A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
Mathematical requirements for first-year BCOM students at NMMU
- Authors: Walton, Marguerite
- Date: 2009
- Subjects: Business mathematics -- South Africa , Mathematics -- Study and teaching (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:10502 , http://hdl.handle.net/10948/886 , Business mathematics -- South Africa , Mathematics -- Study and teaching (Higher) -- South Africa
- Description: These studies have focused on identifying the mathematical requirements of first-year BCom students at Nelson Mandela Metropolitan University. The research methodology used in this quantitative study was to make use of interviewing, questionnaire investigation, and document analysis in the form of textbook, test and examination analysis. These methods provided data that fitted into a grounded theory approach. The study concluded by identifying the list of mathematical topics required for the first year of the core subjects in the BCom degree programme. In addition, the study found that learners who study Mathematics in the National Senior Certificate should be able to cope with the mathematical content included in their BCom degree programme, while learners studying Mathematical Literacy would probably need support in some of the areas of mathematics, especially algebra, in order to cope with the mathematical content included in their BCom degree programme. It makes a valuable contribution towards elucidating the mathematical requirements needed to improve the chances of successful BCom degree programme studies at South African universities. It also draws the contours for starting to design an efficient support course for future “at-risk” students who enter higher education studies.
- Full Text:
- Date Issued: 2009
- Authors: Walton, Marguerite
- Date: 2009
- Subjects: Business mathematics -- South Africa , Mathematics -- Study and teaching (Higher) -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:10502 , http://hdl.handle.net/10948/886 , Business mathematics -- South Africa , Mathematics -- Study and teaching (Higher) -- South Africa
- Description: These studies have focused on identifying the mathematical requirements of first-year BCom students at Nelson Mandela Metropolitan University. The research methodology used in this quantitative study was to make use of interviewing, questionnaire investigation, and document analysis in the form of textbook, test and examination analysis. These methods provided data that fitted into a grounded theory approach. The study concluded by identifying the list of mathematical topics required for the first year of the core subjects in the BCom degree programme. In addition, the study found that learners who study Mathematics in the National Senior Certificate should be able to cope with the mathematical content included in their BCom degree programme, while learners studying Mathematical Literacy would probably need support in some of the areas of mathematics, especially algebra, in order to cope with the mathematical content included in their BCom degree programme. It makes a valuable contribution towards elucidating the mathematical requirements needed to improve the chances of successful BCom degree programme studies at South African universities. It also draws the contours for starting to design an efficient support course for future “at-risk” students who enter higher education studies.
- Full Text:
- Date Issued: 2009
The development of a technique to establish the security requirements of an organization
- Authors: Gerber, Mariana
- Date: 2001
- Subjects: Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10789 , http://hdl.handle.net/10948/89 , Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Description: To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization, it has extreme value to an organization (BS 7799-1, 1999, p 1; Humphreys, Moses & Plate, 1998, p 8). For this reason it has become very important that business information is sufficiently protected. There are many different ways in which information can exist. Information can be printed or written on paper, stored electronically, transmitted electronically or by post, even spoken in conversation or any other way in which knowledge and ideas can be conveyed (URN 99/703, 1999, p. 2; Humphreys, Moses & Plate, 1998, p 8; URN 96/702, 1996, p 3).It is, therefore, critical to protect information, and to ensure that the security of IT (Information Technology) systems within organizations is properly managed. This requirement to protect information is even more important today, since many organizations are internally and externally connected by networks of IT systems (ISO/IEC TR 13335-2, 1996, p 1). Information security is therefore required to assist in the process of controlling and securing of information from accidental or malicious changes, deletions or unauthorized disclosure (Royds, 2000, p 2; URN 96/702, 1996, p 3). By preventing and minimizing the impact of security incidents, information security can ensure business continuity and reduce business damage (Owens, 1998, p 7). Information security in an organization can be regarded as a management opportunity and should become an integral part of the whole management activity of the organization. Obtaining commitment from management is therefore extremely important for effective information security. One way in which management can show their commitment to ensuring information security, is to adopt and enforce a security policy. A security policy ensures that people understand exactly what important role they play in securing information assets.
- Full Text:
- Date Issued: 2001
- Authors: Gerber, Mariana
- Date: 2001
- Subjects: Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Language: English
- Type: Thesis , Masters , MTech (Information Technology)
- Identifier: vital:10789 , http://hdl.handle.net/10948/89 , Computer security -- Management , Electronic data processing departments -- Security measures , Businesses -- Data processing -- Security measures , Computers -- Access control
- Description: To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization, it has extreme value to an organization (BS 7799-1, 1999, p 1; Humphreys, Moses & Plate, 1998, p 8). For this reason it has become very important that business information is sufficiently protected. There are many different ways in which information can exist. Information can be printed or written on paper, stored electronically, transmitted electronically or by post, even spoken in conversation or any other way in which knowledge and ideas can be conveyed (URN 99/703, 1999, p. 2; Humphreys, Moses & Plate, 1998, p 8; URN 96/702, 1996, p 3).It is, therefore, critical to protect information, and to ensure that the security of IT (Information Technology) systems within organizations is properly managed. This requirement to protect information is even more important today, since many organizations are internally and externally connected by networks of IT systems (ISO/IEC TR 13335-2, 1996, p 1). Information security is therefore required to assist in the process of controlling and securing of information from accidental or malicious changes, deletions or unauthorized disclosure (Royds, 2000, p 2; URN 96/702, 1996, p 3). By preventing and minimizing the impact of security incidents, information security can ensure business continuity and reduce business damage (Owens, 1998, p 7). Information security in an organization can be regarded as a management opportunity and should become an integral part of the whole management activity of the organization. Obtaining commitment from management is therefore extremely important for effective information security. One way in which management can show their commitment to ensuring information security, is to adopt and enforce a security policy. A security policy ensures that people understand exactly what important role they play in securing information assets.
- Full Text:
- Date Issued: 2001
- «
- ‹
- 1
- ›
- »