Quality assessment of information systems in SMEs: a study of Eldoret Town in Kenya
- Authors: Ndiege, Joshua Rumo Arongo
- Date: 2010
- Subjects: Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11132 , http://hdl.handle.net/10353/d1000973 , Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Full Text: false
- Date Issued: 2010
- Authors: Ndiege, Joshua Rumo Arongo
- Date: 2010
- Subjects: Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11132 , http://hdl.handle.net/10353/d1000973 , Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Full Text: false
- Date Issued: 2010
Digital forensic model for computer networks
- Authors: Sanyamahwe, Tendai
- Date: 2011
- Subjects: Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11127 , http://hdl.handle.net/10353/d1000968 , Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Description: The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
- Full Text:
- Date Issued: 2011
- Authors: Sanyamahwe, Tendai
- Date: 2011
- Subjects: Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11127 , http://hdl.handle.net/10353/d1000968 , Computer crimes -- Investigation , Evidence, Criminal , Computer networks -- Security measures , Electronic evidence , Forensic sciences , Internet -- Security measures
- Description: The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
- Full Text:
- Date Issued: 2011
Adoption and sustained use of M-Commerce to improve efficacy of construction SMMEs
- Authors: Williams, Zenande
- Date: 2011
- Subjects: Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11125 , http://hdl.handle.net/10353/528 , Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Description: E-commerce has been said to bring value to businesses by improving business efficiency and effectiveness and thus providing business with a competitive advantage through the potential benefits that it offers (Cloete, Courtney & Fintz, 2002). However, despite the potential benefits that e-commerce can offer, the adoption of B2C e-commerce in South African construction SMMEs is low and this is due to the challenges associated with e-commerce (Vaithanathan, 2010; Uzoka, Shemi & Seleka, 2007; Love & Irani, 2004; Anumba & Ruikar, 2002). These e-commerce challenges include: high implementation costs, lack or poor infrastructure, inadequate resources, low use of e-commerce by suppliers and consumers, lack of access to e-commerce, computer illiteracy, deficiency in understanding the potential benefits of e-commerce and security concerns (Vaithanathan, 2010; Uzoka, Shemi, & Seleka, 2007; Mensah, Bahta, & Mhlanga, 2005; Cloete, Courtney, & Fintz, 2002). Therefore, due to these e-commerce challenges, construction SMMEs do not exploit the business advantages that e-commerce offers. In order to assist South African construction SMMEs in their efforts to improve their business effectiveness and efficiency through commercial technologies.
- Full Text:
- Date Issued: 2011
- Authors: Williams, Zenande
- Date: 2011
- Subjects: Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11125 , http://hdl.handle.net/10353/528 , Construction industry , Mobile commerce , Small business , Computer-assisted instruction , Interactive videos
- Description: E-commerce has been said to bring value to businesses by improving business efficiency and effectiveness and thus providing business with a competitive advantage through the potential benefits that it offers (Cloete, Courtney & Fintz, 2002). However, despite the potential benefits that e-commerce can offer, the adoption of B2C e-commerce in South African construction SMMEs is low and this is due to the challenges associated with e-commerce (Vaithanathan, 2010; Uzoka, Shemi & Seleka, 2007; Love & Irani, 2004; Anumba & Ruikar, 2002). These e-commerce challenges include: high implementation costs, lack or poor infrastructure, inadequate resources, low use of e-commerce by suppliers and consumers, lack of access to e-commerce, computer illiteracy, deficiency in understanding the potential benefits of e-commerce and security concerns (Vaithanathan, 2010; Uzoka, Shemi, & Seleka, 2007; Mensah, Bahta, & Mhlanga, 2005; Cloete, Courtney, & Fintz, 2002). Therefore, due to these e-commerce challenges, construction SMMEs do not exploit the business advantages that e-commerce offers. In order to assist South African construction SMMEs in their efforts to improve their business effectiveness and efficiency through commercial technologies.
