue of establishing a reliable trust context for data and security within cloud computing is, up to this point, not well defined. This study investigates the impact that a lack of user trust has on the use of cloud computing. Strategies for enhancing user trust in cloud computing are required to overcome the data security concerns. This study focused on establishing methods to enhance user trust in cloud computing applications through the theoretical contributions of the Proposed Trust Model by Mayer, Davis, and Schoorman (1995) and the Confidentiality, Integrity, Availability (CIA) Triad by Steichen (2010). A questionnaire was used as a means of gathering data on trust-related perceptions of the use of cloud computing. The findings of this questionnaire administered to users and potential users of cloud computing applications are reported in this study. The questionnaire primarily investigates key concerns which result in self-moderation of cloud computing use and factors which would improve trust in cloud computing. Additionally, results relating to user awareness of potential confidentiality, integrity and availability risks are described. An initial cloud computing adoption model was proposed based on a content analysis of existing cloud computing literature. This initial model, empirically tested through the questionnaire, was an important foundation for the establishment of the Critical Success Factors (CSFs) and therefore the framework to enhance user trust in cloud computing applications. The framework proposed by this study aims to assist new cloud computing users to determine the appropriateness of a cloud computing service, thereby enhancing their trust in cloud computing applications.
- Full Text:
- Date Issued: 2014
- Authors: Nyoni, Tamsanqa B
- Date: 2014
- Subjects: Adoption -- Cloud Computing , User Trust
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11142 , http://hdl.handle.net/10353/d1014674 , Adoption -- Cloud Computing , User Trust
- Description: Cloud computing is one of the latest appealing technological trends to emerge in the Information Technology (IT) industry. However, despite the surge in activity and interest, there are significant and persistent concerns about cloud computing, particularly with regard to trusting the platform in terms of confidentiality, integrity and availability of user data stored through these applications. These factors are significant in determining trust in cloud computing and thus provide the foundation for this study. The significant role that trust plays in the use of cloud computing was considered in relation to various trust models, theories and frameworks. Cloud computing is still considered to be a new technology in the business world, therefore minimal work and academic research has been done on enhancing trust in cloud computing. Academic research which focuses on the adoption of cloud computing and, in particular, the building of user trust has been minimal. The available trust models, frameworks and cloud computing adoption strategies that exist mainly focus on cost reduction and the various benefits that are associated with migrating to a cloud computing platform. Available work on cloud computing does not provide clear guidelines for establishing user trust in a cloud computing application. The issue of establishing a reliable trust context for data and security within cloud computing is, up to this point, not well defined. This study investigates the impact that a lack of user trust has on the use of cloud computing. Strategies for enhancing user trust in cloud computing are required to overcome the data security concerns. This study focused on establishing methods to enhance user trust in cloud computing applications through the theoretical contributions of the Proposed Trust Model by Mayer, Davis, and Schoorman (1995) and the Confidentiality, Integrity, Availability (CIA) Triad by Steichen (2010). A questionnaire was used as a means of gathering data on trust-related perceptions of the use of cloud computing. The findings of this questionnaire administered to users and potential users of cloud computing applications are reported in this study. The questionnaire primarily investigates key concerns which result in self-moderation of cloud computing use and factors which would improve trust in cloud computing. Additionally, results relating to user awareness of potential confidentiality, integrity and availability risks are described. An initial cloud computing adoption model was proposed based on a content analysis of existing cloud computing literature. This initial model, empirically tested through the questionnaire, was an important foundation for the establishment of the Critical Success Factors (CSFs) and therefore the framework to enhance user trust in cloud computing applications. The framework proposed by this study aims to assist new cloud computing users to determine the appropriateness of a cloud computing service, thereby enhancing their trust in cloud computing applications.
- Full Text:
- Date Issued: 2014
An information privacy model for primary health care facilities
- Authors: Boucher, Duane Eric
- Date: 2013
- Subjects: Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11139 , http://hdl.handle.net/10353/d1007181 , Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Description: The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical perspective to highlight the constructs of information privacy. These constructs together with a discussion focused on the confidentiality and accessibility of medical records results in the development of an artefact represented in the format of a model. The formulation of the model is accomplished by making use of the Design Science research guidelines for artefact development. Part of the process required that the artefact be refined through the use of an Expert Review Process. This involved an iterative (three phase) process which required (seven) experts from the fields of privacy, information security, and health care to respond to semi-structured questions administered with an interview guide. The data analysis process utilised the ISO/IEC 29100:2011(E) standard on privacy as a means to assign thematic codes to the responses, which were then analysed. The proposed information privacy model was discussed in relation to the compliance requirements of the South African Protection of Personal Information (PoPI) Bill of 2009 and their application in a primary health care facility. The proposed information privacy model provides a holistic view of privacy management that can residually be used to increase awareness associated with the compliance requirements of using patient PII.
