A model to measure the maturuty of smartphone security at software consultancies
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
- Date Issued: 2009
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
- Date Issued: 2009
Ensuring high quality public safety data in participatory crowdsourcing used as a smart city initiative
- Authors: Bhana, Bhaveer
- Date: 2013
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11141 , http://hdl.handle.net/10353/d1014673
- Description: The increase in urbanisation is making the management of city resources a difficult task. Data collected through observations of the city surroundings can be used to improve decision-making in terms of manage city resources. However, the data collected must be of quality in order to ensure that effective and efficient decisions are made. This study is focused on improving emergency and non-emergency services (city resources) by using Participatory Crowdsourcing as a data collection method (collect public safety data) utilising voice technology in the form of an advanced IVR system known as the Spoken Web. The study illustrates how Participatory Crowdsourcing can be used as a Smart City initiative by illustrating what is required to contribute to the Smart City, and developing a roadmap in the form of a model to assist decision-making when selecting the optimal Crowdsourcing initiative. A Public Safety Data Quality criteria was also developed to assess and identify the problems affecting Data Quality. This study is guided by the Design Science methodology and utilises two driving theories: the characteristics of a Smart City, and Wang and Strong’s (1996) Data Quality Framework. Five Critical Success Factors were developed to ensure high quality public safety data is collected through Participatory Crowdsourcing utilising voice technologies. These Critical Success Factors include: Relevant Public Safety Data, Public Safety Reporting Instructions, Public Safety Data Interpretation and Presentation Format, Public Safety Data Integrity and Security, and Simple Participatory Crowdsourcing System Setup.
- Full Text:
- Date Issued: 2013
- Authors: Bhana, Bhaveer
- Date: 2013
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11141 , http://hdl.handle.net/10353/d1014673
- Description: The increase in urbanisation is making the management of city resources a difficult task. Data collected through observations of the city surroundings can be used to improve decision-making in terms of manage city resources. However, the data collected must be of quality in order to ensure that effective and efficient decisions are made. This study is focused on improving emergency and non-emergency services (city resources) by using Participatory Crowdsourcing as a data collection method (collect public safety data) utilising voice technology in the form of an advanced IVR system known as the Spoken Web. The study illustrates how Participatory Crowdsourcing can be used as a Smart City initiative by illustrating what is required to contribute to the Smart City, and developing a roadmap in the form of a model to assist decision-making when selecting the optimal Crowdsourcing initiative. A Public Safety Data Quality criteria was also developed to assess and identify the problems affecting Data Quality. This study is guided by the Design Science methodology and utilises two driving theories: the characteristics of a Smart City, and Wang and Strong’s (1996) Data Quality Framework. Five Critical Success Factors were developed to ensure high quality public safety data is collected through Participatory Crowdsourcing utilising voice technologies. These Critical Success Factors include: Relevant Public Safety Data, Public Safety Reporting Instructions, Public Safety Data Interpretation and Presentation Format, Public Safety Data Integrity and Security, and Simple Participatory Crowdsourcing System Setup.
- Full Text:
- Date Issued: 2013
An information privacy model for primary health care facilities
- Authors: Boucher, Duane Eric
- Date: 2013
- Subjects: Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11139 , http://hdl.handle.net/10353/d1007181 , Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Description: The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical perspective to highlight the constructs of information privacy. These constructs together with a discussion focused on the confidentiality and accessibility of medical records results in the development of an artefact represented in the format of a model. The formulation of the model is accomplished by making use of the Design Science research guidelines for artefact development. Part of the process required that the artefact be refined through the use of an Expert Review Process. This involved an iterative (three phase) process which required (seven) experts from the fields of privacy, information security, and health care to respond to semi-structured questions administered with an interview guide. The data analysis process utilised the ISO/IEC 29100:2011(E) standard on privacy as a means to assign thematic codes to the responses, which were then analysed. The proposed information privacy model was discussed in relation to the compliance requirements of the South African Protection of Personal Information (PoPI) Bill of 2009 and their application in a primary health care facility. The proposed information privacy model provides a holistic view of privacy management that can residually be used to increase awareness associated with the compliance requirements of using patient PII.
- Full Text:
- Date Issued: 2013
- Authors: Boucher, Duane Eric
- Date: 2013
- Subjects: Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11139 , http://hdl.handle.net/10353/d1007181 , Data protection , Privacy, Right of , Medical records -- Access control , Primary health care , Medical care , Caregivers , Community health nursing , Confidential communications , Information technology -- Management
- Description: The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical perspective to highlight the constructs of information privacy. These constructs together with a discussion focused on the confidentiality and accessibility of medical records results in the development of an artefact represented in the format of a model. The formulation of the model is accomplished by making use of the Design Science research guidelines for artefact development. Part of the process required that the artefact be refined through the use of an Expert Review Process. This involved an iterative (three phase) process which required (seven) experts from the fields of privacy, information security, and health care to respond to semi-structured questions administered with an interview guide. The data analysis process utilised the ISO/IEC 29100:2011(E) standard on privacy as a means to assign thematic codes to the responses, which were then analysed. The proposed information privacy model was discussed in relation to the compliance requirements of the South African Protection of Personal Information (PoPI) Bill of 2009 and their application in a primary health care facility. The proposed information privacy model provides a holistic view of privacy management that can residually be used to increase awareness associated with the compliance requirements of using patient PII.