- Full Text:
- Date Issued: 2011
Impact of information and communication technology (ICT) on trust and information sharing in South African automotive supply chains
- Authors: Goche, Chiedza
- Date: 2012
- Subjects: Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/668 , vital:26486 , Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2012
- Authors: Goche, Chiedza
- Date: 2012
- Subjects: Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/668 , vital:26486 , Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2012
A model to measure the maturuty of smartphone security at software consultancies
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
- Date Issued: 2009
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
- Date Issued: 2009
Ensuring high quality public safety data in participatory crowdsourcing used as a smart city initiative
- Authors: Bhana, Bhaveer
- Date: 2013
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11141 , http://hdl.handle.net/10353/d1014673
- Description: The increase in urbanisation is making the management of city resources a difficult task. Data collected through observations of the city surroundings can be used to improve decision-making in terms of manage city resources. However, the data collected must be of quality in order to ensure that effective and efficient decisions are made. This study is focused on improving emergency and non-emergency services (city resources) by using Participatory Crowdsourcing as a data collection method (collect public safety data) utilising voice technology in the form of an advanced IVR system known as the Spoken Web. The study illustrates how Participatory Crowdsourcing can be used as a Smart City initiative by illustrating what is required to contribute to the Smart City, and developing a roadmap in the form of a model to assist decision-making when selecting the optimal Crowdsourcing initiative. A Public Safety Data Quality criteria was also developed to assess and identify the problems affecting Data Quality. This study is guided by the Design Science methodology and utilises two driving theories: the characteristics of a Smart City, and Wang and Strong’s (1996) Data Quality Framework. Five Critical Success Factors were developed to ensure high quality public safety data is collected through Participatory Crowdsourcing utilising voice technologies. These Critical Success Factors include: Relevant Public Safety Data, Public Safety Reporting Instructions, Public Safety Data Interpretation and Presentation Format, Public Safety Data Integrity and Security, and Simple Participatory Crowdsourcing System Setup.
- Full Text:
- Date Issued: 2013
- Authors: Bhana, Bhaveer
- Date: 2013
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11141 , http://hdl.handle.net/10353/d1014673
- Description: The increase in urbanisation is making the management of city resources a difficult task. Data collected through observations of the city surroundings can be used to improve decision-making in terms of manage city resources. However, the data collected must be of quality in order to ensure that effective and efficient decisions are made. This study is focused on improving emergency and non-emergency services (city resources) by using Participatory Crowdsourcing as a data collection method (collect public safety data) utilising voice technology in the form of an advanced IVR system known as the Spoken Web. The study illustrates how Participatory Crowdsourcing can be used as a Smart City initiative by illustrating what is required to contribute to the Smart City, and developing a roadmap in the form of a model to assist decision-making when selecting the optimal Crowdsourcing initiative. A Public Safety Data Quality criteria was also developed to assess and identify the problems affecting Data Quality. This study is guided by the Design Science methodology and utilises two driving theories: the characteristics of a Smart City, and Wang and Strong’s (1996) Data Quality Framework. Five Critical Success Factors were developed to ensure high quality public safety data is collected through Participatory Crowdsourcing utilising voice technologies. These Critical Success Factors include: Relevant Public Safety Data, Public Safety Reporting Instructions, Public Safety Data Interpretation and Presentation Format, Public Safety Data Integrity and Security, and Simple Participatory Crowdsourcing System Setup.
- Full Text:
- Date Issued: 2013
Towards a framework for enhancing user trust in cloud computing
- Authors: Nyoni, Tamsanqa B
- Date: 2014
- Subjects: Adoption -- Cloud Computing , User Trust
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11142 , http://hdl.handle.net/10353/d1014674 , Adoption -- Cloud Computing , User Trust
- Description: Cloud computing is one of the latest appealing technological trends to emerge in the Information Technology (IT) industry. However, despite the surge in activity and interest, there are significant and persistent concerns about cloud computing, particularly with regard to trusting the platform in terms of confidentiality, integrity and availability of user data stored through these applications. These factors are significant in determining trust in cloud computing and thus provide the foundation for this study. The significant role that trust plays in the use of cloud computing was considered in relation to various trust models, theories and frameworks. Cloud computing is still considered to be a new technology in the business world, therefore minimal work and academic research has been done on enhancing trust in cloud computing. Academic research which focuses on the adoption of cloud computing and, in particular, the building of user trust has been minimal. The available trust models, frameworks and cloud computing adoption strategies that exist mainly focus on cost reduction and the various benefits that are associated with migrating to a cloud computing platform. Available work on cloud computing does not provide clear guidelines for establishing user trust in a cloud computing application. The issue of establishing a reliable trust context for data and security within cloud computing is, up to this point, not well defined. This study investigates the impact that a lack of user trust has on the use of cloud computing. Strategies for enhancing user trust in cloud computing are required to overcome the data security concerns. This study focused on establishing methods to enhance user trust in cloud computing applications through the theoretical contributions of the Proposed Trust Model by Mayer, Davis, and Schoorman (1995) and the Confidentiality, Integrity, Availability (CIA) Triad by Steichen (2010). A questionnaire was used as a means of gathering data on trust-related perceptions of the use of cloud computing. The findings of this questionnaire administered to users and potential users of cloud computing applications are reported in this study. The questionnaire primarily investigates key concerns which result in self-moderation of cloud computing use and factors which would improve trust in cloud computing. Additionally, results relating to user awareness of potential confidentiality, integrity and availability risks are described. An initial cloud computing adoption model was proposed based on a content analysis of existing cloud computing literature. This initial model, empirically tested through the questionnaire, was an important foundation for the establishment of the Critical Success Factors (CSFs) and therefore the framework to enhance user trust in cloud computing applications. The framework proposed by this study aims to assist new cloud computing users to determine the appropriateness of a cloud computing service, thereby enhancing their trust in cloud computing applications.
