A business process model for blockchain-based South African real estate transactions
- Authors: Tilbury, Jack Laurie
- Date: 2020
- Subjects: Blockchains (Databases) , Conveyancing -- Technological innovations , Real estate business -- Data processing , Real estate business -- South Africa -- Technological innovations
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148380 , vital:38734
- Description: The real estate transaction process has been described as inefficient and technologically outdated due to numerous stakeholders and predominantly paper-based operations. Despite the apparent bottlenecks in the current process, the implementation of new technology into the real estate sector has lagged. Several attempts have been made to modernise and digitise the business process but committed integration of assisting technology has lacked attention. This study examined the applicability and potential integration of blockchain technology into the business process of South African real estate transactions. Blockchain’s novelty means that research in this space, especially within South Africa, is limited. Of the research that has been conducted, no models of the business processes for South African or blockchain-based real estate transactions have been constructed. This study provides two business process models, illustrating the two different processes. The main contribution of this paper was an integrated business process model, illustrating how the various processes and stakeholder interactions for South African blockchain-based real estate transactions are conducted on one transaction platform, common to all participating stakeholders. This platform was named the South African Blockchain Land Exchange System (SABLES), which manages and facilitates these transactions in their entirety from start to finish. This model depicts an enhanced business process that provides increased security, transparency, and speed. These benefits will be realised by those who register, adopt, and transact on the platform. Through in-depth interviews, the integrated business process model was assessed. The findings produced a final and combined thematic map, representing the main themes of the analysed interview data, namely blockchain implementation strategies, business process applicability, information technology assimilation, current transaction context, and PropTech 3.0 success factors. The discussion revealed that the current transaction process lacks technological innovation, which increases pressure on the conveyancing role. It was also revealed that there is not only a need within the industry, but a desire, for newer technologies to assist the transaction process. In order to streamline and improve efficiency, business processes should leverage digital records and data, and strive for a solution beyond digitisation, achieving digitalisation. Digitalisation recognises digital documents as official and legal documents as opposed to simply being digital back-ups. This, coupled with the business process models, represent theoretical contributions.
- Full Text:
- Date Issued: 2020
- Authors: Tilbury, Jack Laurie
- Date: 2020
- Subjects: Blockchains (Databases) , Conveyancing -- Technological innovations , Real estate business -- Data processing , Real estate business -- South Africa -- Technological innovations
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148380 , vital:38734
- Description: The real estate transaction process has been described as inefficient and technologically outdated due to numerous stakeholders and predominantly paper-based operations. Despite the apparent bottlenecks in the current process, the implementation of new technology into the real estate sector has lagged. Several attempts have been made to modernise and digitise the business process but committed integration of assisting technology has lacked attention. This study examined the applicability and potential integration of blockchain technology into the business process of South African real estate transactions. Blockchain’s novelty means that research in this space, especially within South Africa, is limited. Of the research that has been conducted, no models of the business processes for South African or blockchain-based real estate transactions have been constructed. This study provides two business process models, illustrating the two different processes. The main contribution of this paper was an integrated business process model, illustrating how the various processes and stakeholder interactions for South African blockchain-based real estate transactions are conducted on one transaction platform, common to all participating stakeholders. This platform was named the South African Blockchain Land Exchange System (SABLES), which manages and facilitates these transactions in their entirety from start to finish. This model depicts an enhanced business process that provides increased security, transparency, and speed. These benefits will be realised by those who register, adopt, and transact on the platform. Through in-depth interviews, the integrated business process model was assessed. The findings produced a final and combined thematic map, representing the main themes of the analysed interview data, namely blockchain implementation strategies, business process applicability, information technology assimilation, current transaction context, and PropTech 3.0 success factors. The discussion revealed that the current transaction process lacks technological innovation, which increases pressure on the conveyancing role. It was also revealed that there is not only a need within the industry, but a desire, for newer technologies to assist the transaction process. In order to streamline and improve efficiency, business processes should leverage digital records and data, and strive for a solution beyond digitisation, achieving digitalisation. Digitalisation recognises digital documents as official and legal documents as opposed to simply being digital back-ups. This, coupled with the business process models, represent theoretical contributions.
