A business process model for blockchain-based South African real estate transactions
- Authors: Tilbury, Jack Laurie
- Date: 2020
- Subjects: Blockchains (Databases) , Conveyancing -- Technological innovations , Real estate business -- Data processing , Real estate business -- South Africa -- Technological innovations
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148380 , vital:38734
- Description: The real estate transaction process has been described as inefficient and technologically outdated due to numerous stakeholders and predominantly paper-based operations. Despite the apparent bottlenecks in the current process, the implementation of new technology into the real estate sector has lagged. Several attempts have been made to modernise and digitise the business process but committed integration of assisting technology has lacked attention. This study examined the applicability and potential integration of blockchain technology into the business process of South African real estate transactions. Blockchain’s novelty means that research in this space, especially within South Africa, is limited. Of the research that has been conducted, no models of the business processes for South African or blockchain-based real estate transactions have been constructed. This study provides two business process models, illustrating the two different processes. The main contribution of this paper was an integrated business process model, illustrating how the various processes and stakeholder interactions for South African blockchain-based real estate transactions are conducted on one transaction platform, common to all participating stakeholders. This platform was named the South African Blockchain Land Exchange System (SABLES), which manages and facilitates these transactions in their entirety from start to finish. This model depicts an enhanced business process that provides increased security, transparency, and speed. These benefits will be realised by those who register, adopt, and transact on the platform. Through in-depth interviews, the integrated business process model was assessed. The findings produced a final and combined thematic map, representing the main themes of the analysed interview data, namely blockchain implementation strategies, business process applicability, information technology assimilation, current transaction context, and PropTech 3.0 success factors. The discussion revealed that the current transaction process lacks technological innovation, which increases pressure on the conveyancing role. It was also revealed that there is not only a need within the industry, but a desire, for newer technologies to assist the transaction process. In order to streamline and improve efficiency, business processes should leverage digital records and data, and strive for a solution beyond digitisation, achieving digitalisation. Digitalisation recognises digital documents as official and legal documents as opposed to simply being digital back-ups. This, coupled with the business process models, represent theoretical contributions.
- Full Text:
- Date Issued: 2020
- Authors: Tilbury, Jack Laurie
- Date: 2020
- Subjects: Blockchains (Databases) , Conveyancing -- Technological innovations , Real estate business -- Data processing , Real estate business -- South Africa -- Technological innovations
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148380 , vital:38734
- Description: The real estate transaction process has been described as inefficient and technologically outdated due to numerous stakeholders and predominantly paper-based operations. Despite the apparent bottlenecks in the current process, the implementation of new technology into the real estate sector has lagged. Several attempts have been made to modernise and digitise the business process but committed integration of assisting technology has lacked attention. This study examined the applicability and potential integration of blockchain technology into the business process of South African real estate transactions. Blockchain’s novelty means that research in this space, especially within South Africa, is limited. Of the research that has been conducted, no models of the business processes for South African or blockchain-based real estate transactions have been constructed. This study provides two business process models, illustrating the two different processes. The main contribution of this paper was an integrated business process model, illustrating how the various processes and stakeholder interactions for South African blockchain-based real estate transactions are conducted on one transaction platform, common to all participating stakeholders. This platform was named the South African Blockchain Land Exchange System (SABLES), which manages and facilitates these transactions in their entirety from start to finish. This model depicts an enhanced business process that provides increased security, transparency, and speed. These benefits will be realised by those who register, adopt, and transact on the platform. Through in-depth interviews, the integrated business process model was assessed. The findings produced a final and combined thematic map, representing the main themes of the analysed interview data, namely blockchain implementation strategies, business process applicability, information technology assimilation, current transaction context, and PropTech 3.0 success factors. The discussion revealed that the current transaction process lacks technological innovation, which increases pressure on the conveyancing role. It was also revealed that there is not only a need within the industry, but a desire, for newer technologies to assist the transaction process. In order to streamline and improve efficiency, business processes should leverage digital records and data, and strive for a solution beyond digitisation, achieving digitalisation. Digitalisation recognises digital documents as official and legal documents as opposed to simply being digital back-ups. This, coupled with the business process models, represent theoretical contributions.