- Full Text:
- Date Issued: 2013
Critical success factors for user acceptance of telemedicine in South Africa
- Authors: Cilliers, Liezel
- Date: 2010
- Subjects: Telecommunication in medicine , Medical telematics
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11126 , http://hdl.handle.net/10353/384 , Telecommunication in medicine , Medical telematics
- Description: The World Health Organization has recommended Telemedicine to improve health care in developing countries. The objective of this study was to produce Critical Success Factors that will investigate and identify factors that influence the acceptance and continued use of Telemedicine in the Eastern Cape Department of Health, and to suggest ways to sustain this technology from initial adoption (the pilot programme) to full adoption. Sub questions investigated which other facilitating factors, such as management support or previous Information Technology exposure must be present in order for the technology to be adopted successfully. The study made use of a questionnaire to investigate the user acceptance and behaviour of health care workers. A return rate of 76% was achieved. The data was analysed making use of Statistical Package for the Social Sciences (SPSS), specifically the Chi Square test. From these results Critical Success Factors where then formulated to address the problems identified. The Critical Success Factors that were identified include: Implement and disseminate best practice within a legislative framework; Find a champion; Change management strategies; Training; Sustainable finance; Technical issues and Project management principles If these CSFs are addressed before and during the implementation of Telemedicine it will increase the acceptance and use of the technology among health care workers. Critical Success Factors for User Acceptance of Telemedicine in South Africa.
- Full Text:
- Date Issued: 2010
- Authors: Cilliers, Liezel
- Date: 2010
- Subjects: Telecommunication in medicine , Medical telematics
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11126 , http://hdl.handle.net/10353/384 , Telecommunication in medicine , Medical telematics
- Description: The World Health Organization has recommended Telemedicine to improve health care in developing countries. The objective of this study was to produce Critical Success Factors that will investigate and identify factors that influence the acceptance and continued use of Telemedicine in the Eastern Cape Department of Health, and to suggest ways to sustain this technology from initial adoption (the pilot programme) to full adoption. Sub questions investigated which other facilitating factors, such as management support or previous Information Technology exposure must be present in order for the technology to be adopted successfully. The study made use of a questionnaire to investigate the user acceptance and behaviour of health care workers. A return rate of 76% was achieved. The data was analysed making use of Statistical Package for the Social Sciences (SPSS), specifically the Chi Square test. From these results Critical Success Factors where then formulated to address the problems identified. The Critical Success Factors that were identified include: Implement and disseminate best practice within a legislative framework; Find a champion; Change management strategies; Training; Sustainable finance; Technical issues and Project management principles If these CSFs are addressed before and during the implementation of Telemedicine it will increase the acceptance and use of the technology among health care workers. Critical Success Factors for User Acceptance of Telemedicine in South Africa.
- Full Text:
- Date Issued: 2010
A public safety, participatory crowdsourcing smart city model for a developing country
- Authors: Cilliers, Liezel
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11144 , http://hdl.handle.net/10353/d1015305
- Description: Worldwide the population in cities is increasing. It is the responsibility of local government to provide public safety services in order to ensure the safety of their citizens and, yet, the local government often have inadequate resources to do this. ‘Smart Cities’ is a new and innovative concept that has emerged during the past few years and which involves using current infrastructure and resources more effectively and efficiently. One of the methods used to collect data in a smart city is participatory crowdsourcing but, in order to ensure effectiveness and efficiency, it is essential that a large amount of data be collected from the participants in such a project, who are generally citizens residing in the city. This study was conducted in the city of East London, which is part of the Buffalo City Metropolitan Municipality (BCMM). The study made use of a Design Science approach with a mixed method data collection method. The quantitative data collection comprised a questionnaire that was completed by 394 participants, while the qualitative data collection included a detailed literature review, conversational analysis and observations arising from the building of the crowdsourcing system prototype. The design artefact produced by this research is a model based on the literature, conversational analysis and the principles and concepts learnt from the prototype. Thus, this model represents what must be incorporated in the prototype to assist with the implementation of a public safety, participatory crowdsourcing smart city in a developing country. The model includes three areas ‒ the crowdsourcing system, the city (Buffalo City Metropolitan Municipality) and the citizens of East London. The crowdsourcing system incorporates factors of information security, specifically the CIA triad, and the usability of the crowdsourcing system. Usability includes characteristics such as the quality of the system and interface, as well as the usefulness of the public safety, participatory crowdsourcing system which was used to measure the confidence of the East London citizens in the system. Three steps were identified in the literature as being necessary for the implementation of a smart city project by a city. These steps include the planning, development and delivery of the smart city project. Finally, the trustworthiness of the public safety participatory crowdsourcing system is determined by the ability, reliability and benevolence of the system. These three characteristics were included in the citizen factor of the model.
- Full Text:
- Date Issued: 2014
- Authors: Cilliers, Liezel
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11144 , http://hdl.handle.net/10353/d1015305
- Description: Worldwide the population in cities is increasing. It is the responsibility of local government to provide public safety services in order to ensure the safety of their citizens and, yet, the local government often have inadequate resources to do this. ‘Smart Cities’ is a new and innovative concept that has emerged during the past few years and which involves using current infrastructure and resources more effectively and efficiently. One of the methods used to collect data in a smart city is participatory crowdsourcing but, in order to ensure effectiveness and efficiency, it is essential that a large amount of data be collected from the participants in such a project, who are generally citizens residing in the city. This study was conducted in the city of East London, which is part of the Buffalo City Metropolitan Municipality (BCMM). The study made use of a Design Science approach with a mixed method data collection method. The quantitative data collection comprised a questionnaire that was completed by 394 participants, while the qualitative data collection included a detailed literature review, conversational analysis and observations arising from the building of the crowdsourcing system prototype. The design artefact produced by this research is a model based on the literature, conversational analysis and the principles and concepts learnt from the prototype. Thus, this model represents what must be incorporated in the prototype to assist with the implementation of a public safety, participatory crowdsourcing smart city in a developing country. The model includes three areas ‒ the crowdsourcing system, the city (Buffalo City Metropolitan Municipality) and the citizens of East London. The crowdsourcing system incorporates factors of information security, specifically the CIA triad, and the usability of the crowdsourcing system. Usability includes characteristics such as the quality of the system and interface, as well as the usefulness of the public safety, participatory crowdsourcing system which was used to measure the confidence of the East London citizens in the system. Three steps were identified in the literature as being necessary for the implementation of a smart city project by a city. These steps include the planning, development and delivery of the smart city project. Finally, the trustworthiness of the public safety participatory crowdsourcing system is determined by the ability, reliability and benevolence of the system. These three characteristics were included in the citizen factor of the model.