- Full Text:
- Date Issued: 2020
A cloud adoption framework for South African SMEs
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
A personality-based surveillance model for Facebook apps
- Authors: Van der Schyff, Karl Izak
- Date: 2020
- Subjects: Facebook (Electronic resource) , Electronic surveillance -- Psychological aspects , Online social networks -- Psychological aspects , Social media -- Psychological aspects , Personality
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/145534 , vital:38447
- Description: The surveillance of data through the use of Facebook Apps is an ongoing and persistent problem that impacts millions of users. Nonetheless, limited research has been conducted investigating to what extent a Facebook user’s personality influences their awareness of such surveillance practices. Thus, to understand this situation better, the current study inductively developed four propositions from secondary data sources as part of a detailed content analysis. Spanning three search and analysis phases the content analysis led to the development of the research model. Guided by the propositions and research questions, a questionnaire was developed based on the relevant constructs prescribed by the Theory of Planned Behaviour. This questionnaire was used, and a total of 651 responses were collected from Facebook users over the age of 18 years old and residing in the United States of America. Primary data took place at both a univariate and multivariate level with a specific focus on the development of a structural model. Interpretation of the structural model revealed that out of all the Big Five personality traits, Conscientiousness exhibited the strongest relationship with information security awareness followed by Openness to Experience and Neuroticism, respectively. The results further indicated that the model constructs based on attitude, social norms and awareness significantly influenced the intended use of Facebook Apps. The study also contributes by indicating which personality traits are most vulnerable to Facebook App surveillance. For example, it was found that individuals high in Conscientiousness are the least vulnerable with individuals high in Extraversion being the most vulnerable. Since the results indicate that not all the personality traits are significantly related to the model constructs, additional factors may contribute to App surveillance in this context. Concerning this, factors such as user apathy, information privacy, privacy concerns, control and Facebook dependency are discussed as a means to argue why this might be the case.
- Full Text:
- Date Issued: 2020
- Authors: Van der Schyff, Karl Izak
- Date: 2020
- Subjects: Facebook (Electronic resource) , Electronic surveillance -- Psychological aspects , Online social networks -- Psychological aspects , Social media -- Psychological aspects , Personality
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/145534 , vital:38447
- Description: The surveillance of data through the use of Facebook Apps is an ongoing and persistent problem that impacts millions of users. Nonetheless, limited research has been conducted investigating to what extent a Facebook user’s personality influences their awareness of such surveillance practices. Thus, to understand this situation better, the current study inductively developed four propositions from secondary data sources as part of a detailed content analysis. Spanning three search and analysis phases the content analysis led to the development of the research model. Guided by the propositions and research questions, a questionnaire was developed based on the relevant constructs prescribed by the Theory of Planned Behaviour. This questionnaire was used, and a total of 651 responses were collected from Facebook users over the age of 18 years old and residing in the United States of America. Primary data took place at both a univariate and multivariate level with a specific focus on the development of a structural model. Interpretation of the structural model revealed that out of all the Big Five personality traits, Conscientiousness exhibited the strongest relationship with information security awareness followed by Openness to Experience and Neuroticism, respectively. The results further indicated that the model constructs based on attitude, social norms and awareness significantly influenced the intended use of Facebook Apps. The study also contributes by indicating which personality traits are most vulnerable to Facebook App surveillance. For example, it was found that individuals high in Conscientiousness are the least vulnerable with individuals high in Extraversion being the most vulnerable. Since the results indicate that not all the personality traits are significantly related to the model constructs, additional factors may contribute to App surveillance in this context. Concerning this, factors such as user apathy, information privacy, privacy concerns, control and Facebook dependency are discussed as a means to argue why this might be the case.
