IT business consulting competencies to address business intelligence and analytics challenges in South African organisations
- Authors: Chatapura, Ruvimbo Faith
- Date: 2024-10-11
- Subjects: Business enterprises Information technology South Africa , Business intelligence , Business analytics , Business consultants , Dynamic capabilities , Knowledge management
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/462680 , vital:76325
- Description: Background: In today's dynamic environment, the importance and popularity of business intelligence and analytics (BI&A) has increased due to the rise in big data being generated across the globe. BI&A is an essential emerging business competency area and dynamic capability that serves as an enabler for organisations to harvest value from their big data. When implemented correctly, BI&A is a powerful tool that leads to increased competitive advantage. However, organisations in South Africa are facing major challenges when it comes to adopting and harnessing it. As such, it is IT business consultants that South African organisations turn to for acquiring BI&A expertise. Objective: Using the Theory of Dynamic Capabilities as an underpinning lens, the purpose of this study is to investigate the relevant competencies IT business consultants need to address BI&A challenges in South African organisations. This study focuses on developing a BI&A competency framework based on these competencies that IT business consultants can consider when addressing the BI&A challenges in South African organisations. Methods: A qualitative research approach was utilised in this study by making use of an interpretive paradigm, abductive reasoning, qualitative description research strategy, as well as semi-structured interviews and questionnaires as data collection methods to elicit feedback on this study’s BI&A competency framework. Content analysis was conducted to categorise and code the interview data, and descriptive analysis was conducted to rank the competencies in order of relevance. Findings: It was found that the relevant business competencies to consider are business acumen, industry knowledge and strategic conceptual abilities. The relevant technical competencies are categorised into three categories: analytical skills (logical thinking, problem-solving, statistical analysis and what-if analysis), data engineering (data modelling skills, data warehousing, database management, data governance, data interpretation, data stewardship, data visualisation tools and data processing languages) and supplementary skills (project management, consulting skills and artificial intelligence). The relevant values and behavioural competencies to consider are integrity, communication, teamwork, resilience, commitment, creativity, emotional intelligence, humility, behavioural analysis, curiosity, leadership and social intelligence. , Thesis (MCom) -- Faculty of Commerce, Information Systems, 2024
- Full Text:
A compliance framework for IT governance adoption and use by state-owned entities in South Africa
- Authors: Nxozi, Monelo
- Date: 2023-03-31
- Subjects: Uncatalogued
- Language: English
- Type: Academic theses , Doctoral theses , text
- Identifier: http://hdl.handle.net/10962/419244 , vital:71628
- Description: Embargoed. Possible release date in early 2025. , Thesis (PhD) -- Faculty of Commerce, Information Systems, 2023
- Full Text:
Investigating the use of nudging to dissuade online banking fraud
- Authors: Mutyavariri, Takudzwa Stanley
- Date: 2023-03-31
- Subjects: Electronic commerce Security measures , Bank fraud , Computer security , Behavioral cybersecurity , Decision making Data processing
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/419462 , vital:71646
- Description: Online banking is a service offered by most modern banks to provide their clients with a convenient means to access their bank accounts remotely. However, such convenience comes at a cost and has the potential to expose clients to online banking fraud. To mitigate such forms of fraud, banks make extensive use of traditional cybersecurity measures such as firewalls, intrusion detection systems, as well as personal identification numbers (PINs) and passwords. However, despite the use of such traditional cybersecurity measures, online banking fraud still occurs. In particular, traditional cybersecurity measures have difficulties detecting the unauthorised use of a customer’s online banking credentials. For this reason, this study’s main objective was to investigate the effectiveness of nudges when used to dissuade the unauthorised use of clients’ online banking credentials. The study also had two secondary objectives: firstly, to identify where the deployment of nudges would be most effective; and secondly, to identify the rationalisations an individual may use to justify committing online banking fraud. Although previous research has sought to understand the use of nudges in various online contexts, none have done so within the context of online banking. Using a recontextualised version of the COM-B (capability, opportunity, motivation – behaviour) model of behaviour change, nudges were deployed in three versions of a fictitious online banking website. Following