A framework for enhancing trust for improved participation in electronic marketplaces accessed from mobile platforms
- Authors: Isabirye, Naomi Nabirye
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa , Agricultural innovations -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12102 , vital:27031
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text: false
- Authors: Isabirye, Naomi Nabirye
- Date: 2016
- Subjects: Information technology -- Economic aspects -- South Africa , Agricultural innovations -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/12102 , vital:27031
- Description: Information and communication technologies (ICTs) have been widely researched as a mechanism for improving the socio-economic status of disadvantaged, rural communities. In order to do this numerous technology-based initiatives have been introduced into disadvantaged, rural communities to assist them in various aspects of their lives. Unfortunately, even when the proposed benefit of a particular technology is clearly evident to its initiators, the adoption by the target users is often uncertain. This has also been the case with e-commerce in agriculture. Despite the numerous benefits of e-commerce for agricultural producers, the uptake has been low. Trust is a critical pre-condition for the adoption of e-marketplaces. E-marketplaces expose consumers to the risk of non-delivery or misrepresentation of goods ordered and the misuse of personal information by external parties. Additionally, the time investment needed to make a shift to e-marketplaces and the opinions of important reference groups affects the user’s willingness to trust and depend on an e-marketplace. This study was undertaken to assess the extent to which rural users with limited ICT experience would trust and, consequently, adopt an e-marketplace to support agricultural trade. A pragmatic philosophy was adopted in this study, indicating that the researcher’s view of reality is founded on the practical implications and outcomes that are observed. This study used a Canonical Action Research strategy to design, develop and deploy a voice based e-marketplace to assist the trading activities of a Western Cape based aloe community. The community was allowed to utilise thee-marketplace over a period of eight weeks. Thereafter, interviews were held with the participants to investigate their perceptions of the technology. As a result, a model proposing the factors that must be in place for trust to be achieved in a voice based e-marketplace was proposed. The study found that the trustworthiness of a technology results from the technology’s technical capability to satisfy the needs of its users reliably. Usability and security were found to be important determinants of the trustworthiness of a technology. Furthermore, the requirements elicitation process was found to be central to achieving trust as it defines the necessary criteria for developing secure, usable, functional, and reliable technologies that meet the needs of their users.
- Full Text: false
A framework for grain commodity trading decision support in South Africa
- Authors: Ayankoya, Kayode Anthony
- Date: 2016
- Subjects: Grain trade -- South Africa Commodity exchanges -- South Africa Food industry and trade -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/11437 , vital:26925
- Description: In several countries around the world, grain commodities are traded as assets on stock exchanges. This indicate that the market and effectively the prices of the grain commodities in such countries, are controlled by several local and international economic, political and social factors that are rapidly changing. As a result, the prices of some grain commodities are volatile and trading in such commodities are prone to price-related risks. There are different trading strategies for minimising price-related risks and maximising profits. But empirical research suggests that making the right decision for effective grain commodities trading has been a difficult task for stakeholders due to high volatility of grain commodities prices. Studies have shown that this is more challenging among grain commodities farmers because of their lack of skills and the time to sift through and make sense of the datasets on the plethora of factors that influence the grain commodities market. This thesis focused on providing an answer for the main research problem that grain farmers in South Africa do not take full advantage of all the available strategies for trading their grain commodities because of the complexities associated with monitoring the large datasets that influence the grain commodities market. The main objective set by this study is to design a framework that can be followed to collect, integrate and analyse datasets that influence trading decisions of grain farmers in South Africa about grain commodities. This study takes advantage of the developments in Big Data and Data Science to achieve the set objective using the Design Science Research (DSR) methodology. The prediction of future prices of grain commodities for the different trading strategies was identified as an important factor for making better decisions when trading grain commodities and the key factors that influence the prices were identified. This was followed by a critical review of the literature to determine how the concepts of Big Data and Data Science can be leveraged for an effective grain commodities trading decision support. This resulted in a proposed framework for grain commodities trading. The proposed framework suggested an investigation of the factors that influence the prices of grain commodities as the basis for acquiring the relevant datasets. The proposed framework suggested the adoption of the Big Data approach in acquiring, preparing and integrating relevant datasets from several sources. Furthermore, it was suggested that algorithmic models for predicting grain commodities prices can be developed on top of the data layer of the proposed framework to provide real-time decision support. The proposed framework suggests the need for a carefully designed visualisation of the result and the collected data that promotes user experience. Lastly, the proposed framework included a technology consideration component to support the Big Data and Data Science approach of the framework. To demonstrate that the proposed framework addressed the main problem of this research, datasets from several sources on trading white maize in South Africa and the factors that influence market were streamed, integrated and analysed. Backpropagation Neural Network algorithm was used for modelling the prices of white maize for spot and futures trading strategies were predicted. There are other modelling techniques such as the Box-Jenkins statistical time series analysis methodology. But, Neural Networks was identified as more suitable for time series data with complex patterns and relationships. A demonstration system was setup to provide effective decision support by using near real-time data to provide a dynamic predictive analytics for the spot and December futures contract prices of white maize in South Africa. Comparative analysis of predictions made using the model from the proposed framework to actual data indicated a significant degree of accuracy. A further evaluation was carried out by asking experienced traders to make predictions for the spot and December futures contract prices of white maize. The result of the exercise indicated that the predictions from the developed model were much closer to the actual prices. This indicated that the proposed framework is technically capable and generally useful. It also shows that the proposed framework can be used to provide decision support about trading grain commodities to stakeholders with lesser skills, experience and resources. The practical contribution of this thesis is that relevant datasets from several sources can be streamed into an integrated data source in real-time, which can be used as input for a real-time learning algorithmic model for predicting grain commodities prices. This will make it possible for a predictive analytics that responds to market volatility thereby providing an effective decision support for grain commodities trading. Another practical contribution of this thesis is a proposed framework that can be followed for developing a Decision Support System for trading in grain commodities. This thesis made theoretical contributions by building on the information processing theory and the decision making theory. The theoretical contribution of this thesis consists of the identification of Big Data approach, tools and techniques for eradicating uncertainty and equivocality in grain commodities trading decision making process.
