An investigation into the state-of-practice of information security within Zambian copper mines: a case study
- Authors: Lukweza, Chishala
- Date: 2011
- Subjects: Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1146 , http://hdl.handle.net/10962/d1002776 , Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Description: Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
- Full Text:
- Date Issued: 2011
- Authors: Lukweza, Chishala
- Date: 2011
- Subjects: Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1146 , http://hdl.handle.net/10962/d1002776 , Computer security -- Zambia -- Management Case studies , Computer networks -- Security measures -- Zambia Case studies , Copper mines and mining -- Computer networks -- Security measures -- Zambia Case studies , Information technology -- Zambia
- Description: Zambian copper mines have embraced the use of information technologies for strategic operations and competitive advantage. This dependence on these technologies has not only been seen in the physical aspects of business operations but also in the use of information systems such as Enterprise Resource Planning Systems (ERPs) for strategic decision making and increased usage of Industrial Control Systems (ICS’) that are meant to enhance operational efficiency in production areas. A survey was conducted to explore leadership perceptions on information security practices in Zambian copper mines and an ISO/IEC 27002 Audit Tool was administered to middle management in a particular mine for an in-depth analysis of their information security practices. Results revealed that although information security controls may have been put in place in these organisations, there are still areas that require attention. Senior management and middle management have different perceptions as to the extent to which information security practices are conducted in these copper mines. This implies that management may not be fully involved in certain aspects of these organisations’ information security practices. The results concluded that management needs to be fully involved and provide support for information security programs. Furthermore, these information security programs should be standardised so as to effectively protect these organisations’ information assets. This should also include the involvement of personnel as key players in the information security process.
- Full Text:
- Date Issued: 2011
An investigation into the use of social media channels within the South African retail banking environment in support of creating and maintaining brand loyalty
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
- Authors: Purohit, Ashish
- Date: 2015
- Subjects: Social media -- Economic aspects , Banks and banking -- Internet marketing -- South Africa , Bank marketing -- South Africa , Brand loyalty -- South Africa , Branding (Marketing) -- South Africa , Structural equation modeling
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1157 , http://hdl.handle.net/10962/d1018920
- Description: The use of social media in the retail banking environment has changed the way the banking industry communicates with customers, creates sales and performs marketing and operational tasks. Social media strategies need to be aligned to business goals and effectively used to integrate social media as part of the overall marketing strategy. Only by understanding brand loyalty, multi-channel systems and social media channels can marketers effectively implement social media. In measuring brand loyalty, factors that influence customer buying behaviour and components that influence online interaction are essential in engaging different groups of customers in social media. This research study aimed to examine the use of social media within the South African retail banking environment with a focus on creating and maintaining brand loyalty. An exploratory, mixed method research design was employed. Data collection instruments used in the study includes online surveys, structured interviews, and focus groups. Participants consisted of marketing personnel and customers. Three lead/head social media marketing personnel participated in the interview process, 14 marketing personnel took the online survey and 4 participated in a focus group. Participants for the online survey also consisted of 40 customers who were connected through the internet and performed various online banking activities. Data was analysed both quantitatively and qualitatively. Data from the online surveys completed by customers was analysed quantitatively using descriptive analysis, structural equation modelling (SEM) and factor analysis which was performed on the brand loyalty variables and the brand loyalty measures. Content analysis was used to qualitatively analyse data from the structured interviews. Data from the online surveys completed by marketing personnel was analysed quantitatively and qualitatively. Findings indicated that social media forms an integral part of the marketing strategy that needs be aligned with the core business goals. Banks therefore need to focus on creating campaigns that are fun, exciting and appealing to the target market. A culture of innovation and new ideas is essential to grow the product/service. Building brand trust and creating customer satisfaction forms the core of creating brand loyalty on social media. Banks need to be aware of factors that influence customer brand loyalty and components that influence loyalty on social media in order to measure things that matter through analytical tools so that an actionable strategy can be put in place and implemented.
- Full Text:
- Date Issued: 2015
An investigation of a framework for the implementation of service management in the information and communication technology sector
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
An investigation of a framework to evaluate computer supported collaborative work
- Beauvais, Erik Alexander Maoui
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
An investigation of an undergraduate course module on the ethical aspects of information systems
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
An investigation of ICT project management techniques for sustainable ICT projects in rural development
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
- Authors: Pade, Caroline Ileje
- Date: 2007
- Subjects: Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1140 , http://hdl.handle.net/10962/d1002769 , Educational technology -- South Africa , Information technology -- Study and teaching -- South Africa , Project management -- South Africa , Rural development projects -- South Africa , Rural development projects -- South Africa -- Case studies , Rhodes University Mathematics Education Project , Dwesa ICT Project
- Description: Poverty alleviation by means of rural development has become a priority among developing countries. In turn, rural development may be significantly enhanced and supported by Information and Communication Technologies (ICTs), the use of which is highlighted by the emerging importance of information and knowledge as key strategic resources for social and economic development. An analysis of rural case studies where ICTs have been introduced, suggests that there are a number of barriers and constraints that are faced when taking advantage of these technologies. These include access to infrastructure, limited formal education, insufficient training and capacity building, financial and political constraints, and social and cultural challenges. These challenges threaten the success and sustainability of rural ICT projects. Sustainability is key to the effectiveness of a rural ICT project; therefore it is important to understand the concept and categories associated with ICT project sustainability in rural areas. The categories of sustainability which include social and cultural, institutional, economic, political, and technological, reveal critical success factors that need to be considered in the implementation and management of rural ICT projects. The project management discipline acknowledges the importance of understanding the project’s environment, particularly environmental factors associated with rural communities. The complexity of the environment therefore implies the need for a project to be undertaken in phases comprising the project life cycle. Project management practice for rural ICT project sustainability can therefore be examined, adapting the traditional project life cycle to a rural ICT project. A Rural ICT Project Life Cycle (RICT-PLC) that is sensitive to the critical success factors of sustainability is therefore proposed. In order to further investigate the phases of the life cycle of a rural ICT project, two case study investigations are explored: the Dwesa ICT community project, and the Rhodes University Mathematics Education Project (RUMEP) (MathsNet). A multiple case study analysis confirms the practices associated with the RICT-PLC model, and identifies additional characteristics, phases and practices associated with rural ICT projects. Finally, an enhanced RICT-PLC model is developed, that sets sustainability guidelines for ICT project management in rural areas and identifies the people, environments, technologies, systems, and requirements for ICTs to support rural development activities.