this, 15 semi-structured interviews were conducted with online banking users from the United States of America to understand how a third party may behave and rationalise their choices when they have unauthorised access to a customer’s online banking credentials. The transcripts of these interviews were analysed using thematic analysis. The findings revealed that the most dissuasive nudges focused on encouraging individuals to empathise with the account holder. Nudges that increased the perception of an online banking website’s security were also particularly dissuasive. The findings also indicated that the most effective place to deploy these nudges was after a user had logged in. Several rationalisations that enabled individuals to commit online baking fraud were found. The three most common were crime of opportunity, down on their luck, and sunk cost fallacy and curiosity. Together, the findings provide evidence to suggest that, if used effectively, nudges could prove useful as a means of dissuading online banking fraud, and even more so when combined with traditional cybersecurity measures. , Thesis (MCom) -- Faculty of Commerce, Information Systems, 2023
- Full Text:
The role of optimism bias in susceptibility to phishing attacks in a financial services organisation
- Authors: Owen, Morné
- Date: 2023-03-31
- Subjects: Mixed methods research , Phishing , Optimism bias , Information security , Information storage and retrieval systems Financial services industry , Risk perception
- Language: English
- Type: Academic theses , Doctoral theses , text
- Identifier: http://hdl.handle.net/10962/419257 , vital:71629 , DOI 10.21504/10962/419257
- Description: Researchers looking for ways to change the insecure behaviour that results in successful phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this study is to understand the role of optimism bias (OB – defined as a cognitive bias), which characterises overly optimistic or unrealistic individuals, in order to ensure secure behaviour. Research is considered that has focused on issues such as personality traits, trust, attitude and information security awareness training (ISAT). We used a mixed methods design to investigate OB behaviour, building on a recontextualised version of the theory of planned behaviour to evaluate the influence that OB has on phishing susceptibility. To model the data, an analysis was performed on 226 survey responses (systematic random sampling method) from the employees of a financial services organisation using partial least squares (PLS) path modelling. To evaluate OB behaviour, we conducted an experiment consisting of three ISAT sessions and three simulated phishing attacks. After each phishing experiment, we conducted interviews to gain a better understanding of why people succumbed to the attacks. It was subsequently found that overly optimistic individuals are inclined to behave insecurely, while factors such as attitude and trust significantly influence the intention to behave securely. Our contribution to practice is to enhance the effectiveness of ISAT by identifying and addressing the OB weakness to deliver a more successful training outcome. Our contribution to theory enriches the Information Systems literature by evaluating the effect of a cognitive bias on phishing susceptibility and, through research, offering a contextual explanation of the resultant behaviour. , Thesis (PhD) -- Faculty of Commerce, Information Systems, 2023 , Navorsers op soek na ‘n antwoord om onveilige gedrag te verander wat lei na uitvissing het verskeie moontlike redes oorweeg vir sulke gedrag. Daarom is die doel van hierdie verhandeling om die rol van optimistiese vooroordeel (OB - gedefinieer as 'n kognitiewe vooroordeel) te verstaan, wat te optimistiese of onrealistiese individue kenmerk om veilige gedrag te verseker. Navorsing was oorweeg wat gefokus het op kwessies soos persoonlikheidseienskappe, vertroue, gesindheid en inligtingsekuriteitsbewustheidsopleiding (ISAT). Die navorser het gemengde metodes gebruik om OB-gedrag te ondersoek. Daar was voortgebou op 'n gerekontekstualiseerde weergawe van die theory of planned behaviour om die invloed wat OB op uitvissing-vatbaarheid het, te evalueer. Om die data te modelleer, is 'n analise gedoen waar 226 opname antwoorde verkry is van 'n finansiële dienste organisasie en is partial least squares (PLS) path modelling gebruik. Om OB-gedrag te evalueer, het ons 'n eksperiment uitgevoer wat bestaan uit drie ISAT-sessies en drie gesimuleerde uitvissing-aanvalle. Na elke uitvissing-eksperiment het ons onderhoude gevoer om 'n beter begrip te kry waarom mense aan die aanvalle geswig het. Te optimistiese individue is geneig om onveilig op te tree, terwyl faktore soos gesindheid en vertroue die voorneme om veilig op te tree, aansienlik beïnvloed het. Die studie se bydrae tot die praktyk is om die doeltreffendheid van ISAT te verbeter deur die OBswakheid te identifiseer en aan te spreek om 'n meer suksesvolle opleidingsuitkoms te lewer. Verder verryk die studie die Inligtingstelsels-literatuur deur die effek van 'n kognitiewe vooroordeel op uitvissing-vatbaarheid te evalueer en deur navorsing bied dit 'n kontekstuele verduideliking van die gevolglike gedrag.