- Full Text:
- Date Issued: 2014
Impact of information and communication technology (ICT) on trust and information sharing in South African automotive supply chains
- Authors: Goche, Chiedza
- Date: 2012
- Subjects: Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/668 , vital:26486 , Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2012
- Authors: Goche, Chiedza
- Date: 2012
- Subjects: Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/668 , vital:26486 , Business logistics -- South Africa , Automobile industry and trade -- South Africa , Interorganizational relations -- South Africa , Trust -- South Africa , Information technology -- South Africa , Prisoner's dilemma game
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2012
Towards an information security awareness process for engineering SMEs in emerging economies
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- Date Issued: 2013
- Authors: Gundu, Tapiwa
- Date: 2013
- Subjects: Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11138 , http://hdl.handle.net/10353/d1007179 , Computer security -- South Africa , Information technology -- South Africa , Computer networks -- Security measures -- South Africa , Information resources management -- South Africa , Small business -- South Africa , Engineering firms -- South Africa , Confidential communications -- South Africa , Information Security Awareness , Information Security Behaviour , Information Security Training
- Description: With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
- Full Text:
- Date Issued: 2013
A model for user requirements elicitation specific to users in rural areas
- Authors: Isabirye, Naomi
- Date: 2009
- Subjects: Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11130 , http://hdl.handle.net/10353/145 , Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Description: Dwesa is a rural town situated in South Africa's Eastern Cape Province that has been selected as a testing site for an e-commerce project to address some of the challenges faced by the community. These challenges include difficulties stemming from poverty, poor access to public services, unemployment and low levels of literacy. The Siyakhula Living Lab project’s aim is to develop an e-commerce platform that will 'connect' the residents with the necessary access to services and markets by providing them with the necessary tools that can help in alleviating some of their challenges. In order for the project to achieve its objectives, a deeper understanding into the needs of the prospective users is required. User requirements elicitation deals with the process of interacting with the prospective users to understand and document their needs. This research aims at evaluating existing requirements elicitation techniques and methodologies in the context of rural information technology implementations. The primary objective is to develop a model for user requirements elicitation in Dwesa. Many requirements elicitation techniques and frameworks exist, but few have been evaluated in the context of rural software implementations. Requirements elicitation techniques should not be applied simply as steps to gather information. Instead this research project proposes a model that can be applied to assimilate the contribution of knowledge regarding the stakeholders, problem and solution characteristics, and other characteristics into the software development process for the effective elicitation of requirements.
- Full Text:
- Date Issued: 2009
- Authors: Isabirye, Naomi
- Date: 2009
- Subjects: Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11130 , http://hdl.handle.net/10353/145 , Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Description: Dwesa is a rural town situated in South Africa's Eastern Cape Province that has been selected as a testing site for an e-commerce project to address some of the challenges faced by the community. These challenges include difficulties stemming from poverty, poor access to public services, unemployment and low levels of literacy. The Siyakhula Living Lab project’s aim is to develop an e-commerce platform that will 'connect' the residents with the necessary access to services and markets by providing them with the necessary tools that can help in alleviating some of their challenges. In order for the project to achieve its objectives, a deeper understanding into the needs of the prospective users is required. User requirements elicitation deals with the process of interacting with the prospective users to understand and document their needs. This research aims at evaluating existing requirements elicitation techniques and methodologies in the context of rural information technology implementations. The primary objective is to develop a model for user requirements elicitation in Dwesa. Many requirements elicitation techniques and frameworks exist, but few have been evaluated in the context of rural software implementations. Requirements elicitation techniques should not be applied simply as steps to gather information. Instead this research project proposes a model that can be applied to assimilate the contribution of knowledge regarding the stakeholders, problem and solution characteristics, and other characteristics into the software development process for the effective elicitation of requirements.
- Full Text:
- Date Issued: 2009
E-mail forensic authorship attribution
- Authors: Lalla, Himal
- Date: 2010
- Subjects: Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11128 , http://hdl.handle.net/10353/360 , Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Description: E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
- Full Text:
- Date Issued: 2010
- Authors: Lalla, Himal
- Date: 2010
- Subjects: Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11128 , http://hdl.handle.net/10353/360 , Electronic evidence , Electronic mail systems , Authorship , Electronic mail messages , Signatures (Writing) , Writing -- Identification , Forensic accounting
- Description: E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
- Full Text:
- Date Issued: 2010
A framework to guide development through ICT in rural areas in South Africa
- Mamba, Malungelo Siphiwosami Njinga
- Authors: Mamba, Malungelo Siphiwosami Njinga
- Date: 2012
- Subjects: Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11137 , http://hdl.handle.net/10353/d1007024 , Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Description: Information and Communication Technology (ICT) is widely regarded as a key tool for bringing about development to people who live in underserved areas. Technologies such as mobile phones and Wi-Fi are seen as advantageous because they can be made available to poor places without the cost of building extensive physical infrastructure. However, researchers argue that ICTs have failed to live up to their potential in the context of development. Researchers point out developing countries lack frameworks to guide them through the implementation of ICTs in this context. The objective of this study is to come up with a framework that can be used in rural areas in South Africa to implement ICT projects. The researcher interviewed individuals who have been directly involved in an ICT initiative in a rural setting in the Eastern Cape Province to learn from their experiences. The researcher also studied publications that have been produced from these initiatives in order to gain a richer understanding. The findings of the study show that participants share similar views about how ICT projects should be approached and implemented in rural areas in South Africa. The views are grouped according to similarity into themes and discussed in detail in the study. From these themes a framework that can help implement ICT projects in rural areas is developed.
- Full Text:
- Date Issued: 2012
- Authors: Mamba, Malungelo Siphiwosami Njinga
- Date: 2012
- Subjects: Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11137 , http://hdl.handle.net/10353/d1007024 , Information technology -- Economic aspects -- South Africa , Telecommunication -- South Africa , Information services industry -- South Africa , Rural development -- South Africa , Information services -- Government policy -- South Africa , Communication policy -- South Africa , Communication planning -- South Africa
- Description: Information and Communication Technology (ICT) is widely regarded as a key tool for bringing about development to people who live in underserved areas. Technologies such as mobile phones and Wi-Fi are seen as advantageous because they can be made available to poor places without the cost of building extensive physical infrastructure. However, researchers argue that ICTs have failed to live up to their potential in the context of development. Researchers point out developing countries lack frameworks to guide them through the implementation of ICTs in this context. The objective of this study is to come up with a framework that can be used in rural areas in South Africa to implement ICT projects. The researcher interviewed individuals who have been directly involved in an ICT initiative in a rural setting in the Eastern Cape Province to learn from their experiences. The researcher also studied publications that have been produced from these initiatives in order to gain a richer understanding. The findings of the study show that participants share similar views about how ICT projects should be approached and implemented in rural areas in South Africa. The views are grouped according to similarity into themes and discussed in detail in the study. From these themes a framework that can help implement ICT projects in rural areas is developed.
- Full Text:
- Date Issued: 2012
A model for attaining extended e-commerce adoption and use by hospitality smmes in the Eastern Cape Province
- Authors: Maoneke, Pardon Blessings
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11147 , http://hdl.handle.net/10353/d1017897
- Description: There is a slow adoption and use of electronic commerce or e-Commerce by Small, Medium and Micro-sized Enterprises based in the hospitality sector (hospitality SMMEs). Only a few hospitality SMMEs that have adopted e-Commerce show the migration of value adding activities to their e-Commerce platforms. As such, this study developed and proposed a model that shows how hospitality SMMEs in the Eastern Cape Province can attain extended e-Commerce adoption and use. Extended e-Commerce platforms are characterised by the institutionalization of e-Commerce that includes Search Engine Marketing activities and/or listing services on intermediary websites, and engaging through social media websites. Tourism and hospitality customers’ information needs and buying behaviour were used to guide the requirements of extended e-Commerce platforms for hospitality businesses. The proposed model outlined factors determining extended e-Commerce adoption, extended e-Commerce characteristics and the anticipated e-Commerce adoption outcomes. The model was evaluated in the Eastern Cape using a multiple-case study methodology. The study’s use of a multiple-case study was applied within the interpretivist paradigm and four cases were considered. Triangulation through document analysis, interviews and observation was used for collecting data regarding factors determining the transition to extended e-Commerce adoption. A questionnaire was used for evaluating extended e-Commerce use. Within and cross-case analysis with the aid of coding was used for data analysis. Data collection and analysis validated the proposed model as a model that shows how hospitality SMMEs can attain extended e-Commerce adoption and use. The proposed model concedes that, successful adoption and use of e-Commerce by hospitality SMMEs would result in e-Commerce adoption outcomes namely online sales, reservations and customer service. These e-Commerce adoption outcomes are the criteria against which the level of extended e-Commerce adoption is measured.
- Full Text:
- Date Issued: 2014
- Authors: Maoneke, Pardon Blessings
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11147 , http://hdl.handle.net/10353/d1017897
- Description: There is a slow adoption and use of electronic commerce or e-Commerce by Small, Medium and Micro-sized Enterprises based in the hospitality sector (hospitality SMMEs). Only a few hospitality SMMEs that have adopted e-Commerce show the migration of value adding activities to their e-Commerce platforms. As such, this study developed and proposed a model that shows how hospitality SMMEs in the Eastern Cape Province can attain extended e-Commerce adoption and use. Extended e-Commerce platforms are characterised by the institutionalization of e-Commerce that includes Search Engine Marketing activities and/or listing services on intermediary websites, and engaging through social media websites. Tourism and hospitality customers’ information needs and buying behaviour were used to guide the requirements of extended e-Commerce platforms for hospitality businesses. The proposed model outlined factors determining extended e-Commerce adoption, extended e-Commerce characteristics and the anticipated e-Commerce adoption outcomes. The model was evaluated in the Eastern Cape using a multiple-case study methodology. The study’s use of a multiple-case study was applied within the interpretivist paradigm and four cases were considered. Triangulation through document analysis, interviews and observation was used for collecting data regarding factors determining the transition to extended e-Commerce adoption. A questionnaire was used for evaluating extended e-Commerce use. Within and cross-case analysis with the aid of coding was used for data analysis. Data collection and analysis validated the proposed model as a model that shows how hospitality SMMEs can attain extended e-Commerce adoption and use. The proposed model concedes that, successful adoption and use of e-Commerce by hospitality SMMEs would result in e-Commerce adoption outcomes namely online sales, reservations and customer service. These e-Commerce adoption outcomes are the criteria against which the level of extended e-Commerce adoption is measured.
- Full Text:
- Date Issued: 2014
Deriving value from IT investments within botique hotels: a Buffalo City case study
- Authors: Mathe, Thabelang
- Date: 2009
- Subjects: Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11134 , http://hdl.handle.net/10353/d1000975 , Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Description: Even though many organizations invest in IT, the value that IT is expected to contribute is still not clearly understood. Researchers agree that IT has become a crucial element to business operations and business existence. However, while there is continued investment in new information technologies and systems, organizations are not certain whether significant value is derived from IT investments. The failure to realize good return on IT investments is ascribed to a lack of understanding of IT by organizations and also the failure by organizations to align IT strategies with business strategies. The lack of alignment leads to the failure to match the right IT to the correct task, which leads to the poor application of systems and poor allocation of human resources to tasks. Therefore, organizations such as Small and Medium Enterprises (SMEs) in particular Boutique Hotels, are noted for their failure to derive better IT value. Their unique characteristics are understood to be influential in the way IT is used and managed by affecting the delivery of value from technology. In order to enable Boutique Hotels to derive more value from IT, the IT governance frameworks, Val IT and CobiT (ITGI, 2007), were examined as these integrate good practices to ensure that an organization‘s IT supports the business objectives. In addition, the Task Technology Fit (TTF) (Goodhue and Thompson, 1995) and Gap Analysis (Heeks, 2001) theories were highlighted as these prescribe the platform ideal for more value to be derived from IT. The current status of Boutique Hotels in Buffalo City was assessed through the use of questionnaires and interviews. The collected data was analyzed and resulted in the development of a model that can be used by Boutique Hotels in order to derive more value from IT and to maximize the use of IT.
- Full Text:
- Date Issued: 2009
- Authors: Mathe, Thabelang
- Date: 2009
- Subjects: Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11134 , http://hdl.handle.net/10353/d1000975 , Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Description: Even though many organizations invest in IT, the value that IT is expected to contribute is still not clearly understood. Researchers agree that IT has become a crucial element to business operations and business existence. However, while there is continued investment in new information technologies and systems, organizations are not certain whether significant value is derived from IT investments. The failure to realize good return on IT investments is ascribed to a lack of understanding of IT by organizations and also the failure by organizations to align IT strategies with business strategies. The lack of alignment leads to the failure to match the right IT to the correct task, which leads to the poor application of systems and poor allocation of human resources to tasks. Therefore, organizations such as Small and Medium Enterprises (SMEs) in particular Boutique Hotels, are noted for their failure to derive better IT value. Their unique characteristics are understood to be influential in the way IT is used and managed by affecting the delivery of value from technology. In order to enable Boutique Hotels to derive more value from IT, the IT governance frameworks, Val IT and CobiT (ITGI, 2007), were examined as these integrate good practices to ensure that an organization‘s IT supports the business objectives. In addition, the Task Technology Fit (TTF) (Goodhue and Thompson, 1995) and Gap Analysis (Heeks, 2001) theories were highlighted as these prescribe the platform ideal for more value to be derived from IT. The current status of Boutique Hotels in Buffalo City was assessed through the use of questionnaires and interviews. The collected data was analyzed and resulted in the development of a model that can be used by Boutique Hotels in order to derive more value from IT and to maximize the use of IT.
- Full Text:
- Date Issued: 2009
Phishing within e-commerce: reducing the risk, increasing the trust
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
- Authors: Megaw, Gregory M
- Date: 2010
- Subjects: Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11131 , http://hdl.handle.net/10353/376 , Phishing , Identity theft -- Prevention , Electronic commerce , Computer security , Internet -- Safety measures
- Description: E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Full Text:
- Date Issued: 2010
A resource management framework for sustainability of rural ICT4D projects in Zimbabwe
- Authors: Mugoni, Hope
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/689 , vital:26488
- Description: Developing countries are embracing Information Communication Technologies (ICTs) as a tool for alleviating poverty. There are, however, still challenges that developing countries face in trying to establish Information Communication Technology for Development (ICT4D). Among the major challenges is the lack of proper resource management which results in poor sustainability of ICT4D initiatives. If these ICT4D initiatives are to be sustainable for the benefit of current and future generations, proper resource management methods are to be developed and applied. This study proposes a resource management framework that can be applied to the management of ICT4D resources with the aim of achieving sustainability. The framework is informed by theory, and validated through enquiry in the field. Qualitative research methodology was used as a research approach for this study where three rural ICT4D initiatives were used as case studies. The case studies were conducted in rural Zimbabwe to investigate how proper resource management can influence the sustainability of ICT4D initiatives. It was identified from the study that the lack of proper resource management methods adversely affects the initiatives’ sustainability. The proposed resource management framework will guide ICT4D resource management to enhance the initiatives’ sustainability.
- Full Text:
- Date Issued: 2014
- Authors: Mugoni, Hope
- Date: 2014
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/689 , vital:26488
- Description: Developing countries are embracing Information Communication Technologies (ICTs) as a tool for alleviating poverty. There are, however, still challenges that developing countries face in trying to establish Information Communication Technology for Development (ICT4D). Among the major challenges is the lack of proper resource management which results in poor sustainability of ICT4D initiatives. If these ICT4D initiatives are to be sustainable for the benefit of current and future generations, proper resource management methods are to be developed and applied. This study proposes a resource management framework that can be applied to the management of ICT4D resources with the aim of achieving sustainability. The framework is informed by theory, and validated through enquiry in the field. Qualitative research methodology was used as a research approach for this study where three rural ICT4D initiatives were used as case studies. The case studies were conducted in rural Zimbabwe to investigate how proper resource management can influence the sustainability of ICT4D initiatives. It was identified from the study that the lack of proper resource management methods adversely affects the initiatives’ sustainability. The proposed resource management framework will guide ICT4D resource management to enhance the initiatives’ sustainability.
- Full Text:
- Date Issued: 2014
Critical Success Factors for Enhanced Information Systems Capabilities in Water Billing Processes: A Case Study of Buffalo City Metropolitan Municipality
- Authors: Naki, Avuyile
- Date: 2019
- Subjects: Information networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/13793 , vital:39712
- Description: Water is a nation's most precious resource as humans depend upon it for their lives and livelihoods. Water resources, therefore, require efficient and strategic management by those entities tasked with such a responsibility. Municipalities manage the water distribution to local citizens, but experience challenges due to the numerous tasks involved in water management. A major challenge that municipalities face is inefficiencies in water management business processes due to immature information system capabilities. Many studies focus on the infrastructure-related challenges such as ageing pipes, but little emphasis is placed on the information system-based challenges in water management and their relationship to the local water consumer. Therefore, the focus of this research investigation was on the water billing process activities and the information systems involved in these activities. The study collected primary data by conducting a focus group comprising seven respondents working in water billing-related processes and then conducted semi-structured interviews with two managers at the Buffalo City Metropolitan Municipality (BCMM). The Nvivo software tool was used to organise the collected data. Finally, the collected data was analysed using the principles of thematic analysis. Firstly, the primary evidence indicates that the water billing information systems that are used at BCMM are unintegrated. Secondly, that there are numerous manual processes in the water billing-related processes, which lead to mistakes in the capturing of consumer data. Thirdly, the analysis confirms that BCMM is faced with water management challenges. Fourthly, the analysis revealed that there is inadequate communication between various water billing information systems that are used, which results in delays in data capturing, errors and outdated information. The findings conclude that BCMM has immature water billing information system capabilities and that there are problems related to water processes. The research investigation derived several critical success factors (CSFs) for BCMM to action to ensure that their water billing information systems are enhanced. The CSFs were reviewed by the two managers used for the study in order to ascertain their relevance to the context and were considered relevant by the managers. Therefore, the recommendation is that BCMM, and other municipalities with similar contexts, should action the proposed CSFs to enhance their water billing-related information systems capabilities.