- Full Text:
- Date Issued: 2007
An investigation of knowledge management implementation strategies
- Authors: Sunassee, Nakkiran N
- Date: 2003
- Subjects: Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1141 , http://hdl.handle.net/10962/d1002770 , Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Description: The world is experiencing an era which has been termed the “knowledge age” or the “knowledge economy”. In this new context, knowledge is the primary commodity, and knowledge flows are regarded as the most important factors in the economy. The management of knowledge flows within organisations has become a crucial activity because many of the activities of organisations and the broader economic and social life today are knowledge-driven. In recent years, this managerial activity has become known as Knowledge Management. Equally important are the associated Knowledge Management implementation strategies. Driven by a need expressed by the South African Motor Vehicle Industry for a knowledge management implementation strategy tailored to their needs, this research aimed to develop a knowledge management implementation strategy suited to the needs of this industry. Following an extensive literature survey and a study of the target industry using Duffy’s Knowledge Benchmarking Questionnaire, a model of knowledge management implementation is proposed that is suited to the needs of the South African Motor Vehicle Industry. The model consists of three main interlinked components: Knowledge Management of the Organisation, People, and Infrastructure and Processes. Furthermore, the model recommends a holistic approach to managing knowledge. The critical success factors of the model were tested by means of a survey of industry opinions that validated certain aspects of the model and motivated for changes in others. Additionally, despite the focus of the model on the target industry, it is considered sufficiently appropriate for use by other organisations.
- Full Text:
- Date Issued: 2003
- Authors: Sunassee, Nakkiran N
- Date: 2003
- Subjects: Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1141 , http://hdl.handle.net/10962/d1002770 , Knowledge management , Strategic planning , Automobile industry and trade -- South Africa -- Management
- Description: The world is experiencing an era which has been termed the “knowledge age” or the “knowledge economy”. In this new context, knowledge is the primary commodity, and knowledge flows are regarded as the most important factors in the economy. The management of knowledge flows within organisations has become a crucial activity because many of the activities of organisations and the broader economic and social life today are knowledge-driven. In recent years, this managerial activity has become known as Knowledge Management. Equally important are the associated Knowledge Management implementation strategies. Driven by a need expressed by the South African Motor Vehicle Industry for a knowledge management implementation strategy tailored to their needs, this research aimed to develop a knowledge management implementation strategy suited to the needs of this industry. Following an extensive literature survey and a study of the target industry using Duffy’s Knowledge Benchmarking Questionnaire, a model of knowledge management implementation is proposed that is suited to the needs of the South African Motor Vehicle Industry. The model consists of three main interlinked components: Knowledge Management of the Organisation, People, and Infrastructure and Processes. Furthermore, the model recommends a holistic approach to managing knowledge. The critical success factors of the model were tested by means of a survey of industry opinions that validated certain aspects of the model and motivated for changes in others. Additionally, despite the focus of the model on the target industry, it is considered sufficiently appropriate for use by other organisations.
- Full Text:
- Date Issued: 2003
An investigation of social computing
- Authors: Schlenkrich, Lara
- Date: 2009
- Subjects: Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1149 , http://hdl.handle.net/10962/d1006194 , Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Description: Social network sites have recently become extremely popular online destinations as they offer users easy ways to build and maintain their relationships with each other. Consequently, students, lecturers, teachers, parents and businesses are using these tools to communicate with each other in a fast and cost-effective manner. However, literature suggests that the full potential of social network sites has not yet been revealed since users are still battling to overcome the various negative characteristics surrounding these sites. A framework for appropriate use of these sites is needed so that users are able to overcome these negative aspects, allowing them to be more effective and use the sites successfully. The goal of this research is to construct a framework for perceived successful use of social computing tools in educational institutions. This framework will include critical success factors that need to be adopted by users in order to develop the positive aspects of social computing, while at the same time overcoming the disadvantages experienced by users. Factors for successful use were derived from the literature and consolidated into a theoretical framework in order to understand the factors that drive successful use of social network sites. Measures used to test successful use of social network sites were also derived from these sources and were included in the same theoretical framework; these measures allow users to evaluate the extent of perceived successful use of social network sites. This framework was tested empirically by means of a pilot study and online survey, and revised according to the results of the survey. The factors were identified using Cronbach alpha coefficients (in the pilot study) and exploratory factor analysis to confirm the reliability of the scales developed. Pearson product-moment correlation coefficient analysis, t-tests and Pearson Chi-Square tests were used to measure the relationships amongst the variables in the framework proposed in this research. The factors influencing perceived successful use of social network sites were identified by the empirical study as: • Privacy and Security Settings need to be enabled. These are split into: - Settings: content that users allow others to see - Viewers: people who are allowed onto a user's profile • It is necessary for users to practise Legal and Acceptable Activities when using social network sites • Suspect Information needs to be checked before sharing it with others • Personal and Professional Time needs to be separated to ensure that work is completed before social activities occur • Users need to practise Professional and Ethical Behaviour • Users need to have a Positive Attitude when using social network sites • Usability of sites affects their success. This includes: - technical capacity (broadband) - ease of use - functionality (range of features and functions) • Current and Controversial Issues need to be discussed on social network sites. The extent to which social network sites are being used successfully can be evaluated by the presence of the following measures: • Range of Content must be available to users. This includes: - Content displayed on profiles - Viewers able to visit profiles • Visitors Behaviour is monitored and no unwanted visitors are present users' profiles • Social Contracts found on sites are followed by users • Critical Thinking Skills and Accurate Information are displayed by users • Work is completed before social activities occur on sites • A Variety of Users is present on sites • Collaboration between people as well as variety of opinions exist on sites • Social Capital (well-being) is present after users have been on sites • Learning and Advising Skills are enhanced on sites. The framework developed provides users with a useful instrument to overcome the negative characteristics associated with social network sites. If used successfully, social network sites can offer lecturers and students a unique method to develop their relationship, creating a positive learning experience.