- Full Text:
Guidelines for designing personal health dashboards
- Authors: Chabana, Chabana Ernst
- Date: 2022-11
- Subjects: Dashboards (Management information systems) , Information visualization , Medical informatics , Digital health , Design manual
- Language: English
- Type: Academic theses , Master's theses , text
- Identifier: http://hdl.handle.net/10962/419137 , vital:71619
- Description: The healthcare industry is realising the value of providing ordinary individuals with their personal health data for self-care and self-management purposes, however, these individuals are faced with the challenge of going through, understanding and extracting insights from large volumes of complex personal health data. A dashboard (coupled with data visualization) is regarded as a suitable way to present personal health data effectively, to inform self-care and self- management-based decisions. However, there is no homogeneous (i.e. “one-size-fits-all”) approach to designing dashboards; therefore, this research aimed at creating a set of design guidelines that can be used as a foundation for tailoring dashboards that support the presentation of personal health data. The Design Science Research methodology was used to systematically develop and evaluate the set of dashboard design guidelines. Within this methodology, literature was reviewed and focus groups with participants were conducted to extract insights and inform the development of the initial set (proposed) design guidelines. The proposed design guidelines were then used to develop a medium-fidelity personal health dashboard prototype. Usability testing with the dashboard prototype was conducted to evaluate the efficacy and utility of these design guidelines. The evaluation provided insights that strengthened the quality of the design guidelines. The evaluation indicated that the proposed set of guidelines are suitable for designing a dashboard that presents personal health data effectively. These design guidelines can be adapted in order to inform the process of tailoring dashboards for accommodating different personal health data presentation needs. , Thesis (MCOM) -- Faculty of Commerce, Information Systems, 2023
- Full Text:
A framework for guiding the interdisciplinary design of mHealth intervention apps for physical activity behaviour change
- Authors: Thomson, Callie Deborah
- Date: 2022-04-06
- Subjects: Wireless communication systems in medical care , Exercise Health aspects , Behavior modification , Mobile apps , Medical care Technological innovations , Medical informatics , Health promotion Technological innovations , Application software Development , Design Science Research (DSR)
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10962/232193 , vital:49970 , DOI http://doi.org/10.21504/10962/232193
- Description: The global pandemic of noncommunicable diseases and its associated premature mortality rates and socioeconomic burden have led to increasingly intensified efforts towards designing and delivering health promotion interventions aimed at addressing the leading modifiable health risk behaviours, such as physical inactivity. Developing physical activity behaviour change interventions that target individuals at the dual intra-interpersonal socioecological levels of health promotion has become a key objective worldwide. Digital and mobile technology is revolutionising the ways in which health behaviour change interventions are delivered to individuals across the world, with mobile health applications (mHealth apps) increasingly recognised as a powerful means of promoting physical activity behaviour change. However, with the growth and opportunities of mHealth apps, come several design challenges. Key design challenges concern the integration of theory, the incorporation of evidence-based behaviour change techniques, the application of persuasive systems design principles, and the importance of multi- and interdisciplinary collaborative design, development and evaluation approaches. These key challenges influence the output product design and effectiveness of mHealth physical activity behaviour change intervention apps. There exists a paucity of approaches for guiding and supporting the multi- and interdisciplinary collaborative design, development and evaluation of mHealth physical activity behaviour change intervention apps. To address this gap, this research study proposes an Interdisciplinary mHealth App Design Framework, framed by a novel boundary object view. This view considers the diverse communities of practice, boundary objects and supporting artefacts, process activities, and knowledge sharing practices necessary and relevant to the design of effective mHealth physical activity behaviour change intervention apps. The framework’s development is guided by a Design Science Research (DSR) approach. Its core components are based on the findings of a critical theoretical analysis of twenty existing multi- and interdisciplinary digital health development approaches. Once developed, the framework is evaluated using a qualitative DSR linguistic interpretivist approach, with semi-structured interviews as the research instrument. The thematic analysis findings from interviews with thirty-one international academic researchers and industry practitioners informs the iterative modification and revision of an enhanced Interdisciplinary mHealth App Design Framework, constituting the main DSR artefact contribution of the research study. In addition, four theoretical contributions are made to the mHealth intervention app design body of knowledge, and a practical contribution is made through the provision of guideline recommendations for academics and industry practitioners. Methodological contributions are also made in terms of applying DSR, adopting a hybrid cognitive reasoning strategy, and employing a qualitative linguistic interpretivist approach to evaluation within a DSR project. , Thesis (PhD) -- Faculty of Commerce, Information Systems, 2022
- Full Text:
A guide for the use of tablet PCs for teaching and learning activities for in classroom and distance learning in South African schools
- Authors: Theunissen, Kristen Emma
- Date: 2021-10-29
- Subjects: Tablet computers South Africa Makhanda , Blended learning South Africa Makhanda , Computer-assisted instruction South Africa Makhanda , Educational technology Study and teaching South Africa Makhanda , Teachers In-service training South Africa Makhanda , Pedagogical content knowledge South Africa Makhanda , Education Effect of technological innovations on South Africa Makhanda , South Africa. Department of Basic Education , TPACK (Technological Pedagogical Content Knowledge)
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10962/191920 , vital:45179