- Full Text:
- Date Issued: 2014
- Authors: Nyoni, Tamsanqa B
- Date: 2014
- Subjects: Adoption -- Cloud Computing , User Trust
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11142 , http://hdl.handle.net/10353/d1014674 , Adoption -- Cloud Computing , User Trust
- Description: Cloud computing is one of the latest appealing technological trends to emerge in the Information Technology (IT) industry. However, despite the surge in activity and interest, there are significant and persistent concerns about cloud computing, particularly with regard to trusting the platform in terms of confidentiality, integrity and availability of user data stored through these applications. These factors are significant in determining trust in cloud computing and thus provide the foundation for this study. The significant role that trust plays in the use of cloud computing was considered in relation to various trust models, theories and frameworks. Cloud computing is still considered to be a new technology in the business world, therefore minimal work and academic research has been done on enhancing trust in cloud computing. Academic research which focuses on the adoption of cloud computing and, in particular, the building of user trust has been minimal. The available trust models, frameworks and cloud computing adoption strategies that exist mainly focus on cost reduction and the various benefits that are associated with migrating to a cloud computing platform. Available work on cloud computing does not provide clear guidelines for establishing user trust in a cloud computing application. The issue of establishing a reliable trust context for data and security within cloud computing is, up to this point, not well defined. This study investigates the impact that a lack of user trust has on the use of cloud computing. Strategies for enhancing user trust in cloud computing are required to overcome the data security concerns. This study focused on establishing methods to enhance user trust in cloud computing applications through the theoretical contributions of the Proposed Trust Model by Mayer, Davis, and Schoorman (1995) and the Confidentiality, Integrity, Availability (CIA) Triad by Steichen (2010). A questionnaire was used as a means of gathering data on trust-related perceptions of the use of cloud computing. The findings of this questionnaire administered to users and potential users of cloud computing applications are reported in this study. The questionnaire primarily investigates key concerns which result in self-moderation of cloud computing use and factors which would improve trust in cloud computing. Additionally, results relating to user awareness of potential confidentiality, integrity and availability risks are described. An initial cloud computing adoption model was proposed based on a content analysis of existing cloud computing literature. This initial model, empirically tested through the questionnaire, was an important foundation for the establishment of the Critical Success Factors (CSFs) and therefore the framework to enhance user trust in cloud computing applications. The framework proposed by this study aims to assist new cloud computing users to determine the appropriateness of a cloud computing service, thereby enhancing their trust in cloud computing applications.
- Full Text:
- Date Issued: 2014
Critical success factors for user acceptance of telemedicine in South Africa
- Authors: Cilliers, Liezel
- Date: 2010
- Subjects: Telecommunication in medicine , Medical telematics
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11126 , http://hdl.handle.net/10353/384 , Telecommunication in medicine , Medical telematics
- Description: The World Health Organization has recommended Telemedicine to improve health care in developing countries. The objective of this study was to produce Critical Success Factors that will investigate and identify factors that influence the acceptance and continued use of Telemedicine in the Eastern Cape Department of Health, and to suggest ways to sustain this technology from initial adoption (the pilot programme) to full adoption. Sub questions investigated which other facilitating factors, such as management support or previous Information Technology exposure must be present in order for the technology to be adopted successfully. The study made use of a questionnaire to investigate the user acceptance and behaviour of health care workers. A return rate of 76% was achieved. The data was analysed making use of Statistical Package for the Social Sciences (SPSS), specifically the Chi Square test. From these results Critical Success Factors where then formulated to address the problems identified. The Critical Success Factors that were identified include: Implement and disseminate best practice within a legislative framework; Find a champion; Change management strategies; Training; Sustainable finance; Technical issues and Project management principles If these CSFs are addressed before and during the implementation of Telemedicine it will increase the acceptance and use of the technology among health care workers. Critical Success Factors for User Acceptance of Telemedicine in South Africa.
