A business process model for blockchain-based South African real estate transactions
- Authors: Tilbury, Jack Laurie
- Date: 2020
- Subjects: Blockchains (Databases) , Conveyancing -- Technological innovations , Real estate business -- Data processing , Real estate business -- South Africa -- Technological innovations
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148380 , vital:38734
- Description: The real estate transaction process has been described as inefficient and technologically outdated due to numerous stakeholders and predominantly paper-based operations. Despite the apparent bottlenecks in the current process, the implementation of new technology into the real estate sector has lagged. Several attempts have been made to modernise and digitise the business process but committed integration of assisting technology has lacked attention. This study examined the applicability and potential integration of blockchain technology into the business process of South African real estate transactions. Blockchain’s novelty means that research in this space, especially within South Africa, is limited. Of the research that has been conducted, no models of the business processes for South African or blockchain-based real estate transactions have been constructed. This study provides two business process models, illustrating the two different processes. The main contribution of this paper was an integrated business process model, illustrating how the various processes and stakeholder interactions for South African blockchain-based real estate transactions are conducted on one transaction platform, common to all participating stakeholders. This platform was named the South African Blockchain Land Exchange System (SABLES), which manages and facilitates these transactions in their entirety from start to finish. This model depicts an enhanced business process that provides increased security, transparency, and speed. These benefits will be realised by those who register, adopt, and transact on the platform. Through in-depth interviews, the integrated business process model was assessed. The findings produced a final and combined thematic map, representing the main themes of the analysed interview data, namely blockchain implementation strategies, business process applicability, information technology assimilation, current transaction context, and PropTech 3.0 success factors. The discussion revealed that the current transaction process lacks technological innovation, which increases pressure on the conveyancing role. It was also revealed that there is not only a need within the industry, but a desire, for newer technologies to assist the transaction process. In order to streamline and improve efficiency, business processes should leverage digital records and data, and strive for a solution beyond digitisation, achieving digitalisation. Digitalisation recognises digital documents as official and legal documents as opposed to simply being digital back-ups. This, coupled with the business process models, represent theoretical contributions.
- Full Text:
- Date Issued: 2020
- Authors: Tilbury, Jack Laurie
- Date: 2020
- Subjects: Blockchains (Databases) , Conveyancing -- Technological innovations , Real estate business -- Data processing , Real estate business -- South Africa -- Technological innovations
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148380 , vital:38734
- Description: The real estate transaction process has been described as inefficient and technologically outdated due to numerous stakeholders and predominantly paper-based operations. Despite the apparent bottlenecks in the current process, the implementation of new technology into the real estate sector has lagged. Several attempts have been made to modernise and digitise the business process but committed integration of assisting technology has lacked attention. This study examined the applicability and potential integration of blockchain technology into the business process of South African real estate transactions. Blockchain’s novelty means that research in this space, especially within South Africa, is limited. Of the research that has been conducted, no models of the business processes for South African or blockchain-based real estate transactions have been constructed. This study provides two business process models, illustrating the two different processes. The main contribution of this paper was an integrated business process model, illustrating how the various processes and stakeholder interactions for South African blockchain-based real estate transactions are conducted on one transaction platform, common to all participating stakeholders. This platform was named the South African Blockchain Land Exchange System (SABLES), which manages and facilitates these transactions in their entirety from start to finish. This model depicts an enhanced business process that provides increased security, transparency, and speed. These benefits will be realised by those who register, adopt, and transact on the platform. Through in-depth interviews, the integrated business process model was assessed. The findings produced a final and combined thematic map, representing the main themes of the analysed interview data, namely blockchain implementation strategies, business process applicability, information technology assimilation, current transaction context, and PropTech 3.0 success factors. The discussion revealed that the current transaction process lacks technological innovation, which increases pressure on the conveyancing role. It was also revealed that there is not only a need within the industry, but a desire, for newer technologies to assist the transaction process. In order to streamline and improve efficiency, business processes should leverage digital records and data, and strive for a solution beyond digitisation, achieving digitalisation. Digitalisation recognises digital documents as official and legal documents as opposed to simply being digital back-ups. This, coupled with the business process models, represent theoretical contributions.