- Description: Education in South Africa is said to be in crisis in recent years as many learners cannot pass standardised tests at the correct grade level. This has encouraged the South African Government and the Department of Basic Education (DBE) to introduce technology, specifically Tablet PCs, into education to improve learning outcomes in South African government schools. Furthermore, because of the coronavirus pandemic that started in 2020, educators were increasingly expected to find alternative, digital, online methods to continue teaching learners. Thus, the need for remote or distance education suddenly became an important factor in creating a need for online, remote learning. Against this backdrop this study aimed to determine how and in what ways educators could be supported to promote effective use of Tablet PCs both in the classroom and for distance learning. This study used Action Design Research to develop a guide based on both theory and the results gathered from the educator participants at a local secondary government school in Makhanda, South Africa. The finalised guide presents recommendations to educators, principals, and the DBE to promote acceptance and adoption of technology in the classroom and for distance learning. These recommendations include the provision of data, technological training and pedagogical support, a functioning community of practice, an online learning community of practice, and support from the DBE. Other enrichment factors were also recommended. , Thesis (MCom) -- Faculty of Commerce, Information Systems, 2021
- Full Text:
A personality-based behavioural model: Susceptibility to phishing on social networking sites
- Authors: Frauenstein, Edwin Donald
- Date: 2021-10-29
- Subjects: Phishing , Social networks , Personality , Self-presentation in mass media , Internet fraud , Internet users Habits and behavior , Big Five model , Human information processing , Heuristic-Systematic Model (HSM)
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10962/190306 , vital:44982 , 10.21504/10962/190306
- Description: The worldwide popularity of social networking sites (SNSs) and the technical features they offer users have created many opportunities for malicious individuals to exploit the behavioral tendencies of their users via social engineering tactics. The self-representation and social interactions on SNSs encourage users to reveal their personalities in a way which characterises their behaviour. Frequent engagement on SNSs may also reinforce the performance of certain activities, such as sharing and clicking on links, at a “habitual” level on these sites. Subsequently, this may also influence users to overlook phishing posts and messages on SNSs and thus not apply sufficient cognitive effort in their decision-making. As users do not expect phishing threats on these sites, they may become accustomed to behaving in this manner which may consequently put them at risk of such attacks. Using an online survey, primary data was collected from 215 final-year undergraduate students. Employing structural equation modelling techniques, the associations between the Big Five personality traits, habits and information processing were examined with the aim to identify users susceptible to phishing on SNSs. Moreover, other behavioural factors such as social norms, computer self-efficacy and perceived risk were examined in terms of their influence on phishing susceptibility. The results of the analysis revealed the following key findings: 1) users with the personality traits of extraversion, agreeableness and neuroticism are more likely to perform habitual behaviour, while conscientious users are least likely; 2) users who perform certain behaviours out of habit are directly susceptible to phishing attacks; 3) users who behave out of habit are likely to apply a heuristic mode of processing and are therefore more susceptible to phishing attacks on SNSs than those who apply systematic processing; 4) users with higher computer self-efficacy are less susceptible to phishing; and 5) users who are influenced by social norms are at greater risk of phishing. This study makes a contribution to scholarship and to practice, as it is the first empirical study to investigate, in one comprehensive model, the relationship between personality traits, habit and their effect on information processing which may influence susceptibility to phishing on SNSs. The findings of this study may assist organisations in the customisation of an individual anti-phishing training programme to target specific dispositional factors in vulnerable users. By using a similar instrument to the one used in this study, pre-assessments could determine and classify certain risk profiles that make users vulnerable to phishing attacks. , Thesis (PhD) -- Faculty of Commerce, Information Systems, 2021
- Full Text:
A comprehensive approach to scalability assessment of ICTD projects : a case study of ICT4RED
- Authors: Baduza, Gugulethu Qhawekazi
- Date: 2021-04
- Subjects: To be added
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/178435 , vital:42939
- Description: Access restricted until April 2023. , Thesis (PhD) -- Faculty of Commerce, Information Systems, 2021
- Full Text:
An online information security Aaareness model: the disclosure of personal data
- Authors: Parker, Heather Joubert
- Date: 2021
- Subjects: Social media -- Psychological aspects , Social media -- Psychological aspects -- South Africa , Human behavior , Disclosure of information -- Psychological aspects -- Case studies , Personal information management -- Psychological aspects -- Case studies , Data protection -- Psychologial aspects -- Case studies
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/172329 , vital:42189
- Description: Social media has revolutionized the way people send and receive information by creating a new level of interconnected communication. However, the use of the Internet and social media brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Fourteen university students participated in a mixed-methods experiment, where they completed a questionnaire before and after being shown the data stored about them by online platforms to determine if changes occur in their intention to disclose. Following completing the initial questionnaire, the participant viewed the personal data stored about them by Facebook, Google, and Instagram. Other online tools such as Social Profile Checker, Facebook View As, and HaveIBeenPawned were used to see the information publicly available about each participant. Together these findings were discussed in a semi-structured interview to determine the influence of attitudes, subjective norms, and awareness on the cost-benefit analysis users conduct when disclosing information online. Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by FOMO further allow users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Thus, this study provides insight into privacy and information disclosure on social media in South Africa. It reveals more insight into the cost-benefit analysis users conduct by combining the Theory of Planned Behaviour with the Privacy Calculus Model, as well as the antecedent factors of Trust in the Social Media Provider, FOMO, and Personal Valuation of Information.