- Full Text:
- Date Issued: 2010
- Authors: Cilliers, Liezel
- Date: 2010
- Subjects: Telecommunication in medicine , Medical telematics
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11126 , http://hdl.handle.net/10353/384 , Telecommunication in medicine , Medical telematics
- Description: The World Health Organization has recommended Telemedicine to improve health care in developing countries. The objective of this study was to produce Critical Success Factors that will investigate and identify factors that influence the acceptance and continued use of Telemedicine in the Eastern Cape Department of Health, and to suggest ways to sustain this technology from initial adoption (the pilot programme) to full adoption. Sub questions investigated which other facilitating factors, such as management support or previous Information Technology exposure must be present in order for the technology to be adopted successfully. The study made use of a questionnaire to investigate the user acceptance and behaviour of health care workers. A return rate of 76% was achieved. The data was analysed making use of Statistical Package for the Social Sciences (SPSS), specifically the Chi Square test. From these results Critical Success Factors where then formulated to address the problems identified. The Critical Success Factors that were identified include: Implement and disseminate best practice within a legislative framework; Find a champion; Change management strategies; Training; Sustainable finance; Technical issues and Project management principles If these CSFs are addressed before and during the implementation of Telemedicine it will increase the acceptance and use of the technology among health care workers. Critical Success Factors for User Acceptance of Telemedicine in South Africa.
- Full Text:
- Date Issued: 2010
A model for attaining extended e-commerce adoption and use by hospitality smmes in the Eastern Cape Province
- Authors: Maoneke, Pardon Blessings
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11147 , http://hdl.handle.net/10353/d1017897
- Description: There is a slow adoption and use of electronic commerce or e-Commerce by Small, Medium and Micro-sized Enterprises based in the hospitality sector (hospitality SMMEs). Only a few hospitality SMMEs that have adopted e-Commerce show the migration of value adding activities to their e-Commerce platforms. As such, this study developed and proposed a model that shows how hospitality SMMEs in the Eastern Cape Province can attain extended e-Commerce adoption and use. Extended e-Commerce platforms are characterised by the institutionalization of e-Commerce that includes Search Engine Marketing activities and/or listing services on intermediary websites, and engaging through social media websites. Tourism and hospitality customers’ information needs and buying behaviour were used to guide the requirements of extended e-Commerce platforms for hospitality businesses. The proposed model outlined factors determining extended e-Commerce adoption, extended e-Commerce characteristics and the anticipated e-Commerce adoption outcomes. The model was evaluated in the Eastern Cape using a multiple-case study methodology. The study’s use of a multiple-case study was applied within the interpretivist paradigm and four cases were considered. Triangulation through document analysis, interviews and observation was used for collecting data regarding factors determining the transition to extended e-Commerce adoption. A questionnaire was used for evaluating extended e-Commerce use. Within and cross-case analysis with the aid of coding was used for data analysis. Data collection and analysis validated the proposed model as a model that shows how hospitality SMMEs can attain extended e-Commerce adoption and use. The proposed model concedes that, successful adoption and use of e-Commerce by hospitality SMMEs would result in e-Commerce adoption outcomes namely online sales, reservations and customer service. These e-Commerce adoption outcomes are the criteria against which the level of extended e-Commerce adoption is measured.
- Full Text:
- Date Issued: 2014
- Authors: Maoneke, Pardon Blessings
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11147 , http://hdl.handle.net/10353/d1017897
- Description: There is a slow adoption and use of electronic commerce or e-Commerce by Small, Medium and Micro-sized Enterprises based in the hospitality sector (hospitality SMMEs). Only a few hospitality SMMEs that have adopted e-Commerce show the migration of value adding activities to their e-Commerce platforms. As such, this study developed and proposed a model that shows how hospitality SMMEs in the Eastern Cape Province can attain extended e-Commerce adoption and use. Extended e-Commerce platforms are characterised by the institutionalization of e-Commerce that includes Search Engine Marketing activities and/or listing services on intermediary websites, and engaging through social media websites. Tourism and hospitality customers’ information needs and buying behaviour were used to guide the requirements of extended e-Commerce platforms for hospitality businesses. The proposed model outlined factors determining extended e-Commerce adoption, extended e-Commerce characteristics and the anticipated e-Commerce adoption outcomes. The model was evaluated in the Eastern Cape using a multiple-case study methodology. The study’s use of a multiple-case study was applied within the interpretivist paradigm and four cases were considered. Triangulation through document analysis, interviews and observation was used for collecting data regarding factors determining the transition to extended e-Commerce adoption. A questionnaire was used for evaluating extended e-Commerce use. Within and cross-case analysis with the aid of coding was used for data analysis. Data collection and analysis validated the proposed model as a model that shows how hospitality SMMEs can attain extended e-Commerce adoption and use. The proposed model concedes that, successful adoption and use of e-Commerce by hospitality SMMEs would result in e-Commerce adoption outcomes namely online sales, reservations and customer service. These e-Commerce adoption outcomes are the criteria against which the level of extended e-Commerce adoption is measured.
- Full Text:
- Date Issued: 2014
Towards an information security awareness process for engineering SMEs in emerging economies
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- Date Issued: 2013
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- Date Issued: 2013
Deriving value from IT investments within botique hotels: a Buffalo City case study
- Authors: Mathe, Thabelang
- Date: 2009
- Subjects: Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11134 , http://hdl.handle.net/10353/d1000975 , Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Description: Even though many organizations invest in IT, the value that IT is expected to contribute is still not clearly understood. Researchers agree that IT has become a crucial element to business operations and business existence. However, while there is continued investment in new information technologies and systems, organizations are not certain whether significant value is derived from IT investments. The failure to realize good return on IT investments is ascribed to a lack of understanding of IT by organizations and also the failure by organizations to align IT strategies with business strategies. The lack of alignment leads to the failure to match the right IT to the correct task, which leads to the poor application of systems and poor allocation of human resources to tasks. Therefore, organizations such as Small and Medium Enterprises (SMEs) in particular Boutique Hotels, are noted for their failure to derive better IT value. Their unique characteristics are understood to be influential in the way IT is used and managed by affecting the delivery of value from technology. In order to enable Boutique Hotels to derive more value from IT, the IT governance frameworks, Val IT and CobiT (ITGI, 2007), were examined as these integrate good practices to ensure that an organization‘s IT supports the business objectives. In addition, the Task Technology Fit (TTF) (Goodhue and Thompson, 1995) and Gap Analysis (Heeks, 2001) theories were highlighted as these prescribe the platform ideal for more value to be derived from IT. The current status of Boutique Hotels in Buffalo City was assessed through the use of questionnaires and interviews. The collected data was analyzed and resulted in the development of a model that can be used by Boutique Hotels in order to derive more value from IT and to maximize the use of IT.
- Full Text:
- Date Issued: 2009
- Authors: Mathe, Thabelang
- Date: 2009
- Subjects: Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11134 , http://hdl.handle.net/10353/d1000975 , Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Description: Even though many organizations invest in IT, the value that IT is expected to contribute is still not clearly understood. Researchers agree that IT has become a crucial element to business operations and business existence. However, while there is continued investment in new information technologies and systems, organizations are not certain whether significant value is derived from IT investments. The failure to realize good return on IT investments is ascribed to a lack of understanding of IT by organizations and also the failure by organizations to align IT strategies with business strategies. The lack of alignment leads to the failure to match the right IT to the correct task, which leads to the poor application of systems and poor allocation of human resources to tasks. Therefore, organizations such as Small and Medium Enterprises (SMEs) in particular Boutique Hotels, are noted for their failure to derive better IT value. Their unique characteristics are understood to be influential in the way IT is used and managed by affecting the delivery of value from technology. In order to enable Boutique Hotels to derive more value from IT, the IT governance frameworks, Val IT and CobiT (ITGI, 2007), were examined as these integrate good practices to ensure that an organization‘s IT supports the business objectives. In addition, the Task Technology Fit (TTF) (Goodhue and Thompson, 1995) and Gap Analysis (Heeks, 2001) theories were highlighted as these prescribe the platform ideal for more value to be derived from IT. The current status of Boutique Hotels in Buffalo City was assessed through the use of questionnaires and interviews. The collected data was analyzed and resulted in the development of a model that can be used by Boutique Hotels in order to derive more value from IT and to maximize the use of IT.
- Full Text:
- Date Issued: 2009
E-mail forensic authorship attribution
- Authors: Lalla, Himal
- Date: 2010
- Subjects: Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11128 , http://hdl.handle.net/10353/360 , Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Description: E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
- Full Text:
- Date Issued: 2010
- Authors: Lalla, Himal
- Date: 2010
- Subjects: Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11128 , http://hdl.handle.net/10353/360 , Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Description: E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
- Full Text:
- Date Issued: 2010
A framework to guide development through ICT in rural areas in South Africa
- Mamba, Malungelo Siphiwosami Njinga
- Authors: Mamba, Malungelo Siphiwosami Njinga
- Date: 2012
- Subjects: Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11137 , http://hdl.handle.net/10353/d1007024 , Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Description: Information and Communication Technology (ICT) is widely regarded as a key tool for bringing about development to people who live in underserved areas. Technologies such as mobile phones and Wi-Fi are seen as advantageous because they can be made available to poor places without the cost of building extensive physical infrastructure. However, researchers argue that ICTs have failed to live up to their potential in the context of development. Researchers point out developing countries lack frameworks to guide them through the implementation of ICTs in this context. The objective of this study is to come up with a framework that can be used in rural areas in South Africa to implement ICT projects. The researcher interviewed individuals who have been directly involved in an ICT initiative in a rural setting in the Eastern Cape Province to learn from their experiences. The researcher also studied publications that have been produced from these initiatives in order to gain a richer understanding. The findings of the study show that participants share similar views about how ICT projects should be approached and implemented in rural areas in South Africa. The views are grouped according to similarity into themes and discussed in detail in the study. From these themes a framework that can help implement ICT projects in rural areas is developed.
- Full Text:
- Date Issued: 2012
- Authors: Mamba, Malungelo Siphiwosami Njinga
- Date: 2012
- Subjects: Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11137 , http://hdl.handle.net/10353/d1007024 , Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Description: Information and Communication Technology (ICT) is widely regarded as a key tool for bringing about development to people who live in underserved areas. Technologies such as mobile phones and Wi-Fi are seen as advantageous because they can be made available to poor places without the cost of building extensive physical infrastructure. However, researchers argue that ICTs have failed to live up to their potential in the context of development. Researchers point out developing countries lack frameworks to guide them through the implementation of ICTs in this context. The objective of this study is to come up with a framework that can be used in rural areas in South Africa to implement ICT projects. The researcher interviewed individuals who have been directly involved in an ICT initiative in a rural setting in the Eastern Cape Province to learn from their experiences. The researcher also studied publications that have been produced from these initiatives in order to gain a richer understanding. The findings of the study show that participants share similar views about how ICT projects should be approached and implemented in rural areas in South Africa. The views are grouped according to similarity into themes and discussed in detail in the study. From these themes a framework that can help implement ICT projects in rural areas is developed.
- Full Text:
- Date Issued: 2012
Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government Tenders
- Authors: Rama, Sobhana
- Date: 2013
- Subjects: Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11136 , http://hdl.handle.net/10353/d1006956 , Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Description: Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
- Full Text:
- Date Issued: 2013
- Authors: Rama, Sobhana
- Date: 2013
- Subjects: Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11136 , http://hdl.handle.net/10353/d1006956 , Chinese walls (Communication barriers) -- South Africa , Business logistics -- South Africa , Confidential communications -- South Africa , Conflict of interests -- South Africa , Fraud -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa , Chinese Wall Model , Information confidentiality , Conflict of Interest , Government tender fraud
- Description: Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
- Full Text:
- Date Issued: 2013
Phishing within e-commerce: reducing the risk, increasing the trust
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
A public safety, participatory crowdsourcing smart city model for a developing country
- Authors: Cilliers, Liezel
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11144 , http://hdl.handle.net/10353/d1015305
- Description: Worldwide the population in cities is increasing. It is the responsibility of local government to provide public safety services in order to ensure the safety of their citizens and, yet, the local government often have inadequate resources to do this. ‘Smart Cities’ is a new and innovative concept that has emerged during the past few years and which involves using current infrastructure and resources more effectively and efficiently. One of the methods used to collect data in a smart city is participatory crowdsourcing but, in order to ensure effectiveness and efficiency, it is essential that a large amount of data be collected from the participants in such a project, who are generally citizens residing in the city. This study was conducted in the city of East London, which is part of the Buffalo City Metropolitan Municipality (BCMM). The study made use of a Design Science approach with a mixed method data collection method. The quantitative data collection comprised a questionnaire that was completed by 394 participants, while the qualitative data collection included a detailed literature review, conversational analysis and observations arising from the building of the crowdsourcing system prototype. The design artefact produced by this research is a model based on the literature, conversational analysis and the principles and concepts learnt from the prototype. Thus, this model represents what must be incorporated in the prototype to assist with the implementation of a public safety, participatory crowdsourcing smart city in a developing country. The model includes three areas ‒ the crowdsourcing system, the city (Buffalo City Metropolitan Municipality) and the citizens of East London. The crowdsourcing system incorporates factors of information security, specifically the CIA triad, and the usability of the crowdsourcing system. Usability includes characteristics such as the quality of the system and interface, as well as the usefulness of the public safety, participatory crowdsourcing system which was used to measure the confidence of the East London citizens in the system. Three steps were identified in the literature as being necessary for the implementation of a smart city project by a city. These steps include the planning, development and delivery of the smart city project. Finally, the trustworthiness of the public safety participatory crowdsourcing system is determined by the ability, reliability and benevolence of the system. These three characteristics were included in the citizen factor of the model.
- Full Text:
- Date Issued: 2014
- Authors: Cilliers, Liezel
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11144 , http://hdl.handle.net/10353/d1015305
- Description: Worldwide the population in cities is increasing. It is the responsibility of local government to provide public safety services in order to ensure the safety of their citizens and, yet, the local government often have inadequate resources to do this. ‘Smart Cities’ is a new and innovative concept that has emerged during the past few years and which involves using current infrastructure and resources more effectively and efficiently. One of the methods used to collect data in a smart city is participatory crowdsourcing but, in order to ensure effectiveness and efficiency, it is essential that a large amount of data be collected from the participants in such a project, who are generally citizens residing in the city. This study was conducted in the city of East London, which is part of the Buffalo City Metropolitan Municipality (BCMM). The study made use of a Design Science approach with a mixed method data collection method. The quantitative data collection comprised a questionnaire that was completed by 394 participants, while the qualitative data collection included a detailed literature review, conversational analysis and observations arising from the building of the crowdsourcing system prototype. The design artefact produced by this research is a model based on the literature, conversational analysis and the principles and concepts learnt from the prototype. Thus, this model represents what must be incorporated in the prototype to assist with the implementation of a public safety, participatory crowdsourcing smart city in a developing country. The model includes three areas ‒ the crowdsourcing system, the city (Buffalo City Metropolitan Municipality) and the citizens of East London. The crowdsourcing system incorporates factors of information security, specifically the CIA triad, and the usability of the crowdsourcing system. Usability includes characteristics such as the quality of the system and interface, as well as the usefulness of the public safety, participatory crowdsourcing system which was used to measure the confidence of the East London citizens in the system. Three steps were identified in the literature as being necessary for the implementation of a smart city project by a city. These steps include the planning, development and delivery of the smart city project. Finally, the trustworthiness of the public safety participatory crowdsourcing system is determined by the ability, reliability and benevolence of the system. These three characteristics were included in the citizen factor of the model.
- Full Text:
- Date Issued: 2014
A resource management framework for sustainability of rural ICT4D projects in Zimbabwe
- Authors: Mugoni, Hope
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/689 , vital:26488
- Description: Developing countries are embracing Information Communication Technologies (ICTs) as a tool for alleviating poverty. There are, however, still challenges that developing countries face in trying to establish Information Communication Technology for Development (ICT4D). Among the major challenges is the lack of proper resource management which results in poor sustainability of ICT4D initiatives. If these ICT4D initiatives are to be sustainable for the benefit of current and future generations, proper resource management methods are to be developed and applied. This study proposes a resource management framework that can be applied to the management of ICT4D resources with the aim of achieving sustainability. The framework is informed by theory, and validated through enquiry in the field. Qualitative research methodology was used as a research approach for this study where three rural ICT4D initiatives were used as case studies. The case studies were conducted in rural Zimbabwe to investigate how proper resource management can influence the sustainability of ICT4D initiatives. It was identified from the study that the lack of proper resource management methods adversely affects the initiatives’ sustainability. The proposed resource management framework will guide ICT4D resource management to enhance the initiatives’ sustainability.
- Full Text:
- Date Issued: 2014
- Authors: Mugoni, Hope
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/689 , vital:26488
- Description: Developing countries are embracing Information Communication Technologies (ICTs) as a tool for alleviating poverty. There are, however, still challenges that developing countries face in trying to establish Information Communication Technology for Development (ICT4D). Among the major challenges is the lack of proper resource management which results in poor sustainability of ICT4D initiatives. If these ICT4D initiatives are to be sustainable for the benefit of current and future generations, proper resource management methods are to be developed and applied. This study proposes a resource management framework that can be applied to the management of ICT4D resources with the aim of achieving sustainability. The framework is informed by theory, and validated through enquiry in the field. Qualitative research methodology was used as a research approach for this study where three rural ICT4D initiatives were used as case studies. The case studies were conducted in rural Zimbabwe to investigate how proper resource management can influence the sustainability of ICT4D initiatives. It was identified from the study that the lack of proper resource management methods adversely affects the initiatives’ sustainability. The proposed resource management framework will guide ICT4D resource management to enhance the initiatives’ sustainability.
- Full Text:
- Date Issued: 2014
Small hospitality enterprises and the internet: an IT governance model for conducting business online
- Authors: Ngoqo, Bukelwa
- Date: 2010
- Subjects: Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11133 , http://hdl.handle.net/10353/382 , Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2010
- Authors: Ngoqo, Bukelwa
- Date: 2010
- Subjects: Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11133 , http://hdl.handle.net/10353/382 , Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2010
A framework for implementation of ICT4D initiatives in the Eastern Cape province of South Africa
- Authors: Phingilili, Gcotyelwa
- Date: 2014
- Subjects: Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11146 , http://hdl.handle.net/10353/d1017789 , Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Description: South Africa’s rural communities have received Information and Communication Technologies services through initiatives such as tele-centres, living labs, Thusong service centres and donations of computer applications. There is need, with little plans in place to ensure that the rural communities will benefit from those initiatives. As a result of this, it is necessary to establish a framework for implementing Information and Communication Technologies for development initiatives in order to ensure successful implementation of these initiatives in rural communities. Literature shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of Information and Communication Technologies policies, presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Current literature on ICT developments shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of ICT policies, and presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Unstructured interviews were used as a research method to collect primary data that was used as a basis to develop the proposed framework. Findings from the studies carried out indicated that several ICT4D initiatives which were abandoned due to challenges such lack of proper resources, trainings, lack of local content, access, lack of ownership and lack of stakeholders’ involvement. This study presents a framework for implementing ICT for development initiatives in rural communities which has been developed in order to reduce the number of initiatives that are abandoned or which end up not serving their intended purpose in rural communities of South Africa.