- Full Text:
- Date Issued: 2019
- Authors: Naki, Avuyile
- Date: 2019
- Subjects: Information networks -- Security measures Computer security
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/13793 , vital:39712
- Description: Water is a nation's most precious resource as humans depend upon it for their lives and livelihoods. Water resources, therefore, require efficient and strategic management by those entities tasked with such a responsibility. Municipalities manage the water distribution to local citizens, but experience challenges due to the numerous tasks involved in water management. A major challenge that municipalities face is inefficiencies in water management business processes due to immature information system capabilities. Many studies focus on the infrastructure-related challenges such as ageing pipes, but little emphasis is placed on the information system-based challenges in water management and their relationship to the local water consumer. Therefore, the focus of this research investigation was on the water billing process activities and the information systems involved in these activities. The study collected primary data by conducting a focus group comprising seven respondents working in water billing-related processes and then conducted semi-structured interviews with two managers at the Buffalo City Metropolitan Municipality (BCMM). The Nvivo software tool was used to organise the collected data. Finally, the collected data was analysed using the principles of thematic analysis. Firstly, the primary evidence indicates that the water billing information systems that are used at BCMM are unintegrated. Secondly, that there are numerous manual processes in the water billing-related processes, which lead to mistakes in the capturing of consumer data. Thirdly, the analysis confirms that BCMM is faced with water management challenges. Fourthly, the analysis revealed that there is inadequate communication between various water billing information systems that are used, which results in delays in data capturing, errors and outdated information. The findings conclude that BCMM has immature water billing information system capabilities and that there are problems related to water processes. The research investigation derived several critical success factors (CSFs) for BCMM to action to ensure that their water billing information systems are enhanced. The CSFs were reviewed by the two managers used for the study in order to ascertain their relevance to the context and were considered relevant by the managers. Therefore, the recommendation is that BCMM, and other municipalities with similar contexts, should action the proposed CSFs to enhance their water billing-related information systems capabilities.
- Full Text:
- Date Issued: 2019
Quality assessment of information systems in SMEs: a study of Eldoret Town in Kenya
- Authors: Ndiege, Joshua Rumo Arongo
- Date: 2010
- Subjects: Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11132 , http://hdl.handle.net/10353/d1000973 , Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Full Text: false
- Date Issued: 2010
- Authors: Ndiege, Joshua Rumo Arongo
- Date: 2010
- Subjects: Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11132 , http://hdl.handle.net/10353/d1000973 , Small business -- Kenya , Financial institutions -- Kenya , Small business -- Kenya -- Data processing , Information technology -- Kenya -- Evaluation
- Full Text: false
- Date Issued: 2010
Small hospitality enterprises and the internet: an IT governance model for conducting business online
- Authors: Ngoqo, Bukelwa
- Date: 2010
- Subjects: Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11133 , http://hdl.handle.net/10353/382 , Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2010
- Authors: Ngoqo, Bukelwa
- Date: 2010
- Subjects: Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11133 , http://hdl.handle.net/10353/382 , Hospitality industry -- South Africa , Tourism -- South Africa , Organizational effectiveness -- South Africa , Electronic commerce , Internet , Risk management , Electronic data processing
- Description: The Internet has made a considerable impact on how business is conducted. Empowered by technology consumers are using the Internet as a tool to communicate and transact online. E-commerce (electronic commerce) presents opportunities for business to gain a competitive advantage, however it also posses certain challenges. Small and Medium Hospitality Enterprises (SMHEs) sector within the tourism industry, is one of the sectors which stands to benefit from using the Internet for business. Researchers agree that the contribution made by the tourism sector in developing economies is substantial. However, SMHEs are noted for their failure to derive optimal benefits from using the Internet for business to improve their competitiveness. This study which seeks to develop a model for use by SMHEs as a guide when making the decision to adopt technology was necessitated by the importance of SMHE’s contribution in the economy of developing countries. This model is based on the examination of existing theories and models such as; the Delone and McLean IS success model (2004), and the ITGI’s (2007) IT governance focus areas model. To elicit the desired outcomes, additional data was collected using questionnaires, interviews, and observations. The collected data was analysed and resulted in the development of a model that can be used by SMHEs in order to derive value from IT and to gain a competitive advantage.