- Full Text:
A business process model for blockchain-based South African real estate transactions
- Authors: Tilbury, Jack Laurie
- Date: 2020
- Subjects: Blockchains (Databases) , Conveyancing -- Technological innovations , Real estate business -- Data processing , Real estate business -- South Africa -- Technological innovations
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148380 , vital:38734
- Description: The real estate transaction process has been described as inefficient and technologically outdated due to numerous stakeholders and predominantly paper-based operations. Despite the apparent bottlenecks in the current process, the implementation of new technology into the real estate sector has lagged. Several attempts have been made to modernise and digitise the business process but committed integration of assisting technology has lacked attention. This study examined the applicability and potential integration of blockchain technology into the business process of South African real estate transactions. Blockchain’s novelty means that research in this space, especially within South Africa, is limited. Of the research that has been conducted, no models of the business processes for South African or blockchain-based real estate transactions have been constructed. This study provides two business process models, illustrating the two different processes. The main contribution of this paper was an integrated business process model, illustrating how the various processes and stakeholder interactions for South African blockchain-based real estate transactions are conducted on one transaction platform, common to all participating stakeholders. This platform was named the South African Blockchain Land Exchange System (SABLES), which manages and facilitates these transactions in their entirety from start to finish. This model depicts an enhanced business process that provides increased security, transparency, and speed. These benefits will be realised by those who register, adopt, and transact on the platform. Through in-depth interviews, the integrated business process model was assessed. The findings produced a final and combined thematic map, representing the main themes of the analysed interview data, namely blockchain implementation strategies, business process applicability, information technology assimilation, current transaction context, and PropTech 3.0 success factors. The discussion revealed that the current transaction process lacks technological innovation, which increases pressure on the conveyancing role. It was also revealed that there is not only a need within the industry, but a desire, for newer technologies to assist the transaction process. In order to streamline and improve efficiency, business processes should leverage digital records and data, and strive for a solution beyond digitisation, achieving digitalisation. Digitalisation recognises digital documents as official and legal documents as opposed to simply being digital back-ups. This, coupled with the business process models, represent theoretical contributions.
- Full Text:
A cloud adoption framework for South African SMEs
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
A personality-based surveillance model for Facebook apps
- Authors: Van der Schyff, Karl Izak
- Date: 2020
- Subjects: Facebook (Electronic resource) , Electronic surveillance -- Psychological aspects , Online social networks -- Psychological aspects , Social media -- Psychological aspects , Personality
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/145534 , vital:38447
- Description: The surveillance of data through the use of Facebook Apps is an ongoing and persistent problem that impacts millions of users. Nonetheless, limited research has been conducted investigating to what extent a Facebook user’s personality influences their awareness of such surveillance practices. Thus, to understand this situation better, the current study inductively developed four propositions from secondary data sources as part of a detailed content analysis. Spanning three search and analysis phases the content analysis led to the development of the research model. Guided by the propositions and research questions, a questionnaire was developed based on the relevant constructs prescribed by the Theory of Planned Behaviour. This questionnaire was used, and a total of 651 responses were collected from Facebook users over the age of 18 years old and residing in the United States of America. Primary data took place at both a univariate and multivariate level with a specific focus on the development of a structural model. Interpretation of the structural model revealed that out of all the Big Five personality traits, Conscientiousness exhibited the strongest relationship with information security awareness followed by Openness to Experience and Neuroticism, respectively. The results further indicated that the model constructs based on attitude, social norms and awareness significantly influenced the intended use of Facebook Apps. The study also contributes by indicating which personality traits are most vulnerable to Facebook App surveillance. For example, it was found that individuals high in Conscientiousness are the least vulnerable with individuals high in Extraversion being the most vulnerable. Since the results indicate that not all the personality traits are significantly related to the model constructs, additional factors may contribute to App surveillance in this context. Concerning this, factors such as user apathy, information privacy, privacy concerns, control and Facebook dependency are discussed as a means to argue why this might be the case.