- Full Text:
- Date Issued: 2016
- Authors: Ayankoya, Kayode Anthony
- Date: 2016
- Subjects: Grain trade -- South Africa Commodity exchanges -- South Africa Food industry and trade -- South Africa
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10948/11437 , vital:26925
- Description: In several countries around the world, grain commodities are traded as assets on stock exchanges. This indicate that the market and effectively the prices of the grain commodities in such countries, are controlled by several local and international economic, political and social factors that are rapidly changing. As a result, the prices of some grain commodities are volatile and trading in such commodities are prone to price-related risks. There are different trading strategies for minimising price-related risks and maximising profits. But empirical research suggests that making the right decision for effective grain commodities trading has been a difficult task for stakeholders due to high volatility of grain commodities prices. Studies have shown that this is more challenging among grain commodities farmers because of their lack of skills and the time to sift through and make sense of the datasets on the plethora of factors that influence the grain commodities market. This thesis focused on providing an answer for the main research problem that grain farmers in South Africa do not take full advantage of all the available strategies for trading their grain commodities because of the complexities associated with monitoring the large datasets that influence the grain commodities market. The main objective set by this study is to design a framework that can be followed to collect, integrate and analyse datasets that influence trading decisions of grain farmers in South Africa about grain commodities. This study takes advantage of the developments in Big Data and Data Science to achieve the set objective using the Design Science Research (DSR) methodology. The prediction of future prices of grain commodities for the different trading strategies was identified as an important factor for making better decisions when trading grain commodities and the key factors that influence the prices were identified. This was followed by a critical review of the literature to determine how the concepts of Big Data and Data Science can be leveraged for an effective grain commodities trading decision support. This resulted in a proposed framework for grain commodities trading. The proposed framework suggested an investigation of the factors that influence the prices of grain commodities as the basis for acquiring the relevant datasets. The proposed framework suggested the adoption of the Big Data approach in acquiring, preparing and integrating relevant datasets from several sources. Furthermore, it was suggested that algorithmic models for predicting grain commodities prices can be developed on top of the data layer of the proposed framework to provide real-time decision support. The proposed framework suggests the need for a carefully designed visualisation of the result and the collected data that promotes user experience. Lastly, the proposed framework included a technology consideration component to support the Big Data and Data Science approach of the framework. To demonstrate that the proposed framework addressed the main problem of this research, datasets from several sources on trading white maize in South Africa and the factors that influence market were streamed, integrated and analysed. Backpropagation Neural Network algorithm was used for modelling the prices of white maize for spot and futures trading strategies were predicted. There are other modelling techniques such as the Box-Jenkins statistical time series analysis methodology. But, Neural Networks was identified as more suitable for time series data with complex patterns and relationships. A demonstration system was setup to provide effective decision support by using near real-time data to provide a dynamic predictive analytics for the spot and December futures contract prices of white maize in South Africa. Comparative analysis of predictions made using the model from the proposed framework to actual data indicated a significant degree of accuracy. A further evaluation was carried out by asking experienced traders to make predictions for the spot and December futures contract prices of white maize. The result of the exercise indicated that the predictions from the developed model were much closer to the actual prices. This indicated that the proposed framework is technically capable and generally useful. It also shows that the proposed framework can be used to provide decision support about trading grain commodities to stakeholders with lesser skills, experience and resources. The practical contribution of this thesis is that relevant datasets from several sources can be streamed into an integrated data source in real-time, which can be used as input for a real-time learning algorithmic model for predicting grain commodities prices. This will make it possible for a predictive analytics that responds to market volatility thereby providing an effective decision support for grain commodities trading. Another practical contribution of this thesis is a proposed framework that can be followed for developing a Decision Support System for trading in grain commodities. This thesis made theoretical contributions by building on the information processing theory and the decision making theory. The theoretical contribution of this thesis consists of the identification of Big Data approach, tools and techniques for eradicating uncertainty and equivocality in grain commodities trading decision making process.
- Full Text:
- Date Issued: 2016
A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for information security governance in SMMEs
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for IT governance in small businesses
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
A framework for m-voting implementation in South Africa
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
- Authors: Mpekoa, Noluntu
- Date: 2017
- Subjects: Electronic voting -- South Africa Voting -- Technological innovations , Voting-machines -- South Africa -- Reliability Elections -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10948/19662 , vital:28927
- Description: Voting enables certain formal decisions to be made through the participation of a given population; and it is the vital part of a democratic process. The method of voting used in South Africa (SA) today is derived from the Australian ballot system. This paper-based voting system, however, is slow, convoluted and inaccurate because of human errors; it is costly and largely inefficient. In the early 1900s, election officials overwhelmingly decided to use electronic voting (E-voting) systems to solve some of the problematic issues of paper-based voting systems. Mobile voting (M-voting) is a subset of E-voting; and it allows citizens to use their mobile phones to cast their votes. Very few countries have endeavoured to implement M-voting, in order to improve mobility and simplify the election procedures. Despite several M-voting initiatives reported worldwide; insufficient attention has been devoted to understanding the factors that influence the success or failure of M-voting implementation. It is also important to note that the implementation of M-voting may be very difficult; if the different modalities that aid successful M-voting implementation are not in place. This study seeks to develop a framework that has the potential to enable the successful implementation of M-voting in SA. The proposed framework is an IT artefact that endeavors to improve human experiences for voting. This study followed a Design-Science approach; and it made use of a case study to collect the data via a literature review, observations, questionnaires, focus groups and expert reviews. The study revealed that there is no institutional, legal and regulatory framework for the proliferation of M-voting in SA. Successful M-voting implementation depends on a compendium of factors, which may be unique in the local context where it is implemented. The framework that resulted from the above was assessed for validity and applicability; after which a modified framework was presented. The research concludes with specific implementation guidelines, as well as areas for future research.