- Full Text:
- Date Issued: 2010
Towards a framework for enhancing user trust in cloud computing
- Authors: Nyoni, Tamsanqa B
- Date: 2014
- Subjects: Adoption -- Cloud Computing , User Trust
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11142 , http://hdl.handle.net/10353/d1014674 , Adoption -- Cloud Computing , User Trust
- Description: Cloud computing is one of the latest appealing technological trends to emerge in the Information Technology (IT) industry. However, despite the surge in activity and interest, there are significant and persistent concerns about cloud computing, particularly with regard to trusting the platform in terms of confidentiality, integrity and availability of user data stored through these applications. These factors are significant in determining trust in cloud computing and thus provide the foundation for this study. The significant role that trust plays in the use of cloud computing was considered in relation to various trust models, theories and frameworks. Cloud computing is still considered to be a new technology in the business world, therefore minimal work and academic research has been done on enhancing trust in cloud computing. Academic research which focuses on the adoption of cloud computing and, in particular, the building of user trust has been minimal. The available trust models, frameworks and cloud computing adoption strategies that exist mainly focus on cost reduction and the various benefits that are associated with migrating to a cloud computing platform. Available work on cloud computing does not provide clear guidelines for establishing user trust in a cloud computing application. The issue of establishing a reliable trust context for data and security within cloud computing is, up to this point, not well defined. This study investigates the impact that a lack of user trust has on the use of cloud computing. Strategies for enhancing user trust in cloud computing are required to overcome the data security concerns. This study focused on establishing methods to enhance user trust in cloud computing applications through the theoretical contributions of the Proposed Trust Model by Mayer, Davis, and Schoorman (1995) and the Confidentiality, Integrity, Availability (CIA) Triad by Steichen (2010). A questionnaire was used as a means of gathering data on trust-related perceptions of the use of cloud computing. The findings of this questionnaire administered to users and potential users of cloud computing applications are reported in this study. The questionnaire primarily investigates key concerns which result in self-moderation of cloud computing use and factors which would improve trust in cloud computing. Additionally, results relating to user awareness of potential confidentiality, integrity and availability risks are described. An initial cloud computing adoption model was proposed based on a content analysis of existing cloud computing literature. This initial model, empirically tested through the questionnaire, was an important foundation for the establishment of the Critical Success Factors (CSFs) and therefore the framework to enhance user trust in cloud computing applications. The framework proposed by this study aims to assist new cloud computing users to determine the appropriateness of a cloud computing service, thereby enhancing their trust in cloud computing applications.
- Full Text:
- Date Issued: 2014
- Authors: Nyoni, Tamsanqa B
- Date: 2014
- Subjects: Adoption -- Cloud Computing , User Trust
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11142 , http://hdl.handle.net/10353/d1014674 , Adoption -- Cloud Computing , User Trust
- Description: Cloud computing is one of the latest appealing technological trends to emerge in the Information Technology (IT) industry. However, despite the surge in activity and interest, there are significant and persistent concerns about cloud computing, particularly with regard to trusting the platform in terms of confidentiality, integrity and availability of user data stored through these applications. These factors are significant in determining trust in cloud computing and thus provide the foundation for this study. The significant role that trust plays in the use of cloud computing was considered in relation to various trust models, theories and frameworks. Cloud computing is still considered to be a new technology in the business world, therefore minimal work and academic research has been done on enhancing trust in cloud computing. Academic research which focuses on the adoption of cloud computing and, in particular, the building of user trust has been minimal. The available trust models, frameworks and cloud computing adoption strategies that exist mainly focus on cost reduction and the various benefits that are associated with migrating to a cloud computing platform. Available work on cloud computing does not provide clear guidelines for establishing user trust in a cloud computing application. The issue of establishing a reliable trust context for data and security within cloud computing is, up to this point, not well defined. This study investigates the impact that a lack of user trust has on the use of cloud computing. Strategies for enhancing user trust in cloud computing are required to overcome the data security concerns. This study focused on establishing methods to enhance user trust in cloud computing applications through the theoretical contributions of the Proposed Trust Model by Mayer, Davis, and Schoorman (1995) and the Confidentiality, Integrity, Availability (CIA) Triad by Steichen (2010). A questionnaire was used as a means of gathering data on trust-related perceptions of the use of cloud computing. The findings of this questionnaire administered to users and potential users of cloud computing applications are reported in this study. The questionnaire primarily investigates key concerns which result in self-moderation of cloud computing use and factors which would improve trust in cloud computing. Additionally, results relating to user awareness of potential confidentiality, integrity and availability risks are described. An initial cloud computing adoption model was proposed based on a content analysis of existing cloud computing literature. This initial model, empirically tested through the questionnaire, was an important foundation for the establishment of the Critical Success Factors (CSFs) and therefore the framework to enhance user trust in cloud computing applications. The framework proposed by this study aims to assist new cloud computing users to determine the appropriateness of a cloud computing service, thereby enhancing their trust in cloud computing applications.
- Full Text:
- Date Issued: 2014
The Factors Influencing the Behavioural Intention of Overweight Adults to Use Wearable Devices for Sustained Health Monitoring
- Authors: Ogundele , Oluwaseyi Caleb
- Date: 20xx
- Subjects: Digital media
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/13903 , vital:39725
- Description: The volume of wearable devices that can be used for sustained health monitoring purposes is continuously growing within the healthcare sector. These devices allow users to track their own activity levels in real time. However, there are factors that may inhibit the behavioural intention to sustain the use of wearable devices for health monitoring in the long term by overweight adults. These factors include privacy concerns, costs of obtaining wearable devices, theft, frequent charging and short battery life of wearable devices and bulkiness of some wearable devices. It is against this backdrop that this study examined the factors influencing the behavioural intention of overweight adults in South Africa to make use of wearable devices for sustained health monitoring. This research made use of the Expectation Confirmation Model (ECM) as the theoretical foundation of the study. In achieving the aim of this study, a qualitative research approach was used. The purposive sampling technique was selected to identify twenty (20) overweight adults (aged 18-59 years) who are using wearable devices in East London, South Africa. Interviews were conducted with the twenty participants to identify the factors that will influence their behavioural intention to make use of wearable devices to monitor their health. Through thematic analysis, data provided by participants was grouped and summarised into relevant themes to answer the main research question. The study developed a framework that identifies the factors influencing behavioural intention of overweight adults to continue using wearable devices for sustained health monitoring. The factors that were identified include confirmation, perceived usefulness and satisfaction of wearable devices for sustained health monitoring. The realisation of weight loss, monitoring of daily activities and calories through the use of wearable devices was found to positively influence the behavioural intention of the users of wearable devices to continue their usage. However, the major factors that may inhibit the continuous usage of wearable devices for sustained health monitoring are privacy concerns, costs of obtaining wearable devices, theft, frequent charging and short battery life of wearable devices and bulkiness of some wearable devices. Based on the findings, the study recommended the following: (1) the wearable device manufacturers should assure the users of their privacy and confidentiality by providing the needed ii | P a g e interfaces for this purpose; (2) the manufacturers of wearable devices should make the devices less bulky so that they can be more portable; (3) South African government should provide security operatives in isolated areas where people are not feeling secure; (4) the manufacturers of wearable devices make the purchase prices of wearable devices more affordable, especially for low income people; and (5) the manufacturers of wearable devices should improve on battery life and quality of wearable devices so that the devices are more time efficient and require less charging of the devices.