- Full Text:
Design ethnography: methodological considerations for rebalancing socio-technical phenomena in CMS performativity
- Authors: Jordaan, Leandra
- Date: 2020
- Subjects: Database management -- Social aspects , Information technology -- Social aspects , Management information systems -- Social aspects , Database management -- Philosophy , Information technology -- Philosophy , Management information systems -- Philosophy
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164781 , vital:41164
- Description: As a practitioner, I had been part of two Content Management System (CMS) Projects in a particular setting that did not deliver on the expected outcomes. The expected outcomes of the projects included streamlined processes, better access to information, functionalities to drive engagement, reduced time searching for information, and improved reusability of content. As I began to reflect on the projects, a certain discomfort developed when the social aspect was ignored in favour of the technological. I sought a better understanding, but I was unaware of the fact at first. The techno-centricity as a concept found in literature and my experience as content management (CM) practitioner – together informed my interest in rebalancing the social and the technological. Thus, I focused on conduct in performing of tasks and emphasised attention on the practices of experts who gave insight into context of CM and use. The research participants are communication practitioners who have the responsibility to communicate internally and externally on behalf of a publicly-funded university in South Africa. Guided by the abductive argument and literature, the key themes for the research focused on technology, individuals and the organisation. The focus on technology (CMS as a subfield of Information Systems) began with my involvement in two CMS Projects. What came to the fore was that the practitioner perspective, and thus their experiential knowledge are neglected in research and that it may be an over-emphasis on techno-centrism in CMS research. I sought to better balance the social and technological aspects. The second focus on individuals (communication practitioners) was to value the stakeholder who was considered representative of the worldviews of the community. I sought to support corporate communication practices in the task of relationship building with stakeholders. The findings showed that the culture of informatio sharing was low at the University. The third focus on the organisation (the University) was to prioritise the success of the communication undertaken by the University. I interrogated the role of power. I demonstrated how the role of power could be seen as productive and positive in the context of HE, the social reality of CUT, and this IS research itself. I positioned the research as interpretivistic. I used hermeneutics as a mode of analysis because as researcher-practitioner, I am part of the social reality of the research. A safeguard against my subjectivity was the use of Phronesis as an orientation to knowledge. An organisation with a shared understanding of ethics and values will balance instrumental rationality (scientific and technical reasoning) with value-rationality (moral reasoning about right and wrong actions). Phronesis is the virtue that should ensure ethical behaviour in actions, yet over time, social science research, in a quest to mimic the natural sciences, centred on episteme and techne. I constructed the lens by particularising the four value-rational questions of Flyvbjerg’s contemporary Phronesis to the performative perspective of the research. My interest in social reality, as well as socio-technical aspects, have led to design-ethnography (D-E) to emerge as the most suitable and most appropriate approach to the research. D-E asked the prescriptive ‘How’ and descriptive ‘What’ questions, whilst the Flyvbjergian Phronesis lens brought focus on the ‘Why’ question. D-E emphasised the betterment of the interaction and synergy between research conducted and practice. My status as an immersed researcher needed careful consideration, and D-E accepted that a certain level of immersion is necessary, D-E has short interventional fieldwork, and D-E has future-oriented engagement. The contemporary Phronesis used in the research is to enact D-E and not an all-encompassing guide for doing Phronesis research The key contributions to the research are predominantly methodological. The claims draw on evidence focused on the three themes technology, individuals and organisation, and the phenomena of interest which are to rebalance the social and the technological in CM practices. The first claim is that immersion in the context is possible and supported by the specific particularised approaches to the research. The second claim suggests a way to rebalance the socio-technical nature of Information Systems (IS). The third claim suggests that there is a viewpoint for power that is not focused on power’s oppressive nature which could see a diverging focus on power in IS research in future. In this viewpoint, the status quo of social reality is not questioned, nor are their emancipatory ambitions. The fourth and final claim suggests that Phronesis as a lens could enact D-E, which in turn is a method that assists in valuing the experience of the practitioner and the support of collaborative work. The research is recommended for IT/IS practitioners who prefer to value participants’ views in design. The approaches used could be of value for researchers who consider the context of their research to be of higher importance than the generalisation of outcomes. Researchers who find themselves in the position of being immersed in the context but question the correctness of active engagement in the field may discover some value from the research approaches and my experience. Also, researchers or practitioners who have an interest in the balance between social and the technological aspects of IS projects. Researchers or practitioners interested in Phronesis, and perhaps the viewpoint of a lens may also find value in this research.
- Full Text:
Guidelines for the user interface design of electronic medical records in optometry
- Authors: Nathoo, Dina
- Date: 2020
- Subjects: User interfaces (Computer systems) , Medical records -- Data processing , Optometry -- South Africa -- Eastern Cape , System design , Workflow management systems
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148782 , vital:38773
- Description: With the prevalence of digitalisation in the medical industry, e-health systems have largely replaced the traditional paper-based recording methods. At the centre of these e-health systems are Electronic Health Records (EHRs) and Electronic Medical Records (EMRs), whose benefits significantly improve physician workflows. However, provision for user interface designs (UIDs) of these systems have been so poor that they have severely hindered physician usability, disrupted their workflows and risked patient safety. UID and usability guidelines have been provided, but have been very high level and general, mostly suitable for EHRs (which are used in general practices and hospitals). These guidelines have thus been ineffective in applicability for EMRs, which are typically used in niche medical environments. Within the niche field of Optometry, physicians experience disrupted workflows as a result of poor EMR UID and usability, of which EMR guidelines to improve these challenges are scarce. Hence, the need for this research arose, aiming to create UID guidelines for EMRs in Optometry, which will help improve the usability of the optometrists’ EMR. The main research question was successfully answered to produce the set of UID Guidelines for EMRs in Optometry, which includes guidelines built upon from literature and made contextually relevant, as well as some new additions, which are more patient focused. Design Science Research (DSR) was chosen as a suitable approach, and the phased Design Science Research Process Model (DSRPM) was used to guide this research. A literature review was conducted, including EHR and EMR, usability, UIDs, Optometry, related fields, and studies previously conducted to provide guidelines, frameworks and models. The review also included studying usability problems reported on the systems and the methods to overcome them. Task Analysis (TA) was used to observe and understand the optometrists’ workflows and their interactions with their EMRs during patient appointments, also identifying EMR problem areas. To address these problems, Focus Groups (FGs) were used to brainstorm solutions in the form of EMR UID features that optometrists’ required to improve their usability. From the literature review, TAs and FGs, proposed guidelines were created. The created guidelines informed the UID of an EMR prototype, which was successfully demonstrated to optometrists during Usability Testing sessions for the evaluation. Surveys were also used for the evaluation. The results proved the guidelines were successful, and were usable, effective, efficient and of good quality. A revised, final set of guidelines was then presented. Future researchers and designers may benefit from the contributions made from this research, which are both theoretical and practical.