- Full Text:
- Date Issued: 2014
- Authors: Phingilili, Gcotyelwa
- Date: 2014
- Subjects: Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11146 , http://hdl.handle.net/10353/d1017789 , Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Description: South Africa’s rural communities have received Information and Communication Technologies services through initiatives such as tele-centres, living labs, Thusong service centres and donations of computer applications. There is need, with little plans in place to ensure that the rural communities will benefit from those initiatives. As a result of this, it is necessary to establish a framework for implementing Information and Communication Technologies for development initiatives in order to ensure successful implementation of these initiatives in rural communities. Literature shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of Information and Communication Technologies policies, presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Current literature on ICT developments shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of ICT policies, and presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Unstructured interviews were used as a research method to collect primary data that was used as a basis to develop the proposed framework. Findings from the studies carried out indicated that several ICT4D initiatives which were abandoned due to challenges such lack of proper resources, trainings, lack of local content, access, lack of ownership and lack of stakeholders’ involvement. This study presents a framework for implementing ICT for development initiatives in rural communities which has been developed in order to reduce the number of initiatives that are abandoned or which end up not serving their intended purpose in rural communities of South Africa.
- Full Text:
- Date Issued: 2014
A model for user requirements elicitation specific to users in rural areas
- Authors: Isabirye, Naomi
- Date: 2009
- Subjects: Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11130 , http://hdl.handle.net/10353/145 , Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Description: Dwesa is a rural town situated in South Africa's Eastern Cape Province that has been selected as a testing site for an e-commerce project to address some of the challenges faced by the community. These challenges include difficulties stemming from poverty, poor access to public services, unemployment and low levels of literacy. The Siyakhula Living Lab project’s aim is to develop an e-commerce platform that will 'connect' the residents with the necessary access to services and markets by providing them with the necessary tools that can help in alleviating some of their challenges. In order for the project to achieve its objectives, a deeper understanding into the needs of the prospective users is required. User requirements elicitation deals with the process of interacting with the prospective users to understand and document their needs. This research aims at evaluating existing requirements elicitation techniques and methodologies in the context of rural information technology implementations. The primary objective is to develop a model for user requirements elicitation in Dwesa. Many requirements elicitation techniques and frameworks exist, but few have been evaluated in the context of rural software implementations. Requirements elicitation techniques should not be applied simply as steps to gather information. Instead this research project proposes a model that can be applied to assimilate the contribution of knowledge regarding the stakeholders, problem and solution characteristics, and other characteristics into the software development process for the effective elicitation of requirements.
- Full Text:
- Date Issued: 2009
- Authors: Isabirye, Naomi
- Date: 2009
- Subjects: Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11130 , http://hdl.handle.net/10353/145 , Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Description: Dwesa is a rural town situated in South Africa's Eastern Cape Province that has been selected as a testing site for an e-commerce project to address some of the challenges faced by the community. These challenges include difficulties stemming from poverty, poor access to public services, unemployment and low levels of literacy. The Siyakhula Living Lab project’s aim is to develop an e-commerce platform that will 'connect' the residents with the necessary access to services and markets by providing them with the necessary tools that can help in alleviating some of their challenges. In order for the project to achieve its objectives, a deeper understanding into the needs of the prospective users is required. User requirements elicitation deals with the process of interacting with the prospective users to understand and document their needs. This research aims at evaluating existing requirements elicitation techniques and methodologies in the context of rural information technology implementations. The primary objective is to develop a model for user requirements elicitation in Dwesa. Many requirements elicitation techniques and frameworks exist, but few have been evaluated in the context of rural software implementations. Requirements elicitation techniques should not be applied simply as steps to gather information. Instead this research project proposes a model that can be applied to assimilate the contribution of knowledge regarding the stakeholders, problem and solution characteristics, and other characteristics into the software development process for the effective elicitation of requirements.
- Full Text:
- Date Issued: 2009