An exploratory study of a virtual partnership for building capacity in a tertiary education institution
- Mufeti, Tulimevava Kaunapawa
- Authors: Mufeti, Tulimevava Kaunapawa
- Date: 2013-03-20
- Subjects: Internet in higher education Education, Higher -- Computer-assisted instruction Education, Higher -- Technological innovations Computer-assisted instruction -- Africa, Southern Education, Higher -- Africa, Southern Educational technology -- Africa, Southern SANTED Virtual Classroom Project
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1134 , http://hdl.handle.net/10962/d1001624
- Description: Collaborative partnerships aimed at strengthening institutional capacities are a long established trend in academia. Recent developments in Information and Communications Technologies (ICTs) have fostered a renewed interest in collaborative initiatives in the academic sphere, however, and at the same time, have created new ways of working together. Current research models do not provide sufficient methods to guide collaborations in capacity-building processes in virtual environments, especially in contexts associated with inadequate resources. Conceptual tools are therefore needed to guide the implementation of partnerships that use technology to mediate capacity building in these contexts. This research study was aimed at understanding whether and how virtual partnerships can be used to facilitate capacity building in tertiary education institutions in the SADC region. It is based on a single case study of the SANTED Virtual Classroom Project, a partnership between the Departments of Computer Science at Rhodes University (RU) and the University of Namibia (UNAM). In the project, ICTs were used to mediate the process of building teaching and research capacity in the department at UNAM. The dynamics of the partnership are explored as the implementation process developed over a period of three years. The research adopted a sociocultural perspective in the analysis of the project‟s implementation. It uses activity theory and the notion of communities of practice as conceptual frameworks to explore how the two departments organised themselves and how they harnessed the virtual environment to enable the capacity-building partnership. Activity theory provided a lens to understand the complex relationships between the different elements of the partnership activities mediated by technological tools. The concept of communities of practice, on the other hand, enabled participants‟ progress to be analysed, as they went through the various transition stages of the capacity-building process. The thesis identifies the following four categories of challenges inherent in the implementation of virtual partnerships: infrastructural, institutional, cultural and individual expectations. It also emphasises the need for identifying the different transition stages corresponding to the levels of participation in the capacity-building process. The thesis recommends that the implementation of virtual partnerships for capacity building purposes in the SADC region must focus on: identifying the appropriate capacity building strategies at Abstract ii each transition stage; finding appropriate, light-weight virtual classroom solutions; identifying appropriate pedagogic models to suit available technology; addressing systemic tensions that can arise as a result of different institutional cultures; and developing and nurturing virtual communities of practice to ensure sustainability. The research findings contribute to the body of knowledge exploring the use of technologies to develop and strengthen human resource capacities in developing contexts in a sustainable way. More importantly, it contributes to the literature on collaborative virtual partnerships in the SADC region, and demonstrates one way in which the operations of such a partnership may be supported in similar contexts , Adobe Acrobat 9.53 Paper Capture Plug-in
- Full Text:
- Authors: Mufeti, Tulimevava Kaunapawa
- Date: 2013-03-20
- Subjects: Internet in higher education Education, Higher -- Computer-assisted instruction Education, Higher -- Technological innovations Computer-assisted instruction -- Africa, Southern Education, Higher -- Africa, Southern Educational technology -- Africa, Southern SANTED Virtual Classroom Project
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1134 , http://hdl.handle.net/10962/d1001624
- Description: Collaborative partnerships aimed at strengthening institutional capacities are a long established trend in academia. Recent developments in Information and Communications Technologies (ICTs) have fostered a renewed interest in collaborative initiatives in the academic sphere, however, and at the same time, have created new ways of working together. Current research models do not provide sufficient methods to guide collaborations in capacity-building processes in virtual environments, especially in contexts associated with inadequate resources. Conceptual tools are therefore needed to guide the implementation of partnerships that use technology to mediate capacity building in these contexts. This research study was aimed at understanding whether and how virtual partnerships can be used to facilitate capacity building in tertiary education institutions in the SADC region. It is based on a single case study of the SANTED Virtual Classroom Project, a partnership between the Departments of Computer Science at Rhodes University (RU) and the University of Namibia (UNAM). In the project, ICTs were used to mediate the process of building teaching and research capacity in the department at UNAM. The dynamics of the partnership are explored as the implementation process developed over a period of three years. The research adopted a sociocultural perspective in the analysis of the project‟s implementation. It uses activity theory and the notion of communities of practice as conceptual frameworks to explore how the two departments organised themselves and how they harnessed the virtual environment to enable the capacity-building partnership. Activity theory provided a lens to understand the complex relationships between the different elements of the partnership activities mediated by technological tools. The concept of communities of practice, on the other hand, enabled participants‟ progress to be analysed, as they went through the various transition stages of the capacity-building process. The thesis identifies the following four categories of challenges inherent in the implementation of virtual partnerships: infrastructural, institutional, cultural and individual expectations. It also emphasises the need for identifying the different transition stages corresponding to the levels of participation in the capacity-building process. The thesis recommends that the implementation of virtual partnerships for capacity building purposes in the SADC region must focus on: identifying the appropriate capacity building strategies at Abstract ii each transition stage; finding appropriate, light-weight virtual classroom solutions; identifying appropriate pedagogic models to suit available technology; addressing systemic tensions that can arise as a result of different institutional cultures; and developing and nurturing virtual communities of practice to ensure sustainability. The research findings contribute to the body of knowledge exploring the use of technologies to develop and strengthen human resource capacities in developing contexts in a sustainable way. More importantly, it contributes to the literature on collaborative virtual partnerships in the SADC region, and demonstrates one way in which the operations of such a partnership may be supported in similar contexts , Adobe Acrobat 9.53 Paper Capture Plug-in
- Full Text:
Formulating an IT governance framework
- Authors: Roos, Pieter
- Date: 2015
- Subjects: Corporate governance -- Information technology -- South Africa , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1156 , http://hdl.handle.net/10962/d1017541
- Description: Modern organisations make substantial investments in Information Technology (IT). Corporate governance practices can no longer ignore the importance of effectively governing IT. Consequently, the third King Report on Corporate Governance (King III) makes specific provision for IT governance, which is implemented through the establishment of an IT governance framework. The purpose of this research is to develop a generic IT governance framework, suitable to any large South African organisation in the public or private sector. The literature considered for this research confirmed the extent of standards and practices available in support of IT governance, together with the roles and structures required to implement them. These included well-known publications such as COBIT, Prince2, ITIL and ISO/IEC27000. Based on the literature review, a theoretical Processes, Enablers and Structures (PES) IT Governance Framework was formulated. The framework was further explored by means of a survey of and structured interview with ten Chief Information Officers (CIOs) of South African organisations with a turnover in excess of R1bn per annum. The final PES IT Governance Framework comprises three dimensions, each of which contains a set of constituent components: • Processes: Strategic Alignment, Value Delivery, Resource Management, Risk Management and Performance Measurement. • Enablers: IT Sub Processes, Supporting Documentation, IT Control Framework, Technology Architecture, Desirable Practice, IT Portfolio Management and Regulation. • Structures: The Board, Office of the CIO, IT Steering Committee, Technology Architecture Forum, IT Programme Management Office and Information Security Organisation. As the number of regulatory requirements and associated compliance pressures grow, the importance of an effective IT governance framework also becomes more prominent. The PES IT Governance Framework offers a uniquely practical approach to addressing IT governance principles that are often regarded as abstract. The final PES IT Governance Framework provides clear guidance on how organisations could implement an IT governance framework, which addresses the strategic alignment of IT to business, value delivery by IT investments, IT risk management, IT resource management and IT performance measurement.
- Full Text:
- Date Issued: 2015
- Authors: Roos, Pieter
- Date: 2015
- Subjects: Corporate governance -- Information technology -- South Africa , Information technology -- Management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1156 , http://hdl.handle.net/10962/d1017541
- Description: Modern organisations make substantial investments in Information Technology (IT). Corporate governance practices can no longer ignore the importance of effectively governing IT. Consequently, the third King Report on Corporate Governance (King III) makes specific provision for IT governance, which is implemented through the establishment of an IT governance framework. The purpose of this research is to develop a generic IT governance framework, suitable to any large South African organisation in the public or private sector. The literature considered for this research confirmed the extent of standards and practices available in support of IT governance, together with the roles and structures required to implement them. These included well-known publications such as COBIT, Prince2, ITIL and ISO/IEC27000. Based on the literature review, a theoretical Processes, Enablers and Structures (PES) IT Governance Framework was formulated. The framework was further explored by means of a survey of and structured interview with ten Chief Information Officers (CIOs) of South African organisations with a turnover in excess of R1bn per annum. The final PES IT Governance Framework comprises three dimensions, each of which contains a set of constituent components: • Processes: Strategic Alignment, Value Delivery, Resource Management, Risk Management and Performance Measurement. • Enablers: IT Sub Processes, Supporting Documentation, IT Control Framework, Technology Architecture, Desirable Practice, IT Portfolio Management and Regulation. • Structures: The Board, Office of the CIO, IT Steering Committee, Technology Architecture Forum, IT Programme Management Office and Information Security Organisation. As the number of regulatory requirements and associated compliance pressures grow, the importance of an effective IT governance framework also becomes more prominent. The PES IT Governance Framework offers a uniquely practical approach to addressing IT governance principles that are often regarded as abstract. The final PES IT Governance Framework provides clear guidance on how organisations could implement an IT governance framework, which addresses the strategic alignment of IT to business, value delivery by IT investments, IT risk management, IT resource management and IT performance measurement.