- Full Text:
Passphrase and keystroke dynamics authentication: security and usability
- Authors: Bhana, Bhaveer
- Date: 2020
- Subjects: Computer security -- Management , Computers -- Access control -- Codewords , Computers -- Access control -- Keystroke timing authentication , Entropy (Information theory)
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146663 , vital:38546
- Description: It was found that employees spend a total 2.25 days within a 60 day period on password related activities. Another study found that over 85 days an average user will create 25 accounts with an average of 6.5 unique passwords. These numbers are expected to increase over time as more systems become available. In addition, the use of 6.5 unique passwords highlight that passwords are being reused which creates security concerns as multiple systems will be accessible by an unauthorised party if one of these passwords is leaked. Current user authentication solutions either increase security or usability. When security increases, usability decreases, or vice versa. To add to this, stringent security protocols encourage unsecure behaviours by the user such as writing the password down on a piece of paper to remember it. It was found that passphrases require less cognitive effort than passwords and because passphrases are stronger than passwords, they don’t need to be changed as frequently as passwords. This study aimed to assess a two-tier user authentication solution that increases security and usability. The proposed solution uses passphrases in conjunction with keystroke dynamics to address this research problem. The design science research approach was used to guide this study. The study’s theoretical foundation includes three theories. The Shannon entropy formula was used to calculate the strength of passwords, passphrases and keystroke dynamics. The chunking theory assisted in assessing password and passphrase memorisation issues and the keystroke-level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. A login assessment experiment collected data on user authentication and user-system interaction for passwords and passphrases. Plus, an expert review was conducted to verify findings and assess the research artefact in the form of a model. The model can be used to assist with the implementation of a two-tier user authentication solution which involves passphrases and keystroke dynamics. There are a number of components that need to be considered to realise the benefits of this solution and ensure successful implementation.
- Full Text:
The determination of whether a Unified Communication System can be effective in supporting informal communication and collaboration in virtual teams
- Authors: Hill, Kyle
- Date: 2020
- Subjects: Telecommuting , Virtual work teams , Telecommunication systems , Computer networks
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146343 , vital:38517
- Description: The overall objective of the research is to determine whether a Unified Communication System intervention can be effective in supporting informal communication and collaboration in virtual teams. In so doing, this research is aimed at developing a current framework of critical success factors for facilitating informal collaboration and communication. As teams have evolved to the point where there is no longer a need for team members to be co-located, with a greater importance now being placed on how they collaborate, this framework will also highlight how it can support virtual teams due to the huge potential advantage they can provide to the organisation. A virtual communication and collaboration system will be selected based on the outputs of the current framework and interactions which occur through the system will be observed to provide quantitative and qualitative results. In conclusion, the research will suggest recommendations for the successful implementation of informal communication and collaboration technologies within the organisation. The research will also indicate to a limited degree, the impact of the implementation of these technologies, and the outcome for the organisation, whether positive or negative. Whilst conducting the research, it became apparent that while the UCS was capable of performing the processes and functions required, the individuals and teams engaging with the technology did not always make use of the full scope of the technology provided. Regardless, a UCS was observed to provide direct benefits to an organisation in increasing communication and collaboration in the organisation. These increases can be observed in both the physical and virtual sense. However, the converse is true for generating social capital which lead to the observation that there are a smaller number of interactions happening in the smaller teams, but these are of higher value when compared to the larger teams of this study. It is also clear that the larger a team becomes, the more the trend is to focus on adopting new technologies to make their roles more efficient. This adoption is not however translated into outputs such as social capital but is translated into stronger networks and the formation of new networks. It is also clear that most negative factors around the UCS are related to the respondent’s hardware rather than the solution itself. Cost reductions because of virtuality will also be observed and using the Developed Framework as a blue print, an organisation should be able to observe direct benefits for an organisation by being able to confirm the thesis of this research in that having a UCS intervention is effective in supporting informal communication and collaboration in virtual teams.