- Full Text:
- Date Issued: 2013
- Authors: Boucher, Duane Eric
- Date: 2013
- Subjects: Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11139 , http://hdl.handle.net/10353/d1007181 , Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Description: The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical perspective to highlight the constructs of information privacy. These constructs together with a discussion focused on the confidentiality and accessibility of medical records results in the development of an artefact represented in the format of a model. The formulation of the model is accomplished by making use of the Design Science research guidelines for artefact development. Part of the process required that the artefact be refined through the use of an Expert Review Process. This involved an iterative (three phase) process which required (seven) experts from the fields of privacy, information security, and health care to respond to semi-structured questions administered with an interview guide. The data analysis process utilised the ISO/IEC 29100:2011(E) standard on privacy as a means to assign thematic codes to the responses, which were then analysed. The proposed information privacy model was discussed in relation to the compliance requirements of the South African Protection of Personal Information (PoPI) Bill of 2009 and their application in a primary health care facility. The proposed information privacy model provides a holistic view of privacy management that can residually be used to increase awareness associated with the compliance requirements of using patient PII.
- Full Text:
- Date Issued: 2013
Ensuring high quality public safety data in participatory crowdsourcing used as a smart city initiative
- Authors: Bhana, Bhaveer
- Date: 2013
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11141 , http://hdl.handle.net/10353/d1014673
- Description: The increase in urbanisation is making the management of city resources a difficult task. Data collected through observations of the city surroundings can be used to improve decision-making in terms of manage city resources. However, the data collected must be of quality in order to ensure that effective and efficient decisions are made. This study is focused on improving emergency and non-emergency services (city resources) by using Participatory Crowdsourcing as a data collection method (collect public safety data) utilising voice technology in the form of an advanced IVR system known as the Spoken Web. The study illustrates how Participatory Crowdsourcing can be used as a Smart City initiative by illustrating what is required to contribute to the Smart City, and developing a roadmap in the form of a model to assist decision-making when selecting the optimal Crowdsourcing initiative. A Public Safety Data Quality criteria was also developed to assess and identify the problems affecting Data Quality. This study is guided by the Design Science methodology and utilises two driving theories: the characteristics of a Smart City, and Wang and Strong’s (1996) Data Quality Framework. Five Critical Success Factors were developed to ensure high quality public safety data is collected through Participatory Crowdsourcing utilising voice technologies. These Critical Success Factors include: Relevant Public Safety Data, Public Safety Reporting Instructions, Public Safety Data Interpretation and Presentation Format, Public Safety Data Integrity and Security, and Simple Participatory Crowdsourcing System Setup.
- Full Text:
- Date Issued: 2013
- Authors: Bhana, Bhaveer
- Date: 2013
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11141 , http://hdl.handle.net/10353/d1014673
- Description: The increase in urbanisation is making the management of city resources a difficult task. Data collected through observations of the city surroundings can be used to improve decision-making in terms of manage city resources. However, the data collected must be of quality in order to ensure that effective and efficient decisions are made. This study is focused on improving emergency and non-emergency services (city resources) by using Participatory Crowdsourcing as a data collection method (collect public safety data) utilising voice technology in the form of an advanced IVR system known as the Spoken Web. The study illustrates how Participatory Crowdsourcing can be used as a Smart City initiative by illustrating what is required to contribute to the Smart City, and developing a roadmap in the form of a model to assist decision-making when selecting the optimal Crowdsourcing initiative. A Public Safety Data Quality criteria was also developed to assess and identify the problems affecting Data Quality. This study is guided by the Design Science methodology and utilises two driving theories: the characteristics of a Smart City, and Wang and Strong’s (1996) Data Quality Framework. Five Critical Success Factors were developed to ensure high quality public safety data is collected through Participatory Crowdsourcing utilising voice technologies. These Critical Success Factors include: Relevant Public Safety Data, Public Safety Reporting Instructions, Public Safety Data Interpretation and Presentation Format, Public Safety Data Integrity and Security, and Simple Participatory Crowdsourcing System Setup.