- Full Text:
- Date Issued: 2015
A process assessment framework for rural ICT projects in developing countries: an exploration of the Siyakhula Living Lab, South Africa
- Authors: Osah, Umeoniso Joshua
- Date: 2013
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Rural development projects -- Evaluation -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1133 , http://hdl.handle.net/10962/d1001623
- Description: Rural development can be supported by information and knowledge which are key strategic resources for socio economic development. ICTs enable the facilitation and communication of information between remotely dispersed individuals or groups and more developed regions. While it has become common place that ICTs possess capabilities to potentially support rural development, the concept of ICT for development (ICT4D) is still fraught with challenges and barriers, which impede the success and sustainability of ICT4D projects. It is therefore essential to evaluate rural ICT projects, as such an analysis may aid in revealing information related to the need, effectiveness, impact, and sustainability of these projects. This research seeks to further the implementation and exploration of the Rural ICT Comprehensive Evaluation Framework (RICT-CEF), through the application of the Process Assessment domain in a real life rural ICT project environment. The RICT-CEF framework consisting of 7 evaluation domains has the primary objective of evaluating rural ICT projects from their inception stages to post implementation. A process assessment seeks to determine whether or not a rural ICT project is operating to implement its intended functions in the intended way specified in the projects plan. Such an assessment is invaluable to a comprehensive evaluation. Evaluation questions for a process assessment are centred around critical themes of project performance. Critical themes are aspects of a programme or projects implementation which must be enacted in order to achieve desired project outcomes. This research study is aimed at identifying critical themes of process assessment relevant to rural ICT4D projects. To identify critical themes, assessment approaches on social programme process assessments, evaluation of information systems in use, and rural ICT4D project evaluation case studies are comparatively analysed. Fourteen assessment approaches from these three categories are selected based on criteria. To analyse selected assessment approaches, a template is created based on the research questions, foundational literature on process assessment and identified challenges applicable to process assessments of rural ICT4D projects. Comparing and contrasting critical themes from these assessment approaches highlight critical themes essential to assess in the iterative implementation phase of rural ICT projects. Accentuated critical themes include, service utilization, organizational function and external project factors. These themes, along with suggested guiding principles from literature for conducting process assessments enable the creation of a framework for conducting process assessments of rural ICT projects. The framework is labelled "the Rural ICT Project Process Assessment Framework (RICTP-PAF)". The application of the RICTP-PAF in a real life rural ICT project through a design science case study provides lessons learned (suitability and shortcomings) from applying the framework. This essentially demonstrates the sensitivity of the RICTP-PAF to rural contexts in which it is implemented in. For instance, the implemented prototype of the RICTP-PAF reveals that the framework places a great deal of emphasis on rural beneficiary perspectives. A practice which has been lacking in such evaluation exercises. Furthermore, the guiding principles elucidated, bring to mind best practices to deal with issues such as stakeholder conflict, unreliable data elicitation and unethical assessment practices. The RICTP-PAF represents a fundamental tool for process assessments of rural ICT projects, and may be adopted and customized to various rural ICT project contexts in developing countries.
- Full Text:
- Date Issued: 2013
- Authors: Osah, Umeoniso Joshua
- Date: 2013
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Rural development projects -- Evaluation -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1133 , http://hdl.handle.net/10962/d1001623
- Description: Rural development can be supported by information and knowledge which are key strategic resources for socio economic development. ICTs enable the facilitation and communication of information between remotely dispersed individuals or groups and more developed regions. While it has become common place that ICTs possess capabilities to potentially support rural development, the concept of ICT for development (ICT4D) is still fraught with challenges and barriers, which impede the success and sustainability of ICT4D projects. It is therefore essential to evaluate rural ICT projects, as such an analysis may aid in revealing information related to the need, effectiveness, impact, and sustainability of these projects. This research seeks to further the implementation and exploration of the Rural ICT Comprehensive Evaluation Framework (RICT-CEF), through the application of the Process Assessment domain in a real life rural ICT project environment. The RICT-CEF framework consisting of 7 evaluation domains has the primary objective of evaluating rural ICT projects from their inception stages to post implementation. A process assessment seeks to determine whether or not a rural ICT project is operating to implement its intended functions in the intended way specified in the projects plan. Such an assessment is invaluable to a comprehensive evaluation. Evaluation questions for a process assessment are centred around critical themes of project performance. Critical themes are aspects of a programme or projects implementation which must be enacted in order to achieve desired project outcomes. This research study is aimed at identifying critical themes of process assessment relevant to rural ICT4D projects. To identify critical themes, assessment approaches on social programme process assessments, evaluation of information systems in use, and rural ICT4D project evaluation case studies are comparatively analysed. Fourteen assessment approaches from these three categories are selected based on criteria. To analyse selected assessment approaches, a template is created based on the research questions, foundational literature on process assessment and identified challenges applicable to process assessments of rural ICT4D projects. Comparing and contrasting critical themes from these assessment approaches highlight critical themes essential to assess in the iterative implementation phase of rural ICT projects. Accentuated critical themes include, service utilization, organizational function and external project factors. These themes, along with suggested guiding principles from literature for conducting process assessments enable the creation of a framework for conducting process assessments of rural ICT projects. The framework is labelled "the Rural ICT Project Process Assessment Framework (RICTP-PAF)". The application of the RICTP-PAF in a real life rural ICT project through a design science case study provides lessons learned (suitability and shortcomings) from applying the framework. This essentially demonstrates the sensitivity of the RICTP-PAF to rural contexts in which it is implemented in. For instance, the implemented prototype of the RICTP-PAF reveals that the framework places a great deal of emphasis on rural beneficiary perspectives. A practice which has been lacking in such evaluation exercises. Furthermore, the guiding principles elucidated, bring to mind best practices to deal with issues such as stakeholder conflict, unreliable data elicitation and unethical assessment practices. The RICTP-PAF represents a fundamental tool for process assessments of rural ICT projects, and may be adopted and customized to various rural ICT project contexts in developing countries.
- Full Text:
- Date Issued: 2013
An investigation of a framework to evaluate computer supported collaborative work
- Beauvais, Erik Alexander Maoui
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
- Authors: Beauvais, Erik Alexander Maoui
- Date: 1999
- Subjects: Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1135 , http://hdl.handle.net/10962/d1002763 , Computer networks , Teams in the workplace -- Data processing , Technology -- Data processing , Information technology -- Economic aspects
- Description: Rapidly changing technology constantly modifies the way in which tasks are conceived and executed. Furthermore, leading organisations also encourage the use of new technology to support and establish innovative ways of doing business. For example, technology has helped to drive the globalization and tighter integration of world markets. This has facilitated, and even necessitated, business organisations to compete for work across national borders. For geographically dispersed organisations, collaboration has become critical. But this has presented time and space work complexities. Communication and collaboration technologies, for example, are needed to support such emerging co-operative business practices. The short development cycle of technology, communication and collaborative technologies included, leaves little time for testing and less for understanding the impact of new technology. To compound the problem, no established formulae exist for matching technology with work: over-investment is a waste of resources, while under-investment could lead to work failure. This research proposes a framework to assist organisations in selecting the appropriate level of technology with the work required. In this study, the methodology developed by the Evaluation Working Group, the DARPA Intelligent Collaboration and Visualization program is extended, and a matrix framework is constructed which compares the success of generic work tasks against a range of technology resources. The framework is tested using a low resource configuration, with selected work task types generally found in software development. (The Joint Application Development (JAD) methodology for software development is used as the contextual basis of the experiment.) All activities are evaluated according to selected measure components of success. A collection of research methods known as ethnography is used to examine and test the framework. Methods employed include questionnaires, interviews, interaction analysis and ethnomethodology. The results indicate that even at a low resource level, given selected criteria, collaborative technology successfully supports certain collaborative work activities. Findings also indicate that softer people issues require much more attention in order for technology to support natural collaborative work. Finally, user defined parameter testing has indicated that the framework functions as expected and designed.
- Full Text:
- Date Issued: 1999
An investigation of an undergraduate course module on the ethical aspects of information systems
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
- Authors: Charlesworth, Matthew
- Date: 2005
- Subjects: Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1139 , http://hdl.handle.net/10962/d1002768 , Information technology , Information technology -- Moral and ethical aspects , Computers -- Moral and ethical aspects , Computer science -- Study and teaching (Higher) -- Curricula , Computer engineering -- Study and teaching (Higher) -- Curricula , Software engineering -- Study and teaching (Higher) -- Curricula , Information technology -- study and teaching (Higher) -- Curricula
- Description: An increased emphasis is being placed on ethics in Information Systems. An investigation of: the relevant literature which highlighted the growth of, and importance in understanding the moral philosophies which underlie Computer Ethics; and the official curricula recommendations that have increasingly and consistently recommended inclusion of courses describing the Social, Professional and Ethical responsibilities of Information Systems Professionals; and informed by the observations from two empirical Studies that showed the extent of unethical behaviour, and how this behaviour is diminished in those who have received formal tertiary level education resulted in a proposed new course module on Ethics in Information Systems. The module follows a sandwich-approach whereby two stand-alone modules are conducted on either side of integrated Computer Ethics content within the rest of the curriculum.