- Full Text:
The Integration of Personally-owned Information and Communication Technologies (PICTs) for Teaching and Learning in Resource-Constrained Higher Education Environments – The Case of a Nigerian University
- Authors: Lewis, Oláñrewájú Olúrotimi
- Date: 2020
- Subjects: Uncatalogued
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/163582 , vital:41050 , doi:10.21504/10962/163582
- Description: Thesis (PhD)--Rhodes University, Faculty of Commerce, Information Systems, 2020
- Full Text:
A critical realist exploration of the culture of resistance in educational technology integration practices at a South African university
- Authors: Tshuma, Nompilo
- Date: 2019
- Subjects: Critical realism , Educational technology -- South Africa , Education, Higher -- Effect of technological innovations on -- South Africa , College teachers -- South Africa , College teaching -- Sociological aspects -- South Africa
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/72318 , vital:30033
- Description: This thesis seeks to address a number of troubling concerns related to research and practice in the field of educational technology in South African higher education. Firstly, educational technology research has been criticised for a lack of theoretical rigour resulting in perspectives that are tightly focused mostly on practice but fail to adequately interrogate the socio-political complexities of integrating educational technology. Secondly, while research in the field has been criticised for failing to adequately contextualise the study of educational technology, it also fails to interrogate the impact of colonial legacies and Western-developed technologies on integration practices. Thirdly, there seems to be a disconnect between academics’ practices and choices with educational technology, and the expectations and assumptions of educational technologists. As such, this thesis predominantly follows inductive reasoning where literature and theory are applied to the empirical situation retrospectively in order to avoid the potential influences and biases of mostly Western-driven discourses on educational technology integration practices. Critical realism is used to ‘underlabour’ this study. This meta-theory asserts that there are multiple perspectives of an independent reality, and the work of research is to use these perspectives to draw closer to an understanding of that reality. As such, it allows me to interrogate my perspectives firstly, and secondly those of my research participants, about factors that constrain educational technology integration in the South African context through the use of theory (abstract concepts) and data (research participants’ multiple perspectives). However, critical realism is somewhat cautious in how to access this reality. Therefore, a critical ethnographic epistemology is employed to strengthen critical realism’s aim of accessing knowledge. A critical epistemology emphasises exposing hidden power structures, value judgements as well as self-knowledge and reflexivity. The thesis thus shows how a critical realist ontology could be complemented by a critical ethnographic methodology, particularly in critically-orientated research that has an emancipatory focus which seeks to uncover the socio-political context within which educational technology practices take place. A key argument is that critical realism can be employed as an ontological underlabourer for critical research because of: 1) its immanent critique of traditionally-accepted philosophies, 2) its emphasis on critique of our knowledge claims and value judgements, 3) its insistence that knowledge of the social world necessarily precedes emancipation, and 4) its different conceptions of power (oppressive power and transformatory power). This critical ethnographic research is conducted in a South African university with eight female academics. Data collection is in the form of interviews, observations and reflections, as well as informal and work-related interactions. At each data collection moment, I have had to be reflexively aware of my positionality as an educational technologist, the impact of a colonially-motivated methodology and an ethically-aware approach that seeks to put the needs of the research participants first. Critical ethnography’s meaning-making and critical realism’s abduction and retroduction are used to analyse and make sense of the data. In my attempt to contextualise the study’s findings, I first uncover structural forces and their impact on the academic role before attempting to correlate this with educational technology practices. The study’s findings point to two main structural forces in the socio-political context of South African higher education: the teaching/research tension and the elevation of one dominant culture. In terms of the teaching/research tension, the female academics in this study have to balance the urgent teaching function with the valued research function. They struggle to find this balance because of ambiguous messages from different structures, their passion for teaching, oppressive departmental dynamics and the pressures of their career trajectory. The elevation of one dominant culture is demonstrated through both oppressive cultural practices and untransformed curricula. The study shows that academics mitigate these structural constraints mostly through subtle every day resistance that seeks to mitigate their effect on both the academics and, where applicable, their students. Archer’s morphogenetic/morphostatic cycle is used retrospectively, in response to fieldwork, to conceptualise why this resistance comes about. A resistance framework developed using Archer is then used to understand educational technology choices and practices. The results of the research show that while academics are often pictured as resistant to technology as a response to different barriers, they actually often employ technology to resist structural forces. That is, with this thesis I show that there is a focus on resistance with technology rather than resistance to technology. The study shows how the research participants resist structural forces (teaching tension and dominant culture) by using technology to create safe and responsive learning spaces. As such, this thesis challenges educational technologists to re-think the way they support academics by recommending support strategies that acknowledge both the structural forces in the South African higher education context, as well as the culture of resistance, both of which impact academics’ educational technology choices and practices.
- Full Text:
An access control model for a South African National Electronic Health Record System
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text: