Effective management of an information technology professional's career
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
A needs-ICTD strategy alignment framework foundation for the measurement of ICTD impact
- Authors: Baduza, Gugulethu Qhawekazi
- Date: 2014
- Subjects: Siyakhula Living Lab SAP Research Needs assessment -- Information technology -- Social aspects -- South Africa -- Case studies Information technology -- South Africa -- Management -- Case studies Information technology -- Social aspects -- South Africa Rural development -- Economic aspects -- South Africa Rural development -- South Africa -- Sociological aspects Rural development projects -- South Africa
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1155 , http://hdl.handle.net/10962/d1011116
- Description: Many Information and Communication Technologies for Development (ICTD) projects are established with the overall aim of positively developing the communities they are implemented in. However, the solutions that are provided are often commonly developed without the needs of these communities being sufficiently investigated beforehand. As a result the ICTD strategy of the project ends up not well aligned with the aims and targets of the needs of the community. As a result of this, an appropriate programme theory for the project and relevant impact indicators fail to be adequately developed. Consequently, when an impact assessment is conducted it is often found that the intended effects are not directly linked to the needs of the community or what the community had hoped to gain from the ICTD initiative. The purpose of this research serves to develop a needs-ICTD strategy alignment foundation that supports the identification and formulation of impact assessment indicators. Through this research, a framework is developed to support the alignment of ICTD strategy, the development and the promotion of contextual needs of rural communities and other frequently marginalized areas. The Needs-ICTD strategy alignment framework is composed of eight main components that describe the process that can be used to align ICTD strategy with community needs. These components include: collaboration between the internal and external stakeholders, the development of the community, conducting baseline studies, the needs assessment, the ICTD strategy, linking of the needs-ICTD strategy, and lastly the identification of impact indicators. An interpretive research approach is used to explore and inform the framework through a multi-case study investigation of the Siyakhula Living Lab and two projects in the Systems Application Products (SAP) Living Lab. Two main case study questions drive the exploration of the framework, that being: 1) How are the needs of the community elicited and how is the ICTD strategy aligned to the needs of the community? 2) And, why were the selected approaches chosen for aligning the needs of the community and ICTD strategy? Data for this research was collected qualitatively through interviews, document analysis and participant observation. Key findings indicate that the involvement of internal (local) stakeholders in the development and alignment of ICTD strategy to the needs of the community is still lacking. As a consequence, many community members end up not fully understanding the project objectives and how these objectives aims are to be achieved. The research also finds that ‘solution specific’ projects also fail communities as they focus specifically on one target group and repeatedly fail to assist the community holistically in supporting their information and their community development needs.
- Full Text:
- Date Issued: 2014
- Authors: Baduza, Gugulethu Qhawekazi
- Date: 2014
- Subjects: Siyakhula Living Lab SAP Research Needs assessment -- Information technology -- Social aspects -- South Africa -- Case studies Information technology -- South Africa -- Management -- Case studies Information technology -- Social aspects -- South Africa Rural development -- Economic aspects -- South Africa Rural development -- South Africa -- Sociological aspects Rural development projects -- South Africa
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1155 , http://hdl.handle.net/10962/d1011116
- Description: Many Information and Communication Technologies for Development (ICTD) projects are established with the overall aim of positively developing the communities they are implemented in. However, the solutions that are provided are often commonly developed without the needs of these communities being sufficiently investigated beforehand. As a result the ICTD strategy of the project ends up not well aligned with the aims and targets of the needs of the community. As a result of this, an appropriate programme theory for the project and relevant impact indicators fail to be adequately developed. Consequently, when an impact assessment is conducted it is often found that the intended effects are not directly linked to the needs of the community or what the community had hoped to gain from the ICTD initiative. The purpose of this research serves to develop a needs-ICTD strategy alignment foundation that supports the identification and formulation of impact assessment indicators. Through this research, a framework is developed to support the alignment of ICTD strategy, the development and the promotion of contextual needs of rural communities and other frequently marginalized areas. The Needs-ICTD strategy alignment framework is composed of eight main components that describe the process that can be used to align ICTD strategy with community needs. These components include: collaboration between the internal and external stakeholders, the development of the community, conducting baseline studies, the needs assessment, the ICTD strategy, linking of the needs-ICTD strategy, and lastly the identification of impact indicators. An interpretive research approach is used to explore and inform the framework through a multi-case study investigation of the Siyakhula Living Lab and two projects in the Systems Application Products (SAP) Living Lab. Two main case study questions drive the exploration of the framework, that being: 1) How are the needs of the community elicited and how is the ICTD strategy aligned to the needs of the community? 2) And, why were the selected approaches chosen for aligning the needs of the community and ICTD strategy? Data for this research was collected qualitatively through interviews, document analysis and participant observation. Key findings indicate that the involvement of internal (local) stakeholders in the development and alignment of ICTD strategy to the needs of the community is still lacking. As a consequence, many community members end up not fully understanding the project objectives and how these objectives aims are to be achieved. The research also finds that ‘solution specific’ projects also fail communities as they focus specifically on one target group and repeatedly fail to assist the community holistically in supporting their information and their community development needs.