- Full Text:
- Date Issued: 2020
A cloud adoption framework for South African SMEs
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
A framework for successful SOA adoption in selected South African universities
- Authors: Jacobs, Carmen
- Date: 2013-07-26
- Subjects: System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1153 , http://hdl.handle.net/10962/d1008366 , System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Description: The demand for systems i·ntegration has become more and more significant in higher education as institutions want systems that provide coherent information with data that is up to date and not redundant and can seamlessly support the end user experience. Institutions have become more reliant on information systems to support both administrative functions and those involved in teaching, learning and research, but because each department supports a diverse array of computing platforms and applications, it becomes very difficult to integrate these systems. SOA is classified as an innovative approach to integrating existing systems involving the use of independent services that can be accessed without knowledge of the underlying platform implementation. Unfortunately, the SOA initiative will not be success if it is not understood and used correctly by various applications and systems throughout the organisation. SOA introduces complexity and challenges in systems integration, acceptance, governance, data, development planning, security and external opportunities. If an organisation does not embrace or enable change in each of these areas, it is not ready for the adoption of SOA. This research investigates the systems integration challenge in selected South African universities and explores factors for SOA adoption. The framework for the adoption of SOA comprises seven factors, of which Systems Integration is the most significant and represents an efficient starting point for institutions considering SOA adoption. Acceptance, Governance, Data, Development Planning, Security and External Opportunities are other factors of SOA adoption that require careful and thorough consideration before an institution can successfully adopt SOA. The results of this research emphasise the importance of being able to embrace change and innovation and modify strategies in order to reflect the constant changes required for the adoption of SOA. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Authors: Jacobs, Carmen
- Date: 2013-07-26
- Subjects: System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1153 , http://hdl.handle.net/10962/d1008366 , System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Description: The demand for systems i·ntegration has become more and more significant in higher education as institutions want systems that provide coherent information with data that is up to date and not redundant and can seamlessly support the end user experience. Institutions have become more reliant on information systems to support both administrative functions and those involved in teaching, learning and research, but because each department supports a diverse array of computing platforms and applications, it becomes very difficult to integrate these systems. SOA is classified as an innovative approach to integrating existing systems involving the use of independent services that can be accessed without knowledge of the underlying platform implementation. Unfortunately, the SOA initiative will not be success if it is not understood and used correctly by various applications and systems throughout the organisation. SOA introduces complexity and challenges in systems integration, acceptance, governance, data, development planning, security and external opportunities. If an organisation does not embrace or enable change in each of these areas, it is not ready for the adoption of SOA. This research investigates the systems integration challenge in selected South African universities and explores factors for SOA adoption. The framework for the adoption of SOA comprises seven factors, of which Systems Integration is the most significant and represents an efficient starting point for institutions considering SOA adoption. Acceptance, Governance, Data, Development Planning, Security and External Opportunities are other factors of SOA adoption that require careful and thorough consideration before an institution can successfully adopt SOA. The results of this research emphasise the importance of being able to embrace change and innovation and modify strategies in order to reflect the constant changes required for the adoption of SOA. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
A framework for the development and measurement of agile enterprise architecture
- Authors: Mthupha, Bokang
- Date: 2012
- Subjects: Management information systems -- Research Industrial management -- Technological innovations -- Research Industrial organization -- Technological innovations -- Research System design
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1147 , http://hdl.handle.net/10962/d1002777
- Description: Enterprise architecture is the high-level design of the entire business, facilitated by enterprise architects. "Agile enterprise architecture" is the term used in enterprise architecture to describe an architecture that caters for future unknowns, enabling change to occur rapidly without undue resource utilization, yet in a controlled manner and with minimal adverse impact. Some enterprise architects still use outdated, rigid approaches to enterprise architecture which are incompatible with today‟s business environment. In addition, there is limited research into methods that can be applied to measure the agility of enterprise architecture. The current environment is such that there is a need for a more agile approach to developing and measuring enterprise architecture. This work will lead to the creation of a Framework for The Development and Measurement of Agile Enterprise Architecture. In support of the main goal of the development of the framework, a literature review will be conducted focusing on the necessary sub-goals of the research. The first sub-goal of the literature review is to develop a comprehensive definition for enterprise architecture (referred to as EA), as well as discover how it is currently practiced. Thereafter, the literature review will investigate a comprehensive definition for agility and research why it is emerging as a critical topic. The next chapter of the literature review will research how agility fits within the context of EA, uncovering a comprehensive definition for agile EA and the best practices in agile EA development. The final chapter of the literature review will investigate suitable measurement techniques that can be used to assess the level of agility of EA. On completion of the literature review, a preliminary framework will be created using the most important contributions from the literature. An empirical study will be conducted to explore the definitions for EA, agility, agile EA, the methods to measure the agility of EA and the concepts for the development of agile EA summarised in the preliminary framework. Data analysis follows an interpretive and qualitative approach based on four case studies through interviews with systems experts in four South African organizations in one province. Each interviewee was interviewed once. The initial interview with a Principal Consultant on Enterprise Strategy Consulting at organisation # 1 formed the basis of an exploratory study; the results of which were used to refine the research instrument and preliminary framework. Thereafter, a more rigorous empirical study focused on interviews with the Chief Architect, Senior Manager in Advisory Services and an Enterprise Architect at organizations 2, 3 and 4 respectively was conducted. The research follows an inductive approach to capture the interpretive experiences of participants and develop theoretical propositions from them. Following the exploratory pilot study it became necessary to make changes to the preliminary framework and initial survey instrument created. Thereafter, the empirical study consisting of the remaining three cases was conducted to test the important aspects of the framework and literature definitions. The analysis of the results of the empirical study prompted further changes to the theoretical framework and definitions created. The interviews conducted with each of the organizations confirmed the factors for agile EA development as well as the effectiveness of the definitions created in the literature review. The research uncovered that the need for a more agile approach to developing EA and a way to measure the level of agility of EA has become more and more significant in organizations. This begins with a better understanding of EA, agility, how agility fits within the context of EA, as well as appropriate methods to measure agility.