- Full Text:
- Date Issued: 2013
Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government Tenders
- Authors: Rama, Sobhana
- Date: 2013
- Subjects: Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11136 , http://hdl.handle.net/10353/d1006956 , Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Description: Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
- Full Text:
- Date Issued: 2013
- Authors: Rama, Sobhana
- Date: 2013
- Subjects: Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11136 , http://hdl.handle.net/10353/d1006956 , Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Description: Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
- Full Text:
- Date Issued: 2013
Towards an information security awareness process for engineering SMEs in emerging economies
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- Date Issued: 2013
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- Date Issued: 2013
A framework to guide development through ICT in rural areas in South Africa
- Mamba, Malungelo Siphiwosami Njinga
- Authors: Mamba, Malungelo Siphiwosami Njinga
- Date: 2012
- Subjects: Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11137 , http://hdl.handle.net/10353/d1007024 , Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Description: Information and Communication Technology (ICT) is widely regarded as a key tool for bringing about development to people who live in underserved areas. Technologies such as mobile phones and Wi-Fi are seen as advantageous because they can be made available to poor places without the cost of building extensive physical infrastructure. However, researchers argue that ICTs have failed to live up to their potential in the context of development. Researchers point out developing countries lack frameworks to guide them through the implementation of ICTs in this context. The objective of this study is to come up with a framework that can be used in rural areas in South Africa to implement ICT projects. The researcher interviewed individuals who have been directly involved in an ICT initiative in a rural setting in the Eastern Cape Province to learn from their experiences. The researcher also studied publications that have been produced from these initiatives in order to gain a richer understanding. The findings of the study show that participants share similar views about how ICT projects should be approached and implemented in rural areas in South Africa. The views are grouped according to similarity into themes and discussed in detail in the study. From these themes a framework that can help implement ICT projects in rural areas is developed.
- Full Text:
- Date Issued: 2012
- Authors: Mamba, Malungelo Siphiwosami Njinga
- Date: 2012
- Subjects: Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11137 , http://hdl.handle.net/10353/d1007024 , Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Description: Information and Communication Technology (ICT) is widely regarded as a key tool for bringing about development to people who live in underserved areas. Technologies such as mobile phones and Wi-Fi are seen as advantageous because they can be made available to poor places without the cost of building extensive physical infrastructure. However, researchers argue that ICTs have failed to live up to their potential in the context of development. Researchers point out developing countries lack frameworks to guide them through the implementation of ICTs in this context. The objective of this study is to come up with a framework that can be used in rural areas in South Africa to implement ICT projects. The researcher interviewed individuals who have been directly involved in an ICT initiative in a rural setting in the Eastern Cape Province to learn from their experiences. The researcher also studied publications that have been produced from these initiatives in order to gain a richer understanding. The findings of the study show that participants share similar views about how ICT projects should be approached and implemented in rural areas in South Africa. The views are grouped according to similarity into themes and discussed in detail in the study. From these themes a framework that can help implement ICT projects in rural areas is developed.
- Full Text:
- Date Issued: 2012
Impact of information and communication technology (ICT) on trust and information sharing in South African automotive supply chains
- Authors: Goche, Chiedza
- Date: 2012
- Subjects: Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/668 , vital:26486 , Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2012
- Authors: Goche, Chiedza
- Date: 2012
- Subjects: Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/668 , vital:26486 , Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2012
Adoption and sustained use of M-Commerce to improve efficacy of construction SMMEs
- Authors: Williams, Zenande
- Date: 2011
- Subjects: Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11125 , http://hdl.handle.net/10353/528 , Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Description: E-commerce has been said to bring value to businesses by improving business efficiency and effectiveness and thus providing business with a competitive advantage through the potential benefits that it offers (Cloete, Courtney & Fintz, 2002). However, despite the potential benefits that e-commerce can offer, the adoption of B2C e-commerce in South African construction SMMEs is low and this is due to the challenges associated with e-commerce (Vaithanathan, 2010; Uzoka, Shemi & Seleka, 2007; Love & Irani, 2004; Anumba & Ruikar, 2002). These e-commerce challenges include: high implementation costs, lack or poor infrastructure, inadequate resources, low use of e-commerce by suppliers and consumers, lack of access to e-commerce, computer illiteracy, deficiency in understanding the potential benefits of e-commerce and security concerns (Vaithanathan, 2010; Uzoka, Shemi, & Seleka, 2007; Mensah, Bahta, & Mhlanga, 2005; Cloete, Courtney, & Fintz, 2002). Therefore, due to these e-commerce challenges, construction SMMEs do not exploit the business advantages that e-commerce offers. In order to assist South African construction SMMEs in their efforts to improve their business effectiveness and efficiency through commercial technologies.
- Full Text:
- Date Issued: 2011
- Authors: Williams, Zenande
- Date: 2011
- Subjects: Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11125 , http://hdl.handle.net/10353/528 , Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Description: E-commerce has been said to bring value to businesses by improving business efficiency and effectiveness and thus providing business with a competitive advantage through the potential benefits that it offers (Cloete, Courtney & Fintz, 2002). However, despite the potential benefits that e-commerce can offer, the adoption of B2C e-commerce in South African construction SMMEs is low and this is due to the challenges associated with e-commerce (Vaithanathan, 2010; Uzoka, Shemi & Seleka, 2007; Love & Irani, 2004; Anumba & Ruikar, 2002). These e-commerce challenges include: high implementation costs, lack or poor infrastructure, inadequate resources, low use of e-commerce by suppliers and consumers, lack of access to e-commerce, computer illiteracy, deficiency in understanding the potential benefits of e-commerce and security concerns (Vaithanathan, 2010; Uzoka, Shemi, & Seleka, 2007; Mensah, Bahta, & Mhlanga, 2005; Cloete, Courtney, & Fintz, 2002). Therefore, due to these e-commerce challenges, construction SMMEs do not exploit the business advantages that e-commerce offers. In order to assist South African construction SMMEs in their efforts to improve their business effectiveness and efficiency through commercial technologies.
- Full Text:
- Date Issued: 2011
Digital forensic model for computer networks
- Authors: Sanyamahwe, Tendai
- Date: 2011
- Subjects: Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11127 , http://hdl.handle.net/10353/d1000968 , Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Description: The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
- Full Text:
- Date Issued: 2011
- Authors: Sanyamahwe, Tendai
- Date: 2011
- Subjects: Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11127 , http://hdl.handle.net/10353/d1000968 , Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Description: The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
- Full Text:
- Date Issued: 2011
Critical success factors for user acceptance of telemedicine in South Africa
- Authors: Cilliers, Liezel
- Date: 2010
- Subjects: Telecommunication in medicine , Medical telematics
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11126 , http://hdl.handle.net/10353/384 , Telecommunication in medicine , Medical telematics
- Description: The World Health Organization has recommended Telemedicine to improve health care in developing countries. The objective of this study was to produce Critical Success Factors that will investigate and identify factors that influence the acceptance and continued use of Telemedicine in the Eastern Cape Department of Health, and to suggest ways to sustain this technology from initial adoption (the pilot programme) to full adoption. Sub questions investigated which other facilitating factors, such as management support or previous Information Technology exposure must be present in order for the technology to be adopted successfully. The study made use of a questionnaire to investigate the user acceptance and behaviour of health care workers. A return rate of 76% was achieved. The data was analysed making use of Statistical Package for the Social Sciences (SPSS), specifically the Chi Square test. From these results Critical Success Factors where then formulated to address the problems identified. The Critical Success Factors that were identified include: Implement and disseminate best practice within a legislative framework; Find a champion; Change management strategies; Training; Sustainable finance; Technical issues and Project management principles If these CSFs are addressed before and during the implementation of Telemedicine it will increase the acceptance and use of the technology among health care workers. Critical Success Factors for User Acceptance of Telemedicine in South Africa.
- Full Text:
- Date Issued: 2010
- Authors: Cilliers, Liezel
- Date: 2010
- Subjects: Telecommunication in medicine , Medical telematics
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11126 , http://hdl.handle.net/10353/384 , Telecommunication in medicine , Medical telematics
- Description: The World Health Organization has recommended Telemedicine to improve health care in developing countries. The objective of this study was to produce Critical Success Factors that will investigate and identify factors that influence the acceptance and continued use of Telemedicine in the Eastern Cape Department of Health, and to suggest ways to sustain this technology from initial adoption (the pilot programme) to full adoption. Sub questions investigated which other facilitating factors, such as management support or previous Information Technology exposure must be present in order for the technology to be adopted successfully. The study made use of a questionnaire to investigate the user acceptance and behaviour of health care workers. A return rate of 76% was achieved. The data was analysed making use of Statistical Package for the Social Sciences (SPSS), specifically the Chi Square test. From these results Critical Success Factors where then formulated to address the problems identified. The Critical Success Factors that were identified include: Implement and disseminate best practice within a legislative framework; Find a champion; Change management strategies; Training; Sustainable finance; Technical issues and Project management principles If these CSFs are addressed before and during the implementation of Telemedicine it will increase the acceptance and use of the technology among health care workers. Critical Success Factors for User Acceptance of Telemedicine in South Africa.
- Full Text:
- Date Issued: 2010
E-mail forensic authorship attribution
- Authors: Lalla, Himal
- Date: 2010
- Subjects: Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11128 , http://hdl.handle.net/10353/360 , Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Description: E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
- Full Text:
- Date Issued: 2010
- Authors: Lalla, Himal
- Date: 2010
- Subjects: Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11128 , http://hdl.handle.net/10353/360 , Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Description: E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
- Full Text:
- Date Issued: 2010
Phishing within e-commerce: reducing the risk, increasing the trust
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
Quality assessment of information systems in SMEs: a study of Eldoret Town in Kenya
- Authors: Ndiege, Joshua Rumo Arongo
- Date: 2010
- Subjects: Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11132 , http://hdl.handle.net/10353/d1000973 , Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Full Text: false
- Date Issued: 2010
- Authors: Ndiege, Joshua Rumo Arongo
- Date: 2010
- Subjects: Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11132 , http://hdl.handle.net/10353/d1000973 , Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Full Text: false
- Date Issued: 2010