- Full Text:
- Date Issued: 2009
- Authors: Schlenkrich, Lara
- Date: 2009
- Subjects: Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1149 , http://hdl.handle.net/10962/d1006194 , Online social networks , Online social networks -- Law and legislation , Interpersonal communication , Internet in education , Education -- Communication system , Education -- Data processing
- Description: Social network sites have recently become extremely popular online destinations as they offer users easy ways to build and maintain their relationships with each other. Consequently, students, lecturers, teachers, parents and businesses are using these tools to communicate with each other in a fast and cost-effective manner. However, literature suggests that the full potential of social network sites has not yet been revealed since users are still battling to overcome the various negative characteristics surrounding these sites. A framework for appropriate use of these sites is needed so that users are able to overcome these negative aspects, allowing them to be more effective and use the sites successfully. The goal of this research is to construct a framework for perceived successful use of social computing tools in educational institutions. This framework will include critical success factors that need to be adopted by users in order to develop the positive aspects of social computing, while at the same time overcoming the disadvantages experienced by users. Factors for successful use were derived from the literature and consolidated into a theoretical framework in order to understand the factors that drive successful use of social network sites. Measures used to test successful use of social network sites were also derived from these sources and were included in the same theoretical framework; these measures allow users to evaluate the extent of perceived successful use of social network sites. This framework was tested empirically by means of a pilot study and online survey, and revised according to the results of the survey. The factors were identified using Cronbach alpha coefficients (in the pilot study) and exploratory factor analysis to confirm the reliability of the scales developed. Pearson product-moment correlation coefficient analysis, t-tests and Pearson Chi-Square tests were used to measure the relationships amongst the variables in the framework proposed in this research. The factors influencing perceived successful use of social network sites were identified by the empirical study as: • Privacy and Security Settings need to be enabled. These are split into: - Settings: content that users allow others to see - Viewers: people who are allowed onto a user's profile • It is necessary for users to practise Legal and Acceptable Activities when using social network sites • Suspect Information needs to be checked before sharing it with others • Personal and Professional Time needs to be separated to ensure that work is completed before social activities occur • Users need to practise Professional and Ethical Behaviour • Users need to have a Positive Attitude when using social network sites • Usability of sites affects their success. This includes: - technical capacity (broadband) - ease of use - functionality (range of features and functions) • Current and Controversial Issues need to be discussed on social network sites. The extent to which social network sites are being used successfully can be evaluated by the presence of the following measures: • Range of Content must be available to users. This includes: - Content displayed on profiles - Viewers able to visit profiles • Visitors Behaviour is monitored and no unwanted visitors are present users' profiles • Social Contracts found on sites are followed by users • Critical Thinking Skills and Accurate Information are displayed by users • Work is completed before social activities occur on sites • A Variety of Users is present on sites • Collaboration between people as well as variety of opinions exist on sites • Social Capital (well-being) is present after users have been on sites • Learning and Advising Skills are enhanced on sites. The framework developed provides users with a useful instrument to overcome the negative characteristics associated with social network sites. If used successfully, social network sites can offer lecturers and students a unique method to develop their relationship, creating a positive learning experience.
- Full Text:
- Date Issued: 2009
An investigation of the development and adoption of educational metadata standards for the widespread use of learning objects
- Authors: Krull, Greig Emil
- Date: 2005
- Subjects: Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1142 , http://hdl.handle.net/10962/d1002771 , Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Description: This research investigates the development and adoption of educational metadata standards for the widespread use of learning objects. Learning objects, metadata, the related IEEE standard and the various application profiles derived from the standard are discussed. A number of standards and specifications for educational metadata used to describe learning objects are explored, namely the Dublin Core, IMS, SCORM, ARIADNE, CanCore and the UK LOM Core. Three metadata editors and the experience with using one of them, RELOAD, is described. These educational metadata specifications are used in a practical metadata implementation scenario and the experiences are extrapolated to derive a localised instance of the generic IEEE standard. A new application profile is proposed, “RU LOM Core”, for the South African higher education context. Some existing results are confirmed about the complexity of using the IEEE standard and it is demonstrated that it is possible to instantiate the standard for South African conditions. The results are largely qualitative and based on practical experience. However, the results concur with results from related research. Although the development of an application profile is certainly not new, the development of RU LOM Core illustrates that the IEEE standard, developed largely within the northern hemisphere, can be adapted to work in the South African scenario. RU LOM Core has been developed for the South African higher education environment and takes linguistic and cultural diversity and the low rate of technological literacy into consideration. The lessons learned and the proposed LOM core can be built upon in further research and collaboration to use and support the use of such standards within South Africa.
- Full Text:
- Date Issued: 2005
- Authors: Krull, Greig Emil
- Date: 2005
- Subjects: Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1142 , http://hdl.handle.net/10962/d1002771 , Metadata , Internet in education , Web databases , Education -- Standards , Educational technology , Computer-assisted instruction
- Description: This research investigates the development and adoption of educational metadata standards for the widespread use of learning objects. Learning objects, metadata, the related IEEE standard and the various application profiles derived from the standard are discussed. A number of standards and specifications for educational metadata used to describe learning objects are explored, namely the Dublin Core, IMS, SCORM, ARIADNE, CanCore and the UK LOM Core. Three metadata editors and the experience with using one of them, RELOAD, is described. These educational metadata specifications are used in a practical metadata implementation scenario and the experiences are extrapolated to derive a localised instance of the generic IEEE standard. A new application profile is proposed, “RU LOM Core”, for the South African higher education context. Some existing results are confirmed about the complexity of using the IEEE standard and it is demonstrated that it is possible to instantiate the standard for South African conditions. The results are largely qualitative and based on practical experience. However, the results concur with results from related research. Although the development of an application profile is certainly not new, the development of RU LOM Core illustrates that the IEEE standard, developed largely within the northern hemisphere, can be adapted to work in the South African scenario. RU LOM Core has been developed for the South African higher education environment and takes linguistic and cultural diversity and the low rate of technological literacy into consideration. The lessons learned and the proposed LOM core can be built upon in further research and collaboration to use and support the use of such standards within South Africa.
- Full Text:
- Date Issued: 2005
An online information security Aaareness model: the disclosure of personal data
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
- Date Issued: 2021
Design ethnography: methodological considerations for rebalancing socio-technical phenomena in CMS performativity
- Authors: Jordaan, Leandra
- Date: 2020
- Subjects: Database management -- Social aspects , Information technology -- Social aspects , Management information systems -- Social aspects , Database management -- Philosophy , Information technology -- Philosophy , Management information systems -- Philosophy
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164781 , vital:41164