- Full Text:
- Date Issued: 2014
An access control model for a South African National Electronic Health Record System
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
An emancipatory approach for innovative access to education in farm schools of the Eastern Cape, South Africa
- Authors: Robinson, Craig Grant
- Date: 2019
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/72462 , vital:30055
- Description: Expected release date-April 2020
- Full Text: false
- Date Issued: 2019
- Authors: Robinson, Craig Grant
- Date: 2019
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/72462 , vital:30055
- Description: Expected release date-April 2020
- Full Text: false
- Date Issued: 2019
A model for the development of service agreements in the Information and Communication Technology sector
- Authors: Johnston, Robert
- Date: 2006
- Subjects: Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1143 , http://hdl.handle.net/10962/d1002772 , Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Description: SAs are documents that specify the business relationship between stakeholders to an outsourcing agreement. SAs specify this relationship in a legally binding manner that assists in managing expectations of the stakeholders about the service provision. According to Verma (1999), an SA is a precise statement of the expectations and obligations that exist in a business relationship between two organisation: the service provider and the client. In order for organizations to have successful outsourcing partnerships, they need well crafted methods of developing Service Agreements (SAs). Successful methods will produce a conclusive contract that will act as a working document that details the spirit of cooperation between the service provider and the service recipient. This research investigates the development of SAs in the Information and Communication Technology (ICT) sector, and proposes a model for their development. A number of models for SA development have been analysed. Models are analysed from leading researchers in the area, from software houses such as Microsoft and from international standards organisations such as the BS15000 which stipulates the ITIL framework. Eight development principles are identified and explored. An investigation into SAs and their development is conducted. A model is proposed that is composed of the development principles. The development of SAs was explored in an empirical study by means of a survey administered to industry practitioners and a series of interviews with managers in the ICT industry. The results of the study indicate varying levels of support for the development principles and limited relationship between the development principles and the success of the SA, as defined by the number of changes made to the SA after it is completed.
- Full Text:
- Date Issued: 2006
- Authors: Johnston, Robert
- Date: 2006
- Subjects: Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1143 , http://hdl.handle.net/10962/d1002772 , Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Description: SAs are documents that specify the business relationship between stakeholders to an outsourcing agreement. SAs specify this relationship in a legally binding manner that assists in managing expectations of the stakeholders about the service provision. According to Verma (1999), an SA is a precise statement of the expectations and obligations that exist in a business relationship between two organisation: the service provider and the client. In order for organizations to have successful outsourcing partnerships, they need well crafted methods of developing Service Agreements (SAs). Successful methods will produce a conclusive contract that will act as a working document that details the spirit of cooperation between the service provider and the service recipient. This research investigates the development of SAs in the Information and Communication Technology (ICT) sector, and proposes a model for their development. A number of models for SA development have been analysed. Models are analysed from leading researchers in the area, from software houses such as Microsoft and from international standards organisations such as the BS15000 which stipulates the ITIL framework. Eight development principles are identified and explored. An investigation into SAs and their development is conducted. A model is proposed that is composed of the development principles. The development of SAs was explored in an empirical study by means of a survey administered to industry practitioners and a series of interviews with managers in the ICT industry. The results of the study indicate varying levels of support for the development principles and limited relationship between the development principles and the success of the SA, as defined by the number of changes made to the SA after it is completed.