- Full Text:
- Date Issued: 2020
Design ethnography: methodological considerations for rebalancing socio-technical phenomena in CMS performativity
- Authors: Jordaan, Leandra
- Date: 2020
- Subjects: Database management -- Social aspects , Information technology -- Social aspects , Management information systems -- Social aspects , Database management -- Philosophy , Information technology -- Philosophy , Management information systems -- Philosophy
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164781 , vital:41164
- Description: As a practitioner, I had been part of two Content Management System (CMS) Projects in a particular setting that did not deliver on the expected outcomes. The expected outcomes of the projects included streamlined processes, better access to information, functionalities to drive engagement, reduced time searching for information, and improved reusability of content. As I began to reflect on the projects, a certain discomfort developed when the social aspect was ignored in favour of the technological. I sought a better understanding, but I was unaware of the fact at first. The techno-centricity as a concept found in literature and my experience as content management (CM) practitioner – together informed my interest in rebalancing the social and the technological. Thus, I focused on conduct in performing of tasks and emphasised attention on the practices of experts who gave insight into context of CM and use. The research participants are communication practitioners who have the responsibility to communicate internally and externally on behalf of a publicly-funded university in South Africa. Guided by the abductive argument and literature, the key themes for the research focused on technology, individuals and the organisation. The focus on technology (CMS as a subfield of Information Systems) began with my involvement in two CMS Projects. What came to the fore was that the practitioner perspective, and thus their experiential knowledge are neglected in research and that it may be an over-emphasis on techno-centrism in CMS research. I sought to better balance the social and technological aspects. The second focus on individuals (communication practitioners) was to value the stakeholder who was considered representative of the worldviews of the community. I sought to support corporate communication practices in the task of relationship building with stakeholders. The findings showed that the culture of informatio sharing was low at the University. The third focus on the organisation (the University) was to prioritise the success of the communication undertaken by the University. I interrogated the role of power. I demonstrated how the role of power could be seen as productive and positive in the context of HE, the social reality of CUT, and this IS research itself. I positioned the research as interpretivistic. I used hermeneutics as a mode of analysis because as researcher-practitioner, I am part of the social reality of the research. A safeguard against my subjectivity was the use of Phronesis as an orientation to knowledge. An organisation with a shared understanding of ethics and values will balance instrumental rationality (scientific and technical reasoning) with value-rationality (moral reasoning about right and wrong actions). Phronesis is the virtue that should ensure ethical behaviour in actions, yet over time, social science research, in a quest to mimic the natural sciences, centred on episteme and techne. I constructed the lens by particularising the four value-rational questions of Flyvbjerg’s contemporary Phronesis to the performative perspective of the research. My interest in social reality, as well as socio-technical aspects, have led to design-ethnography (D-E) to emerge as the most suitable and most appropriate approach to the research. D-E asked the prescriptive ‘How’ and descriptive ‘What’ questions, whilst the Flyvbjergian Phronesis lens brought focus on the ‘Why’ question. D-E emphasised the betterment of the interaction and synergy between research conducted and practice. My status as an immersed researcher needed careful consideration, and D-E accepted that a certain level of immersion is necessary, D-E has short interventional fieldwork, and D-E has future-oriented engagement. The contemporary Phronesis used in the research is to enact D-E and not an all-encompassing guide for doing Phronesis research The key contributions to the research are predominantly methodological. The claims draw on evidence focused on the three themes technology, individuals and organisation, and the phenomena of interest which are to rebalance the social and the technological in CM practices. The first claim is that immersion in the context is possible and supported by the specific particularised approaches to the research. The second claim suggests a way to rebalance the socio-technical nature of Information Systems (IS). The third claim suggests that there is a viewpoint for power that is not focused on power’s oppressive nature which could see a diverging focus on power in IS research in future. In this viewpoint, the status quo of social reality is not questioned, nor are their emancipatory ambitions. The fourth and final claim suggests that Phronesis as a lens could enact D-E, which in turn is a method that assists in valuing the experience of the practitioner and the support of collaborative work. The research is recommended for IT/IS practitioners who prefer to value participants’ views in design. The approaches used could be of value for researchers who consider the context of their research to be of higher importance than the generalisation of outcomes. Researchers who find themselves in the position of being immersed in the context but question the correctness of active engagement in the field may discover some value from the research approaches and my experience. Also, researchers or practitioners who have an interest in the balance between social and the technological aspects of IS projects. Researchers or practitioners interested in Phronesis, and perhaps the viewpoint of a lens may also find value in this research.