- Full Text:
- Date Issued: 2020
A cloud adoption framework for South African SMEs
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
A framework for the development and measurement of agile enterprise architecture
- Authors: Mthupha, Bokang
- Date: 2012
- Subjects: Management information systems -- Research Industrial management -- Technological innovations -- Research Industrial organization -- Technological innovations -- Research System design
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1147 , http://hdl.handle.net/10962/d1002777
- Description: Enterprise architecture is the high-level design of the entire business, facilitated by enterprise architects. "Agile enterprise architecture" is the term used in enterprise architecture to describe an architecture that caters for future unknowns, enabling change to occur rapidly without undue resource utilization, yet in a controlled manner and with minimal adverse impact. Some enterprise architects still use outdated, rigid approaches to enterprise architecture which are incompatible with today‟s business environment. In addition, there is limited research into methods that can be applied to measure the agility of enterprise architecture. The current environment is such that there is a need for a more agile approach to developing and measuring enterprise architecture. This work will lead to the creation of a Framework for The Development and Measurement of Agile Enterprise Architecture. In support of the main goal of the development of the framework, a literature review will be conducted focusing on the necessary sub-goals of the research. The first sub-goal of the literature review is to develop a comprehensive definition for enterprise architecture (referred to as EA), as well as discover how it is currently practiced. Thereafter, the literature review will investigate a comprehensive definition for agility and research why it is emerging as a critical topic. The next chapter of the literature review will research how agility fits within the context of EA, uncovering a comprehensive definition for agile EA and the best practices in agile EA development. The final chapter of the literature review will investigate suitable measurement techniques that can be used to assess the level of agility of EA. On completion of the literature review, a preliminary framework will be created using the most important contributions from the literature. An empirical study will be conducted to explore the definitions for EA, agility, agile EA, the methods to measure the agility of EA and the concepts for the development of agile EA summarised in the preliminary framework. Data analysis follows an interpretive and qualitative approach based on four case studies through interviews with systems experts in four South African organizations in one province. Each interviewee was interviewed once. The initial interview with a Principal Consultant on Enterprise Strategy Consulting at organisation # 1 formed the basis of an exploratory study; the results of which were used to refine the research instrument and preliminary framework. Thereafter, a more rigorous empirical study focused on interviews with the Chief Architect, Senior Manager in Advisory Services and an Enterprise Architect at organizations 2, 3 and 4 respectively was conducted. The research follows an inductive approach to capture the interpretive experiences of participants and develop theoretical propositions from them. Following the exploratory pilot study it became necessary to make changes to the preliminary framework and initial survey instrument created. Thereafter, the empirical study consisting of the remaining three cases was conducted to test the important aspects of the framework and literature definitions. The analysis of the results of the empirical study prompted further changes to the theoretical framework and definitions created. The interviews conducted with each of the organizations confirmed the factors for agile EA development as well as the effectiveness of the definitions created in the literature review. The research uncovered that the need for a more agile approach to developing EA and a way to measure the level of agility of EA has become more and more significant in organizations. This begins with a better understanding of EA, agility, how agility fits within the context of EA, as well as appropriate methods to measure agility.
- Full Text:
- Date Issued: 2012
- Authors: Mthupha, Bokang
- Date: 2012
- Subjects: Management information systems -- Research Industrial management -- Technological innovations -- Research Industrial organization -- Technological innovations -- Research System design
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1147 , http://hdl.handle.net/10962/d1002777
- Description: Enterprise architecture is the high-level design of the entire business, facilitated by enterprise architects. "Agile enterprise architecture" is the term used in enterprise architecture to describe an architecture that caters for future unknowns, enabling change to occur rapidly without undue resource utilization, yet in a controlled manner and with minimal adverse impact. Some enterprise architects still use outdated, rigid approaches to enterprise architecture which are incompatible with today‟s business environment. In addition, there is limited research into methods that can be applied to measure the agility of enterprise architecture. The current environment is such that there is a need for a more agile approach to developing and measuring enterprise architecture. This work will lead to the creation of a Framework for The Development and Measurement of Agile Enterprise Architecture. In support of the main goal of the development of the framework, a literature review will be conducted focusing on the necessary sub-goals of the research. The first sub-goal of the literature review is to develop a comprehensive definition for enterprise architecture (referred to as EA), as well as discover how it is currently practiced. Thereafter, the literature review will investigate a comprehensive definition for agility and research why it is emerging as a critical topic. The next chapter of the literature review will research how agility fits within the context of EA, uncovering a comprehensive definition for agile EA and the best practices in agile EA development. The final chapter of the literature review will investigate suitable measurement techniques that can be used to assess the level of agility of EA. On completion of the literature review, a preliminary framework will be created using the most important contributions from the literature. An empirical study will be conducted to explore the definitions for EA, agility, agile EA, the methods to measure the agility of EA and the concepts for the development of agile EA summarised in the preliminary framework. Data analysis follows an interpretive and qualitative approach based on four case studies through interviews with systems experts in four South African organizations in one province. Each interviewee was interviewed once. The initial interview with a Principal Consultant on Enterprise Strategy Consulting at organisation # 1 formed the basis of an exploratory study; the results of which were used to refine the research instrument and preliminary framework. Thereafter, a more rigorous empirical study focused on interviews with the Chief Architect, Senior Manager in Advisory Services and an Enterprise Architect at organizations 2, 3 and 4 respectively was conducted. The research follows an inductive approach to capture the interpretive experiences of participants and develop theoretical propositions from them. Following the exploratory pilot study it became necessary to make changes to the preliminary framework and initial survey instrument created. Thereafter, the empirical study consisting of the remaining three cases was conducted to test the important aspects of the framework and literature definitions. The analysis of the results of the empirical study prompted further changes to the theoretical framework and definitions created. The interviews conducted with each of the organizations confirmed the factors for agile EA development as well as the effectiveness of the definitions created in the literature review. The research uncovered that the need for a more agile approach to developing EA and a way to measure the level of agility of EA has become more and more significant in organizations. This begins with a better understanding of EA, agility, how agility fits within the context of EA, as well as appropriate methods to measure agility.
- Full Text:
- Date Issued: 2012
A model for the development of service agreements in the Information and Communication Technology sector
- Authors: Johnston, Robert
- Date: 2006
- Subjects: Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1143 , http://hdl.handle.net/10962/d1002772 , Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Description: SAs are documents that specify the business relationship between stakeholders to an outsourcing agreement. SAs specify this relationship in a legally binding manner that assists in managing expectations of the stakeholders about the service provision. According to Verma (1999), an SA is a precise statement of the expectations and obligations that exist in a business relationship between two organisation: the service provider and the client. In order for organizations to have successful outsourcing partnerships, they need well crafted methods of developing Service Agreements (SAs). Successful methods will produce a conclusive contract that will act as a working document that details the spirit of cooperation between the service provider and the service recipient. This research investigates the development of SAs in the Information and Communication Technology (ICT) sector, and proposes a model for their development. A number of models for SA development have been analysed. Models are analysed from leading researchers in the area, from software houses such as Microsoft and from international standards organisations such as the BS15000 which stipulates the ITIL framework. Eight development principles are identified and explored. An investigation into SAs and their development is conducted. A model is proposed that is composed of the development principles. The development of SAs was explored in an empirical study by means of a survey administered to industry practitioners and a series of interviews with managers in the ICT industry. The results of the study indicate varying levels of support for the development principles and limited relationship between the development principles and the success of the SA, as defined by the number of changes made to the SA after it is completed.
- Full Text:
- Date Issued: 2006
- Authors: Johnston, Robert
- Date: 2006
- Subjects: Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1143 , http://hdl.handle.net/10962/d1002772 , Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Description: SAs are documents that specify the business relationship between stakeholders to an outsourcing agreement. SAs specify this relationship in a legally binding manner that assists in managing expectations of the stakeholders about the service provision. According to Verma (1999), an SA is a precise statement of the expectations and obligations that exist in a business relationship between two organisation: the service provider and the client. In order for organizations to have successful outsourcing partnerships, they need well crafted methods of developing Service Agreements (SAs). Successful methods will produce a conclusive contract that will act as a working document that details the spirit of cooperation between the service provider and the service recipient. This research investigates the development of SAs in the Information and Communication Technology (ICT) sector, and proposes a model for their development. A number of models for SA development have been analysed. Models are analysed from leading researchers in the area, from software houses such as Microsoft and from international standards organisations such as the BS15000 which stipulates the ITIL framework. Eight development principles are identified and explored. An investigation into SAs and their development is conducted. A model is proposed that is composed of the development principles. The development of SAs was explored in an empirical study by means of a survey administered to industry practitioners and a series of interviews with managers in the ICT industry. The results of the study indicate varying levels of support for the development principles and limited relationship between the development principles and the success of the SA, as defined by the number of changes made to the SA after it is completed.
- Full Text:
- Date Issued: 2006
A needs-ICTD strategy alignment framework foundation for the measurement of ICTD impact
- Authors: Baduza, Gugulethu Qhawekazi
- Date: 2014
- Subjects: Siyakhula Living Lab SAP Research Needs assessment -- Information technology -- Social aspects -- South Africa -- Case studies Information technology -- South Africa -- Management -- Case studies Information technology -- Social aspects -- South Africa Rural development -- Economic aspects -- South Africa Rural development -- South Africa -- Sociological aspects Rural development projects -- South Africa
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1155 , http://hdl.handle.net/10962/d1011116
- Description: Many Information and Communication Technologies for Development (ICTD) projects are established with the overall aim of positively developing the communities they are implemented in. However, the solutions that are provided are often commonly developed without the needs of these communities being sufficiently investigated beforehand. As a result the ICTD strategy of the project ends up not well aligned with the aims and targets of the needs of the community. As a result of this, an appropriate programme theory for the project and relevant impact indicators fail to be adequately developed. Consequently, when an impact assessment is conducted it is often found that the intended effects are not directly linked to the needs of the community or what the community had hoped to gain from the ICTD initiative. The purpose of this research serves to develop a needs-ICTD strategy alignment foundation that supports the identification and formulation of impact assessment indicators. Through this research, a framework is developed to support the alignment of ICTD strategy, the development and the promotion of contextual needs of rural communities and other frequently marginalized areas. The Needs-ICTD strategy alignment framework is composed of eight main components that describe the process that can be used to align ICTD strategy with community needs. These components include: collaboration between the internal and external stakeholders, the development of the community, conducting baseline studies, the needs assessment, the ICTD strategy, linking of the needs-ICTD strategy, and lastly the identification of impact indicators. An interpretive research approach is used to explore and inform the framework through a multi-case study investigation of the Siyakhula Living Lab and two projects in the Systems Application Products (SAP) Living Lab. Two main case study questions drive the exploration of the framework, that being: 1) How are the needs of the community elicited and how is the ICTD strategy aligned to the needs of the community? 2) And, why were the selected approaches chosen for aligning the needs of the community and ICTD strategy? Data for this research was collected qualitatively through interviews, document analysis and participant observation. Key findings indicate that the involvement of internal (local) stakeholders in the development and alignment of ICTD strategy to the needs of the community is still lacking. As a consequence, many community members end up not fully understanding the project objectives and how these objectives aims are to be achieved. The research also finds that ‘solution specific’ projects also fail communities as they focus specifically on one target group and repeatedly fail to assist the community holistically in supporting their information and their community development needs.
- Full Text:
- Date Issued: 2014
- Authors: Baduza, Gugulethu Qhawekazi
- Date: 2014
- Subjects: Siyakhula Living Lab SAP Research Needs assessment -- Information technology -- Social aspects -- South Africa -- Case studies Information technology -- South Africa -- Management -- Case studies Information technology -- Social aspects -- South Africa Rural development -- Economic aspects -- South Africa Rural development -- South Africa -- Sociological aspects Rural development projects -- South Africa
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1155 , http://hdl.handle.net/10962/d1011116
- Description: Many Information and Communication Technologies for Development (ICTD) projects are established with the overall aim of positively developing the communities they are implemented in. However, the solutions that are provided are often commonly developed without the needs of these communities being sufficiently investigated beforehand. As a result the ICTD strategy of the project ends up not well aligned with the aims and targets of the needs of the community. As a result of this, an appropriate programme theory for the project and relevant impact indicators fail to be adequately developed. Consequently, when an impact assessment is conducted it is often found that the intended effects are not directly linked to the needs of the community or what the community had hoped to gain from the ICTD initiative. The purpose of this research serves to develop a needs-ICTD strategy alignment foundation that supports the identification and formulation of impact assessment indicators. Through this research, a framework is developed to support the alignment of ICTD strategy, the development and the promotion of contextual needs of rural communities and other frequently marginalized areas. The Needs-ICTD strategy alignment framework is composed of eight main components that describe the process that can be used to align ICTD strategy with community needs. These components include: collaboration between the internal and external stakeholders, the development of the community, conducting baseline studies, the needs assessment, the ICTD strategy, linking of the needs-ICTD strategy, and lastly the identification of impact indicators. An interpretive research approach is used to explore and inform the framework through a multi-case study investigation of the Siyakhula Living Lab and two projects in the Systems Application Products (SAP) Living Lab. Two main case study questions drive the exploration of the framework, that being: 1) How are the needs of the community elicited and how is the ICTD strategy aligned to the needs of the community? 2) And, why were the selected approaches chosen for aligning the needs of the community and ICTD strategy? Data for this research was collected qualitatively through interviews, document analysis and participant observation. Key findings indicate that the involvement of internal (local) stakeholders in the development and alignment of ICTD strategy to the needs of the community is still lacking. As a consequence, many community members end up not fully understanding the project objectives and how these objectives aims are to be achieved. The research also finds that ‘solution specific’ projects also fail communities as they focus specifically on one target group and repeatedly fail to assist the community holistically in supporting their information and their community development needs.
- Full Text:
- Date Issued: 2014
An access control model for a South African National Electronic Health Record System
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
An Agile systems development approach for enhancing e-Government user adoption
- Authors: Lehasa, Odifentse Mapula-e
- Date: 2019
- Subjects: Agile software development , Internet in public administration -- Developing countries
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/94158 , vital:31010
- Description: The expansion of technological developments in all areas of society has seen governments taking advantage of new technologies to enhance public service delivery, disseminate information and promote participation by the public in government decision-making. This phenomenon is known as electronic government, or e-Government. However despite the socio-economic benefits inherent in the implementation of e-Government systems, an overwhelming number of government projects – particularly in developing countries – struggle to successfully implement e-Government systems. e-Government project failure is more pronounced in developing countries, with more than half of these projects either partially or completely failing. The failure of e-Government projects undermines government investments, as well as the potential socio-economic benefits that could be realised by the citizens. Arguably, while the failure or success of an e-Government project is attributed to a myriad of factors, low user adoption is one of the key factors that contribute to e-Government project failure. Therefore this thesis seeks to investigate the phenomenon of low e-Government user adoption and determine whether the use of an Agile system development approach can positively influence e-Government user satisfaction as well as buy-in and adoption. A Mixed-Methods, multi-case study approach was used through the perspective of Post-Positivism. The researcher examined four (4) South African e-Government projects – using an online questionnaire and in-depth interviews with members of the system development team – to determine whether the use of an Agile approach has merit in enhancing e-Government user adoption. The use of a Mixed-Methods approach allowed for data triangulation so as to verify the findings; while the use of multiple case studies enabled for cross-case analysis. The findings indicate that the use of Agile practices, as listed in the proposed Agile-informed User Engagement Guidelines, can ensure that the e-Government system developed meets user needs; and, that users are satisfied with, and make use of the e-Government system. However since most large e-Government projects make use of a traditional Waterfall development approach, it is recommended that the Agile practices (proposed guidelines) be incorporated into the structured Waterfall approach – to create a hybrid, or blended system development approach. In conclusion, the use of the proposed Agile-informed User Engagement Guidelines can enhance e-Government user adoption; and, subsequently, contribute towards nurturing the success of e-Government projects.
- Full Text:
- Date Issued: 2019
- Authors: Lehasa, Odifentse Mapula-e
- Date: 2019
- Subjects: Agile software development , Internet in public administration -- Developing countries
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/94158 , vital:31010
- Description: The expansion of technological developments in all areas of society has seen governments taking advantage of new technologies to enhance public service delivery, disseminate information and promote participation by the public in government decision-making. This phenomenon is known as electronic government, or e-Government. However despite the socio-economic benefits inherent in the implementation of e-Government systems, an overwhelming number of government projects – particularly in developing countries – struggle to successfully implement e-Government systems. e-Government project failure is more pronounced in developing countries, with more than half of these projects either partially or completely failing. The failure of e-Government projects undermines government investments, as well as the potential socio-economic benefits that could be realised by the citizens. Arguably, while the failure or success of an e-Government project is attributed to a myriad of factors, low user adoption is one of the key factors that contribute to e-Government project failure. Therefore this thesis seeks to investigate the phenomenon of low e-Government user adoption and determine whether the use of an Agile system development approach can positively influence e-Government user satisfaction as well as buy-in and adoption. A Mixed-Methods, multi-case study approach was used through the perspective of Post-Positivism. The researcher examined four (4) South African e-Government projects – using an online questionnaire and in-depth interviews with members of the system development team – to determine whether the use of an Agile approach has merit in enhancing e-Government user adoption. The use of a Mixed-Methods approach allowed for data triangulation so as to verify the findings; while the use of multiple case studies enabled for cross-case analysis. The findings indicate that the use of Agile practices, as listed in the proposed Agile-informed User Engagement Guidelines, can ensure that the e-Government system developed meets user needs; and, that users are satisfied with, and make use of the e-Government system. However since most large e-Government projects make use of a traditional Waterfall development approach, it is recommended that the Agile practices (proposed guidelines) be incorporated into the structured Waterfall approach – to create a hybrid, or blended system development approach. In conclusion, the use of the proposed Agile-informed User Engagement Guidelines can enhance e-Government user adoption; and, subsequently, contribute towards nurturing the success of e-Government projects.
- Full Text:
- Date Issued: 2019
An emancipatory approach for innovative access to education in farm schools of the Eastern Cape, South Africa
- Authors: Robinson, Craig Grant
- Date: 2019
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/72462 , vital:30055
- Description: Expected release date-April 2020
- Full Text: false
- Date Issued: 2019
- Authors: Robinson, Craig Grant
- Date: 2019
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/72462 , vital:30055
- Description: Expected release date-April 2020
- Full Text: false
- Date Issued: 2019
An investigation into the use of social media channels within the South African retail banking environment in support of creating and maintaining brand loyalty
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
An investigation of a framework for the implementation of service management in the information and communication technology sector
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
An investigation of an undergraduate course module on the ethical aspects of information systems
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
An investigation of ICT project management techniques for sustainable ICT projects in rural development
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
An investigation of social computing
- Authors: Schlenkrich, Lara
- Date: 2009
- Subjects: Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1149 , http://hdl.handle.net/10962/d1006194 , Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Description: Social network sites have recently become extremely popular online destinations as they offer users easy ways to build and maintain their relationships with each other. Consequently, students, lecturers, teachers, parents and businesses are using these tools to communicate with each other in a fast and cost-effective manner. However, literature suggests that the full potential of social network sites has not yet been revealed since users are still battling to overcome the various negative characteristics surrounding these sites. A framework for appropriate use of these sites is needed so that users are able to overcome these negative aspects, allowing them to be more effective and use the sites successfully. The goal of this research is to construct a framework for perceived successful use of social computing tools in educational institutions. This framework will include critical success factors that need to be adopted by users in order to develop the positive aspects of social computing, while at the same time overcoming the disadvantages experienced by users. Factors for successful use were derived from the literature and consolidated into a theoretical framework in order to understand the factors that drive successful use of social network sites. Measures used to test successful use of social network sites were also derived from these sources and were included in the same theoretical framework; these measures allow users to evaluate the extent of perceived successful use of social network sites. This framework was tested empirically by means of a pilot study and online survey, and revised according to the results of the survey. The factors were identified using Cronbach alpha coefficients (in the pilot study) and exploratory factor analysis to confirm the reliability of the scales developed. Pearson product-moment correlation coefficient analysis, t-tests and Pearson Chi-Square tests were used to measure the relationships amongst the variables in the framework proposed in this research. The factors influencing perceived successful use of social network sites were identified by the empirical study as: • Privacy and Security Settings need to be enabled. These are split into: - Settings: content that users allow others to see - Viewers: people who are allowed onto a user's profile • It is necessary for users to practise Legal and Acceptable Activities when using social network sites • Suspect Information needs to be checked before sharing it with others • Personal and Professional Time needs to be separated to ensure that work is completed before social activities occur • Users need to practise Professional and Ethical Behaviour • Users need to have a Positive Attitude when using social network sites • Usability of sites affects their success. This includes: - technical capacity (broadband) - ease of use - functionality (range of features and functions) • Current and Controversial Issues need to be discussed on social network sites. The extent to which social network sites are being used successfully can be evaluated by the presence of the following measures: • Range of Content must be available to users. This includes: - Content displayed on profiles - Viewers able to visit profiles • Visitors Behaviour is monitored and no unwanted visitors are present users' profiles • Social Contracts found on sites are followed by users • Critical Thinking Skills and Accurate Information are displayed by users • Work is completed before social activities occur on sites • A Variety of Users is present on sites • Collaboration between people as well as variety of opinions exist on sites • Social Capital (well-being) is present after users have been on sites • Learning and Advising Skills are enhanced on sites. The framework developed provides users with a useful instrument to overcome the negative characteristics associated with social network sites. If used successfully, social network sites can offer lecturers and students a unique method to develop their relationship, creating a positive learning experience.