- Description: As a practitioner, I had been part of two Content Management System (CMS) Projects in a particular setting that did not deliver on the expected outcomes. The expected outcomes of the projects included streamlined processes, better access to information, functionalities to drive engagement, reduced time searching for information, and improved reusability of content. As I began to reflect on the projects, a certain discomfort developed when the social aspect was ignored in favour of the technological. I sought a better understanding, but I was unaware of the fact at first. The techno-centricity as a concept found in literature and my experience as content management (CM) practitioner – together informed my interest in rebalancing the social and the technological. Thus, I focused on conduct in performing of tasks and emphasised attention on the practices of experts who gave insight into context of CM and use. The research participants are communication practitioners who have the responsibility to communicate internally and externally on behalf of a publicly-funded university in South Africa. Guided by the abductive argument and literature, the key themes for the research focused on technology, individuals and the organisation. The focus on technology (CMS as a subfield of Information Systems) began with my involvement in two CMS Projects. What came to the fore was that the practitioner perspective, and thus their experiential knowledge are neglected in research and that it may be an over-emphasis on techno-centrism in CMS research. I sought to better balance the social and technological aspects. The second focus on individuals (communication practitioners) was to value the stakeholder who was considered representative of the worldviews of the community. I sought to support corporate communication practices in the task of relationship building with stakeholders. The findings showed that the culture of informatio sharing was low at the University. The third focus on the organisation (the University) was to prioritise the success of the communication undertaken by the University. I interrogated the role of power. I demonstrated how the role of power could be seen as productive and positive in the context of HE, the social reality of CUT, and this IS research itself. I positioned the research as interpretivistic. I used hermeneutics as a mode of analysis because as researcher-practitioner, I am part of the social reality of the research. A safeguard against my subjectivity was the use of Phronesis as an orientation to knowledge. An organisation with a shared understanding of ethics and values will balance instrumental rationality (scientific and technical reasoning) with value-rationality (moral reasoning about right and wrong actions). Phronesis is the virtue that should ensure ethical behaviour in actions, yet over time, social science research, in a quest to mimic the natural sciences, centred on episteme and techne. I constructed the lens by particularising the four value-rational questions of Flyvbjerg’s contemporary Phronesis to the performative perspective of the research. My interest in social reality, as well as socio-technical aspects, have led to design-ethnography (D-E) to emerge as the most suitable and most appropriate approach to the research. D-E asked the prescriptive ‘How’ and descriptive ‘What’ questions, whilst the Flyvbjergian Phronesis lens brought focus on the ‘Why’ question. D-E emphasised the betterment of the interaction and synergy between research conducted and practice. My status as an immersed researcher needed careful consideration, and D-E accepted that a certain level of immersion is necessary, D-E has short interventional fieldwork, and D-E has future-oriented engagement. The contemporary Phronesis used in the research is to enact D-E and not an all-encompassing guide for doing Phronesis research The key contributions to the research are predominantly methodological. The claims draw on evidence focused on the three themes technology, individuals and organisation, and the phenomena of interest which are to rebalance the social and the technological in CM practices. The first claim is that immersion in the context is possible and supported by the specific particularised approaches to the research. The second claim suggests a way to rebalance the socio-technical nature of Information Systems (IS). The third claim suggests that there is a viewpoint for power that is not focused on power’s oppressive nature which could see a diverging focus on power in IS research in future. In this viewpoint, the status quo of social reality is not questioned, nor are their emancipatory ambitions. The fourth and final claim suggests that Phronesis as a lens could enact D-E, which in turn is a method that assists in valuing the experience of the practitioner and the support of collaborative work. The research is recommended for IT/IS practitioners who prefer to value participants’ views in design. The approaches used could be of value for researchers who consider the context of their research to be of higher importance than the generalisation of outcomes. Researchers who find themselves in the position of being immersed in the context but question the correctness of active engagement in the field may discover some value from the research approaches and my experience. Also, researchers or practitioners who have an interest in the balance between social and the technological aspects of IS projects. Researchers or practitioners interested in Phronesis, and perhaps the viewpoint of a lens may also find value in this research.
- Full Text:
- Date Issued: 2020
- Authors: Jordaan, Leandra
- Date: 2020
- Subjects: Database management -- Social aspects , Information technology -- Social aspects , Management information systems -- Social aspects , Database management -- Philosophy , Information technology -- Philosophy , Management information systems -- Philosophy
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164781 , vital:41164
- Description: As a practitioner, I had been part of two Content Management System (CMS) Projects in a particular setting that did not deliver on the expected outcomes. The expected outcomes of the projects included streamlined processes, better access to information, functionalities to drive engagement, reduced time searching for information, and improved reusability of content. As I began to reflect on the projects, a certain discomfort developed when the social aspect was ignored in favour of the technological. I sought a better understanding, but I was unaware of the fact at first. The techno-centricity as a concept found in literature and my experience as content management (CM) practitioner – together informed my interest in rebalancing the social and the technological. Thus, I focused on conduct in performing of tasks and emphasised attention on the practices of experts who gave insight into context of CM and use. The research participants are communication practitioners who have the responsibility to communicate internally and externally on behalf of a publicly-funded university in South Africa. Guided by the abductive argument and literature, the key themes for the research focused on technology, individuals and the organisation. The focus on technology (CMS as a subfield of Information Systems) began with my involvement in two CMS Projects. What came to the fore was that the practitioner perspective, and thus their experiential knowledge are neglected in research and that it may be an over-emphasis on techno-centrism in CMS research. I sought to better balance the social and technological aspects. The second focus on individuals (communication practitioners) was to value the stakeholder who was considered representative of the worldviews of the community. I sought to support corporate communication practices in the task of relationship building with stakeholders. The findings showed that the culture of informatio sharing was low at the University. The third focus on the organisation (the University) was to prioritise the success of the communication undertaken by the University. I interrogated the role of power. I demonstrated how the role of power could be seen as productive and positive in the context of HE, the social reality of CUT, and this IS research itself. I positioned the research as interpretivistic. I used hermeneutics as a mode of analysis because as researcher-practitioner, I am part of the social reality of the research. A safeguard against my subjectivity was the use of Phronesis as an orientation to knowledge. An organisation with a shared understanding of ethics and values will balance instrumental rationality (scientific and technical reasoning) with value-rationality (moral reasoning about right and wrong actions). Phronesis is the virtue that should ensure ethical behaviour in actions, yet over time, social science research, in a quest to mimic the natural sciences, centred on episteme and techne. I constructed the lens by particularising the four value-rational questions of Flyvbjerg’s contemporary Phronesis to the performative perspective of the research. My interest in social reality, as well as socio-technical aspects, have led to design-ethnography (D-E) to emerge as the most suitable and most appropriate approach to the research. D-E asked the prescriptive ‘How’ and descriptive ‘What’ questions, whilst the Flyvbjergian Phronesis lens brought focus on the ‘Why’ question. D-E emphasised the betterment of the interaction and synergy between research conducted and practice. My status as an immersed researcher needed careful consideration, and D-E accepted that a certain level of immersion is necessary, D-E has short interventional fieldwork, and D-E has future-oriented engagement. The contemporary Phronesis used in the research is to enact D-E and not an all-encompassing guide for doing Phronesis research The key contributions to the research are predominantly methodological. The claims draw on evidence focused on the three themes technology, individuals and organisation, and the phenomena of interest which are to rebalance the social and the technological in CM practices. The first claim is that immersion in the context is possible and supported by the specific particularised approaches to the research. The second claim suggests a way to rebalance the socio-technical nature of Information Systems (IS). The third claim suggests that there is a viewpoint for power that is not focused on power’s oppressive nature which could see a diverging focus on power in IS research in future. In this viewpoint, the status quo of social reality is not questioned, nor are their emancipatory ambitions. The fourth and final claim suggests that Phronesis as a lens could enact D-E, which in turn is a method that assists in valuing the experience of the practitioner and the support of collaborative work. The research is recommended for IT/IS practitioners who prefer to value participants’ views in design. The approaches used could be of value for researchers who consider the context of their research to be of higher importance than the generalisation of outcomes. Researchers who find themselves in the position of being immersed in the context but question the correctness of active engagement in the field may discover some value from the research approaches and my experience. Also, researchers or practitioners who have an interest in the balance between social and the technological aspects of IS projects. Researchers or practitioners interested in Phronesis, and perhaps the viewpoint of a lens may also find value in this research.