- Full Text:
- Date Issued: 2005
Investigating the problems experienced by virtual team members engaged in requirements elicitation
- Authors: De Abrew, Upuli Kanchana
- Date: 2013
- Subjects: Virtual work teams Virtual work teams -- South Africa System design System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1151 , http://hdl.handle.net/10962/d1007845
- Description: The constant acceleration in the rate of technological innovation, and the ever growing emphasis on the importance of information for competition has seen organisations around the world strive for the technologies that give them global customer reach. One of the most pervasive technological innovations developed is the internet, and its unique quality of being able to draw people from across the world together in one virtual space has given birth to the concept of virtual teams. Organisations have seized the advantages of such virtual teams to give them the cost and time reductions they need to stay competitive in the global marketplace. In the software industry, where product and service development is always a race against time, forward thinking software companies in the developed world have taken full advantage of the cost and time saving benefits that virtual teams have to offer. In addition, the rate of expansion of technology and software to support such teams is also growing exponentially, offering increasingly faster ways of virtual working. Despite the immense advantages offered by such teams, South African software development companies do not seem to engage in distributed work to any great degree. The importance of this research rests on the belief that South African software development companies will be unable to avoid engaging in distributed software development if they are to achieve and maintain competitiveness in the global marketplace. This research focuses on a sub-section of the software development process with a specific reference to South African software development. The requirements elicitation phase of software development is one of the initial stages of any software project. It is here that developers work with the users in order to identify requirements for the system to be built. It is acknowledged that other phases of distributed development also bring to bear their own problems, however, in the interests of scoping this research, only the requirements elicitation process is focused on. The research shows that most techniques of requirements elicitation can be adapted for use within the virtual environment, although each technique has its share of advantages and disadvantages. In addition, virtual team members experience problems during their general, day-to-day interactions, many of these arising from the dependence on technology for communication and task performance. The research identifies the problems in both categories, and develops a holistic model of virtual requirements elicitation to prevent or solve the problems experienced by virtual teams engaged in distributed requirements elicitation. The model is made up of three key frameworks, each of which prescribes actions to be taken to ensure the success of the virtual team within the requirements elicitation process. The model is verified through the testing of its critical success factors. Certain aspects of the model were adapted based on the findings of the study, but it was confirmed that the rationale behind the model is sound, indicating that it has the potential to solve the problems of virtual RE when implemented.
- Full Text:
- Date Issued: 2013
- Authors: De Abrew, Upuli Kanchana
- Date: 2013
- Subjects: Virtual work teams Virtual work teams -- South Africa System design System analysis
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1151 , http://hdl.handle.net/10962/d1007845
- Description: The constant acceleration in the rate of technological innovation, and the ever growing emphasis on the importance of information for competition has seen organisations around the world strive for the technologies that give them global customer reach. One of the most pervasive technological innovations developed is the internet, and its unique quality of being able to draw people from across the world together in one virtual space has given birth to the concept of virtual teams. Organisations have seized the advantages of such virtual teams to give them the cost and time reductions they need to stay competitive in the global marketplace. In the software industry, where product and service development is always a race against time, forward thinking software companies in the developed world have taken full advantage of the cost and time saving benefits that virtual teams have to offer. In addition, the rate of expansion of technology and software to support such teams is also growing exponentially, offering increasingly faster ways of virtual working. Despite the immense advantages offered by such teams, South African software development companies do not seem to engage in distributed work to any great degree. The importance of this research rests on the belief that South African software development companies will be unable to avoid engaging in distributed software development if they are to achieve and maintain competitiveness in the global marketplace. This research focuses on a sub-section of the software development process with a specific reference to South African software development. The requirements elicitation phase of software development is one of the initial stages of any software project. It is here that developers work with the users in order to identify requirements for the system to be built. It is acknowledged that other phases of distributed development also bring to bear their own problems, however, in the interests of scoping this research, only the requirements elicitation process is focused on. The research shows that most techniques of requirements elicitation can be adapted for use within the virtual environment, although each technique has its share of advantages and disadvantages. In addition, virtual team members experience problems during their general, day-to-day interactions, many of these arising from the dependence on technology for communication and task performance. The research identifies the problems in both categories, and develops a holistic model of virtual requirements elicitation to prevent or solve the problems experienced by virtual teams engaged in distributed requirements elicitation. The model is made up of three key frameworks, each of which prescribes actions to be taken to ensure the success of the virtual team within the requirements elicitation process. The model is verified through the testing of its critical success factors. Certain aspects of the model were adapted based on the findings of the study, but it was confirmed that the rationale behind the model is sound, indicating that it has the potential to solve the problems of virtual RE when implemented.
- Full Text:
- Date Issued: 2013
An investigation of a framework for the implementation of service management in the information and communication technology sector
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
- Authors: Benyon, Robert Victor
- Date: 2006
- Subjects: Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1137 , http://hdl.handle.net/10962/d1002766 , Support services (Management) , Service industries -- Management , Information technology -- Management , Management information systems , Communication in management
- Description: Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
- Full Text:
- Date Issued: 2006
A personality-based behavioural model: Susceptibility to phishing on social networking sites
- Authors: Frauenstein, Edwin Donald
- Date: 2021-10-29
- Subjects: Phishing , Social networks , Personality , Self-presentation in mass media , Internet fraud , Internet users Habits and behavior , Big Five model , Human information processing , Heuristic-Systematic Model (HSM)
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10962/190306 , vital:44982 , 10.21504/10962/190306
- Description: The worldwide popularity of social networking sites (SNSs) and the technical features they offer users have created many opportunities for malicious individuals to exploit the behavioral tendencies of their users via social engineering tactics. The self-representation and social interactions on SNSs encourage users to reveal their personalities in a way which characterises their behaviour. Frequent engagement on SNSs may also reinforce the performance of certain activities, such as sharing and clicking on links, at a “habitual” level on these sites. Subsequently, this may also influence users to overlook phishing posts and messages on SNSs and thus not apply sufficient cognitive effort in their decision-making. As users do not expect phishing threats on these sites, they may become accustomed to behaving in this manner which may consequently put them at risk of such attacks. Using an online survey, primary data was collected from 215 final-year undergraduate students. Employing structural equation modelling techniques, the associations between the Big Five personality traits, habits and information processing were examined with the aim to identify users susceptible to phishing on SNSs. Moreover, other behavioural factors such as social norms, computer self-efficacy and perceived risk were examined in terms of their influence on phishing susceptibility. The results of the analysis revealed the following key findings: 1) users with the personality traits of extraversion, agreeableness and neuroticism are more likely to perform habitual behaviour, while conscientious users are least likely; 2) users who perform certain behaviours out of habit are directly susceptible to phishing attacks; 3) users who behave out of habit are likely to apply a heuristic mode of processing and are therefore more susceptible to phishing attacks on SNSs than those who apply systematic processing; 4) users with higher computer self-efficacy are less susceptible to phishing; and 5) users who are influenced by social norms are at greater risk of phishing. This study makes a contribution to scholarship and to practice, as it is the first empirical study to investigate, in one comprehensive model, the relationship between personality traits, habit and their effect on information processing which may influence susceptibility to phishing on SNSs. The findings of this study may assist organisations in the customisation of an individual anti-phishing training programme to target specific dispositional factors in vulnerable users. By using a similar instrument to the one used in this study, pre-assessments could determine and classify certain risk profiles that make users vulnerable to phishing attacks. , Thesis (PhD) -- Faculty of Commerce, Information Systems, 2021
- Full Text:
- Date Issued: 2021-10-29
- Authors: Frauenstein, Edwin Donald
- Date: 2021-10-29
- Subjects: Phishing , Social networks , Personality , Self-presentation in mass media , Internet fraud , Internet users Habits and behavior , Big Five model , Human information processing , Heuristic-Systematic Model (HSM)
- Language: English
- Type: Doctoral theses , text
- Identifier: http://hdl.handle.net/10962/190306 , vital:44982 , 10.21504/10962/190306
- Description: The worldwide popularity of social networking sites (SNSs) and the technical features they offer users have created many opportunities for malicious individuals to exploit the behavioral tendencies of their users via social engineering tactics. The self-representation and social interactions on SNSs encourage users to reveal their personalities in a way which characterises their behaviour. Frequent engagement on SNSs may also reinforce the performance of certain activities, such as sharing and clicking on links, at a “habitual” level on these sites. Subsequently, this may also influence users to overlook phishing posts and messages on SNSs and thus not apply sufficient cognitive effort in their decision-making. As users do not expect phishing threats on these sites, they may become accustomed to behaving in this manner which may consequently put them at risk of such attacks. Using an online survey, primary data was collected from 215 final-year undergraduate students. Employing structural equation modelling techniques, the associations between the Big Five personality traits, habits and information processing were examined with the aim to identify users susceptible to phishing on SNSs. Moreover, other behavioural factors such as social norms, computer self-efficacy and perceived risk were examined in terms of their influence on phishing susceptibility. The results of the analysis revealed the following key findings: 1) users with the personality traits of extraversion, agreeableness and neuroticism are more likely to perform habitual behaviour, while conscientious users are least likely; 2) users who perform certain behaviours out of habit are directly susceptible to phishing attacks; 3) users who behave out of habit are likely to apply a heuristic mode of processing and are therefore more susceptible to phishing attacks on SNSs than those who apply systematic processing; 4) users with higher computer self-efficacy are less susceptible to phishing; and 5) users who are influenced by social norms are at greater risk of phishing. This study makes a contribution to scholarship and to practice, as it is the first empirical study to investigate, in one comprehensive model, the relationship between personality traits, habit and their effect on information processing which may influence susceptibility to phishing on SNSs. The findings of this study may assist organisations in the customisation of an individual anti-phishing training programme to target specific dispositional factors in vulnerable users. By using a similar instrument to the one used in this study, pre-assessments could determine and classify certain risk profiles that make users vulnerable to phishing attacks. , Thesis (PhD) -- Faculty of Commerce, Information Systems, 2021
- Full Text:
- Date Issued: 2021-10-29
A framework for the development and measurement of agile enterprise architecture
- Authors: Mthupha, Bokang
- Date: 2012
- Subjects: Management information systems -- Research Industrial management -- Technological innovations -- Research Industrial organization -- Technological innovations -- Research System design
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1147 , http://hdl.handle.net/10962/d1002777
- Description: Enterprise architecture is the high-level design of the entire business, facilitated by enterprise architects. "Agile enterprise architecture" is the term used in enterprise architecture to describe an architecture that caters for future unknowns, enabling change to occur rapidly without undue resource utilization, yet in a controlled manner and with minimal adverse impact. Some enterprise architects still use outdated, rigid approaches to enterprise architecture which are incompatible with today‟s business environment. In addition, there is limited research into methods that can be applied to measure the agility of enterprise architecture. The current environment is such that there is a need for a more agile approach to developing and measuring enterprise architecture. This work will lead to the creation of a Framework for The Development and Measurement of Agile Enterprise Architecture. In support of the main goal of the development of the framework, a literature review will be conducted focusing on the necessary sub-goals of the research. The first sub-goal of the literature review is to develop a comprehensive definition for enterprise architecture (referred to as EA), as well as discover how it is currently practiced. Thereafter, the literature review will investigate a comprehensive definition for agility and research why it is emerging as a critical topic. The next chapter of the literature review will research how agility fits within the context of EA, uncovering a comprehensive definition for agile EA and the best practices in agile EA development. The final chapter of the literature review will investigate suitable measurement techniques that can be used to assess the level of agility of EA. On completion of the literature review, a preliminary framework will be created using the most important contributions from the literature. An empirical study will be conducted to explore the definitions for EA, agility, agile EA, the methods to measure the agility of EA and the concepts for the development of agile EA summarised in the preliminary framework. Data analysis follows an interpretive and qualitative approach based on four case studies through interviews with systems experts in four South African organizations in one province. Each interviewee was interviewed once. The initial interview with a Principal Consultant on Enterprise Strategy Consulting at organisation # 1 formed the basis of an exploratory study; the results of which were used to refine the research instrument and preliminary framework. Thereafter, a more rigorous empirical study focused on interviews with the Chief Architect, Senior Manager in Advisory Services and an Enterprise Architect at organizations 2, 3 and 4 respectively was conducted. The research follows an inductive approach to capture the interpretive experiences of participants and develop theoretical propositions from them. Following the exploratory pilot study it became necessary to make changes to the preliminary framework and initial survey instrument created. Thereafter, the empirical study consisting of the remaining three cases was conducted to test the important aspects of the framework and literature definitions. The analysis of the results of the empirical study prompted further changes to the theoretical framework and definitions created. The interviews conducted with each of the organizations confirmed the factors for agile EA development as well as the effectiveness of the definitions created in the literature review. The research uncovered that the need for a more agile approach to developing EA and a way to measure the level of agility of EA has become more and more significant in organizations. This begins with a better understanding of EA, agility, how agility fits within the context of EA, as well as appropriate methods to measure agility.
- Full Text:
- Date Issued: 2012
- Authors: Mthupha, Bokang
- Date: 2012
- Subjects: Management information systems -- Research Industrial management -- Technological innovations -- Research Industrial organization -- Technological innovations -- Research System design
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1147 , http://hdl.handle.net/10962/d1002777
- Description: Enterprise architecture is the high-level design of the entire business, facilitated by enterprise architects. "Agile enterprise architecture" is the term used in enterprise architecture to describe an architecture that caters for future unknowns, enabling change to occur rapidly without undue resource utilization, yet in a controlled manner and with minimal adverse impact. Some enterprise architects still use outdated, rigid approaches to enterprise architecture which are incompatible with today‟s business environment. In addition, there is limited research into methods that can be applied to measure the agility of enterprise architecture. The current environment is such that there is a need for a more agile approach to developing and measuring enterprise architecture. This work will lead to the creation of a Framework for The Development and Measurement of Agile Enterprise Architecture. In support of the main goal of the development of the framework, a literature review will be conducted focusing on the necessary sub-goals of the research. The first sub-goal of the literature review is to develop a comprehensive definition for enterprise architecture (referred to as EA), as well as discover how it is currently practiced. Thereafter, the literature review will investigate a comprehensive definition for agility and research why it is emerging as a critical topic. The next chapter of the literature review will research how agility fits within the context of EA, uncovering a comprehensive definition for agile EA and the best practices in agile EA development. The final chapter of the literature review will investigate suitable measurement techniques that can be used to assess the level of agility of EA. On completion of the literature review, a preliminary framework will be created using the most important contributions from the literature. An empirical study will be conducted to explore the definitions for EA, agility, agile EA, the methods to measure the agility of EA and the concepts for the development of agile EA summarised in the preliminary framework. Data analysis follows an interpretive and qualitative approach based on four case studies through interviews with systems experts in four South African organizations in one province. Each interviewee was interviewed once. The initial interview with a Principal Consultant on Enterprise Strategy Consulting at organisation # 1 formed the basis of an exploratory study; the results of which were used to refine the research instrument and preliminary framework. Thereafter, a more rigorous empirical study focused on interviews with the Chief Architect, Senior Manager in Advisory Services and an Enterprise Architect at organizations 2, 3 and 4 respectively was conducted. The research follows an inductive approach to capture the interpretive experiences of participants and develop theoretical propositions from them. Following the exploratory pilot study it became necessary to make changes to the preliminary framework and initial survey instrument created. Thereafter, the empirical study consisting of the remaining three cases was conducted to test the important aspects of the framework and literature definitions. The analysis of the results of the empirical study prompted further changes to the theoretical framework and definitions created. The interviews conducted with each of the organizations confirmed the factors for agile EA development as well as the effectiveness of the definitions created in the literature review. The research uncovered that the need for a more agile approach to developing EA and a way to measure the level of agility of EA has become more and more significant in organizations. This begins with a better understanding of EA, agility, how agility fits within the context of EA, as well as appropriate methods to measure agility.
- Full Text:
- Date Issued: 2012
A framework for successful SOA adoption in selected South African universities
- Authors: Jacobs, Carmen
- Date: 2013-07-26
- Subjects: System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1153 , http://hdl.handle.net/10962/d1008366 , System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Description: The demand for systems i·ntegration has become more and more significant in higher education as institutions want systems that provide coherent information with data that is up to date and not redundant and can seamlessly support the end user experience. Institutions have become more reliant on information systems to support both administrative functions and those involved in teaching, learning and research, but because each department supports a diverse array of computing platforms and applications, it becomes very difficult to integrate these systems. SOA is classified as an innovative approach to integrating existing systems involving the use of independent services that can be accessed without knowledge of the underlying platform implementation. Unfortunately, the SOA initiative will not be success if it is not understood and used correctly by various applications and systems throughout the organisation. SOA introduces complexity and challenges in systems integration, acceptance, governance, data, development planning, security and external opportunities. If an organisation does not embrace or enable change in each of these areas, it is not ready for the adoption of SOA. This research investigates the systems integration challenge in selected South African universities and explores factors for SOA adoption. The framework for the adoption of SOA comprises seven factors, of which Systems Integration is the most significant and represents an efficient starting point for institutions considering SOA adoption. Acceptance, Governance, Data, Development Planning, Security and External Opportunities are other factors of SOA adoption that require careful and thorough consideration before an institution can successfully adopt SOA. The results of this research emphasise the importance of being able to embrace change and innovation and modify strategies in order to reflect the constant changes required for the adoption of SOA. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Authors: Jacobs, Carmen
- Date: 2013-07-26
- Subjects: System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:1153 , http://hdl.handle.net/10962/d1008366 , System analysis -- Data processing , System design -- Data processing , Systems integration , Service-oriented architecture (Computer science) , Education, Higher -- Data processing
- Description: The demand for systems i·ntegration has become more and more significant in higher education as institutions want systems that provide coherent information with data that is up to date and not redundant and can seamlessly support the end user experience. Institutions have become more reliant on information systems to support both administrative functions and those involved in teaching, learning and research, but because each department supports a diverse array of computing platforms and applications, it becomes very difficult to integrate these systems. SOA is classified as an innovative approach to integrating existing systems involving the use of independent services that can be accessed without knowledge of the underlying platform implementation. Unfortunately, the SOA initiative will not be success if it is not understood and used correctly by various applications and systems throughout the organisation. SOA introduces complexity and challenges in systems integration, acceptance, governance, data, development planning, security and external opportunities. If an organisation does not embrace or enable change in each of these areas, it is not ready for the adoption of SOA. This research investigates the systems integration challenge in selected South African universities and explores factors for SOA adoption. The framework for the adoption of SOA comprises seven factors, of which Systems Integration is the most significant and represents an efficient starting point for institutions considering SOA adoption. Acceptance, Governance, Data, Development Planning, Security and External Opportunities are other factors of SOA adoption that require careful and thorough consideration before an institution can successfully adopt SOA. The results of this research emphasise the importance of being able to embrace change and innovation and modify strategies in order to reflect the constant changes required for the adoption of SOA. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
The development and implementation of an evaluation for rural ICT projects in developing countries: an exploration of the Siyakhulu Living Lab, South Africa
- Authors: Pade Khene, Caroline Ileje
- Date: 2010
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1138 , http://hdl.handle.net/10962/d1002767
- Description: Rural development is a priority for poverty alleviation and development in developing countries, as the majority of the poor live in rural areas. Information and knowledge are key strategic resources for social and economic development as they empower rural communities with the ability to expand their choices through knowing what works best in their communities. Information and communication technologies (ICT) play a significant role in supporting rural development activities through providing supportive development information and creating essential interconnectivities between rural areas and more developed regions. However, rural ICT for development (ICT4D) is still at best a ‘working hypothesis’, faced with barriers and challenges associated with implementation and use in the rural environment; which threaten the success, sustainability or relevance of an ICT intervention. Many key questions remain largely unanswered, with no concrete or credible data to support a wide range of claims concerning the use of ICT for development. The evaluation of rural ICT projects is indispensable as it determines the need, effectiveness, impact, sustainability and extent of the awareness of the contribution such projects or programmes can make in poverty alleviation and development. Even so, existing ICT4D evaluations are confrontedwith shortcomings and challenges which influence the accuracy and reliability of evaluation conclusions. These shortcomings highlight the need to embark on a more comprehensive evaluation approach, sensitive to the rural environment. This research study was aimed at developing a comprehensive rural ICT evaluation framework to assess ICT projects and interventions that work toward supporting poverty eradication in rural communities. A multi-method approach was used to determine the multiple variables and components associated with rural ICT evaluation, and then to determine how these variables interrelate. The approach is founded on programme evaluation, ICT for development evaluation, and information systems evaluation. Firstly, key domains of programme evaluations combined with an exploration of the need and shortcomings of ICT4D evaluation, contributed to the development of a template to analyse existing ICT4D evaluation frameworks and information systems frameworks, based on a selection of criteria. The combined analysis of the two groups of frameworks compares and contrasts key characteristics that form the structure of a comprehensive evaluation. This analysis and a review of programme evaluation enabled the development of a Rural ICT Comprehensive Evaluation Framework (RICT-CEF) that encompasses the key components essential for a comprehensive evaluation of rural ICT projects. The theoretical framework aims to inform ICT intervention to improve and support rural development, through the application of fundamental and interconnected evaluation domains sensitive to the rural environment, throughout the project’s lifecycle. In order to obtain a better understanding and application of the RICT-CEF, a real-life case study investigation of the Siyakhula Living Lab reveals the lessons learned (shortcomings and suitability) from applying a prototype of the framework in a rural environment. The study is characteristically a rich case study, as the investigation occurs at two levels: 1) The actual evaluation of the project to obtain results to improve or guide the project, through applying domains of the RICT-CEF, and 2) Observing and investigating the application of the RICT-CEF framework to learn lessons from its evaluation process in a real-life context. The research study reveals the compatibility of the RICT-CEF framework in a real-life rural ICT intervention case, and builds lessons learned for enhancing the framework and guiding future evaluations in ICT4D. The RICT-CEF can possibly be viewed as a platform for the key domains and processes essential for the evaluation of ICT4D interventions; which can be customised for a variety of ICT projects, such that a comparative assessment of projects can provide measurement and further awareness of the impact of rural ICT in developing countries.
- Full Text:
- Date Issued: 2010
- Authors: Pade Khene, Caroline Ileje
- Date: 2010
- Subjects: Siyakhula Living Lab Information technology -- South Africa -- Eastern Cape Rural development projects -- South Africa -- Eastern Cape Communication in economic development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1138 , http://hdl.handle.net/10962/d1002767
- Description: Rural development is a priority for poverty alleviation and development in developing countries, as the majority of the poor live in rural areas. Information and knowledge are key strategic resources for social and economic development as they empower rural communities with the ability to expand their choices through knowing what works best in their communities. Information and communication technologies (ICT) play a significant role in supporting rural development activities through providing supportive development information and creating essential interconnectivities between rural areas and more developed regions. However, rural ICT for development (ICT4D) is still at best a ‘working hypothesis’, faced with barriers and challenges associated with implementation and use in the rural environment; which threaten the success, sustainability or relevance of an ICT intervention. Many key questions remain largely unanswered, with no concrete or credible data to support a wide range of claims concerning the use of ICT for development. The evaluation of rural ICT projects is indispensable as it determines the need, effectiveness, impact, sustainability and extent of the awareness of the contribution such projects or programmes can make in poverty alleviation and development. Even so, existing ICT4D evaluations are confrontedwith shortcomings and challenges which influence the accuracy and reliability of evaluation conclusions. These shortcomings highlight the need to embark on a more comprehensive evaluation approach, sensitive to the rural environment. This research study was aimed at developing a comprehensive rural ICT evaluation framework to assess ICT projects and interventions that work toward supporting poverty eradication in rural communities. A multi-method approach was used to determine the multiple variables and components associated with rural ICT evaluation, and then to determine how these variables interrelate. The approach is founded on programme evaluation, ICT for development evaluation, and information systems evaluation. Firstly, key domains of programme evaluations combined with an exploration of the need and shortcomings of ICT4D evaluation, contributed to the development of a template to analyse existing ICT4D evaluation frameworks and information systems frameworks, based on a selection of criteria. The combined analysis of the two groups of frameworks compares and contrasts key characteristics that form the structure of a comprehensive evaluation. This analysis and a review of programme evaluation enabled the development of a Rural ICT Comprehensive Evaluation Framework (RICT-CEF) that encompasses the key components essential for a comprehensive evaluation of rural ICT projects. The theoretical framework aims to inform ICT intervention to improve and support rural development, through the application of fundamental and interconnected evaluation domains sensitive to the rural environment, throughout the project’s lifecycle. In order to obtain a better understanding and application of the RICT-CEF, a real-life case study investigation of the Siyakhula Living Lab reveals the lessons learned (shortcomings and suitability) from applying a prototype of the framework in a rural environment. The study is characteristically a rich case study, as the investigation occurs at two levels: 1) The actual evaluation of the project to obtain results to improve or guide the project, through applying domains of the RICT-CEF, and 2) Observing and investigating the application of the RICT-CEF framework to learn lessons from its evaluation process in a real-life context. The research study reveals the compatibility of the RICT-CEF framework in a real-life rural ICT intervention case, and builds lessons learned for enhancing the framework and guiding future evaluations in ICT4D. The RICT-CEF can possibly be viewed as a platform for the key domains and processes essential for the evaluation of ICT4D interventions; which can be customised for a variety of ICT projects, such that a comparative assessment of projects can provide measurement and further awareness of the impact of rural ICT in developing countries.
- Full Text:
- Date Issued: 2010
An access control model for a South African National Electronic Health Record System
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
- Authors: Tsegaye, Tamir Asrat
- Date: 2019
- Subjects: Medical records -- Data processing , Medical records -- Data processing -- Safety measures , Medical records -- Data processing -- South Africa , Medical records -- Data processing -- Access control , Medical informatics , Medical records -- Management -- South Africa , Health services administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/97046 , vital:31390
- Description: Countries such as South Africa have attempted to leverage eHealth by digitising patients’ medical records with the ultimate goal of improving the delivery of healthcare. This involves the use of the Electronic Health Record (EHR) which is a longitudinal electronic record of a patient’s information. The EHR is comprised of all of the encounters that have been made at different health facilities. In the national context, the EHR is also known as a national EHR which enables the sharing of patient information between points of care. Despite this, the realisation of a national EHR system puts patients' EHRs at risk. This is because patients’ information, which was once only available at local health facilities in the form of paper-based records, can be accessed anywhere within the country as a national EHR. This results in security and privacy issues since patients’ EHRs are shared with an increasing number of parties who are geographically distributed. This study proposes an access control model that will address the security and privacy issues by providing the right level of secure access to authorised clinicians. The proposed model is based on a combination of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). The study found that RBAC is the most common access control model that is used within the healthcare domain where users’ job functions are based on roles. While RBAC is not able to handle dynamic events such as emergencies, the proposed model’s use of ABAC addresses this limitation. The development of the proposed model followed the design science research paradigm and was informed by the results of the content analysis plus an expert review. The content analysis sample was retrieved by conducting a systematic literature review and the analysis of this sample resulted in 6743 tags. The proposed model was evaluated using an evaluation framework via an expert review.
- Full Text:
- Date Issued: 2019
Design ethnography: methodological considerations for rebalancing socio-technical phenomena in CMS performativity
- Authors: Jordaan, Leandra
- Date: 2020
- Subjects: Database management -- Social aspects , Information technology -- Social aspects , Management information systems -- Social aspects , Database management -- Philosophy , Information technology -- Philosophy , Management information systems -- Philosophy
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164781 , vital:41164
- Description: As a practitioner, I had been part of two Content Management System (CMS) Projects in a particular setting that did not deliver on the expected outcomes. The expected outcomes of the projects included streamlined processes, better access to information, functionalities to drive engagement, reduced time searching for information, and improved reusability of content. As I began to reflect on the projects, a certain discomfort developed when the social aspect was ignored in favour of the technological. I sought a better understanding, but I was unaware of the fact at first. The techno-centricity as a concept found in literature and my experience as content management (CM) practitioner – together informed my interest in rebalancing the social and the technological. Thus, I focused on conduct in performing of tasks and emphasised attention on the practices of experts who gave insight into context of CM and use. The research participants are communication practitioners who have the responsibility to communicate internally and externally on behalf of a publicly-funded university in South Africa. Guided by the abductive argument and literature, the key themes for the research focused on technology, individuals and the organisation. The focus on technology (CMS as a subfield of Information Systems) began with my involvement in two CMS Projects. What came to the fore was that the practitioner perspective, and thus their experiential knowledge are neglected in research and that it may be an over-emphasis on techno-centrism in CMS research. I sought to better balance the social and technological aspects. The second focus on individuals (communication practitioners) was to value the stakeholder who was considered representative of the worldviews of the community. I sought to support corporate communication practices in the task of relationship building with stakeholders. The findings showed that the culture of informatio sharing was low at the University. The third focus on the organisation (the University) was to prioritise the success of the communication undertaken by the University. I interrogated the role of power. I demonstrated how the role of power could be seen as productive and positive in the context of HE, the social reality of CUT, and this IS research itself. I positioned the research as interpretivistic. I used hermeneutics as a mode of analysis because as researcher-practitioner, I am part of the social reality of the research. A safeguard against my subjectivity was the use of Phronesis as an orientation to knowledge. An organisation with a shared understanding of ethics and values will balance instrumental rationality (scientific and technical reasoning) with value-rationality (moral reasoning about right and wrong actions). Phronesis is the virtue that should ensure ethical behaviour in actions, yet over time, social science research, in a quest to mimic the natural sciences, centred on episteme and techne. I constructed the lens by particularising the four value-rational questions of Flyvbjerg’s contemporary Phronesis to the performative perspective of the research. My interest in social reality, as well as socio-technical aspects, have led to design-ethnography (D-E) to emerge as the most suitable and most appropriate approach to the research. D-E asked the prescriptive ‘How’ and descriptive ‘What’ questions, whilst the Flyvbjergian Phronesis lens brought focus on the ‘Why’ question. D-E emphasised the betterment of the interaction and synergy between research conducted and practice. My status as an immersed researcher needed careful consideration, and D-E accepted that a certain level of immersion is necessary, D-E has short interventional fieldwork, and D-E has future-oriented engagement. The contemporary Phronesis used in the research is to enact D-E and not an all-encompassing guide for doing Phronesis research The key contributions to the research are predominantly methodological. The claims draw on evidence focused on the three themes technology, individuals and organisation, and the phenomena of interest which are to rebalance the social and the technological in CM practices. The first claim is that immersion in the context is possible and supported by the specific particularised approaches to the research. The second claim suggests a way to rebalance the socio-technical nature of Information Systems (IS). The third claim suggests that there is a viewpoint for power that is not focused on power’s oppressive nature which could see a diverging focus on power in IS research in future. In this viewpoint, the status quo of social reality is not questioned, nor are their emancipatory ambitions. The fourth and final claim suggests that Phronesis as a lens could enact D-E, which in turn is a method that assists in valuing the experience of the practitioner and the support of collaborative work. The research is recommended for IT/IS practitioners who prefer to value participants’ views in design. The approaches used could be of value for researchers who consider the context of their research to be of higher importance than the generalisation of outcomes. Researchers who find themselves in the position of being immersed in the context but question the correctness of active engagement in the field may discover some value from the research approaches and my experience. Also, researchers or practitioners who have an interest in the balance between social and the technological aspects of IS projects. Researchers or practitioners interested in Phronesis, and perhaps the viewpoint of a lens may also find value in this research.
- Full Text:
- Date Issued: 2020
- Authors: Jordaan, Leandra
- Date: 2020
- Subjects: Database management -- Social aspects , Information technology -- Social aspects , Management information systems -- Social aspects , Database management -- Philosophy , Information technology -- Philosophy , Management information systems -- Philosophy
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/164781 , vital:41164
- Description: As a practitioner, I had been part of two Content Management System (CMS) Projects in a particular setting that did not deliver on the expected outcomes. The expected outcomes of the projects included streamlined processes, better access to information, functionalities to drive engagement, reduced time searching for information, and improved reusability of content. As I began to reflect on the projects, a certain discomfort developed when the social aspect was ignored in favour of the technological. I sought a better understanding, but I was unaware of the fact at first. The techno-centricity as a concept found in literature and my experience as content management (CM) practitioner – together informed my interest in rebalancing the social and the technological. Thus, I focused on conduct in performing of tasks and emphasised attention on the practices of experts who gave insight into context of CM and use. The research participants are communication practitioners who have the responsibility to communicate internally and externally on behalf of a publicly-funded university in South Africa. Guided by the abductive argument and literature, the key themes for the research focused on technology, individuals and the organisation. The focus on technology (CMS as a subfield of Information Systems) began with my involvement in two CMS Projects. What came to the fore was that the practitioner perspective, and thus their experiential knowledge are neglected in research and that it may be an over-emphasis on techno-centrism in CMS research. I sought to better balance the social and technological aspects. The second focus on individuals (communication practitioners) was to value the stakeholder who was considered representative of the worldviews of the community. I sought to support corporate communication practices in the task of relationship building with stakeholders. The findings showed that the culture of informatio sharing was low at the University. The third focus on the organisation (the University) was to prioritise the success of the communication undertaken by the University. I interrogated the role of power. I demonstrated how the role of power could be seen as productive and positive in the context of HE, the social reality of CUT, and this IS research itself. I positioned the research as interpretivistic. I used hermeneutics as a mode of analysis because as researcher-practitioner, I am part of the social reality of the research. A safeguard against my subjectivity was the use of Phronesis as an orientation to knowledge. An organisation with a shared understanding of ethics and values will balance instrumental rationality (scientific and technical reasoning) with value-rationality (moral reasoning about right and wrong actions). Phronesis is the virtue that should ensure ethical behaviour in actions, yet over time, social science research, in a quest to mimic the natural sciences, centred on episteme and techne. I constructed the lens by particularising the four value-rational questions of Flyvbjerg’s contemporary Phronesis to the performative perspective of the research. My interest in social reality, as well as socio-technical aspects, have led to design-ethnography (D-E) to emerge as the most suitable and most appropriate approach to the research. D-E asked the prescriptive ‘How’ and descriptive ‘What’ questions, whilst the Flyvbjergian Phronesis lens brought focus on the ‘Why’ question. D-E emphasised the betterment of the interaction and synergy between research conducted and practice. My status as an immersed researcher needed careful consideration, and D-E accepted that a certain level of immersion is necessary, D-E has short interventional fieldwork, and D-E has future-oriented engagement. The contemporary Phronesis used in the research is to enact D-E and not an all-encompassing guide for doing Phronesis research The key contributions to the research are predominantly methodological. The claims draw on evidence focused on the three themes technology, individuals and organisation, and the phenomena of interest which are to rebalance the social and the technological in CM practices. The first claim is that immersion in the context is possible and supported by the specific particularised approaches to the research. The second claim suggests a way to rebalance the socio-technical nature of Information Systems (IS). The third claim suggests that there is a viewpoint for power that is not focused on power’s oppressive nature which could see a diverging focus on power in IS research in future. In this viewpoint, the status quo of social reality is not questioned, nor are their emancipatory ambitions. The fourth and final claim suggests that Phronesis as a lens could enact D-E, which in turn is a method that assists in valuing the experience of the practitioner and the support of collaborative work. The research is recommended for IT/IS practitioners who prefer to value participants’ views in design. The approaches used could be of value for researchers who consider the context of their research to be of higher importance than the generalisation of outcomes. Researchers who find themselves in the position of being immersed in the context but question the correctness of active engagement in the field may discover some value from the research approaches and my experience. Also, researchers or practitioners who have an interest in the balance between social and the technological aspects of IS projects. Researchers or practitioners interested in Phronesis, and perhaps the viewpoint of a lens may also find value in this research.