- Full Text:
- Date Issued: 2012
- Authors: Mthupha, Bokang
- Date: 2012
- Subjects: Management information systems -- Research Industrial management -- Technological innovations -- Research Industrial organization -- Technological innovations -- Research System design
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1147 , http://hdl.handle.net/10962/d1002777
- Description: Enterprise architecture is the high-level design of the entire business, facilitated by enterprise architects. "Agile enterprise architecture" is the term used in enterprise architecture to describe an architecture that caters for future unknowns, enabling change to occur rapidly without undue resource utilization, yet in a controlled manner and with minimal adverse impact. Some enterprise architects still use outdated, rigid approaches to enterprise architecture which are incompatible with today‟s business environment. In addition, there is limited research into methods that can be applied to measure the agility of enterprise architecture. The current environment is such that there is a need for a more agile approach to developing and measuring enterprise architecture. This work will lead to the creation of a Framework for The Development and Measurement of Agile Enterprise Architecture. In support of the main goal of the development of the framework, a literature review will be conducted focusing on the necessary sub-goals of the research. The first sub-goal of the literature review is to develop a comprehensive definition for enterprise architecture (referred to as EA), as well as discover how it is currently practiced. Thereafter, the literature review will investigate a comprehensive definition for agility and research why it is emerging as a critical topic. The next chapter of the literature review will research how agility fits within the context of EA, uncovering a comprehensive definition for agile EA and the best practices in agile EA development. The final chapter of the literature review will investigate suitable measurement techniques that can be used to assess the level of agility of EA. On completion of the literature review, a preliminary framework will be created using the most important contributions from the literature. An empirical study will be conducted to explore the definitions for EA, agility, agile EA, the methods to measure the agility of EA and the concepts for the development of agile EA summarised in the preliminary framework. Data analysis follows an interpretive and qualitative approach based on four case studies through interviews with systems experts in four South African organizations in one province. Each interviewee was interviewed once. The initial interview with a Principal Consultant on Enterprise Strategy Consulting at organisation # 1 formed the basis of an exploratory study; the results of which were used to refine the research instrument and preliminary framework. Thereafter, a more rigorous empirical study focused on interviews with the Chief Architect, Senior Manager in Advisory Services and an Enterprise Architect at organizations 2, 3 and 4 respectively was conducted. The research follows an inductive approach to capture the interpretive experiences of participants and develop theoretical propositions from them. Following the exploratory pilot study it became necessary to make changes to the preliminary framework and initial survey instrument created. Thereafter, the empirical study consisting of the remaining three cases was conducted to test the important aspects of the framework and literature definitions. The analysis of the results of the empirical study prompted further changes to the theoretical framework and definitions created. The interviews conducted with each of the organizations confirmed the factors for agile EA development as well as the effectiveness of the definitions created in the literature review. The research uncovered that the need for a more agile approach to developing EA and a way to measure the level of agility of EA has become more and more significant in organizations. This begins with a better understanding of EA, agility, how agility fits within the context of EA, as well as appropriate methods to measure agility.
- Full Text:
- Date Issued: 2012
A model for the development of service agreements in the Information and Communication Technology sector
- Authors: Johnston, Robert
- Date: 2006
- Subjects: Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1143 , http://hdl.handle.net/10962/d1002772 , Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Description: SAs are documents that specify the business relationship between stakeholders to an outsourcing agreement. SAs specify this relationship in a legally binding manner that assists in managing expectations of the stakeholders about the service provision. According to Verma (1999), an SA is a precise statement of the expectations and obligations that exist in a business relationship between two organisation: the service provider and the client. In order for organizations to have successful outsourcing partnerships, they need well crafted methods of developing Service Agreements (SAs). Successful methods will produce a conclusive contract that will act as a working document that details the spirit of cooperation between the service provider and the service recipient. This research investigates the development of SAs in the Information and Communication Technology (ICT) sector, and proposes a model for their development. A number of models for SA development have been analysed. Models are analysed from leading researchers in the area, from software houses such as Microsoft and from international standards organisations such as the BS15000 which stipulates the ITIL framework. Eight development principles are identified and explored. An investigation into SAs and their development is conducted. A model is proposed that is composed of the development principles. The development of SAs was explored in an empirical study by means of a survey administered to industry practitioners and a series of interviews with managers in the ICT industry. The results of the study indicate varying levels of support for the development principles and limited relationship between the development principles and the success of the SA, as defined by the number of changes made to the SA after it is completed.
- Full Text:
- Date Issued: 2006
- Authors: Johnston, Robert
- Date: 2006
- Subjects: Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1143 , http://hdl.handle.net/10962/d1002772 , Information technology , Communication -- Technological innovations , Service industries -- Management , Service -- Level agreements
- Description: SAs are documents that specify the business relationship between stakeholders to an outsourcing agreement. SAs specify this relationship in a legally binding manner that assists in managing expectations of the stakeholders about the service provision. According to Verma (1999), an SA is a precise statement of the expectations and obligations that exist in a business relationship between two organisation: the service provider and the client. In order for organizations to have successful outsourcing partnerships, they need well crafted methods of developing Service Agreements (SAs). Successful methods will produce a conclusive contract that will act as a working document that details the spirit of cooperation between the service provider and the service recipient. This research investigates the development of SAs in the Information and Communication Technology (ICT) sector, and proposes a model for their development. A number of models for SA development have been analysed. Models are analysed from leading researchers in the area, from software houses such as Microsoft and from international standards organisations such as the BS15000 which stipulates the ITIL framework. Eight development principles are identified and explored. An investigation into SAs and their development is conducted. A model is proposed that is composed of the development principles. The development of SAs was explored in an empirical study by means of a survey administered to industry practitioners and a series of interviews with managers in the ICT industry. The results of the study indicate varying levels of support for the development principles and limited relationship between the development principles and the success of the SA, as defined by the number of changes made to the SA after it is completed.