- Full Text:
- Date Issued: 2006
Guidelines for the user interface design of electronic medical records in optometry
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020
An investigation of ICT project management techniques for sustainable ICT projects in rural development
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
Radio Frequency Identification (RFID) adoption in the South African retail sector: an investigation of perceptions held by members of the retail sector regarding the adoption constraints
- Authors: Liu, Haidi
- Date: 2008
- Subjects: Radio frequency identification systems , Retail trade -- South Africa , Business logistics -- Management -- South Africa , Retail trade -- Employees -- South Africa , Retail trade -- Technological innovations , Radio waves , Consumer profiling
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1144 , http://hdl.handle.net/10962/d1002774 , Radio frequency identification systems , Retail trade -- South Africa , Business logistics -- Management -- South Africa , Retail trade -- Employees -- South Africa , Retail trade -- Technological innovations , Radio waves , Consumer profiling
- Description: Radio Frequency Identification (RFID) technology is a ethod of identifying unique items using radio waves that communicate between RFID tags and readers without line-of-sight readability. RFID technology provides great potential in many industries and a wide spectrum of possible uses. Areas of application include person identification, logistics, pharmaceutical, access control, security guard monitoring and asset management. One of the areas where RFID is being used and where it promises excellent results is the retail industry. While RFID systems have the potential to revolutionise the way products and goods are tracked and traced in the retail supply chain, barriers to its widespread adoption exist: for example; technical constraints, return on investment constraints, a lack of awareness and education and as well as privacy and security issues. The research aims to identify the barriers to the adoption of RFID and to investigate the perceptions of RFID held by members of the retail sector in South Africa (SA). Current research and available literature are used to identify RFID adoption barriers and a conceptual framework on this subject is proposed, which is then verified by SA retailers’ perceptions, established by means of a survey. Initial barriers to widespread adoption include a shortage in skills, a lack of standards, high costs associated with RFID devices, the difficulty of integrating with current legacy systems, and a lack of familiarity with the system. Finally, an enhanced framework is proposed, describing RFID adoption barriers within the South African retail sector. In summary, the framework is an outline of the barriers impacting RFID adoption in the SA retail sector that need to be considered and addressed. The framework identifies six categories of RFID adoption barriers, with each category containing two or more barriers relating to that particular category. These categories are Technological, Cost and return on investment, Privacy and security, Implementation, Organisational factors and People.
- Full Text:
- Date Issued: 2008
- Authors: Liu, Haidi
- Date: 2008
- Subjects: Radio frequency identification systems , Retail trade -- South Africa , Business logistics -- Management -- South Africa , Retail trade -- Employees -- South Africa , Retail trade -- Technological innovations , Radio waves , Consumer profiling
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1144 , http://hdl.handle.net/10962/d1002774 , Radio frequency identification systems , Retail trade -- South Africa , Business logistics -- Management -- South Africa , Retail trade -- Employees -- South Africa , Retail trade -- Technological innovations , Radio waves , Consumer profiling
- Description: Radio Frequency Identification (RFID) technology is a ethod of identifying unique items using radio waves that communicate between RFID tags and readers without line-of-sight readability. RFID technology provides great potential in many industries and a wide spectrum of possible uses. Areas of application include person identification, logistics, pharmaceutical, access control, security guard monitoring and asset management. One of the areas where RFID is being used and where it promises excellent results is the retail industry. While RFID systems have the potential to revolutionise the way products and goods are tracked and traced in the retail supply chain, barriers to its widespread adoption exist: for example; technical constraints, return on investment constraints, a lack of awareness and education and as well as privacy and security issues. The research aims to identify the barriers to the adoption of RFID and to investigate the perceptions of RFID held by members of the retail sector in South Africa (SA). Current research and available literature are used to identify RFID adoption barriers and a conceptual framework on this subject is proposed, which is then verified by SA retailers’ perceptions, established by means of a survey. Initial barriers to widespread adoption include a shortage in skills, a lack of standards, high costs associated with RFID devices, the difficulty of integrating with current legacy systems, and a lack of familiarity with the system. Finally, an enhanced framework is proposed, describing RFID adoption barriers within the South African retail sector. In summary, the framework is an outline of the barriers impacting RFID adoption in the SA retail sector that need to be considered and addressed. The framework identifies six categories of RFID adoption barriers, with each category containing two or more barriers relating to that particular category. These categories are Technological, Cost and return on investment, Privacy and security, Implementation, Organisational factors and People.