- Full Text:
- Date Issued: 2020
Effective management of an information technology professional's career
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
- Authors: Tedder, Derek
- Date: 2005
- Subjects: Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1148 , http://hdl.handle.net/10962/d1004543 , Information technology -- Vocational guidance , Information technology -- Management , Knowledge management , Career development , Computer Science -- Vocational guidance , System analysis -- Vocational guidance
- Description: The human resource is constantly cited as an organisation's greatest asset. In a rapidly changing technological environment this is most applicable to the Information Technology (IT) function. Organisations are experiencing IT human resource problems such as low satisfaction, early plateauing, high turnover, burnout, limited advancement potential, nominal corporate commitment, supervisory aversion, poor organisational culture, and exceptional compensation. These problems are directly related to the IT professional's career. There is a lack of information and awareness surrounding IT careers to deal effectively with these problems. The research aims to create increased awareness of IT careers and the inherent problems through the development of a career management model. The research aims to identify the factors that influence IT careers, provide career management with a means to measure compatibility of the factors, and suggest solutions to incompatibility. The solving of this problem will be of mutual benefit to both organisations and individuals as they seek to better manage IT careers. After reviewing research literature relating to career anchors, IT job types, IT skills portfolios, and career dynamics a model for Effective IT Career Management (EITCM) has been constructed. The model represents the dynamic interactions between individual, organisational, and dependent factors. The model examines the compatibility of these interacting factors by measuring the levels of relevant career variables. The model suggests appropriate career management techniques to increase the compatibility of the interacting factors. An empirical study was designed and launched online to provide data that would confirm the seven Critical Success Factors (CSF) relating to the proposed model. The responses from the members of the Computer Society of South Africa (CSSA) allowed the seven hypotheses derived from the CSFs to be tested. The results of the empirical study were positive but required modification to five of the CSFs before they could be confirmed. The EITCM model was modified to reflect the improved CSFs. An awareness of career influencing factors combined with active career management is advantageous to both IT professionals and their organisations.
- Full Text:
- Date Issued: 2005
A personality-based surveillance model for Facebook apps
- Authors: Van der Schyff, Karl Izak
- Date: 2020
- Subjects: Facebook (Electronic resource) , Electronic surveillance -- Psychological aspects , Online social networks -- Psychological aspects , Social media -- Psychological aspects , Personality
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/145534 , vital:38447
- Description: The surveillance of data through the use of Facebook Apps is an ongoing and persistent problem that impacts millions of users. Nonetheless, limited research has been conducted investigating to what extent a Facebook user’s personality influences their awareness of such surveillance practices. Thus, to understand this situation better, the current study inductively developed four propositions from secondary data sources as part of a detailed content analysis. Spanning three search and analysis phases the content analysis led to the development of the research model. Guided by the propositions and research questions, a questionnaire was developed based on the relevant constructs prescribed by the Theory of Planned Behaviour. This questionnaire was used, and a total of 651 responses were collected from Facebook users over the age of 18 years old and residing in the United States of America. Primary data took place at both a univariate and multivariate level with a specific focus on the development of a structural model. Interpretation of the structural model revealed that out of all the Big Five personality traits, Conscientiousness exhibited the strongest relationship with information security awareness followed by Openness to Experience and Neuroticism, respectively. The results further indicated that the model constructs based on attitude, social norms and awareness significantly influenced the intended use of Facebook Apps. The study also contributes by indicating which personality traits are most vulnerable to Facebook App surveillance. For example, it was found that individuals high in Conscientiousness are the least vulnerable with individuals high in Extraversion being the most vulnerable. Since the results indicate that not all the personality traits are significantly related to the model constructs, additional factors may contribute to App surveillance in this context. Concerning this, factors such as user apathy, information privacy, privacy concerns, control and Facebook dependency are discussed as a means to argue why this might be the case.
- Full Text:
- Date Issued: 2020
- Authors: Van der Schyff, Karl Izak
- Date: 2020
- Subjects: Facebook (Electronic resource) , Electronic surveillance -- Psychological aspects , Online social networks -- Psychological aspects , Social media -- Psychological aspects , Personality
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/145534 , vital:38447
- Description: The surveillance of data through the use of Facebook Apps is an ongoing and persistent problem that impacts millions of users. Nonetheless, limited research has been conducted investigating to what extent a Facebook user’s personality influences their awareness of such surveillance practices. Thus, to understand this situation better, the current study inductively developed four propositions from secondary data sources as part of a detailed content analysis. Spanning three search and analysis phases the content analysis led to the development of the research model. Guided by the propositions and research questions, a questionnaire was developed based on the relevant constructs prescribed by the Theory of Planned Behaviour. This questionnaire was used, and a total of 651 responses were collected from Facebook users over the age of 18 years old and residing in the United States of America. Primary data took place at both a univariate and multivariate level with a specific focus on the development of a structural model. Interpretation of the structural model revealed that out of all the Big Five personality traits, Conscientiousness exhibited the strongest relationship with information security awareness followed by Openness to Experience and Neuroticism, respectively. The results further indicated that the model constructs based on attitude, social norms and awareness significantly influenced the intended use of Facebook Apps. The study also contributes by indicating which personality traits are most vulnerable to Facebook App surveillance. For example, it was found that individuals high in Conscientiousness are the least vulnerable with individuals high in Extraversion being the most vulnerable. Since the results indicate that not all the personality traits are significantly related to the model constructs, additional factors may contribute to App surveillance in this context. Concerning this, factors such as user apathy, information privacy, privacy concerns, control and Facebook dependency are discussed as a means to argue why this might be the case.
- Full Text:
- Date Issued: 2020
The Integration of Personally-owned Information and Communication Technologies (PICTs) for Teaching and Learning in Resource-Constrained Higher Education Environments – The Case of a Nigerian University
- Authors: Lewis, Oláñrewájú Olúrotimi
- Date: 2020
- Subjects: Uncatalogued
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/163582 , vital:41050 , doi:10.21504/10962/163582
- Description: Thesis (PhD)--Rhodes University, Faculty of Commerce, Information Systems, 2020
- Full Text:
- Date Issued: 2020
- Authors: Lewis, Oláñrewájú Olúrotimi
- Date: 2020
- Subjects: Uncatalogued
- Language: English
- Type: thesis , text , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/163582 , vital:41050 , doi:10.21504/10962/163582
- Description: Thesis (PhD)--Rhodes University, Faculty of Commerce, Information Systems, 2020
- Full Text:
- Date Issued: 2020
A cloud adoption framework for South African SMEs
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
- Authors: Mudzamba, Ronald Ratidzo
- Date: 2020
- Subjects: Cloud computing , Cloud computing -- Security measures , Small business -- Technological innovations -- South Africa -- Eastern Cape , Small business -- Information technology -- South Africa -- Eastern Cape , Information technology -- South Africa -- Eastern Cape , Technology-Organisation-Environment (TOE) framework , Small to Medium Enterprises (SMEs)
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/148574 , vital:38751
- Description: Small to Medium Enterprises (SMEs) have been touted as key enablers to the economic development of most countries. Despite growing evidence that most SMEs fail within their initial years, ICTs have been found to add substantial value in facilitating their success. However, in most developing countries, ICT adoption by SMEs has been plagued with a plethora of challenges ranging from poor electricity supply, high ICT costs, lack of ICT expertise to lack of government support. While this might seem problematic for SMEs, the adoption and the use of cloud services mitigates some of these challenges. The problem, however, is that a limited amount of literature has provided guidance with regard to how the cloud adoption process should be carried out by SMEs. The objective of this research, was therefore, to address this by developing a framework that can be used by SMEs to guide them through the cloud adoption process. To this end, thirteen (13) semi-structured interviews were conducted across nine (9) SMEs in the Eastern Cape. The resultant interview transcripts were analysed using an established thematic approach; the result of which allowed for the development of a rich interpretive narrative about SME cloud adoption. Combined with theory from extant literature, this culminated in the development of a framework for cloud services adoption for SMEs in the Eastern Cape.
- Full Text:
- Date Issued: 2020
Passphrase and keystroke dynamics authentication: security and usability
- Authors: Bhana, Bhaveer
- Date: 2020
- Subjects: Computer security -- Management , Computers -- Access control -- Codewords , Computers -- Access control -- Keystroke timing authentication , Entropy (Information theory)
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146663 , vital:38546
- Description: It was found that employees spend a total 2.25 days within a 60 day period on password related activities. Another study found that over 85 days an average user will create 25 accounts with an average of 6.5 unique passwords. These numbers are expected to increase over time as more systems become available. In addition, the use of 6.5 unique passwords highlight that passwords are being reused which creates security concerns as multiple systems will be accessible by an unauthorised party if one of these passwords is leaked. Current user authentication solutions either increase security or usability. When security increases, usability decreases, or vice versa. To add to this, stringent security protocols encourage unsecure behaviours by the user such as writing the password down on a piece of paper to remember it. It was found that passphrases require less cognitive effort than passwords and because passphrases are stronger than passwords, they don’t need to be changed as frequently as passwords. This study aimed to assess a two-tier user authentication solution that increases security and usability. The proposed solution uses passphrases in conjunction with keystroke dynamics to address this research problem. The design science research approach was used to guide this study. The study’s theoretical foundation includes three theories. The Shannon entropy formula was used to calculate the strength of passwords, passphrases and keystroke dynamics. The chunking theory assisted in assessing password and passphrase memorisation issues and the keystroke-level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. A login assessment experiment collected data on user authentication and user-system interaction for passwords and passphrases. Plus, an expert review was conducted to verify findings and assess the research artefact in the form of a model. The model can be used to assist with the implementation of a two-tier user authentication solution which involves passphrases and keystroke dynamics. There are a number of components that need to be considered to realise the benefits of this solution and ensure successful implementation.