- Full Text:
- Date Issued: 2017
A framework for management participation in HIV and AIDS intervention programmes: the Chris Hani District Municipality case
- Authors: Kolo, Vuyiswa Felicia
- Date: 2016
- Subjects: Employee health promotion -- South Africa -- Eastern Cape AIDS (Disease) -- Prevention
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/15345 , vital:28221
- Description: South Africa is one of the countries in the world with the highest number of people living with HIV/AIDS. Workplace HIV/AIDS programmes have been singled out by the Government as one of the measures to fight against the spread of the disease. However, it is quite concerning that managers in most organisations are very reluctant to actively participate in the programmes. One of such organisations is the Chris Hani District Municipality. Reluctance by managers to participate in these programmes has given rise to effects such as lower level employees also not willing to participate in the programmes; thereby undermining efforts by the municipality and the National Government as a whole to fight against the spread of the disease in South Africa. This study has developed a framework that may enable municipal managers to participate in HIV/AIDS programmes in the municipality. In addition the study has also explored factors that discourage managers from participating in HIV/AIDS programmes. The study took place in the Chris Hani municipality. The sample population was municipal managers from the different directorates. The methodological approach was quantitative. Data was collected with use of a questionnaire. The questionnaire was distributed physically and electronically by the researcher. The findings of the study show that in order for managers to actively participate in the programmes of HIV/AIDS, measures should be put place to enhance the following: self-awareness, positive attitude, effective communication, management involvement, management support, and relationship building. The researcher hopes that the study will not only enhance management participation in the Chris Hani municipality, but also other municipalities and organisations in South Africa interested in the fight against the spread of the HIV/AIDS disease.
- Full Text:
- Date Issued: 2016
- Authors: Kolo, Vuyiswa Felicia
- Date: 2016
- Subjects: Employee health promotion -- South Africa -- Eastern Cape AIDS (Disease) -- Prevention
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/15345 , vital:28221
- Description: South Africa is one of the countries in the world with the highest number of people living with HIV/AIDS. Workplace HIV/AIDS programmes have been singled out by the Government as one of the measures to fight against the spread of the disease. However, it is quite concerning that managers in most organisations are very reluctant to actively participate in the programmes. One of such organisations is the Chris Hani District Municipality. Reluctance by managers to participate in these programmes has given rise to effects such as lower level employees also not willing to participate in the programmes; thereby undermining efforts by the municipality and the National Government as a whole to fight against the spread of the disease in South Africa. This study has developed a framework that may enable municipal managers to participate in HIV/AIDS programmes in the municipality. In addition the study has also explored factors that discourage managers from participating in HIV/AIDS programmes. The study took place in the Chris Hani municipality. The sample population was municipal managers from the different directorates. The methodological approach was quantitative. Data was collected with use of a questionnaire. The questionnaire was distributed physically and electronically by the researcher. The findings of the study show that in order for managers to actively participate in the programmes of HIV/AIDS, measures should be put place to enhance the following: self-awareness, positive attitude, effective communication, management involvement, management support, and relationship building. The researcher hopes that the study will not only enhance management participation in the Chris Hani municipality, but also other municipalities and organisations in South Africa interested in the fight against the spread of the HIV/AIDS disease.
- Full Text:
- Date Issued: 2016
A framework for managing timetable data quality within the NMMU
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
- Authors: Els, Dierdre Jean
- Date: 2008
- Subjects: Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9769 , http://hdl.handle.net/10948/948 , Computer algorithms Timetables , Management information systems , Management -- Data processing , Information storage and retrieval systems -- Management , Information management
- Description: This dissertation investigates the influencing factors on timetable quality, not only from a data quality perspective, but also from an information quality perspective which takes into account the quality of the business processes involved in creating the timetable. The Nelson Mandela Metropolitan University was used as a case study for assessing the quality of the timetable process, the quality of the source data, and the quality of the final timetable produced. A framework for managing the data quality during the timetabling process is proposed. The framework is based on reviews done on data quality management best practices and data quality aspects. Chapter 1 introduces the current Nelson Mandela Metropolitan University timetable, and motivates why data quality management is essential to its success. The scope and research objectives are presented for this dissertation. Chapter 2 covers a literature study on business process and data quality management best practices. The common thread through all the management methodologies investigated, was top management involvement and commitment to continuously improving the quality of data. Chapter 3 discusses various characteristics of data quality. Quality is determined to be whether the end result meets the quality requirements for which it was intended. Hence each system could have quality aspects that are unique to it. Chapter 4 explains various research designs and which were followed for this dissertation. The combination of literature studies, a questionnaire and a case study were used. Chapter 5 is a case study of the data quality and timetabling processes used at the Nelson Mandela Metropolitan University and is based on the research design described in chapter 4. The current business processes followed in setting up the current timetable are presented, as well as the proposed timetabling process that should produce a better quality timetable for the Nelson Mandela Metropolitan 4 University. The data quality aspects most pertinent to the Nelson Mandela Metropolitan University are determined, being timeliness, accountability, integrity and consistency, as well as the most probable causes for bad timetable quality, like uniform technology, processes, ownership and using a common terminology. Chapter 6 presents a framework for managing timetable data quality at the Nelson Mandela Metropolitan University using an Information Product Map approach that will ensure a better quality timetable. Future research is also proposed. It is evident from this dissertation that data quality of source data as well as the quality of the business process involved is essential for producing a timetable that satisfies the requirements for which it was intended. The management framework proposed for the Nelson Mandela Metropolitan University timetabling process can potentially be used at other institutions as well.