- Full Text:
- Date Issued: 2009
- Authors: Schlenkrich, Lara
- Date: 2009
- Subjects: Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1149 , http://hdl.handle.net/10962/d1006194 , Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Description: Social network sites have recently become extremely popular online destinations as they offer users easy ways to build and maintain their relationships with each other. Consequently, students, lecturers, teachers, parents and businesses are using these tools to communicate with each other in a fast and cost-effective manner. However, literature suggests that the full potential of social network sites has not yet been revealed since users are still battling to overcome the various negative characteristics surrounding these sites. A framework for appropriate use of these sites is needed so that users are able to overcome these negative aspects, allowing them to be more effective and use the sites successfully. The goal of this research is to construct a framework for perceived successful use of social computing tools in educational institutions. This framework will include critical success factors that need to be adopted by users in order to develop the positive aspects of social computing, while at the same time overcoming the disadvantages experienced by users. Factors for successful use were derived from the literature and consolidated into a theoretical framework in order to understand the factors that drive successful use of social network sites. Measures used to test successful use of social network sites were also derived from these sources and were included in the same theoretical framework; these measures allow users to evaluate the extent of perceived successful use of social network sites. This framework was tested empirically by means of a pilot study and online survey, and revised according to the results of the survey. The factors were identified using Cronbach alpha coefficients (in the pilot study) and exploratory factor analysis to confirm the reliability of the scales developed. Pearson product-moment correlation coefficient analysis, t-tests and Pearson Chi-Square tests were used to measure the relationships amongst the variables in the framework proposed in this research. The factors influencing perceived successful use of social network sites were identified by the empirical study as: • Privacy and Security Settings need to be enabled. These are split into: - Settings: content that users allow others to see - Viewers: people who are allowed onto a user's profile • It is necessary for users to practise Legal and Acceptable Activities when using social network sites • Suspect Information needs to be checked before sharing it with others • Personal and Professional Time needs to be separated to ensure that work is completed before social activities occur • Users need to practise Professional and Ethical Behaviour • Users need to have a Positive Attitude when using social network sites • Usability of sites affects their success. This includes: - technical capacity (broadband) - ease of use - functionality (range of features and functions) • Current and Controversial Issues need to be discussed on social network sites. The extent to which social network sites are being used successfully can be evaluated by the presence of the following measures: • Range of Content must be available to users. This includes: - Content displayed on profiles - Viewers able to visit profiles • Visitors Behaviour is monitored and no unwanted visitors are present users' profiles • Social Contracts found on sites are followed by users • Critical Thinking Skills and Accurate Information are displayed by users • Work is completed before social activities occur on sites • A Variety of Users is present on sites • Collaboration between people as well as variety of opinions exist on sites • Social Capital (well-being) is present after users have been on sites • Learning and Advising Skills are enhanced on sites. The framework developed provides users with a useful instrument to overcome the negative characteristics associated with social network sites. If used successfully, social network sites can offer lecturers and students a unique method to develop their relationship, creating a positive learning experience.
- Full Text:
- Date Issued: 2009
An investigation of the development and adoption of educational metadata standards for the widespread use of learning objects
- Authors: Krull, Greig Emil
- Date: 2005
- Subjects: Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1142 , http://hdl.handle.net/10962/d1002771 , Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Description: This research investigates the development and adoption of educational metadata standards for the widespread use of learning objects. Learning objects, metadata, the related IEEE standard and the various application profiles derived from the standard are discussed. A number of standards and specifications for educational metadata used to describe learning objects are explored, namely the Dublin Core, IMS, SCORM, ARIADNE, CanCore and the UK LOM Core. Three metadata editors and the experience with using one of them, RELOAD, is described. These educational metadata specifications are used in a practical metadata implementation scenario and the experiences are extrapolated to derive a localised instance of the generic IEEE standard. A new application profile is proposed, “RU LOM Core”, for the South African higher education context. Some existing results are confirmed about the complexity of using the IEEE standard and it is demonstrated that it is possible to instantiate the standard for South African conditions. The results are largely qualitative and based on practical experience. However, the results concur with results from related research. Although the development of an application profile is certainly not new, the development of RU LOM Core illustrates that the IEEE standard, developed largely within the northern hemisphere, can be adapted to work in the South African scenario. RU LOM Core has been developed for the South African higher education environment and takes linguistic and cultural diversity and the low rate of technological literacy into consideration. The lessons learned and the proposed LOM core can be built upon in further research and collaboration to use and support the use of such standards within South Africa.