- Full Text:
- Date Issued: 2008
Geographically distributed requirements elicitation
- Authors: Vat, Nicholas
- Date: 2000
- Subjects: Management information systems -- Management , Information resources management , System design , System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1136 , http://hdl.handle.net/10962/d1002764 , Management information systems -- Management , Information resources management , System design , System analysis
- Description: The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
- Full Text:
- Date Issued: 2000
- Authors: Vat, Nicholas
- Date: 2000
- Subjects: Management information systems -- Management , Information resources management , System design , System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1136 , http://hdl.handle.net/10962/d1002764 , Management information systems -- Management , Information resources management , System design , System analysis
- Description: The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
- Full Text:
- Date Issued: 2000
Teacher perceptions regarding training and their subsequent ability to integrate ICTs into marginalised rural schools : The ICT4RED Case Study
- Authors: Nkula, Kanya Zonke
- Date: 2015
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:20978 , http://hdl.handle.net/10962/5798
- Description: It is well documented that Information and Communication Technologies (ICTs) play an important role in education and that their use is associated with improving student learning and adding value to the curriculum. However, despite the opportunities that ICTs offer, numerous schools in South Africa face various barriers that result in the limited use of ICTs in the classroom. Literature has highlighted the lack of integration as one of these barriers. Teachers focus on teaching about ICTs where the focus is on developing computer literacy or technical knowledge rather than allowing students to learn through or with ICTs. This thesis aims to explore the concept of ICT integration in rural schools, where ICTs form an integral part of teaching and learning practices. It presents a number of theoretical considerations for ICT integration with a particular focus on teacher pedagogical beliefs and barriers to integration. Using interpretivism as the underlying philosophy and thematic analysis as the analysis tool, the author reflects on ICT integration in the ICT4RED project at Arthur Mfebe Senior Secondary School in the Eastern Cape Province. Furthermore, this thesis offers an in-depth understanding of integration barriers in rural marginalised schools. These barriers are presented in Thematic Maps as well as a framework which incorporates both theoretical considerations and themes that emerged from fieldwork.
- Full Text:
- Date Issued: 2015
- Authors: Nkula, Kanya Zonke
- Date: 2015
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:20978 , http://hdl.handle.net/10962/5798
- Description: It is well documented that Information and Communication Technologies (ICTs) play an important role in education and that their use is associated with improving student learning and adding value to the curriculum. However, despite the opportunities that ICTs offer, numerous schools in South Africa face various barriers that result in the limited use of ICTs in the classroom. Literature has highlighted the lack of integration as one of these barriers. Teachers focus on teaching about ICTs where the focus is on developing computer literacy or technical knowledge rather than allowing students to learn through or with ICTs. This thesis aims to explore the concept of ICT integration in rural schools, where ICTs form an integral part of teaching and learning practices. It presents a number of theoretical considerations for ICT integration with a particular focus on teacher pedagogical beliefs and barriers to integration. Using interpretivism as the underlying philosophy and thematic analysis as the analysis tool, the author reflects on ICT integration in the ICT4RED project at Arthur Mfebe Senior Secondary School in the Eastern Cape Province. Furthermore, this thesis offers an in-depth understanding of integration barriers in rural marginalised schools. These barriers are presented in Thematic Maps as well as a framework which incorporates both theoretical considerations and themes that emerged from fieldwork.
- Full Text:
- Date Issued: 2015
A cloud adoption framework for South African SMEs
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
An investigation of a framework to evaluate computer supported collaborative work
- Beauvais, Erik Alexander Maoui
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
An online information security Aaareness model: the disclosure of personal data
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021
An investigation into the state-of-practice of information security within Zambian copper mines: a case study
- Authors: Lukweza, Chishala
- Date: 2011
- Subjects: Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1146 , http://hdl.handle.net/10962/d1002776 , Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Description: Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
- Full Text:
- Date Issued: 2011
- Authors: Lukweza, Chishala
- Date: 2011
- Subjects: Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1146 , http://hdl.handle.net/10962/d1002776 , Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Description: Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
- Full Text:
- Date Issued: 2011
An investigation of a framework for the implementation of service management in the information and communication technology sector
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
An investigation of an undergraduate course module on the ethical aspects of information systems
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
An investigation into the use of social media channels within the South African retail banking environment in support of creating and maintaining brand loyalty
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
Non-government organizations’ adoption of knowledge management systems to enhance service delivery of projects in Grahamstown in the Makana region of the Eastern Cape Province, South Africa
- Authors: Sherif, Nabiha Mohammed
- Date: 2018
- Subjects: Knowledge management , Organizational learning , Non-governmental organizations South Africa Makhanda , Human services South Africa Makhanda
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/61723 , vital:28052
- Description: The object of this research is to enhance the performance of non-government organizations in the Makana region of the Eastern Cape Province of South Africa by the use of knowledge management practices and principles. Non-government organizations face several service delivery challenges that affect their performance. Knowledge management assists in enhancing performance by means of organizational learning. However, the adoption of knowledge management systems has been limited to the profit-making sector. This study includes an evaluation of the contributing factors influencing the adoption of knowledge management and the extent to which non-government organizations use knowledge management to promote organizational learning. An interpretivist, qualitative case study approach was used on five non-government organizations cases from the Makana region of the Eastern Cape Province of South Africa. A suitability profile sampling method was developed to select the non-government organization cases. The participants in the research include non-government organizations’ managers, employees and volunteers. Literature was explored to gain a better understanding of the research area. The research was initiated by an open-ended questionnaire to gather data from the participants, followed by a focus group to enrich the interpretation of the findings. The research proposes a framework to facilitate the adoption of knowledge management systems in non-government organizations. The findings of the research are intended to enhance the performance of non-government organizations projects by means of the use of knowledge management systems.
- Full Text:
- Date Issued: 2018
- Authors: Sherif, Nabiha Mohammed
- Date: 2018
- Subjects: Knowledge management , Organizational learning , Non-governmental organizations South Africa Makhanda , Human services South Africa Makhanda
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/61723 , vital:28052
- Description: The object of this research is to enhance the performance of non-government organizations in the Makana region of the Eastern Cape Province of South Africa by the use of knowledge management practices and principles. Non-government organizations face several service delivery challenges that affect their performance. Knowledge management assists in enhancing performance by means of organizational learning. However, the adoption of knowledge management systems has been limited to the profit-making sector. This study includes an evaluation of the contributing factors influencing the adoption of knowledge management and the extent to which non-government organizations use knowledge management to promote organizational learning. An interpretivist, qualitative case study approach was used on five non-government organizations cases from the Makana region of the Eastern Cape Province of South Africa. A suitability profile sampling method was developed to select the non-government organization cases. The participants in the research include non-government organizations’ managers, employees and volunteers. Literature was explored to gain a better understanding of the research area. The research was initiated by an open-ended questionnaire to gather data from the participants, followed by a focus group to enrich the interpretation of the findings. The research proposes a framework to facilitate the adoption of knowledge management systems in non-government organizations. The findings of the research are intended to enhance the performance of non-government organizations projects by means of the use of knowledge management systems.
- Full Text:
- Date Issued: 2018
Towards identifying how knowledge management concepts may be applied to enhance the tendering process in South African public sector institutions
- Authors: Kasi, Sizukisa Bridget
- Date: 2013
- Subjects: Letting of contracts -- South Africa , Knowledge management , Public contracts -- South Africa , Transparency in government -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1150 , http://hdl.handle.net/10962/d1007741 , Letting of contracts -- South Africa , Knowledge management , Public contracts -- South Africa , Transparency in government -- South Africa
- Description: The state of the Tendering Process in South African Government Institutions has become an area of concern in recent years with issues related to transparency, governance and rigid retrospective procedures being cited as impediments to efficiency. In tum, Knowledge Management (KM) and its ability to be applied to all types of organisations to increase efficiency has been popularised extensively. An analysis of KM literature suggested that the principles of KM may be used to increase efficiency and create competitive advantage. This study attempted to identify whether the benefits gained by other organisations through the application of Knowledge Management principles, could be applied to the Tendering Process in South African Government Institutions. The study sought to identify how Knowledge Value Chain by Wang and Ahmed (2005) may be leveraged to create an enhanced Tendering Process. The study then reviewed the Tendering Processes conducted in Australia, United States of America, Malaysia and South Africa and sought to identify the common steps in a tendering process in order to construct a standard tendering process. The Knowledge Value Chain was then applied to this process to create a standard tendering process enhanced by Knowledge Management Principles. The model was compared to the processes currently conducted in two Government institutions and two parastals. The findings indicated that the model is well suited for Government Organisations and would assist in the creation of greater transparency, however the practical implementation of the model is yet unlikely as the model suggest electronic access to information, and the process in South African Government Institutions is predominately paper-based.
- Full Text:
- Date Issued: 2013
- Authors: Kasi, Sizukisa Bridget
- Date: 2013
- Subjects: Letting of contracts -- South Africa , Knowledge management , Public contracts -- South Africa , Transparency in government -- South Africa
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1150 , http://hdl.handle.net/10962/d1007741 , Letting of contracts -- South Africa , Knowledge management , Public contracts -- South Africa , Transparency in government -- South Africa
- Description: The state of the Tendering Process in South African Government Institutions has become an area of concern in recent years with issues related to transparency, governance and rigid retrospective procedures being cited as impediments to efficiency. In tum, Knowledge Management (KM) and its ability to be applied to all types of organisations to increase efficiency has been popularised extensively. An analysis of KM literature suggested that the principles of KM may be used to increase efficiency and create competitive advantage. This study attempted to identify whether the benefits gained by other organisations through the application of Knowledge Management principles, could be applied to the Tendering Process in South African Government Institutions. The study sought to identify how Knowledge Value Chain by Wang and Ahmed (2005) may be leveraged to create an enhanced Tendering Process. The study then reviewed the Tendering Processes conducted in Australia, United States of America, Malaysia and South Africa and sought to identify the common steps in a tendering process in order to construct a standard tendering process. The Knowledge Value Chain was then applied to this process to create a standard tendering process enhanced by Knowledge Management Principles. The model was compared to the processes currently conducted in two Government institutions and two parastals. The findings indicated that the model is well suited for Government Organisations and would assist in the creation of greater transparency, however the practical implementation of the model is yet unlikely as the model suggest electronic access to information, and the process in South African Government Institutions is predominately paper-based.
- Full Text:
- Date Issued: 2013
An investigation of knowledge management implementation strategies
- Authors: Sunassee, Nakkiran N
- Date: 2003
- Subjects: Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1141 , http://hdl.handle.net/10962/d1002770 , Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Description: The world is experiencing an era which has been termed the “knowledge age” or the “knowledge economy”. In this new context, knowledge is the primary commodity, and knowledge flows are regarded as the most important factors in the economy. The management of knowledge flows within organisations has become a crucial activity because many of the activities of organisations and the broader economic and social life today are knowledge-driven. In recent years, this managerial activity has become known as Knowledge Management. Equally important are the associated Knowledge Management implementation strategies. Driven by a need expressed by the South African Motor Vehicle Industry for a knowledge management implementation strategy tailored to their needs, this research aimed to develop a knowledge management implementation strategy suited to the needs of this industry. Following an extensive literature survey and a study of the target industry using Duffy’s Knowledge Benchmarking Questionnaire, a model of knowledge management implementation is proposed that is suited to the needs of the South African Motor Vehicle Industry. The model consists of three main interlinked components: Knowledge Management of the Organisation, People, and Infrastructure and Processes. Furthermore, the model recommends a holistic approach to managing knowledge. The critical success factors of the model were tested by means of a survey of industry opinions that validated certain aspects of the model and motivated for changes in others. Additionally, despite the focus of the model on the target industry, it is considered sufficiently appropriate for use by other organisations.
- Full Text:
- Date Issued: 2003
- Authors: Sunassee, Nakkiran N
- Date: 2003
- Subjects: Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1141 , http://hdl.handle.net/10962/d1002770 , Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Description: The world is experiencing an era which has been termed the “knowledge age” or the “knowledge economy”. In this new context, knowledge is the primary commodity, and knowledge flows are regarded as the most important factors in the economy. The management of knowledge flows within organisations has become a crucial activity because many of the activities of organisations and the broader economic and social life today are knowledge-driven. In recent years, this managerial activity has become known as Knowledge Management. Equally important are the associated Knowledge Management implementation strategies. Driven by a need expressed by the South African Motor Vehicle Industry for a knowledge management implementation strategy tailored to their needs, this research aimed to develop a knowledge management implementation strategy suited to the needs of this industry. Following an extensive literature survey and a study of the target industry using Duffy’s Knowledge Benchmarking Questionnaire, a model of knowledge management implementation is proposed that is suited to the needs of the South African Motor Vehicle Industry. The model consists of three main interlinked components: Knowledge Management of the Organisation, People, and Infrastructure and Processes. Furthermore, the model recommends a holistic approach to managing knowledge. The critical success factors of the model were tested by means of a survey of industry opinions that validated certain aspects of the model and motivated for changes in others. Additionally, despite the focus of the model on the target industry, it is considered sufficiently appropriate for use by other organisations.
- Full Text:
- Date Issued: 2003