- Full Text:
- Date Issued: 20xx
- Authors: Ogundele , Oluwaseyi Caleb
- Date: 20xx
- Subjects: Digital media
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/13903 , vital:39725
- Description: The volume of wearable devices that can be used for sustained health monitoring purposes is continuously growing within the healthcare sector. These devices allow users to track their own activity levels in real time. However, there are factors that may inhibit the behavioural intention to sustain the use of wearable devices for health monitoring in the long term by overweight adults. These factors include privacy concerns, costs of obtaining wearable devices, theft, frequent charging and short battery life of wearable devices and bulkiness of some wearable devices. It is against this backdrop that this study examined the factors influencing the behavioural intention of overweight adults in South Africa to make use of wearable devices for sustained health monitoring. This research made use of the Expectation Confirmation Model (ECM) as the theoretical foundation of the study. In achieving the aim of this study, a qualitative research approach was used. The purposive sampling technique was selected to identify twenty (20) overweight adults (aged 18-59 years) who are using wearable devices in East London, South Africa. Interviews were conducted with the twenty participants to identify the factors that will influence their behavioural intention to make use of wearable devices to monitor their health. Through thematic analysis, data provided by participants was grouped and summarised into relevant themes to answer the main research question. The study developed a framework that identifies the factors influencing behavioural intention of overweight adults to continue using wearable devices for sustained health monitoring. The factors that were identified include confirmation, perceived usefulness and satisfaction of wearable devices for sustained health monitoring. The realisation of weight loss, monitoring of daily activities and calories through the use of wearable devices was found to positively influence the behavioural intention of the users of wearable devices to continue their usage. However, the major factors that may inhibit the continuous usage of wearable devices for sustained health monitoring are privacy concerns, costs of obtaining wearable devices, theft, frequent charging and short battery life of wearable devices and bulkiness of some wearable devices. Based on the findings, the study recommended the following: (1) the wearable device manufacturers should assure the users of their privacy and confidentiality by providing the needed ii | P a g e interfaces for this purpose; (2) the manufacturers of wearable devices should make the devices less bulky so that they can be more portable; (3) South African government should provide security operatives in isolated areas where people are not feeling secure; (4) the manufacturers of wearable devices make the purchase prices of wearable devices more affordable, especially for low income people; and (5) the manufacturers of wearable devices should improve on battery life and quality of wearable devices so that the devices are more time efficient and require less charging of the devices.
- Full Text:
- Date Issued: 20xx
A framework for implementation of ICT4D initiatives in the Eastern Cape province of South Africa
- Authors: Phingilili, Gcotyelwa
- Date: 2014
- Subjects: Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11146 , http://hdl.handle.net/10353/d1017789 , Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Description: South Africa’s rural communities have received Information and Communication Technologies services through initiatives such as tele-centres, living labs, Thusong service centres and donations of computer applications. There is need, with little plans in place to ensure that the rural communities will benefit from those initiatives. As a result of this, it is necessary to establish a framework for implementing Information and Communication Technologies for development initiatives in order to ensure successful implementation of these initiatives in rural communities. Literature shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of Information and Communication Technologies policies, presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Current literature on ICT developments shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of ICT policies, and presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Unstructured interviews were used as a research method to collect primary data that was used as a basis to develop the proposed framework. Findings from the studies carried out indicated that several ICT4D initiatives which were abandoned due to challenges such lack of proper resources, trainings, lack of local content, access, lack of ownership and lack of stakeholders’ involvement. This study presents a framework for implementing ICT for development initiatives in rural communities which has been developed in order to reduce the number of initiatives that are abandoned or which end up not serving their intended purpose in rural communities of South Africa.
- Full Text:
- Date Issued: 2014
- Authors: Phingilili, Gcotyelwa
- Date: 2014
- Subjects: Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11146 , http://hdl.handle.net/10353/d1017789 , Information and Communication Technologies , ICT4D -- Development -- Rural community , Implementation -- ICT initiatives
- Description: South Africa’s rural communities have received Information and Communication Technologies services through initiatives such as tele-centres, living labs, Thusong service centres and donations of computer applications. There is need, with little plans in place to ensure that the rural communities will benefit from those initiatives. As a result of this, it is necessary to establish a framework for implementing Information and Communication Technologies for development initiatives in order to ensure successful implementation of these initiatives in rural communities. Literature shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of Information and Communication Technologies policies, presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Current literature on ICT developments shows that in order to successfully implement an ICT initiative for rural communities, there should be active engagement with ICT stakeholders, consultation of ICT policies, and presence of ICT infrastructure, ICT services, monitoring, evaluating, training and maintenance. Unstructured interviews were used as a research method to collect primary data that was used as a basis to develop the proposed framework. Findings from the studies carried out indicated that several ICT4D initiatives which were abandoned due to challenges such lack of proper resources, trainings, lack of local content, access, lack of ownership and lack of stakeholders’ involvement. This study presents a framework for implementing ICT for development initiatives in rural communities which has been developed in order to reduce the number of initiatives that are abandoned or which end up not serving their intended purpose in rural communities of South Africa.
- Full Text:
- Date Issued: 2014