- Full Text:
- Date Issued: 2005
- Authors: Krull, Greig Emil
- Date: 2005
- Subjects: Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1142 , http://hdl.handle.net/10962/d1002771 , Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Description: This research investigates the development and adoption of educational metadata standards for the widespread use of learning objects. Learning objects, metadata, the related IEEE standard and the various application profiles derived from the standard are discussed. A number of standards and specifications for educational metadata used to describe learning objects are explored, namely the Dublin Core, IMS, SCORM, ARIADNE, CanCore and the UK LOM Core. Three metadata editors and the experience with using one of them, RELOAD, is described. These educational metadata specifications are used in a practical metadata implementation scenario and the experiences are extrapolated to derive a localised instance of the generic IEEE standard. A new application profile is proposed, “RU LOM Core”, for the South African higher education context. Some existing results are confirmed about the complexity of using the IEEE standard and it is demonstrated that it is possible to instantiate the standard for South African conditions. The results are largely qualitative and based on practical experience. However, the results concur with results from related research. Although the development of an application profile is certainly not new, the development of RU LOM Core illustrates that the IEEE standard, developed largely within the northern hemisphere, can be adapted to work in the South African scenario. RU LOM Core has been developed for the South African higher education environment and takes linguistic and cultural diversity and the low rate of technological literacy into consideration. The lessons learned and the proposed LOM core can be built upon in further research and collaboration to use and support the use of such standards within South Africa.
- Full Text:
- Date Issued: 2005
An online information security Aaareness model: the disclosure of personal data
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021
Effective management of an information technology professional's career
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
Factors influencing the successful adoption of mobile commerce services
- De Sousa, Sergio Anthony David
- Authors: De Sousa, Sergio Anthony David
- Date: 2013
- Subjects: Mobile commerce Electronic commerce Wireless communication systems Mobile communication systems Computer networks
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1152 , http://hdl.handle.net/10962/d1008184
- Description: Mobile Commerce (MC) can be defined as any transaction carried out over a wireless network, using a wireless device, such as a mobile phone, and that has monetary value (Wang and Liao, 2007). MC is a rapidly developing industry in tenns of its technological capabilities. With these increasing developments, come greater forecasts of potential benefits to societies, economies, industries and individuals. However, the growth and development ofthe underlying MC technology, has not been met by the creation and adoption of the services meant to accompany MC. It is said that the success of MC will ultimately lie in its services. As MC Service Providers (MCSP) are responsible for delivering these MC Services (MCS), the success ofMC can be said to rest on them. In order for MCSs to be successfully adopted, both the initial use and continuous use thereof should be targeted. In other words those that have used MCSs (users) and those that have yet to use MCSs (non-users) should be targeted. It is thus pivotal that an understanding of the factors that generate MCS adoption be sought. This research purposed to uncover the factors that generate MCS adoption within the user and nonuser group. In defining successful adoption ofMCS's, two separate measures were used for each group. User satisfaction is a well accepted construct among researchers for measuring system success among users. User satisfaction is also accepted to be a detenninant of service re-use and loyalty. Intention to use is a measure used for MC success among non-users and is accepted to be a detenninant of actual use. Factors affecting both detenninants, user satisfaction and intention to use, were investigated. After a review ofliterature and current models, ten (10) factors were hypothesised to be significant factors in determining user satisfaction and intention to use namely: ease of use, cost, speed, personalisation, pennission, privacy, security, convenience, relationship (with MCSP) and awareness. A questionnaire was developed to test the hypothesised factors. Not all factors were proven to have a significant impact on both user satisfactions and intention to use. One main recommendation is that both initial and continuous adoption should be the focus ofMC strategy. Services that cater to specific user needs and offer convenience at a low cost should be offered. MCSPs can use the factors proved to be significant to generate and evaluate their service offering, to users and non users, to increase the probability of successful adoption from initial to continuous use. The research concludes that MCSPs need to begin to offer MCSs that meet user needs and add value to their lives in order to realise the professed potential ofMC.
- Full Text:
- Date Issued: 2013
- Authors: De Sousa, Sergio Anthony David
- Date: 2013
- Subjects: Mobile commerce Electronic commerce Wireless communication systems Mobile communication systems Computer networks
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1152 , http://hdl.handle.net/10962/d1008184
- Description: Mobile Commerce (MC) can be defined as any transaction carried out over a wireless network, using a wireless device, such as a mobile phone, and that has monetary value (Wang and Liao, 2007). MC is a rapidly developing industry in tenns of its technological capabilities. With these increasing developments, come greater forecasts of potential benefits to societies, economies, industries and individuals. However, the growth and development ofthe underlying MC technology, has not been met by the creation and adoption of the services meant to accompany MC. It is said that the success of MC will ultimately lie in its services. As MC Service Providers (MCSP) are responsible for delivering these MC Services (MCS), the success ofMC can be said to rest on them. In order for MCSs to be successfully adopted, both the initial use and continuous use thereof should be targeted. In other words those that have used MCSs (users) and those that have yet to use MCSs (non-users) should be targeted. It is thus pivotal that an understanding of the factors that generate MCS adoption be sought. This research purposed to uncover the factors that generate MCS adoption within the user and nonuser group. In defining successful adoption ofMCS's, two separate measures were used for each group. User satisfaction is a well accepted construct among researchers for measuring system success among users. User satisfaction is also accepted to be a detenninant of service re-use and loyalty. Intention to use is a measure used for MC success among non-users and is accepted to be a detenninant of actual use. Factors affecting both detenninants, user satisfaction and intention to use, were investigated. After a review ofliterature and current models, ten (10) factors were hypothesised to be significant factors in determining user satisfaction and intention to use namely: ease of use, cost, speed, personalisation, pennission, privacy, security, convenience, relationship (with MCSP) and awareness. A questionnaire was developed to test the hypothesised factors. Not all factors were proven to have a significant impact on both user satisfactions and intention to use. One main recommendation is that both initial and continuous adoption should be the focus ofMC strategy. Services that cater to specific user needs and offer convenience at a low cost should be offered. MCSPs can use the factors proved to be significant to generate and evaluate their service offering, to users and non users, to increase the probability of successful adoption from initial to continuous use. The research concludes that MCSPs need to begin to offer MCSs that meet user needs and add value to their lives in order to realise the professed potential ofMC.
- Full Text:
- Date Issued: 2013
Formulating an IT governance framework
- Authors: Roos, Pieter
- Date: 2015
- Subjects: Corporate governance -- Information technology -- South Africa , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1156 , http://hdl.handle.net/10962/d1017541
- Description: Modern organisations make substantial investments in Information Technology (IT). Corporate governance practices can no longer ignore the importance of effectively governing IT. Consequently, the third King Report on Corporate Governance (King III) makes specific provision for IT governance, which is implemented through the establishment of an IT governance framework. The purpose of this research is to develop a generic IT governance framework, suitable to any large South African organisation in the public or private sector. The literature considered for this research confirmed the extent of standards and practices available in support of IT governance, together with the roles and structures required to implement them. These included well-known publications such as COBIT, Prince2, ITIL and ISO/IEC27000. Based on the literature review, a theoretical Processes, Enablers and Structures (PES) IT Governance Framework was formulated. The framework was further explored by means of a survey of and structured interview with ten Chief Information Officers (CIOs) of South African organisations with a turnover in excess of R1bn per annum. The final PES IT Governance Framework comprises three dimensions, each of which contains a set of constituent components: • Processes: Strategic Alignment, Value Delivery, Resource Management, Risk Management and Performance Measurement. • Enablers: IT Sub Processes, Supporting Documentation, IT Control Framework, Technology Architecture, Desirable Practice, IT Portfolio Management and Regulation. • Structures: The Board, Office of the CIO, IT Steering Committee, Technology Architecture Forum, IT Programme Management Office and Information Security Organisation. As the number of regulatory requirements and associated compliance pressures grow, the importance of an effective IT governance framework also becomes more prominent. The PES IT Governance Framework offers a uniquely practical approach to addressing IT governance principles that are often regarded as abstract. The final PES IT Governance Framework provides clear guidance on how organisations could implement an IT governance framework, which addresses the strategic alignment of IT to business, value delivery by IT investments, IT risk management, IT resource management and IT performance measurement.
- Full Text:
- Date Issued: 2015
- Authors: Roos, Pieter
- Date: 2015
- Subjects: Corporate governance -- Information technology -- South Africa , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1156 , http://hdl.handle.net/10962/d1017541
- Description: Modern organisations make substantial investments in Information Technology (IT). Corporate governance practices can no longer ignore the importance of effectively governing IT. Consequently, the third King Report on Corporate Governance (King III) makes specific provision for IT governance, which is implemented through the establishment of an IT governance framework. The purpose of this research is to develop a generic IT governance framework, suitable to any large South African organisation in the public or private sector. The literature considered for this research confirmed the extent of standards and practices available in support of IT governance, together with the roles and structures required to implement them. These included well-known publications such as COBIT, Prince2, ITIL and ISO/IEC27000. Based on the literature review, a theoretical Processes, Enablers and Structures (PES) IT Governance Framework was formulated. The framework was further explored by means of a survey of and structured interview with ten Chief Information Officers (CIOs) of South African organisations with a turnover in excess of R1bn per annum. The final PES IT Governance Framework comprises three dimensions, each of which contains a set of constituent components: • Processes: Strategic Alignment, Value Delivery, Resource Management, Risk Management and Performance Measurement. • Enablers: IT Sub Processes, Supporting Documentation, IT Control Framework, Technology Architecture, Desirable Practice, IT Portfolio Management and Regulation. • Structures: The Board, Office of the CIO, IT Steering Committee, Technology Architecture Forum, IT Programme Management Office and Information Security Organisation. As the number of regulatory requirements and associated compliance pressures grow, the importance of an effective IT governance framework also becomes more prominent. The PES IT Governance Framework offers a uniquely practical approach to addressing IT governance principles that are often regarded as abstract. The final PES IT Governance Framework provides clear guidance on how organisations could implement an IT governance framework, which addresses the strategic alignment of IT to business, value delivery by IT investments, IT risk management, IT resource management and IT performance measurement.
- Full Text:
- Date Issued: 2015
Geographically distributed requirements elicitation
- Authors: Vat, Nicholas
- Date: 2000
- Subjects: Management information systems -- Management , Information resources management , System design , System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1136 , http://hdl.handle.net/10962/d1002764 , Management information systems -- Management , Information resources management , System design , System analysis
- Description: The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
- Full Text:
- Date Issued: 2000
- Authors: Vat, Nicholas
- Date: 2000
- Subjects: Management information systems -- Management , Information resources management , System design , System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1136 , http://hdl.handle.net/10962/d1002764 , Management information systems -- Management , Information resources management , System design , System analysis
- Description: The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
- Full Text:
- Date Issued: 2000
Guidelines for the user interface design of electronic medical records in optometry
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020