- Full Text:
- Date Issued: 2008
A framework for mobile SOA using compression
- Authors: Saunders, Evan
- Date: 2010
- Subjects: Service-oriented architecture (Computer science)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10459 , http://hdl.handle.net/10948/1500 , Service-oriented architecture (Computer science)
- Description: The widely accepted standards of Service-Oriented Architecture (SOA) have changed the way many organisations conduct their everyday business. The significant popularity of mobile devices has seen a rapid increase in the rate of mobile technology enhancements, which have become widely used for communication, as well as conducting everyday tasks. An increased requirement in many businesses is for staff not to be tied down to the office. Consequently, mobile devices play an important role in achieving the mobility and information access that people desire. Due to the popularity and increasing use of SOA and mobile devices, Mobile Service-Oriented Architecture (Mobile SOA) has become a new industry catch-phrase. Many challenges, however, exist within the Mobile SOA environment. These issues include limitations on mobile devices, such as a reduced screen size, lack of processing power, insufficient processing memory, limited battery life, poor storage capacity, unreliable network connections, limited bandwidth available and high transfer costs. This research aimed to provide an elegant solution to the issues of a mobile device, which hinders the performance of Mobile SOA. The main objective of this research was to improve the effectiveness and efficiency of Mobile SOA. In order to achieve this goal, a framework was proposed, which supported intelligent compression of files used within a Web Service. The proposed framework provided a set of guidelines that facilitate the quick development of a system. A proof-of-concept prototype was developed, based on these guidelines and the framework design principles. The prototype provided practical evidence of the effectiveness of implementing a system based on the proposed framework. An analytical evaluation was conducted to determine the effectiveness of the prototype within the Mobile SOA environment. A performance evaluation was conducted to determine efficiency it provides. Additionally, the performance evaluation highlighted the decrease in file transfer time, as well as the significant reduction in transfer costs. The analytical and performance evaluations demonstrated that the prototype optimises the effectiveness and efficiency of Mobile SOA. The framework could, thus, be used to facilitate efficient file transfer between a Server and (Mobile) Client.
- Full Text:
- Date Issued: 2010
- Authors: Saunders, Evan
- Date: 2010
- Subjects: Service-oriented architecture (Computer science)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10459 , http://hdl.handle.net/10948/1500 , Service-oriented architecture (Computer science)
- Description: The widely accepted standards of Service-Oriented Architecture (SOA) have changed the way many organisations conduct their everyday business. The significant popularity of mobile devices has seen a rapid increase in the rate of mobile technology enhancements, which have become widely used for communication, as well as conducting everyday tasks. An increased requirement in many businesses is for staff not to be tied down to the office. Consequently, mobile devices play an important role in achieving the mobility and information access that people desire. Due to the popularity and increasing use of SOA and mobile devices, Mobile Service-Oriented Architecture (Mobile SOA) has become a new industry catch-phrase. Many challenges, however, exist within the Mobile SOA environment. These issues include limitations on mobile devices, such as a reduced screen size, lack of processing power, insufficient processing memory, limited battery life, poor storage capacity, unreliable network connections, limited bandwidth available and high transfer costs. This research aimed to provide an elegant solution to the issues of a mobile device, which hinders the performance of Mobile SOA. The main objective of this research was to improve the effectiveness and efficiency of Mobile SOA. In order to achieve this goal, a framework was proposed, which supported intelligent compression of files used within a Web Service. The proposed framework provided a set of guidelines that facilitate the quick development of a system. A proof-of-concept prototype was developed, based on these guidelines and the framework design principles. The prototype provided practical evidence of the effectiveness of implementing a system based on the proposed framework. An analytical evaluation was conducted to determine the effectiveness of the prototype within the Mobile SOA environment. A performance evaluation was conducted to determine efficiency it provides. Additionally, the performance evaluation highlighted the decrease in file transfer time, as well as the significant reduction in transfer costs. The analytical and performance evaluations demonstrated that the prototype optimises the effectiveness and efficiency of Mobile SOA. The framework could, thus, be used to facilitate efficient file transfer between a Server and (Mobile) Client.