- Full Text:
- Date Issued: 2006
A needs-ICTD strategy alignment framework foundation for the measurement of ICTD impact
- Authors: Baduza, Gugulethu Qhawekazi
- Date: 2014
- Subjects: Siyakhula Living Lab SAP Research Needs assessment -- Information technology -- Social aspects -- South Africa -- Case studies Information technology -- South Africa -- Management -- Case studies Information technology -- Social aspects -- South Africa Rural development -- Economic aspects -- South Africa Rural development -- South Africa -- Sociological aspects Rural development projects -- South Africa
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1155 , http://hdl.handle.net/10962/d1011116
- Description: Many Information and Communication Technologies for Development (ICTD) projects are established with the overall aim of positively developing the communities they are implemented in. However, the solutions that are provided are often commonly developed without the needs of these communities being sufficiently investigated beforehand. As a result the ICTD strategy of the project ends up not well aligned with the aims and targets of the needs of the community. As a result of this, an appropriate programme theory for the project and relevant impact indicators fail to be adequately developed. Consequently, when an impact assessment is conducted it is often found that the intended effects are not directly linked to the needs of the community or what the community had hoped to gain from the ICTD initiative. The purpose of this research serves to develop a needs-ICTD strategy alignment foundation that supports the identification and formulation of impact assessment indicators. Through this research, a framework is developed to support the alignment of ICTD strategy, the development and the promotion of contextual needs of rural communities and other frequently marginalized areas. The Needs-ICTD strategy alignment framework is composed of eight main components that describe the process that can be used to align ICTD strategy with community needs. These components include: collaboration between the internal and external stakeholders, the development of the community, conducting baseline studies, the needs assessment, the ICTD strategy, linking of the needs-ICTD strategy, and lastly the identification of impact indicators. An interpretive research approach is used to explore and inform the framework through a multi-case study investigation of the Siyakhula Living Lab and two projects in the Systems Application Products (SAP) Living Lab. Two main case study questions drive the exploration of the framework, that being: 1) How are the needs of the community elicited and how is the ICTD strategy aligned to the needs of the community? 2) And, why were the selected approaches chosen for aligning the needs of the community and ICTD strategy? Data for this research was collected qualitatively through interviews, document analysis and participant observation. Key findings indicate that the involvement of internal (local) stakeholders in the development and alignment of ICTD strategy to the needs of the community is still lacking. As a consequence, many community members end up not fully understanding the project objectives and how these objectives aims are to be achieved. The research also finds that ‘solution specific’ projects also fail communities as they focus specifically on one target group and repeatedly fail to assist the community holistically in supporting their information and their community development needs.
- Full Text:
- Date Issued: 2014
- Authors: Baduza, Gugulethu Qhawekazi
- Date: 2014
- Subjects: Siyakhula Living Lab SAP Research Needs assessment -- Information technology -- Social aspects -- South Africa -- Case studies Information technology -- South Africa -- Management -- Case studies Information technology -- Social aspects -- South Africa Rural development -- Economic aspects -- South Africa Rural development -- South Africa -- Sociological aspects Rural development projects -- South Africa
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1155 , http://hdl.handle.net/10962/d1011116
- Description: Many Information and Communication Technologies for Development (ICTD) projects are established with the overall aim of positively developing the communities they are implemented in. However, the solutions that are provided are often commonly developed without the needs of these communities being sufficiently investigated beforehand. As a result the ICTD strategy of the project ends up not well aligned with the aims and targets of the needs of the community. As a result of this, an appropriate programme theory for the project and relevant impact indicators fail to be adequately developed. Consequently, when an impact assessment is conducted it is often found that the intended effects are not directly linked to the needs of the community or what the community had hoped to gain from the ICTD initiative. The purpose of this research serves to develop a needs-ICTD strategy alignment foundation that supports the identification and formulation of impact assessment indicators. Through this research, a framework is developed to support the alignment of ICTD strategy, the development and the promotion of contextual needs of rural communities and other frequently marginalized areas. The Needs-ICTD strategy alignment framework is composed of eight main components that describe the process that can be used to align ICTD strategy with community needs. These components include: collaboration between the internal and external stakeholders, the development of the community, conducting baseline studies, the needs assessment, the ICTD strategy, linking of the needs-ICTD strategy, and lastly the identification of impact indicators. An interpretive research approach is used to explore and inform the framework through a multi-case study investigation of the Siyakhula Living Lab and two projects in the Systems Application Products (SAP) Living Lab. Two main case study questions drive the exploration of the framework, that being: 1) How are the needs of the community elicited and how is the ICTD strategy aligned to the needs of the community? 2) And, why were the selected approaches chosen for aligning the needs of the community and ICTD strategy? Data for this research was collected qualitatively through interviews, document analysis and participant observation. Key findings indicate that the involvement of internal (local) stakeholders in the development and alignment of ICTD strategy to the needs of the community is still lacking. As a consequence, many community members end up not fully understanding the project objectives and how these objectives aims are to be achieved. The research also finds that ‘solution specific’ projects also fail communities as they focus specifically on one target group and repeatedly fail to assist the community holistically in supporting their information and their community development needs.
- Full Text:
- Date Issued: 2014
A process assessment framework for rural ICT projects in developing countries: an exploration of the Siyakhula Living Lab, South Africa
- Authors: Osah, Umeoniso Joshua
- Date: 2013
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Rural development projects -- Evaluation -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1133 , http://hdl.handle.net/10962/d1001623
- Description: Rural development can be supported by information and knowledge which are key strategic resources for socio economic development. ICTs enable the facilitation and communication of information between remotely dispersed individuals or groups and more developed regions. While it has become common place that ICTs possess capabilities to potentially support rural development, the concept of ICT for development (ICT4D) is still fraught with challenges and barriers, which impede the success and sustainability of ICT4D projects. It is therefore essential to evaluate rural ICT projects, as such an analysis may aid in revealing information related to the need, effectiveness, impact, and sustainability of these projects. This research seeks to further the implementation and exploration of the Rural ICT Comprehensive Evaluation Framework (RICT-CEF), through the application of the Process Assessment domain in a real life rural ICT project environment. The RICT-CEF framework consisting of 7 evaluation domains has the primary objective of evaluating rural ICT projects from their inception stages to post implementation. A process assessment seeks to determine whether or not a rural ICT project is operating to implement its intended functions in the intended way specified in the projects plan. Such an assessment is invaluable to a comprehensive evaluation. Evaluation questions for a process assessment are centred around critical themes of project performance. Critical themes are aspects of a programme or projects implementation which must be enacted in order to achieve desired project outcomes. This research study is aimed at identifying critical themes of process assessment relevant to rural ICT4D projects. To identify critical themes, assessment approaches on social programme process assessments, evaluation of information systems in use, and rural ICT4D project evaluation case studies are comparatively analysed. Fourteen assessment approaches from these three categories are selected based on criteria. To analyse selected assessment approaches, a template is created based on the research questions, foundational literature on process assessment and identified challenges applicable to process assessments of rural ICT4D projects. Comparing and contrasting critical themes from these assessment approaches highlight critical themes essential to assess in the iterative implementation phase of rural ICT projects. Accentuated critical themes include, service utilization, organizational function and external project factors. These themes, along with suggested guiding principles from literature for conducting process assessments enable the creation of a framework for conducting process assessments of rural ICT projects. The framework is labelled "the Rural ICT Project Process Assessment Framework (RICTP-PAF)". The application of the RICTP-PAF in a real life rural ICT project through a design science case study provides lessons learned (suitability and shortcomings) from applying the framework. This essentially demonstrates the sensitivity of the RICTP-PAF to rural contexts in which it is implemented in. For instance, the implemented prototype of the RICTP-PAF reveals that the framework places a great deal of emphasis on rural beneficiary perspectives. A practice which has been lacking in such evaluation exercises. Furthermore, the guiding principles elucidated, bring to mind best practices to deal with issues such as stakeholder conflict, unreliable data elicitation and unethical assessment practices. The RICTP-PAF represents a fundamental tool for process assessments of rural ICT projects, and may be adopted and customized to various rural ICT project contexts in developing countries.
- Full Text:
- Date Issued: 2013
- Authors: Osah, Umeoniso Joshua
- Date: 2013
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Rural development projects -- Evaluation -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1133 , http://hdl.handle.net/10962/d1001623
- Description: Rural development can be supported by information and knowledge which are key strategic resources for socio economic development. ICTs enable the facilitation and communication of information between remotely dispersed individuals or groups and more developed regions. While it has become common place that ICTs possess capabilities to potentially support rural development, the concept of ICT for development (ICT4D) is still fraught with challenges and barriers, which impede the success and sustainability of ICT4D projects. It is therefore essential to evaluate rural ICT projects, as such an analysis may aid in revealing information related to the need, effectiveness, impact, and sustainability of these projects. This research seeks to further the implementation and exploration of the Rural ICT Comprehensive Evaluation Framework (RICT-CEF), through the application of the Process Assessment domain in a real life rural ICT project environment. The RICT-CEF framework consisting of 7 evaluation domains has the primary objective of evaluating rural ICT projects from their inception stages to post implementation. A process assessment seeks to determine whether or not a rural ICT project is operating to implement its intended functions in the intended way specified in the projects plan. Such an assessment is invaluable to a comprehensive evaluation. Evaluation questions for a process assessment are centred around critical themes of project performance. Critical themes are aspects of a programme or projects implementation which must be enacted in order to achieve desired project outcomes. This research study is aimed at identifying critical themes of process assessment relevant to rural ICT4D projects. To identify critical themes, assessment approaches on social programme process assessments, evaluation of information systems in use, and rural ICT4D project evaluation case studies are comparatively analysed. Fourteen assessment approaches from these three categories are selected based on criteria. To analyse selected assessment approaches, a template is created based on the research questions, foundational literature on process assessment and identified challenges applicable to process assessments of rural ICT4D projects. Comparing and contrasting critical themes from these assessment approaches highlight critical themes essential to assess in the iterative implementation phase of rural ICT projects. Accentuated critical themes include, service utilization, organizational function and external project factors. These themes, along with suggested guiding principles from literature for conducting process assessments enable the creation of a framework for conducting process assessments of rural ICT projects. The framework is labelled "the Rural ICT Project Process Assessment Framework (RICTP-PAF)". The application of the RICTP-PAF in a real life rural ICT project through a design science case study provides lessons learned (suitability and shortcomings) from applying the framework. This essentially demonstrates the sensitivity of the RICTP-PAF to rural contexts in which it is implemented in. For instance, the implemented prototype of the RICTP-PAF reveals that the framework places a great deal of emphasis on rural beneficiary perspectives. A practice which has been lacking in such evaluation exercises. Furthermore, the guiding principles elucidated, bring to mind best practices to deal with issues such as stakeholder conflict, unreliable data elicitation and unethical assessment practices. The RICTP-PAF represents a fundamental tool for process assessments of rural ICT projects, and may be adopted and customized to various rural ICT project contexts in developing countries.