- Full Text:
- Date Issued: 2020
Effective management of an information technology professional's career
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
Factors influencing the successful adoption of mobile commerce services
- De Sousa, Sergio Anthony David
- Authors: De Sousa, Sergio Anthony David
- Date: 2013
- Subjects: Mobile commerce Electronic commerce Wireless communication systems Mobile communication systems Computer networks
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1152 , http://hdl.handle.net/10962/d1008184
- Description: Mobile Commerce (MC) can be defined as any transaction carried out over a wireless network, using a wireless device, such as a mobile phone, and that has monetary value (Wang and Liao, 2007). MC is a rapidly developing industry in tenns of its technological capabilities. With these increasing developments, come greater forecasts of potential benefits to societies, economies, industries and individuals. However, the growth and development ofthe underlying MC technology, has not been met by the creation and adoption of the services meant to accompany MC. It is said that the success of MC will ultimately lie in its services. As MC Service Providers (MCSP) are responsible for delivering these MC Services (MCS), the success ofMC can be said to rest on them. In order for MCSs to be successfully adopted, both the initial use and continuous use thereof should be targeted. In other words those that have used MCSs (users) and those that have yet to use MCSs (non-users) should be targeted. It is thus pivotal that an understanding of the factors that generate MCS adoption be sought. This research purposed to uncover the factors that generate MCS adoption within the user and nonuser group. In defining successful adoption ofMCS's, two separate measures were used for each group. User satisfaction is a well accepted construct among researchers for measuring system success among users. User satisfaction is also accepted to be a detenninant of service re-use and loyalty. Intention to use is a measure used for MC success among non-users and is accepted to be a detenninant of actual use. Factors affecting both detenninants, user satisfaction and intention to use, were investigated. After a review ofliterature and current models, ten (10) factors were hypothesised to be significant factors in determining user satisfaction and intention to use namely: ease of use, cost, speed, personalisation, pennission, privacy, security, convenience, relationship (with MCSP) and awareness. A questionnaire was developed to test the hypothesised factors. Not all factors were proven to have a significant impact on both user satisfactions and intention to use. One main recommendation is that both initial and continuous adoption should be the focus ofMC strategy. Services that cater to specific user needs and offer convenience at a low cost should be offered. MCSPs can use the factors proved to be significant to generate and evaluate their service offering, to users and non users, to increase the probability of successful adoption from initial to continuous use. The research concludes that MCSPs need to begin to offer MCSs that meet user needs and add value to their lives in order to realise the professed potential ofMC.
- Full Text:
- Date Issued: 2013
- Authors: De Sousa, Sergio Anthony David
- Date: 2013
- Subjects: Mobile commerce Electronic commerce Wireless communication systems Mobile communication systems Computer networks
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1152 , http://hdl.handle.net/10962/d1008184
- Description: Mobile Commerce (MC) can be defined as any transaction carried out over a wireless network, using a wireless device, such as a mobile phone, and that has monetary value (Wang and Liao, 2007). MC is a rapidly developing industry in tenns of its technological capabilities. With these increasing developments, come greater forecasts of potential benefits to societies, economies, industries and individuals. However, the growth and development ofthe underlying MC technology, has not been met by the creation and adoption of the services meant to accompany MC. It is said that the success of MC will ultimately lie in its services. As MC Service Providers (MCSP) are responsible for delivering these MC Services (MCS), the success ofMC can be said to rest on them. In order for MCSs to be successfully adopted, both the initial use and continuous use thereof should be targeted. In other words those that have used MCSs (users) and those that have yet to use MCSs (non-users) should be targeted. It is thus pivotal that an understanding of the factors that generate MCS adoption be sought. This research purposed to uncover the factors that generate MCS adoption within the user and nonuser group. In defining successful adoption ofMCS's, two separate measures were used for each group. User satisfaction is a well accepted construct among researchers for measuring system success among users. User satisfaction is also accepted to be a detenninant of service re-use and loyalty. Intention to use is a measure used for MC success among non-users and is accepted to be a detenninant of actual use. Factors affecting both detenninants, user satisfaction and intention to use, were investigated. After a review ofliterature and current models, ten (10) factors were hypothesised to be significant factors in determining user satisfaction and intention to use namely: ease of use, cost, speed, personalisation, pennission, privacy, security, convenience, relationship (with MCSP) and awareness. A questionnaire was developed to test the hypothesised factors. Not all factors were proven to have a significant impact on both user satisfactions and intention to use. One main recommendation is that both initial and continuous adoption should be the focus ofMC strategy. Services that cater to specific user needs and offer convenience at a low cost should be offered. MCSPs can use the factors proved to be significant to generate and evaluate their service offering, to users and non users, to increase the probability of successful adoption from initial to continuous use. The research concludes that MCSPs need to begin to offer MCSs that meet user needs and add value to their lives in order to realise the professed potential ofMC.
- Full Text:
- Date Issued: 2013
Formulating an IT governance framework
- Authors: Roos, Pieter
- Date: 2015
- Subjects: Corporate governance -- Information technology -- South Africa , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1156 , http://hdl.handle.net/10962/d1017541
- Description: Modern organisations make substantial investments in Information Technology (IT). Corporate governance practices can no longer ignore the importance of effectively governing IT. Consequently, the third King Report on Corporate Governance (King III) makes specific provision for IT governance, which is implemented through the establishment of an IT governance framework. The purpose of this research is to develop a generic IT governance framework, suitable to any large South African organisation in the public or private sector. The literature considered for this research confirmed the extent of standards and practices available in support of IT governance, together with the roles and structures required to implement them. These included well-known publications such as COBIT, Prince2, ITIL and ISO/IEC27000. Based on the literature review, a theoretical Processes, Enablers and Structures (PES) IT Governance Framework was formulated. The framework was further explored by means of a survey of and structured interview with ten Chief Information Officers (CIOs) of South African organisations with a turnover in excess of R1bn per annum. The final PES IT Governance Framework comprises three dimensions, each of which contains a set of constituent components: • Processes: Strategic Alignment, Value Delivery, Resource Management, Risk Management and Performance Measurement. • Enablers: IT Sub Processes, Supporting Documentation, IT Control Framework, Technology Architecture, Desirable Practice, IT Portfolio Management and Regulation. • Structures: The Board, Office of the CIO, IT Steering Committee, Technology Architecture Forum, IT Programme Management Office and Information Security Organisation. As the number of regulatory requirements and associated compliance pressures grow, the importance of an effective IT governance framework also becomes more prominent. The PES IT Governance Framework offers a uniquely practical approach to addressing IT governance principles that are often regarded as abstract. The final PES IT Governance Framework provides clear guidance on how organisations could implement an IT governance framework, which addresses the strategic alignment of IT to business, value delivery by IT investments, IT risk management, IT resource management and IT performance measurement.