- Full Text:
- Date Issued: 2010
A framework for parental control of mobile devices in South Africa
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
A framework for personal health records in online social networking
- Van der Westhuizen, Eldridge Werner
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
A framework for secure mobile computing in healthcare
- Thomas, Godwin Dogara Ayenajeh
- Authors: Thomas, Godwin Dogara Ayenajeh
- Date: 2007
- Subjects: Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9789 , http://hdl.handle.net/10948/618 , Mobile computing
- Description: Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
- Full Text:
- Date Issued: 2007
- Authors: Thomas, Godwin Dogara Ayenajeh
- Date: 2007
- Subjects: Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9789 , http://hdl.handle.net/10948/618 , Mobile computing
- Description: Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
- Full Text:
- Date Issued: 2007
A framework for secure mobility in wireless overlay networks
- Authors: Chen, Hejun
- Date: 2006
- Subjects: Wireless communication systems , Computer networks
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9778 , http://hdl.handle.net/10948/819 , Wireless communication systems , Computer networks
- Description: Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
- Full Text:
- Date Issued: 2006
- Authors: Chen, Hejun
- Date: 2006
- Subjects: Wireless communication systems , Computer networks
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9778 , http://hdl.handle.net/10948/819 , Wireless communication systems , Computer networks
- Description: Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
- Full Text:
- Date Issued: 2006
A framework for supplier selection in the Nelson Mandela Bay retail industry
- Authors: Mavela, A
- Date: 2020
- Subjects: Business logistics -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/48905 , vital:41169
- Description: The success of business firms operating in the retail industry is largely dependent on the performance rendered by their supply base. Choosing the incorrect supplier could have dire consequences for the retailer’s performance, as suppliers are generally considered an extension of the retailer. Organisations base their operational expertise on the key performance objectives of cost, service, quality, speed, dependability and flexibility, which becomes the basis of their selection criteria when evaluating suppliers. The primary objective of this study was to develop a framework that guides retailers in their supplier selection process with the ultimate goal of formulating strategies to improve Nelson Mandela Bay’s (NMB’s) retail performance. In support of the primary objective, it was necessary to identify the current supplier selection criteria used in the NMB retail industry and the challenges that retailers face when selecting suppliers. The study set out to assess the effects of utilising established supplier selection criteria on retailers’ performance, as well as to identify strategies that retailers should employ to improve their performance. A quantitative research approach was utilised to collect data from a sample of 248 retailers and procurement and logistics managers. The empirical findings of the study identified flexibility, timeous delivery and reliability as the most important supplier selection criteria identified by retailers in NMB. The findings also revealed that utilising established supplier selection criteria has a significantly positive effect on retailers’ performance. Lack of collaboration between suppliers and retailers, lack of transparency between suppliers and retailers and suppliers’ limited knowledge of the criteria by which they are judged were identified as the most significant challenges facing retailers in NMB. The empirical findings also identified an increase in a retailer’s competitive advantage and revenue as the benefits of utilising supplier selection criteria to improve a retailer’s performance. The conclusions and implications of the empirical findings are provided and recommendations made. The study advances a framework to assist in guiding the retailers and procurement and logistics managers, retail researchers and policy makers when selecting suppliers. The study suggests that retailers should identify the most important supplier selection criteria, inform potential suppliers of the importance v of those criteria, select suppliers based on those criteria and utilise those criteria to evaluate the suppliers’ performance.
- Full Text:
- Date Issued: 2020
- Authors: Mavela, A
- Date: 2020
- Subjects: Business logistics -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/48905 , vital:41169
- Description: The success of business firms operating in the retail industry is largely dependent on the performance rendered by their supply base. Choosing the incorrect supplier could have dire consequences for the retailer’s performance, as suppliers are generally considered an extension of the retailer. Organisations base their operational expertise on the key performance objectives of cost, service, quality, speed, dependability and flexibility, which becomes the basis of their selection criteria when evaluating suppliers. The primary objective of this study was to develop a framework that guides retailers in their supplier selection process with the ultimate goal of formulating strategies to improve Nelson Mandela Bay’s (NMB’s) retail performance. In support of the primary objective, it was necessary to identify the current supplier selection criteria used in the NMB retail industry and the challenges that retailers face when selecting suppliers. The study set out to assess the effects of utilising established supplier selection criteria on retailers’ performance, as well as to identify strategies that retailers should employ to improve their performance. A quantitative research approach was utilised to collect data from a sample of 248 retailers and procurement and logistics managers. The empirical findings of the study identified flexibility, timeous delivery and reliability as the most important supplier selection criteria identified by retailers in NMB. The findings also revealed that utilising established supplier selection criteria has a significantly positive effect on retailers’ performance. Lack of collaboration between suppliers and retailers, lack of transparency between suppliers and retailers and suppliers’ limited knowledge of the criteria by which they are judged were identified as the most significant challenges facing retailers in NMB. The empirical findings also identified an increase in a retailer’s competitive advantage and revenue as the benefits of utilising supplier selection criteria to improve a retailer’s performance. The conclusions and implications of the empirical findings are provided and recommendations made. The study advances a framework to assist in guiding the retailers and procurement and logistics managers, retail researchers and policy makers when selecting suppliers. The study suggests that retailers should identify the most important supplier selection criteria, inform potential suppliers of the importance v of those criteria, select suppliers based on those criteria and utilise those criteria to evaluate the suppliers’ performance.
- Full Text:
- Date Issued: 2020
A framework for the adoption of enterprise resource planning (ERP) systems in higher education
- Authors: Scholtz, Brenda
- Date: 2011
- Subjects: Curriculum change , Enterprise resource planning.
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10485 , http://hdl.handle.net/10948/d1015961
- Description: Information Communication Technology (ICT) practitioners and Enterprise Resource Planning (ERP) specialists are highly sought after globally and in South Africa. In order to address this need for ERP specialists, several studies propose that ERP systems should be adopted in the Information Systems (IS) curricula in higher education institutions (HEIs) for instructional purposes. Whilst many HEIs in the United States, Australia and Europe have successfully adopted ERP systems into their curricula, less than 30% of South African HEIs have followed this trend. The adoption of ERP systems is a challenging process as such systems are resource-intensive, costly, complex, and have a steep learning curve. Educators are faced with resource problems and a dearth of options relating to the adoption process. In addition it is critical that the skills and knowledge competencies attained in these courses are industry-relevant. Several education frameworks have been recommended to assist educators with the process of adopting an ERP system in the curriculum, but these frameworks are not comprehensive since they do not consider all the factors relating to the adoption of an ERP system. In addition existing frameworks are not based on industry-relevant competencies but rather on educational objectives. This has resulted in a difference between the competencies required by organisations and those produced by higher education. Whilst there are several research studies on ERP education, empirical studies on frameworks supporting the adoption of ERP systems in HEIs for instructional purposes are limited, particularly on the impact of these frameworks on educational outcomes. The impact of the usability of the ERP system on educational outcomes has also not been fully explored. A survey of ERP consulting organisations in South Africa confirmed that these organisations struggle to obtain ERP specialists with the appropriate competencies. The survey results also contributed to a standardised, comprehensive, set of industry-relevant ERP competencies. The competency set forms part of a comprehensive Competency Framework for ERP System Adoption in IS Higher Education (ERPEd), which can assist educators with the decisions relating to the adoption of an ERP system into the IS curriculum. It includes all the categories of competencies relevant to industry and maps these onto a recommended ERP system adoption approach, an ERP learning tool, as well as the appropriate level of adoption. The application of the ERPEd framework to a case study, the Management Information Systems (MIS) course at the Nelson Mandela Metropolitan University (NMMU), resulted in the adoption of the SYSPRO medium-sized ERP system into the MIS course with the hands-on approach. The empirical results of the evaluation of the case study revealed that the hands-on use of a medium-sized ERP system, SYSPRO, can successfully contribute to the attainment of educational outcomes. These outcomes were mapped to the three core competencies addressed by the MIS course, which were ERP Theory and Concepts, ERP Transactions and Business Process Management (BPM). The educational outcomes evaluated were the measures of performance, self-efficacy and usability. Self-efficacy included satisfaction with the adoption approach. The results were positive in terms of all the metrics of performance, and all three competency categories had positive post-intervention self-efficacy ratings. In terms of growth in self-efficacy from pre-intervention to post-intervention, BPM was the only competency category that did not show a significant growth, however the satisfaction data indicated that students found that the use of SYSPRO improved their competencies in business process understanding. Usability was evaluated in terms of navigation, presentation and learnability. Learnability was the only usability measure in the neutral range, with the other measures falling in the positive range. This confirms related studies reporting that ERP systems are not designed for learning. Overall the students enjoyed the practical application of the theory by using SYSPRO. Several positive and negative features of the user interface were provided which can be used in the design of improved ERP systems for instructional purposes. The results of this investigation can assist in narrowing the gap between industry requirements and IS education programmes. The ERP competency set provides a standardised list of skills and knowledge which is the starting point for any skills improvement program. The ERPEd framework can improve the quality of ERP courses and the competencies of IS graduates. This in turn, can benefit the business community since it will improve the chances of ERP project success. This research is a major contribution to both government and academic initiatives in South Africa to address both the ICT skills problem as well as the need for ERP specialists.
- Full Text:
- Date Issued: 2011
- Authors: Scholtz, Brenda
- Date: 2011
- Subjects: Curriculum change , Enterprise resource planning.
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:10485 , http://hdl.handle.net/10948/d1015961
- Description: Information Communication Technology (ICT) practitioners and Enterprise Resource Planning (ERP) specialists are highly sought after globally and in South Africa. In order to address this need for ERP specialists, several studies propose that ERP systems should be adopted in the Information Systems (IS) curricula in higher education institutions (HEIs) for instructional purposes. Whilst many HEIs in the United States, Australia and Europe have successfully adopted ERP systems into their curricula, less than 30% of South African HEIs have followed this trend. The adoption of ERP systems is a challenging process as such systems are resource-intensive, costly, complex, and have a steep learning curve. Educators are faced with resource problems and a dearth of options relating to the adoption process. In addition it is critical that the skills and knowledge competencies attained in these courses are industry-relevant. Several education frameworks have been recommended to assist educators with the process of adopting an ERP system in the curriculum, but these frameworks are not comprehensive since they do not consider all the factors relating to the adoption of an ERP system. In addition existing frameworks are not based on industry-relevant competencies but rather on educational objectives. This has resulted in a difference between the competencies required by organisations and those produced by higher education. Whilst there are several research studies on ERP education, empirical studies on frameworks supporting the adoption of ERP systems in HEIs for instructional purposes are limited, particularly on the impact of these frameworks on educational outcomes. The impact of the usability of the ERP system on educational outcomes has also not been fully explored. A survey of ERP consulting organisations in South Africa confirmed that these organisations struggle to obtain ERP specialists with the appropriate competencies. The survey results also contributed to a standardised, comprehensive, set of industry-relevant ERP competencies. The competency set forms part of a comprehensive Competency Framework for ERP System Adoption in IS Higher Education (ERPEd), which can assist educators with the decisions relating to the adoption of an ERP system into the IS curriculum. It includes all the categories of competencies relevant to industry and maps these onto a recommended ERP system adoption approach, an ERP learning tool, as well as the appropriate level of adoption. The application of the ERPEd framework to a case study, the Management Information Systems (MIS) course at the Nelson Mandela Metropolitan University (NMMU), resulted in the adoption of the SYSPRO medium-sized ERP system into the MIS course with the hands-on approach. The empirical results of the evaluation of the case study revealed that the hands-on use of a medium-sized ERP system, SYSPRO, can successfully contribute to the attainment of educational outcomes. These outcomes were mapped to the three core competencies addressed by the MIS course, which were ERP Theory and Concepts, ERP Transactions and Business Process Management (BPM). The educational outcomes evaluated were the measures of performance, self-efficacy and usability. Self-efficacy included satisfaction with the adoption approach. The results were positive in terms of all the metrics of performance, and all three competency categories had positive post-intervention self-efficacy ratings. In terms of growth in self-efficacy from pre-intervention to post-intervention, BPM was the only competency category that did not show a significant growth, however the satisfaction data indicated that students found that the use of SYSPRO improved their competencies in business process understanding. Usability was evaluated in terms of navigation, presentation and learnability. Learnability was the only usability measure in the neutral range, with the other measures falling in the positive range. This confirms related studies reporting that ERP systems are not designed for learning. Overall the students enjoyed the practical application of the theory by using SYSPRO. Several positive and negative features of the user interface were provided which can be used in the design of improved ERP systems for instructional purposes. The results of this investigation can assist in narrowing the gap between industry requirements and IS education programmes. The ERP competency set provides a standardised list of skills and knowledge which is the starting point for any skills improvement program. The ERPEd framework can improve the quality of ERP courses and the competencies of IS graduates. This in turn, can benefit the business community since it will improve the chances of ERP project success. This research is a major contribution to both government and academic initiatives in South Africa to address both the ICT skills problem as well as the need for ERP specialists.
- Full Text:
- Date Issued: 2011
A framework for the corporate governance of ICT in local government
- Delport, Petrus Marthinus Jacobus
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A framework for the design of business intelligence dashboard tools
- Authors: Smuts, Martin Bradley
- Date: 2016
- Subjects: Business intelligence Dashboards (Management information systems)
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/12941 , vital:27136
- Description: Vast amounts of data are collected on a daily basis, making it difficult for humans to derive at valuable information to make effective decisions. In recent years, the field of Business Intelligence (BI) and Information Visualisation (IV) have become a key driver of an organisation’s success. BI tools supporting decision making need to be accessible to a larger audience on different levels of the organisation. The problem is that non-expert users, or novice users, of BI tools do not have the technical knowledge to conduct data analysis and often rely on expert users to assist. For this reason, BI vendors are shifting their focus to self-service BI, a relatively new term where novice users can analyse data without the traditional human mediator. Despite the proliferation of self-service BI tools, limited research is available on their usability and design considerations to assist novice users with decision making and BI analysis. The contribution of this study is a conceptual framework for designing, evaluating or selecting BI tools that support non-expert users to create dashboards (the BI Framework). A dashboard is a particular IV technique that enables users to view critical information at a glance. The main research problem addressed by this study is that non-expert users often have to utilise a number of software tools to conduct data analysis and to develop visualisations, such as BI dashboards. The research problem was further investigated by following a two-step approach. The first approach was to investigate existing problems by using an in-depth literature review in the fields of BI and IV. The second approach was to conduct a field study (Field Study 1) using a development environment consisting of a number of software components of which SAP Xcelsius was the main BI tool used to create a dashboard. The aim of the field study was to compare the identified problems and requirements with those found in literature. The results of the problem analysis revealed a number of problems in terms of BI software. One of the major problems is that BI tools do not adequately guide users through a logical process to conduct data analysis. In addition, the process becomes increasingly difficult when several BI tools are involved that need to be integrated. The results showed positive aspects when the data was mapped to a visualisation, which increased the users’ understanding of data they were analysing. The results were verified in a focus group discussion and were used to establish an initial set of problems and requirements, which were then synthesised with the problems and requirements identified from literature. Once the major problems were verified, a framework was established to guide the design of BI dashboard tools for novice users. The framework includes a set of design guidelines and usability evaluation criteria for BI tools. An extant systems analysis was conducted using BI tools to compare the advantages and disadvantages. The results revealed that a number of tools could be used by non-experts, however, their usability hinders users. All the participants used in all field studies and evaluations were Computer Science (CS) and Information Systems (IS) students. Participants were specially sourced from a higher education institution such as the Nelson Mandela Metropolitan University (NMMU). A second field study (Field Study 2) was conducted with participants using another traditional BI tool identified from the extant systems analysis, PowerPivot. The objective of this field study was to verify the design guidelines and related features that served as a BI Scorecard that can be used to select BI tools. Another BI tool, Tableau, was used for the final evaluation. The final evaluation was conducted with a large participant sample consisting of IS students in their second and third year of study. The results for the two groups revealed a significant difference between participants’ education levels and the usability ratings of Tableau. Additionally, the results indicated a significant relationship between the participants’ experience level and the usability ratings of Tableau. The usability ratings of Tableau were mostly positive and the results revealed that participants found the tool easy to use, flexible and efficient. The proposed BI Framework can be used to assist organisations when evaluating BI tools for adoption. Furthermore, designers of BI tools can use the framework to improve the usability of these tools, reduce the workload for users when creating dashboards, and increase the effectiveness and efficiency of decision support.
- Full Text:
- Date Issued: 2016
- Authors: Smuts, Martin Bradley
- Date: 2016
- Subjects: Business intelligence Dashboards (Management information systems)
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/12941 , vital:27136
- Description: Vast amounts of data are collected on a daily basis, making it difficult for humans to derive at valuable information to make effective decisions. In recent years, the field of Business Intelligence (BI) and Information Visualisation (IV) have become a key driver of an organisation’s success. BI tools supporting decision making need to be accessible to a larger audience on different levels of the organisation. The problem is that non-expert users, or novice users, of BI tools do not have the technical knowledge to conduct data analysis and often rely on expert users to assist. For this reason, BI vendors are shifting their focus to self-service BI, a relatively new term where novice users can analyse data without the traditional human mediator. Despite the proliferation of self-service BI tools, limited research is available on their usability and design considerations to assist novice users with decision making and BI analysis. The contribution of this study is a conceptual framework for designing, evaluating or selecting BI tools that support non-expert users to create dashboards (the BI Framework). A dashboard is a particular IV technique that enables users to view critical information at a glance. The main research problem addressed by this study is that non-expert users often have to utilise a number of software tools to conduct data analysis and to develop visualisations, such as BI dashboards. The research problem was further investigated by following a two-step approach. The first approach was to investigate existing problems by using an in-depth literature review in the fields of BI and IV. The second approach was to conduct a field study (Field Study 1) using a development environment consisting of a number of software components of which SAP Xcelsius was the main BI tool used to create a dashboard. The aim of the field study was to compare the identified problems and requirements with those found in literature. The results of the problem analysis revealed a number of problems in terms of BI software. One of the major problems is that BI tools do not adequately guide users through a logical process to conduct data analysis. In addition, the process becomes increasingly difficult when several BI tools are involved that need to be integrated. The results showed positive aspects when the data was mapped to a visualisation, which increased the users’ understanding of data they were analysing. The results were verified in a focus group discussion and were used to establish an initial set of problems and requirements, which were then synthesised with the problems and requirements identified from literature. Once the major problems were verified, a framework was established to guide the design of BI dashboard tools for novice users. The framework includes a set of design guidelines and usability evaluation criteria for BI tools. An extant systems analysis was conducted using BI tools to compare the advantages and disadvantages. The results revealed that a number of tools could be used by non-experts, however, their usability hinders users. All the participants used in all field studies and evaluations were Computer Science (CS) and Information Systems (IS) students. Participants were specially sourced from a higher education institution such as the Nelson Mandela Metropolitan University (NMMU). A second field study (Field Study 2) was conducted with participants using another traditional BI tool identified from the extant systems analysis, PowerPivot. The objective of this field study was to verify the design guidelines and related features that served as a BI Scorecard that can be used to select BI tools. Another BI tool, Tableau, was used for the final evaluation. The final evaluation was conducted with a large participant sample consisting of IS students in their second and third year of study. The results for the two groups revealed a significant difference between participants’ education levels and the usability ratings of Tableau. Additionally, the results indicated a significant relationship between the participants’ experience level and the usability ratings of Tableau. The usability ratings of Tableau were mostly positive and the results revealed that participants found the tool easy to use, flexible and efficient. The proposed BI Framework can be used to assist organisations when evaluating BI tools for adoption. Furthermore, designers of BI tools can use the framework to improve the usability of these tools, reduce the workload for users when creating dashboards, and increase the effectiveness and efficiency of decision support.
- Full Text:
- Date Issued: 2016
A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
A framework for the governance of social media in the workplace
- Authors: Scharneck, Justin William
- Date: 2012
- Subjects: Social media -- Law and legislation , Social media -- Economic aspects , Work environment , Online social networks
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8861 , http://hdl.handle.net/10948/d1020180
- Description: Social media is fast becoming an ever-increasingly significant part of the world of business and a phenomenon which cannot be evaded. The advent of social media in the workplace compels organisations to acclimatise to the transformation emanating from employees‟ adoption of these technologies (Hanaki & Casella, 2008). Approximately seventy percent of organisations do not have a social media governance framework in place (Fink et al., 2011). Social media governance in organisations is very disjointed; companies have varying stances as to social media strategy, the risks, benefits and business use of social media (Thompson et al., 2011). The growth of social media and its use in the business environment will see a more standardised approach to social media governance (Thompson et al., 2011). Being at the forefront of technology development in Africa, and in certain areas, globally (Government of the Republic of South Africa, 2012), places added emphasis on IT organisations in South Africa to set the standard as it relates to social media governance. The diversity and depth of the human and technology resources within these organisations, creates an environment conducive to establishing and pioneering sound social media governance structures. The treatise consists of a study on the governance of social media and the successive development of two frameworks; an integrated framework for the governance of social media in the workplace, as well as integrated framework for a social media policy within an IT organisation. These frameworks are empirically evaluated amongst employees, within the context of Information Technology (IT) organisations, in South Africa. Several recommendations are proposed by the author in relation to the adoption of the proposed frameworks.
- Full Text:
- Date Issued: 2012
- Authors: Scharneck, Justin William
- Date: 2012
- Subjects: Social media -- Law and legislation , Social media -- Economic aspects , Work environment , Online social networks
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: vital:8861 , http://hdl.handle.net/10948/d1020180
- Description: Social media is fast becoming an ever-increasingly significant part of the world of business and a phenomenon which cannot be evaded. The advent of social media in the workplace compels organisations to acclimatise to the transformation emanating from employees‟ adoption of these technologies (Hanaki & Casella, 2008). Approximately seventy percent of organisations do not have a social media governance framework in place (Fink et al., 2011). Social media governance in organisations is very disjointed; companies have varying stances as to social media strategy, the risks, benefits and business use of social media (Thompson et al., 2011). The growth of social media and its use in the business environment will see a more standardised approach to social media governance (Thompson et al., 2011). Being at the forefront of technology development in Africa, and in certain areas, globally (Government of the Republic of South Africa, 2012), places added emphasis on IT organisations in South Africa to set the standard as it relates to social media governance. The diversity and depth of the human and technology resources within these organisations, creates an environment conducive to establishing and pioneering sound social media governance structures. The treatise consists of a study on the governance of social media and the successive development of two frameworks; an integrated framework for the governance of social media in the workplace, as well as integrated framework for a social media policy within an IT organisation. These frameworks are empirically evaluated amongst employees, within the context of Information Technology (IT) organisations, in South Africa. Several recommendations are proposed by the author in relation to the adoption of the proposed frameworks.
- Full Text:
- Date Issued: 2012