- Full Text:
- Date Issued: 2013
An access control model for a South African National Electronic Health Record System
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
An Agile systems development approach for enhancing e-Government user adoption
- Authors: Lehasa, Odifentse Mapula-e
- Date: 2019
- Subjects: Agile software development , Internet in public administration -- Developing countries
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/94158 , vital:31010
- Description: The expansion of technological developments in all areas of society has seen governments taking advantage of new technologies to enhance public service delivery, disseminate information and promote participation by the public in government decision-making. This phenomenon is known as electronic government, or e-Government. However despite the socio-economic benefits inherent in the implementation of e-Government systems, an overwhelming number of government projects – particularly in developing countries – struggle to successfully implement e-Government systems. e-Government project failure is more pronounced in developing countries, with more than half of these projects either partially or completely failing. The failure of e-Government projects undermines government investments, as well as the potential socio-economic benefits that could be realised by the citizens. Arguably, while the failure or success of an e-Government project is attributed to a myriad of factors, low user adoption is one of the key factors that contribute to e-Government project failure. Therefore this thesis seeks to investigate the phenomenon of low e-Government user adoption and determine whether the use of an Agile system development approach can positively influence e-Government user satisfaction as well as buy-in and adoption. A Mixed-Methods, multi-case study approach was used through the perspective of Post-Positivism. The researcher examined four (4) South African e-Government projects – using an online questionnaire and in-depth interviews with members of the system development team – to determine whether the use of an Agile approach has merit in enhancing e-Government user adoption. The use of a Mixed-Methods approach allowed for data triangulation so as to verify the findings; while the use of multiple case studies enabled for cross-case analysis. The findings indicate that the use of Agile practices, as listed in the proposed Agile-informed User Engagement Guidelines, can ensure that the e-Government system developed meets user needs; and, that users are satisfied with, and make use of the e-Government system. However since most large e-Government projects make use of a traditional Waterfall development approach, it is recommended that the Agile practices (proposed guidelines) be incorporated into the structured Waterfall approach – to create a hybrid, or blended system development approach. In conclusion, the use of the proposed Agile-informed User Engagement Guidelines can enhance e-Government user adoption; and, subsequently, contribute towards nurturing the success of e-Government projects.
- Full Text:
- Date Issued: 2019
- Authors: Lehasa, Odifentse Mapula-e
- Date: 2019
- Subjects: Agile software development , Internet in public administration -- Developing countries
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/94158 , vital:31010
- Description: The expansion of technological developments in all areas of society has seen governments taking advantage of new technologies to enhance public service delivery, disseminate information and promote participation by the public in government decision-making. This phenomenon is known as electronic government, or e-Government. However despite the socio-economic benefits inherent in the implementation of e-Government systems, an overwhelming number of government projects – particularly in developing countries – struggle to successfully implement e-Government systems. e-Government project failure is more pronounced in developing countries, with more than half of these projects either partially or completely failing. The failure of e-Government projects undermines government investments, as well as the potential socio-economic benefits that could be realised by the citizens. Arguably, while the failure or success of an e-Government project is attributed to a myriad of factors, low user adoption is one of the key factors that contribute to e-Government project failure. Therefore this thesis seeks to investigate the phenomenon of low e-Government user adoption and determine whether the use of an Agile system development approach can positively influence e-Government user satisfaction as well as buy-in and adoption. A Mixed-Methods, multi-case study approach was used through the perspective of Post-Positivism. The researcher examined four (4) South African e-Government projects – using an online questionnaire and in-depth interviews with members of the system development team – to determine whether the use of an Agile approach has merit in enhancing e-Government user adoption. The use of a Mixed-Methods approach allowed for data triangulation so as to verify the findings; while the use of multiple case studies enabled for cross-case analysis. The findings indicate that the use of Agile practices, as listed in the proposed Agile-informed User Engagement Guidelines, can ensure that the e-Government system developed meets user needs; and, that users are satisfied with, and make use of the e-Government system. However since most large e-Government projects make use of a traditional Waterfall development approach, it is recommended that the Agile practices (proposed guidelines) be incorporated into the structured Waterfall approach – to create a hybrid, or blended system development approach. In conclusion, the use of the proposed Agile-informed User Engagement Guidelines can enhance e-Government user adoption; and, subsequently, contribute towards nurturing the success of e-Government projects.
- Full Text:
- Date Issued: 2019
An emancipatory approach for innovative access to education in farm schools of the Eastern Cape, South Africa
- Authors: Robinson, Craig Grant
- Date: 2019
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/72462 , vital:30055
- Description: Expected release date-April 2020
- Full Text: false
- Date Issued: 2019
- Authors: Robinson, Craig Grant
- Date: 2019
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/72462 , vital:30055
- Description: Expected release date-April 2020
- Full Text: false
- Date Issued: 2019
An investigation into the state-of-practice of information security within Zambian copper mines: a case study
- Authors: Lukweza, Chishala
- Date: 2011
- Subjects: Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1146 , http://hdl.handle.net/10962/d1002776 , Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Description: Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
- Full Text:
- Date Issued: 2011
- Authors: Lukweza, Chishala
- Date: 2011
- Subjects: Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1146 , http://hdl.handle.net/10962/d1002776 , Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Description: Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
- Full Text:
- Date Issued: 2011
An investigation into the use of social media channels within the South African retail banking environment in support of creating and maintaining brand loyalty
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
An investigation of a framework for the implementation of service management in the information and communication technology sector
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
An investigation of a framework to evaluate computer supported collaborative work
- Beauvais, Erik Alexander Maoui
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
An investigation of an undergraduate course module on the ethical aspects of information systems
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
An investigation of ICT project management techniques for sustainable ICT projects in rural development
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
An investigation of knowledge management implementation strategies
- Authors: Sunassee, Nakkiran N
- Date: 2003
- Subjects: Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1141 , http://hdl.handle.net/10962/d1002770 , Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Description: The world is experiencing an era which has been termed the “knowledge age” or the “knowledge economy”. In this new context, knowledge is the primary commodity, and knowledge flows are regarded as the most important factors in the economy. The management of knowledge flows within organisations has become a crucial activity because many of the activities of organisations and the broader economic and social life today are knowledge-driven. In recent years, this managerial activity has become known as Knowledge Management. Equally important are the associated Knowledge Management implementation strategies. Driven by a need expressed by the South African Motor Vehicle Industry for a knowledge management implementation strategy tailored to their needs, this research aimed to develop a knowledge management implementation strategy suited to the needs of this industry. Following an extensive literature survey and a study of the target industry using Duffy’s Knowledge Benchmarking Questionnaire, a model of knowledge management implementation is proposed that is suited to the needs of the South African Motor Vehicle Industry. The model consists of three main interlinked components: Knowledge Management of the Organisation, People, and Infrastructure and Processes. Furthermore, the model recommends a holistic approach to managing knowledge. The critical success factors of the model were tested by means of a survey of industry opinions that validated certain aspects of the model and motivated for changes in others. Additionally, despite the focus of the model on the target industry, it is considered sufficiently appropriate for use by other organisations.
- Full Text:
- Date Issued: 2003
- Authors: Sunassee, Nakkiran N
- Date: 2003
- Subjects: Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1141 , http://hdl.handle.net/10962/d1002770 , Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Description: The world is experiencing an era which has been termed the “knowledge age” or the “knowledge economy”. In this new context, knowledge is the primary commodity, and knowledge flows are regarded as the most important factors in the economy. The management of knowledge flows within organisations has become a crucial activity because many of the activities of organisations and the broader economic and social life today are knowledge-driven. In recent years, this managerial activity has become known as Knowledge Management. Equally important are the associated Knowledge Management implementation strategies. Driven by a need expressed by the South African Motor Vehicle Industry for a knowledge management implementation strategy tailored to their needs, this research aimed to develop a knowledge management implementation strategy suited to the needs of this industry. Following an extensive literature survey and a study of the target industry using Duffy’s Knowledge Benchmarking Questionnaire, a model of knowledge management implementation is proposed that is suited to the needs of the South African Motor Vehicle Industry. The model consists of three main interlinked components: Knowledge Management of the Organisation, People, and Infrastructure and Processes. Furthermore, the model recommends a holistic approach to managing knowledge. The critical success factors of the model were tested by means of a survey of industry opinions that validated certain aspects of the model and motivated for changes in others. Additionally, despite the focus of the model on the target industry, it is considered sufficiently appropriate for use by other organisations.
- Full Text:
- Date Issued: 2003
An investigation of social computing
- Authors: Schlenkrich, Lara
- Date: 2009
- Subjects: Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1149 , http://hdl.handle.net/10962/d1006194 , Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Description: Social network sites have recently become extremely popular online destinations as they offer users easy ways to build and maintain their relationships with each other. Consequently, students, lecturers, teachers, parents and businesses are using these tools to communicate with each other in a fast and cost-effective manner. However, literature suggests that the full potential of social network sites has not yet been revealed since users are still battling to overcome the various negative characteristics surrounding these sites. A framework for appropriate use of these sites is needed so that users are able to overcome these negative aspects, allowing them to be more effective and use the sites successfully. The goal of this research is to construct a framework for perceived successful use of social computing tools in educational institutions. This framework will include critical success factors that need to be adopted by users in order to develop the positive aspects of social computing, while at the same time overcoming the disadvantages experienced by users. Factors for successful use were derived from the literature and consolidated into a theoretical framework in order to understand the factors that drive successful use of social network sites. Measures used to test successful use of social network sites were also derived from these sources and were included in the same theoretical framework; these measures allow users to evaluate the extent of perceived successful use of social network sites. This framework was tested empirically by means of a pilot study and online survey, and revised according to the results of the survey. The factors were identified using Cronbach alpha coefficients (in the pilot study) and exploratory factor analysis to confirm the reliability of the scales developed. Pearson product-moment correlation coefficient analysis, t-tests and Pearson Chi-Square tests were used to measure the relationships amongst the variables in the framework proposed in this research. The factors influencing perceived successful use of social network sites were identified by the empirical study as: • Privacy and Security Settings need to be enabled. These are split into: - Settings: content that users allow others to see - Viewers: people who are allowed onto a user's profile • It is necessary for users to practise Legal and Acceptable Activities when using social network sites • Suspect Information needs to be checked before sharing it with others • Personal and Professional Time needs to be separated to ensure that work is completed before social activities occur • Users need to practise Professional and Ethical Behaviour • Users need to have a Positive Attitude when using social network sites • Usability of sites affects their success. This includes: - technical capacity (broadband) - ease of use - functionality (range of features and functions) • Current and Controversial Issues need to be discussed on social network sites. The extent to which social network sites are being used successfully can be evaluated by the presence of the following measures: • Range of Content must be available to users. This includes: - Content displayed on profiles - Viewers able to visit profiles • Visitors Behaviour is monitored and no unwanted visitors are present users' profiles • Social Contracts found on sites are followed by users • Critical Thinking Skills and Accurate Information are displayed by users • Work is completed before social activities occur on sites • A Variety of Users is present on sites • Collaboration between people as well as variety of opinions exist on sites • Social Capital (well-being) is present after users have been on sites • Learning and Advising Skills are enhanced on sites. The framework developed provides users with a useful instrument to overcome the negative characteristics associated with social network sites. If used successfully, social network sites can offer lecturers and students a unique method to develop their relationship, creating a positive learning experience.
- Full Text:
- Date Issued: 2009
- Authors: Schlenkrich, Lara
- Date: 2009
- Subjects: Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1149 , http://hdl.handle.net/10962/d1006194 , Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Description: Social network sites have recently become extremely popular online destinations as they offer users easy ways to build and maintain their relationships with each other. Consequently, students, lecturers, teachers, parents and businesses are using these tools to communicate with each other in a fast and cost-effective manner. However, literature suggests that the full potential of social network sites has not yet been revealed since users are still battling to overcome the various negative characteristics surrounding these sites. A framework for appropriate use of these sites is needed so that users are able to overcome these negative aspects, allowing them to be more effective and use the sites successfully. The goal of this research is to construct a framework for perceived successful use of social computing tools in educational institutions. This framework will include critical success factors that need to be adopted by users in order to develop the positive aspects of social computing, while at the same time overcoming the disadvantages experienced by users. Factors for successful use were derived from the literature and consolidated into a theoretical framework in order to understand the factors that drive successful use of social network sites. Measures used to test successful use of social network sites were also derived from these sources and were included in the same theoretical framework; these measures allow users to evaluate the extent of perceived successful use of social network sites. This framework was tested empirically by means of a pilot study and online survey, and revised according to the results of the survey. The factors were identified using Cronbach alpha coefficients (in the pilot study) and exploratory factor analysis to confirm the reliability of the scales developed. Pearson product-moment correlation coefficient analysis, t-tests and Pearson Chi-Square tests were used to measure the relationships amongst the variables in the framework proposed in this research. The factors influencing perceived successful use of social network sites were identified by the empirical study as: • Privacy and Security Settings need to be enabled. These are split into: - Settings: content that users allow others to see - Viewers: people who are allowed onto a user's profile • It is necessary for users to practise Legal and Acceptable Activities when using social network sites • Suspect Information needs to be checked before sharing it with others • Personal and Professional Time needs to be separated to ensure that work is completed before social activities occur • Users need to practise Professional and Ethical Behaviour • Users need to have a Positive Attitude when using social network sites • Usability of sites affects their success. This includes: - technical capacity (broadband) - ease of use - functionality (range of features and functions) • Current and Controversial Issues need to be discussed on social network sites. The extent to which social network sites are being used successfully can be evaluated by the presence of the following measures: • Range of Content must be available to users. This includes: - Content displayed on profiles - Viewers able to visit profiles • Visitors Behaviour is monitored and no unwanted visitors are present users' profiles • Social Contracts found on sites are followed by users • Critical Thinking Skills and Accurate Information are displayed by users • Work is completed before social activities occur on sites • A Variety of Users is present on sites • Collaboration between people as well as variety of opinions exist on sites • Social Capital (well-being) is present after users have been on sites • Learning and Advising Skills are enhanced on sites. The framework developed provides users with a useful instrument to overcome the negative characteristics associated with social network sites. If used successfully, social network sites can offer lecturers and students a unique method to develop their relationship, creating a positive learning experience.
- Full Text:
- Date Issued: 2009
An investigation of the development and adoption of educational metadata standards for the widespread use of learning objects
- Authors: Krull, Greig Emil
- Date: 2005
- Subjects: Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1142 , http://hdl.handle.net/10962/d1002771 , Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Description: This research investigates the development and adoption of educational metadata standards for the widespread use of learning objects. Learning objects, metadata, the related IEEE standard and the various application profiles derived from the standard are discussed. A number of standards and specifications for educational metadata used to describe learning objects are explored, namely the Dublin Core, IMS, SCORM, ARIADNE, CanCore and the UK LOM Core. Three metadata editors and the experience with using one of them, RELOAD, is described. These educational metadata specifications are used in a practical metadata implementation scenario and the experiences are extrapolated to derive a localised instance of the generic IEEE standard. A new application profile is proposed, “RU LOM Core”, for the South African higher education context. Some existing results are confirmed about the complexity of using the IEEE standard and it is demonstrated that it is possible to instantiate the standard for South African conditions. The results are largely qualitative and based on practical experience. However, the results concur with results from related research. Although the development of an application profile is certainly not new, the development of RU LOM Core illustrates that the IEEE standard, developed largely within the northern hemisphere, can be adapted to work in the South African scenario. RU LOM Core has been developed for the South African higher education environment and takes linguistic and cultural diversity and the low rate of technological literacy into consideration. The lessons learned and the proposed LOM core can be built upon in further research and collaboration to use and support the use of such standards within South Africa.
- Full Text:
- Date Issued: 2005
- Authors: Krull, Greig Emil
- Date: 2005
- Subjects: Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1142 , http://hdl.handle.net/10962/d1002771 , Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Description: This research investigates the development and adoption of educational metadata standards for the widespread use of learning objects. Learning objects, metadata, the related IEEE standard and the various application profiles derived from the standard are discussed. A number of standards and specifications for educational metadata used to describe learning objects are explored, namely the Dublin Core, IMS, SCORM, ARIADNE, CanCore and the UK LOM Core. Three metadata editors and the experience with using one of them, RELOAD, is described. These educational metadata specifications are used in a practical metadata implementation scenario and the experiences are extrapolated to derive a localised instance of the generic IEEE standard. A new application profile is proposed, “RU LOM Core”, for the South African higher education context. Some existing results are confirmed about the complexity of using the IEEE standard and it is demonstrated that it is possible to instantiate the standard for South African conditions. The results are largely qualitative and based on practical experience. However, the results concur with results from related research. Although the development of an application profile is certainly not new, the development of RU LOM Core illustrates that the IEEE standard, developed largely within the northern hemisphere, can be adapted to work in the South African scenario. RU LOM Core has been developed for the South African higher education environment and takes linguistic and cultural diversity and the low rate of technological literacy into consideration. The lessons learned and the proposed LOM core can be built upon in further research and collaboration to use and support the use of such standards within South Africa.
- Full Text:
- Date Issued: 2005
An online information security Aaareness model: the disclosure of personal data
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021