- Full Text:
- Date Issued: 2015
- Authors: Roos, Pieter
- Date: 2015
- Subjects: Corporate governance -- Information technology -- South Africa , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1156 , http://hdl.handle.net/10962/d1017541
- Description: Modern organisations make substantial investments in Information Technology (IT). Corporate governance practices can no longer ignore the importance of effectively governing IT. Consequently, the third King Report on Corporate Governance (King III) makes specific provision for IT governance, which is implemented through the establishment of an IT governance framework. The purpose of this research is to develop a generic IT governance framework, suitable to any large South African organisation in the public or private sector. The literature considered for this research confirmed the extent of standards and practices available in support of IT governance, together with the roles and structures required to implement them. These included well-known publications such as COBIT, Prince2, ITIL and ISO/IEC27000. Based on the literature review, a theoretical Processes, Enablers and Structures (PES) IT Governance Framework was formulated. The framework was further explored by means of a survey of and structured interview with ten Chief Information Officers (CIOs) of South African organisations with a turnover in excess of R1bn per annum. The final PES IT Governance Framework comprises three dimensions, each of which contains a set of constituent components: • Processes: Strategic Alignment, Value Delivery, Resource Management, Risk Management and Performance Measurement. • Enablers: IT Sub Processes, Supporting Documentation, IT Control Framework, Technology Architecture, Desirable Practice, IT Portfolio Management and Regulation. • Structures: The Board, Office of the CIO, IT Steering Committee, Technology Architecture Forum, IT Programme Management Office and Information Security Organisation. As the number of regulatory requirements and associated compliance pressures grow, the importance of an effective IT governance framework also becomes more prominent. The PES IT Governance Framework offers a uniquely practical approach to addressing IT governance principles that are often regarded as abstract. The final PES IT Governance Framework provides clear guidance on how organisations could implement an IT governance framework, which addresses the strategic alignment of IT to business, value delivery by IT investments, IT risk management, IT resource management and IT performance measurement.
- Full Text:
- Date Issued: 2015
Geographically distributed requirements elicitation
- Authors: Vat, Nicholas
- Date: 2000
- Subjects: Management information systems -- Management , Information resources management , System design , System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1136 , http://hdl.handle.net/10962/d1002764 , Management information systems -- Management , Information resources management , System design , System analysis
- Description: The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
- Full Text:
- Date Issued: 2000
- Authors: Vat, Nicholas
- Date: 2000
- Subjects: Management information systems -- Management , Information resources management , System design , System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1136 , http://hdl.handle.net/10962/d1002764 , Management information systems -- Management , Information resources management , System design , System analysis
- Description: The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
- Full Text:
- Date Issued: 2000
Guidelines for designing personal health dashboards
- Authors: Chabana, Chabana Ernst
- Date: 2022-11
- Subjects: Uncatalogued
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/419137 , vital:71619
- Description: The healthcare industry is realising the value of providing ordinary individuals with their personal health data for self-care and self-management purposes, however, these individuals are faced with the challenge of going through, understanding and extracting insights from large volumes of complex personal health data. A dashboard (coupled with data visualization) is regarded as a suitable way to present personal health data effectively, to inform self-care and self- management-based decisions. However, there is no homogeneous (i.e. “one-size-fits-all”) approach to designing dashboards; therefore, this research aimed at creating a set of design guidelines that can be used as a foundation for tailoring dashboards that support the presentation of personal health data. The Design Science Research methodology was used to systematically develop and evaluate the set of dashboard design guidelines. Within this methodology, literature was reviewed and focus groups with participants were conducted to extract insights and inform the development of the initial set (proposed) design guidelines. The proposed design guidelines were then used to develop a medium-fidelity personal health dashboard prototype. Usability testing with the dashboard prototype was conducted to evaluate the efficacy and utility of these design guidelines. The evaluation provided insights that strengthened the quality of the design guidelines. The evaluation indicated that the proposed set of guidelines are suitable for designing a dashboard that presents personal health data effectively. These design guidelines can be adapted in order to inform the process of tailoring dashboards for accommodating different personal health data presentation needs. , Thesis (MCOM) -- Faculty of Commerce, Information Systems, 2023
- Full Text:
- Date Issued: 2022-11
- Authors: Chabana, Chabana Ernst
- Date: 2022-11
- Subjects: Uncatalogued
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/419137 , vital:71619
- Description: The healthcare industry is realising the value of providing ordinary individuals with their personal health data for self-care and self-management purposes, however, these individuals are faced with the challenge of going through, understanding and extracting insights from large volumes of complex personal health data. A dashboard (coupled with data visualization) is regarded as a suitable way to present personal health data effectively, to inform self-care and self- management-based decisions. However, there is no homogeneous (i.e. “one-size-fits-all”) approach to designing dashboards; therefore, this research aimed at creating a set of design guidelines that can be used as a foundation for tailoring dashboards that support the presentation of personal health data. The Design Science Research methodology was used to systematically develop and evaluate the set of dashboard design guidelines. Within this methodology, literature was reviewed and focus groups with participants were conducted to extract insights and inform the development of the initial set (proposed) design guidelines. The proposed design guidelines were then used to develop a medium-fidelity personal health dashboard prototype. Usability testing with the dashboard prototype was conducted to evaluate the efficacy and utility of these design guidelines. The evaluation provided insights that strengthened the quality of the design guidelines. The evaluation indicated that the proposed set of guidelines are suitable for designing a dashboard that presents personal health data effectively. These design guidelines can be adapted in order to inform the process of tailoring dashboards for accommodating different personal health data presentation needs. , Thesis (MCOM) -- Faculty of Commerce, Information Systems, 2023
- Full Text:
- Date Issued: 2022-11
Guidelines for the user interface design of electronic medical records in optometry
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
- Date Issued: 2020
Information technology support for transformation in higher educational institutions in South Africa
- Authors: Roets, Rina Annette
- Date: 2008
- Subjects: Education, Higher -- South Africa Educational change -- South Africa Universities and colleges -- South Africa Universities and colleges -- South Africa -- Administration Information technology -- South Africa Educational technology -- South Africa Education, Higher -- Technological innovations -- South Africa Knowledge management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1145 , http://hdl.handle.net/10962/d1002775
- Description: Higher Education Institutions (HEIs) have been in a state of change, and in South Africa, the term “transformation” is used to describe the changes occurring. These changes have implications for the structure, processes and focus of HEIs, and as such have implications for Information Technology (IS/ICT) support for HEIs. IS/ICT support for organisations is predicated on several factors, such as effective informational and technical support at all levels of the organisation, but especially support for the strategic goals of the organisation (alignment). For organisations in a state of rapid change other issues need to be considered, such as flexibility, and new and diverse information and communication needs. This paper investigates the use of Information Technology to support HEIs in transformation. The research examines factors that make HEIs less amenable to rationalist techniques such as mixed management styles and a “different” value chain. The difficulties for IS/ICT support of HEIs at all managerial levels is discussed, especially the issue of alignment with institutional goals. Thereafter, transformation of HEIs and the possibility of IS/ICT support in achieving the ill-defined goal of transformation is examined. The research uses management and IS/ICT theories such as the widely used and reported Porter’s value chain, Anthony’s information model, and Minzberg’s organisational model to suggest an analysis model for HEIs (Applegate, McFarlan and McKenney, 1996; Minzberg, 1979; Ward and Peppard, 2002). Furthermore, from the analysis of the literature, a model of antecedent factors for successful HEI transformation supported by IS/ICT is proposed. The research makes use of a comparative case study approach in which 3 (three) South African HEIs are investigated through the “lens” of the developed model. The major finding of the research is that the potential use of IS/ICT support for HEIs is not optimal in the three cases examined. Results of the analysis suggest that: • IS/ICT alignment with organisational goals at HEIs is low and holistic IS/ICT strategic management is lacking. The areas of Knowledge Management and Communication Management are conducted informally and Knowledge Management, especially, is not fully exploited. • The greatest area of concern is the lack of IS/ICT support for academic management, where academics are increasingly required to perform administrative and managerial tasks. • The merger/incorporation information needs have not caused major system problems, but other intangible aspects of the mergers/incorporations could be better supported by IS/ICT. The research concludes with a set of actions that should ensure a higher level of support, amongst which are the more holistic management of IS/ICT especially for Academic management needs, and particularly the use of IS/ICT in innovative ways to overcome the challenges of the “transformed” Universities: There are areas of excellence but the full possibilities afforded by technology are not exploited maximally in support of transformation. Research suggests that the reasons for this are mainly the lack of holistic strategic management of IS/ICT.
- Full Text:
- Date Issued: 2008
Information technology support for transformation in higher educational institutions in South Africa
- Authors: Roets, Rina Annette
- Date: 2008
- Subjects: Education, Higher -- South Africa Educational change -- South Africa Universities and colleges -- South Africa Universities and colleges -- South Africa -- Administration Information technology -- South Africa Educational technology -- South Africa Education, Higher -- Technological innovations -- South Africa Knowledge management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1145 , http://hdl.handle.net/10962/d1002775
- Description: Higher Education Institutions (HEIs) have been in a state of change, and in South Africa, the term “transformation” is used to describe the changes occurring. These changes have implications for the structure, processes and focus of HEIs, and as such have implications for Information Technology (IS/ICT) support for HEIs. IS/ICT support for organisations is predicated on several factors, such as effective informational and technical support at all levels of the organisation, but especially support for the strategic goals of the organisation (alignment). For organisations in a state of rapid change other issues need to be considered, such as flexibility, and new and diverse information and communication needs. This paper investigates the use of Information Technology to support HEIs in transformation. The research examines factors that make HEIs less amenable to rationalist techniques such as mixed management styles and a “different” value chain. The difficulties for IS/ICT support of HEIs at all managerial levels is discussed, especially the issue of alignment with institutional goals. Thereafter, transformation of HEIs and the possibility of IS/ICT support in achieving the ill-defined goal of transformation is examined. The research uses management and IS/ICT theories such as the widely used and reported Porter’s value chain, Anthony’s information model, and Minzberg’s organisational model to suggest an analysis model for HEIs (Applegate, McFarlan and McKenney, 1996; Minzberg, 1979; Ward and Peppard, 2002). Furthermore, from the analysis of the literature, a model of antecedent factors for successful HEI transformation supported by IS/ICT is proposed. The research makes use of a comparative case study approach in which 3 (three) South African HEIs are investigated through the “lens” of the developed model. The major finding of the research is that the potential use of IS/ICT support for HEIs is not optimal in the three cases examined. Results of the analysis suggest that: • IS/ICT alignment with organisational goals at HEIs is low and holistic IS/ICT strategic management is lacking. The areas of Knowledge Management and Communication Management are conducted informally and Knowledge Management, especially, is not fully exploited. • The greatest area of concern is the lack of IS/ICT support for academic management, where academics are increasingly required to perform administrative and managerial tasks. • The merger/incorporation information needs have not caused major system problems, but other intangible aspects of the mergers/incorporations could be better supported by IS/ICT. The research concludes with a set of actions that should ensure a higher level of support, amongst which are the more holistic management of IS/ICT especially for Academic management needs, and particularly the use of IS/ICT in innovative ways to overcome the challenges of the “transformed” Universities: There are areas of excellence but the full possibilities afforded by technology are not exploited maximally in support of transformation. Research suggests that the reasons for this are mainly the lack of holistic strategic management of IS/ICT.
- Full Text:
- Date Issued: 2008
Investigating the problems experienced by virtual team members engaged in requirements elicitation
- Authors: De Abrew, Upuli Kanchana
- Date: 2013
- Subjects: Virtual work teams Virtual work teams -- South Africa System design System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1151 , http://hdl.handle.net/10962/d1007845
- Description: The constant acceleration in the rate of technological innovation, and the ever growing emphasis on the importance of information for competition has seen organisations around the world strive for the technologies that give them global customer reach. One of the most pervasive technological innovations developed is the internet, and its unique quality of being able to draw people from across the world together in one virtual space has given birth to the concept of virtual teams. Organisations have seized the advantages of such virtual teams to give them the cost and time reductions they need to stay competitive in the global marketplace. In the software industry, where product and service development is always a race against time, forward thinking software companies in the developed world have taken full advantage of the cost and time saving benefits that virtual teams have to offer. In addition, the rate of expansion of technology and software to support such teams is also growing exponentially, offering increasingly faster ways of virtual working. Despite the immense advantages offered by such teams, South African software development companies do not seem to engage in distributed work to any great degree. The importance of this research rests on the belief that South African software development companies will be unable to avoid engaging in distributed software development if they are to achieve and maintain competitiveness in the global marketplace. This research focuses on a sub-section of the software development process with a specific reference to South African software development. The requirements elicitation phase of software development is one of the initial stages of any software project. It is here that developers work with the users in order to identify requirements for the system to be built. It is acknowledged that other phases of distributed development also bring to bear their own problems, however, in the interests of scoping this research, only the requirements elicitation process is focused on. The research shows that most techniques of requirements elicitation can be adapted for use within the virtual environment, although each technique has its share of advantages and disadvantages. In addition, virtual team members experience problems during their general, day-to-day interactions, many of these arising from the dependence on technology for communication and task performance. The research identifies the problems in both categories, and develops a holistic model of virtual requirements elicitation to prevent or solve the problems experienced by virtual teams engaged in distributed requirements elicitation. The model is made up of three key frameworks, each of which prescribes actions to be taken to ensure the success of the virtual team within the requirements elicitation process. The model is verified through the testing of its critical success factors. Certain aspects of the model were adapted based on the findings of the study, but it was confirmed that the rationale behind the model is sound, indicating that it has the potential to solve the problems of virtual RE when implemented.
- Full Text:
- Date Issued: 2013
- Authors: De Abrew, Upuli Kanchana
- Date: 2013
- Subjects: Virtual work teams Virtual work teams -- South Africa System design System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1151 , http://hdl.handle.net/10962/d1007845
- Description: The constant acceleration in the rate of technological innovation, and the ever growing emphasis on the importance of information for competition has seen organisations around the world strive for the technologies that give them global customer reach. One of the most pervasive technological innovations developed is the internet, and its unique quality of being able to draw people from across the world together in one virtual space has given birth to the concept of virtual teams. Organisations have seized the advantages of such virtual teams to give them the cost and time reductions they need to stay competitive in the global marketplace. In the software industry, where product and service development is always a race against time, forward thinking software companies in the developed world have taken full advantage of the cost and time saving benefits that virtual teams have to offer. In addition, the rate of expansion of technology and software to support such teams is also growing exponentially, offering increasingly faster ways of virtual working. Despite the immense advantages offered by such teams, South African software development companies do not seem to engage in distributed work to any great degree. The importance of this research rests on the belief that South African software development companies will be unable to avoid engaging in distributed software development if they are to achieve and maintain competitiveness in the global marketplace. This research focuses on a sub-section of the software development process with a specific reference to South African software development. The requirements elicitation phase of software development is one of the initial stages of any software project. It is here that developers work with the users in order to identify requirements for the system to be built. It is acknowledged that other phases of distributed development also bring to bear their own problems, however, in the interests of scoping this research, only the requirements elicitation process is focused on. The research shows that most techniques of requirements elicitation can be adapted for use within the virtual environment, although each technique has its share of advantages and disadvantages. In addition, virtual team members experience problems during their general, day-to-day interactions, many of these arising from the dependence on technology for communication and task performance. The research identifies the problems in both categories, and develops a holistic model of virtual requirements elicitation to prevent or solve the problems experienced by virtual teams engaged in distributed requirements elicitation. The model is made up of three key frameworks, each of which prescribes actions to be taken to ensure the success of the virtual team within the requirements elicitation process. The model is verified through the testing of its critical success factors. Certain aspects of the model were adapted based on the findings of the study, but it was confirmed that the rationale behind the model is sound, indicating that it has the potential to solve the problems of virtual RE when implemented.
- Full Text:
- Date Issued: 2013
Investigating the use of nudging to dissuade online banking fraud
- Mutyavariri, Takudzwa Stanley
- Authors: Mutyavariri, Takudzwa Stanley
- Date: 2023-03-31
- Subjects: Uncatalogued
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/419462 , vital:71646
- Description: Online banking is a service offered by most modern banks to provide their clients with a convenient means to access their bank accounts remotely. However, such convenience comes at a cost and has the potential to expose clients to online banking fraud. To mitigate such forms of fraud, banks make extensive use of traditional cybersecurity measures such as firewalls, intrusion detection systems, as well as personal identification numbers (PINs) and passwords. However, despite the use of such traditional cybersecurity measures, online banking fraud still occurs. In particular, traditional cybersecurity measures have difficulties detecting the unauthorised use of a customer’s online banking credentials. For this reason, this study’s main objective was to investigate the effectiveness of nudges when used to dissuade the unauthorised use of clients’ online banking credentials. The study also had two secondary objectives: firstly, to identify where the deployment of nudges would be most effective; and secondly, to identify the rationalisations an individual may use to justify committing online banking fraud. Although previous research has sought to understand the use of nudges in various online contexts, none have done so within the context of online banking. Using a recontextualised version of the COM-B (capability, opportunity, motivation – behaviour) model of behaviour change, nudges were deployed in three versions of a fictitious online banking website. Following this, 15 semi-structured interviews were conducted with online banking users from the United States of America to understand how a third party may behave and rationalise their choices when they have unauthorised access to a customer’s online banking credentials. The transcripts of these interviews were analysed using thematic analysis. The findings revealed that the most dissuasive nudges focused on encouraging individuals to empathise with the account holder. Nudges that increased the perception of an online banking website’s security were also particularly dissuasive. The findings also indicated that the most effective place to deploy these nudges was after a user had logged in. Several rationalisations that enabled individuals to commit online baking fraud were found. The three most common were crime of opportunity, down on their luck, and sunk cost fallacy and curiosity. Together, the findings provide evidence to suggest that, if used effectively, nudges could prove useful as a means of dissuading online banking fraud, and even more so when combined with traditional cybersecurity measures. , Thesis (MCom) -- Faculty of Commerce, Information Systems, 2023
- Full Text:
- Date Issued: 2023-03-31
- Authors: Mutyavariri, Takudzwa Stanley
- Date: 2023-03-31
- Subjects: Uncatalogued
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/419462 , vital:71646
- Description: Online banking is a service offered by most modern banks to provide their clients with a convenient means to access their bank accounts remotely. However, such convenience comes at a cost and has the potential to expose clients to online banking fraud. To mitigate such forms of fraud, banks make extensive use of traditional cybersecurity measures such as firewalls, intrusion detection systems, as well as personal identification numbers (PINs) and passwords. However, despite the use of such traditional cybersecurity measures, online banking fraud still occurs. In particular, traditional cybersecurity measures have difficulties detecting the unauthorised use of a customer’s online banking credentials. For this reason, this study’s main objective was to investigate the effectiveness of nudges when used to dissuade the unauthorised use of clients’ online banking credentials. The study also had two secondary objectives: firstly, to identify where the deployment of nudges would be most effective; and secondly, to identify the rationalisations an individual may use to justify committing online banking fraud. Although previous research has sought to understand the use of nudges in various online contexts, none have done so within the context of online banking. Using a recontextualised version of the COM-B (capability, opportunity, motivation – behaviour) model of behaviour change, nudges were deployed in three versions of a fictitious online banking website. Following this, 15 semi-structured interviews were conducted with online banking users from the United States of America to understand how a third party may behave and rationalise their choices when they have unauthorised access to a customer’s online banking credentials. The transcripts of these interviews were analysed using thematic analysis. The findings revealed that the most dissuasive nudges focused on encouraging individuals to empathise with the account holder. Nudges that increased the perception of an online banking website’s security were also particularly dissuasive. The findings also indicated that the most effective place to deploy these nudges was after a user had logged in. Several rationalisations that enabled individuals to commit online baking fraud were found. The three most common were crime of opportunity, down on their luck, and sunk cost fallacy and curiosity. Together, the findings provide evidence to suggest that, if used effectively, nudges could prove useful as a means of dissuading online banking fraud, and even more so when combined with traditional cybersecurity measures. , Thesis (MCom) -- Faculty of Commerce, Information Systems, 2023
- Full Text:
- Date Issued: 2023-03-31