- Full Text:
- Date Issued: 2020
- Authors: Jordaan, Leandra
- Date: 2020
- Subjects: Database management -- Social aspects , Information technology -- Social aspects , Management information systems -- Social aspects , Database management -- Philosophy , Information technology -- Philosophy , Management information systems -- Philosophy
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164781 , vital:41164
- Description: As a practitioner, I had been part of two Content Management System (CMS) Projects in a particular setting that did not deliver on the expected outcomes. The expected outcomes of the projects included streamlined processes, better access to information, functionalities to drive engagement, reduced time searching for information, and improved reusability of content. As I began to reflect on the projects, a certain discomfort developed when the social aspect was ignored in favour of the technological. I sought a better understanding, but I was unaware of the fact at first. The techno-centricity as a concept found in literature and my experience as content management (CM) practitioner – together informed my interest in rebalancing the social and the technological. Thus, I focused on conduct in performing of tasks and emphasised attention on the practices of experts who gave insight into context of CM and use. The research participants are communication practitioners who have the responsibility to communicate internally and externally on behalf of a publicly-funded university in South Africa. Guided by the abductive argument and literature, the key themes for the research focused on technology, individuals and the organisation. The focus on technology (CMS as a subfield of Information Systems) began with my involvement in two CMS Projects. What came to the fore was that the practitioner perspective, and thus their experiential knowledge are neglected in research and that it may be an over-emphasis on techno-centrism in CMS research. I sought to better balance the social and technological aspects. The second focus on individuals (communication practitioners) was to value the stakeholder who was considered representative of the worldviews of the community. I sought to support corporate communication practices in the task of relationship building with stakeholders. The findings showed that the culture of informatio sharing was low at the University. The third focus on the organisation (the University) was to prioritise the success of the communication undertaken by the University. I interrogated the role of power. I demonstrated how the role of power could be seen as productive and positive in the context of HE, the social reality of CUT, and this IS research itself. I positioned the research as interpretivistic. I used hermeneutics as a mode of analysis because as researcher-practitioner, I am part of the social reality of the research. A safeguard against my subjectivity was the use of Phronesis as an orientation to knowledge. An organisation with a shared understanding of ethics and values will balance instrumental rationality (scientific and technical reasoning) with value-rationality (moral reasoning about right and wrong actions). Phronesis is the virtue that should ensure ethical behaviour in actions, yet over time, social science research, in a quest to mimic the natural sciences, centred on episteme and techne. I constructed the lens by particularising the four value-rational questions of Flyvbjerg’s contemporary Phronesis to the performative perspective of the research. My interest in social reality, as well as socio-technical aspects, have led to design-ethnography (D-E) to emerge as the most suitable and most appropriate approach to the research. D-E asked the prescriptive ‘How’ and descriptive ‘What’ questions, whilst the Flyvbjergian Phronesis lens brought focus on the ‘Why’ question. D-E emphasised the betterment of the interaction and synergy between research conducted and practice. My status as an immersed researcher needed careful consideration, and D-E accepted that a certain level of immersion is necessary, D-E has short interventional fieldwork, and D-E has future-oriented engagement. The contemporary Phronesis used in the research is to enact D-E and not an all-encompassing guide for doing Phronesis research The key contributions to the research are predominantly methodological. The claims draw on evidence focused on the three themes technology, individuals and organisation, and the phenomena of interest which are to rebalance the social and the technological in CM practices. The first claim is that immersion in the context is possible and supported by the specific particularised approaches to the research. The second claim suggests a way to rebalance the socio-technical nature of Information Systems (IS). The third claim suggests that there is a viewpoint for power that is not focused on power’s oppressive nature which could see a diverging focus on power in IS research in future. In this viewpoint, the status quo of social reality is not questioned, nor are their emancipatory ambitions. The fourth and final claim suggests that Phronesis as a lens could enact D-E, which in turn is a method that assists in valuing the experience of the practitioner and the support of collaborative work. The research is recommended for IT/IS practitioners who prefer to value participants’ views in design. The approaches used could be of value for researchers who consider the context of their research to be of higher importance than the generalisation of outcomes. Researchers who find themselves in the position of being immersed in the context but question the correctness of active engagement in the field may discover some value from the research approaches and my experience. Also, researchers or practitioners who have an interest in the balance between social and the technological aspects of IS projects. Researchers or practitioners interested in Phronesis, and perhaps the viewpoint of a lens may also find value in this research.
- Full Text:
- Date Issued: 2020
Guidelines for the user interface design of electronic medical records in optometry
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020
Passphrase and keystroke dynamics authentication: security and usability
- Authors: Bhana, Bhaveer
- Date: 2020
- Subjects: Computer security -- Management , Computers -- Access control -- Codewords , Computers -- Access control -- Keystroke timing authentication , Entropy (Information theory)
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146663 , vital:38546
- Description: It was found that employees spend a total 2.25 days within a 60 day period on password related activities. Another study found that over 85 days an average user will create 25 accounts with an average of 6.5 unique passwords. These numbers are expected to increase over time as more systems become available. In addition, the use of 6.5 unique passwords highlight that passwords are being reused which creates security concerns as multiple systems will be accessible by an unauthorised party if one of these passwords is leaked. Current user authentication solutions either increase security or usability. When security increases, usability decreases, or vice versa. To add to this, stringent security protocols encourage unsecure behaviours by the user such as writing the password down on a piece of paper to remember it. It was found that passphrases require less cognitive effort than passwords and because passphrases are stronger than passwords, they don’t need to be changed as frequently as passwords. This study aimed to assess a two-tier user authentication solution that increases security and usability. The proposed solution uses passphrases in conjunction with keystroke dynamics to address this research problem. The design science research approach was used to guide this study. The study’s theoretical foundation includes three theories. The Shannon entropy formula was used to calculate the strength of passwords, passphrases and keystroke dynamics. The chunking theory assisted in assessing password and passphrase memorisation issues and the keystroke-level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. A login assessment experiment collected data on user authentication and user-system interaction for passwords and passphrases. Plus, an expert review was conducted to verify findings and assess the research artefact in the form of a model. The model can be used to assist with the implementation of a two-tier user authentication solution which involves passphrases and keystroke dynamics. There are a number of components that need to be considered to realise the benefits of this solution and ensure successful implementation.
- Full Text:
- Date Issued: 2020
- Authors: Bhana, Bhaveer
- Date: 2020
- Subjects: Computer security -- Management , Computers -- Access control -- Codewords , Computers -- Access control -- Keystroke timing authentication , Entropy (Information theory)
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146663 , vital:38546
- Description: It was found that employees spend a total 2.25 days within a 60 day period on password related activities. Another study found that over 85 days an average user will create 25 accounts with an average of 6.5 unique passwords. These numbers are expected to increase over time as more systems become available. In addition, the use of 6.5 unique passwords highlight that passwords are being reused which creates security concerns as multiple systems will be accessible by an unauthorised party if one of these passwords is leaked. Current user authentication solutions either increase security or usability. When security increases, usability decreases, or vice versa. To add to this, stringent security protocols encourage unsecure behaviours by the user such as writing the password down on a piece of paper to remember it. It was found that passphrases require less cognitive effort than passwords and because passphrases are stronger than passwords, they don’t need to be changed as frequently as passwords. This study aimed to assess a two-tier user authentication solution that increases security and usability. The proposed solution uses passphrases in conjunction with keystroke dynamics to address this research problem. The design science research approach was used to guide this study. The study’s theoretical foundation includes three theories. The Shannon entropy formula was used to calculate the strength of passwords, passphrases and keystroke dynamics. The chunking theory assisted in assessing password and passphrase memorisation issues and the keystroke-level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. A login assessment experiment collected data on user authentication and user-system interaction for passwords and passphrases. Plus, an expert review was conducted to verify findings and assess the research artefact in the form of a model. The model can be used to assist with the implementation of a two-tier user authentication solution which involves passphrases and keystroke dynamics. There are a number of components that need to be considered to realise the benefits of this solution and ensure successful implementation.
- Full Text:
- Date Issued: 2020
The determination of whether a Unified Communication System can be effective in supporting informal communication and collaboration in virtual teams
- Authors: Hill, Kyle
- Date: 2020
- Subjects: Telecommuting , Virtual work teams , Telecommunication systems , Computer networks
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146343 , vital:38517
- Description: The overall objective of the research is to determine whether a Unified Communication System intervention can be effective in supporting informal communication and collaboration in virtual teams. In so doing, this research is aimed at developing a current framework of critical success factors for facilitating informal collaboration and communication. As teams have evolved to the point where there is no longer a need for team members to be co-located, with a greater importance now being placed on how they collaborate, this framework will also highlight how it can support virtual teams due to the huge potential advantage they can provide to the organisation. A virtual communication and collaboration system will be selected based on the outputs of the current framework and interactions which occur through the system will be observed to provide quantitative and qualitative results. In conclusion, the research will suggest recommendations for the successful implementation of informal communication and collaboration technologies within the organisation. The research will also indicate to a limited degree, the impact of the implementation of these technologies, and the outcome for the organisation, whether positive or negative. Whilst conducting the research, it became apparent that while the UCS was capable of performing the processes and functions required, the individuals and teams engaging with the technology did not always make use of the full scope of the technology provided. Regardless, a UCS was observed to provide direct benefits to an organisation in increasing communication and collaboration in the organisation. These increases can be observed in both the physical and virtual sense. However, the converse is true for generating social capital which lead to the observation that there are a smaller number of interactions happening in the smaller teams, but these are of higher value when compared to the larger teams of this study. It is also clear that the larger a team becomes, the more the trend is to focus on adopting new technologies to make their roles more efficient. This adoption is not however translated into outputs such as social capital but is translated into stronger networks and the formation of new networks. It is also clear that most negative factors around the UCS are related to the respondent’s hardware rather than the solution itself. Cost reductions because of virtuality will also be observed and using the Developed Framework as a blue print, an organisation should be able to observe direct benefits for an organisation by being able to confirm the thesis of this research in that having a UCS intervention is effective in supporting informal communication and collaboration in virtual teams.
- Full Text:
- Date Issued: 2020
- Authors: Hill, Kyle
- Date: 2020
- Subjects: Telecommuting , Virtual work teams , Telecommunication systems , Computer networks
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146343 , vital:38517
- Description: The overall objective of the research is to determine whether a Unified Communication System intervention can be effective in supporting informal communication and collaboration in virtual teams. In so doing, this research is aimed at developing a current framework of critical success factors for facilitating informal collaboration and communication. As teams have evolved to the point where there is no longer a need for team members to be co-located, with a greater importance now being placed on how they collaborate, this framework will also highlight how it can support virtual teams due to the huge potential advantage they can provide to the organisation. A virtual communication and collaboration system will be selected based on the outputs of the current framework and interactions which occur through the system will be observed to provide quantitative and qualitative results. In conclusion, the research will suggest recommendations for the successful implementation of informal communication and collaboration technologies within the organisation. The research will also indicate to a limited degree, the impact of the implementation of these technologies, and the outcome for the organisation, whether positive or negative. Whilst conducting the research, it became apparent that while the UCS was capable of performing the processes and functions required, the individuals and teams engaging with the technology did not always make use of the full scope of the technology provided. Regardless, a UCS was observed to provide direct benefits to an organisation in increasing communication and collaboration in the organisation. These increases can be observed in both the physical and virtual sense. However, the converse is true for generating social capital which lead to the observation that there are a smaller number of interactions happening in the smaller teams, but these are of higher value when compared to the larger teams of this study. It is also clear that the larger a team becomes, the more the trend is to focus on adopting new technologies to make their roles more efficient. This adoption is not however translated into outputs such as social capital but is translated into stronger networks and the formation of new networks. It is also clear that most negative factors around the UCS are related to the respondent’s hardware rather than the solution itself. Cost reductions because of virtuality will also be observed and using the Developed Framework as a blue print, an organisation should be able to observe direct benefits for an organisation by being able to confirm the thesis of this research in that having a UCS intervention is effective in supporting informal communication and collaboration in virtual teams.
- Full Text:
- Date Issued: 2020
The Integration of Personally-owned Information and Communication Technologies (PICTs) for Teaching and Learning in Resource-Constrained Higher Education Environments – The Case of a Nigerian University
- Authors: Lewis, Oláñrewájú Olúrotimi
- Date: 2020
- Subjects: Uncatalogued
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/163582 , vital:41050 , doi:10.21504/10962/163582
- Description: Thesis (PhD)--Rhodes University, Faculty of Commerce, Information Systems, 2020
- Full Text:
- Date Issued: 2020
- Authors: Lewis, Oláñrewájú Olúrotimi
- Date: 2020
- Subjects: Uncatalogued
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/163582 , vital:41050 , doi:10.21504/10962/163582
- Description: Thesis (PhD)--Rhodes University, Faculty of Commerce, Information Systems, 2020
- Full Text:
- Date Issued: 2020
- «
- ‹
- 1
- ›
- »