- Full Text:
- Date Issued: 2020
- Authors: Bhana, Bhaveer
- Date: 2020
- Subjects: Computer security -- Management , Computers -- Access control -- Codewords , Computers -- Access control -- Keystroke timing authentication , Entropy (Information theory)
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146663 , vital:38546
- Description: It was found that employees spend a total 2.25 days within a 60 day period on password related activities. Another study found that over 85 days an average user will create 25 accounts with an average of 6.5 unique passwords. These numbers are expected to increase over time as more systems become available. In addition, the use of 6.5 unique passwords highlight that passwords are being reused which creates security concerns as multiple systems will be accessible by an unauthorised party if one of these passwords is leaked. Current user authentication solutions either increase security or usability. When security increases, usability decreases, or vice versa. To add to this, stringent security protocols encourage unsecure behaviours by the user such as writing the password down on a piece of paper to remember it. It was found that passphrases require less cognitive effort than passwords and because passphrases are stronger than passwords, they don’t need to be changed as frequently as passwords. This study aimed to assess a two-tier user authentication solution that increases security and usability. The proposed solution uses passphrases in conjunction with keystroke dynamics to address this research problem. The design science research approach was used to guide this study. The study’s theoretical foundation includes three theories. The Shannon entropy formula was used to calculate the strength of passwords, passphrases and keystroke dynamics. The chunking theory assisted in assessing password and passphrase memorisation issues and the keystroke-level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. A login assessment experiment collected data on user authentication and user-system interaction for passwords and passphrases. Plus, an expert review was conducted to verify findings and assess the research artefact in the form of a model. The model can be used to assist with the implementation of a two-tier user authentication solution which involves passphrases and keystroke dynamics. There are a number of components that need to be considered to realise the benefits of this solution and ensure successful implementation.
- Full Text:
- Date Issued: 2020
Information technology support for transformation in higher educational institutions in South Africa
- Authors: Roets, Rina Annette
- Date: 2008
- Subjects: Education, Higher -- South Africa Educational change -- South Africa Universities and colleges -- South Africa Universities and colleges -- South Africa -- Administration Information technology -- South Africa Educational technology -- South Africa Education, Higher -- Technological innovations -- South Africa Knowledge management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1145 , http://hdl.handle.net/10962/d1002775
- Description: Higher Education Institutions (HEIs) have been in a state of change, and in South Africa, the term “transformation” is used to describe the changes occurring. These changes have implications for the structure, processes and focus of HEIs, and as such have implications for Information Technology (IS/ICT) support for HEIs. IS/ICT support for organisations is predicated on several factors, such as effective informational and technical support at all levels of the organisation, but especially support for the strategic goals of the organisation (alignment). For organisations in a state of rapid change other issues need to be considered, such as flexibility, and new and diverse information and communication needs. This paper investigates the use of Information Technology to support HEIs in transformation. The research examines factors that make HEIs less amenable to rationalist techniques such as mixed management styles and a “different” value chain. The difficulties for IS/ICT support of HEIs at all managerial levels is discussed, especially the issue of alignment with institutional goals. Thereafter, transformation of HEIs and the possibility of IS/ICT support in achieving the ill-defined goal of transformation is examined. The research uses management and IS/ICT theories such as the widely used and reported Porter’s value chain, Anthony’s information model, and Minzberg’s organisational model to suggest an analysis model for HEIs (Applegate, McFarlan and McKenney, 1996; Minzberg, 1979; Ward and Peppard, 2002). Furthermore, from the analysis of the literature, a model of antecedent factors for successful HEI transformation supported by IS/ICT is proposed. The research makes use of a comparative case study approach in which 3 (three) South African HEIs are investigated through the “lens” of the developed model. The major finding of the research is that the potential use of IS/ICT support for HEIs is not optimal in the three cases examined. Results of the analysis suggest that: • IS/ICT alignment with organisational goals at HEIs is low and holistic IS/ICT strategic management is lacking. The areas of Knowledge Management and Communication Management are conducted informally and Knowledge Management, especially, is not fully exploited. • The greatest area of concern is the lack of IS/ICT support for academic management, where academics are increasingly required to perform administrative and managerial tasks. • The merger/incorporation information needs have not caused major system problems, but other intangible aspects of the mergers/incorporations could be better supported by IS/ICT. The research concludes with a set of actions that should ensure a higher level of support, amongst which are the more holistic management of IS/ICT especially for Academic management needs, and particularly the use of IS/ICT in innovative ways to overcome the challenges of the “transformed” Universities: There are areas of excellence but the full possibilities afforded by technology are not exploited maximally in support of transformation. Research suggests that the reasons for this are mainly the lack of holistic strategic management of IS/ICT.
- Full Text:
- Date Issued: 2008
Information technology support for transformation in higher educational institutions in South Africa
- Authors: Roets, Rina Annette
- Date: 2008
- Subjects: Education, Higher -- South Africa Educational change -- South Africa Universities and colleges -- South Africa Universities and colleges -- South Africa -- Administration Information technology -- South Africa Educational technology -- South Africa Education, Higher -- Technological innovations -- South Africa Knowledge management
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:1145 , http://hdl.handle.net/10962/d1002775
- Description: Higher Education Institutions (HEIs) have been in a state of change, and in South Africa, the term “transformation” is used to describe the changes occurring. These changes have implications for the structure, processes and focus of HEIs, and as such have implications for Information Technology (IS/ICT) support for HEIs. IS/ICT support for organisations is predicated on several factors, such as effective informational and technical support at all levels of the organisation, but especially support for the strategic goals of the organisation (alignment). For organisations in a state of rapid change other issues need to be considered, such as flexibility, and new and diverse information and communication needs. This paper investigates the use of Information Technology to support HEIs in transformation. The research examines factors that make HEIs less amenable to rationalist techniques such as mixed management styles and a “different” value chain. The difficulties for IS/ICT support of HEIs at all managerial levels is discussed, especially the issue of alignment with institutional goals. Thereafter, transformation of HEIs and the possibility of IS/ICT support in achieving the ill-defined goal of transformation is examined. The research uses management and IS/ICT theories such as the widely used and reported Porter’s value chain, Anthony’s information model, and Minzberg’s organisational model to suggest an analysis model for HEIs (Applegate, McFarlan and McKenney, 1996; Minzberg, 1979; Ward and Peppard, 2002). Furthermore, from the analysis of the literature, a model of antecedent factors for successful HEI transformation supported by IS/ICT is proposed. The research makes use of a comparative case study approach in which 3 (three) South African HEIs are investigated through the “lens” of the developed model. The major finding of the research is that the potential use of IS/ICT support for HEIs is not optimal in the three cases examined. Results of the analysis suggest that: • IS/ICT alignment with organisational goals at HEIs is low and holistic IS/ICT strategic management is lacking. The areas of Knowledge Management and Communication Management are conducted informally and Knowledge Management, especially, is not fully exploited. • The greatest area of concern is the lack of IS/ICT support for academic management, where academics are increasingly required to perform administrative and managerial tasks. • The merger/incorporation information needs have not caused major system problems, but other intangible aspects of the mergers/incorporations could be better supported by IS/ICT. The research concludes with a set of actions that should ensure a higher level of support, amongst which are the more holistic management of IS/ICT especially for Academic management needs, and particularly the use of IS/ICT in innovative ways to overcome the challenges of the “transformed” Universities: There are areas of excellence but the full possibilities afforded by technology are not exploited maximally in support of transformation. Research suggests that the reasons for this are mainly the lack of holistic strategic management of IS/ICT.
- Full Text:
- Date Issued: 2008
Toward a culture of engagement: leveraging the enterprise social network
- Authors: Alistoun, Garth
- Date: 2014
- Subjects: Communication in organizations -- South Africa Business communication -- South Africa Social media -- South Africa -- Case studies Leadership -- South Africa -- Case studies Human capital -- Management Personnel management Organizational effectiveness
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1154 , http://hdl.handle.net/10962/d1010869
- Description: This research aims to provide a theory of enterprise social networking that generates and/or sustains a culture of employee engagement within a chosen South African private sector company. Based on an extensive review of interesting literature and the application of a grounded theory process in a chosen case, this research work provides a theory of enterprise social networking sustaining and growing employee engagement together with an explanatory theoretical framework that makes the theory more practical. Employee engagement is defined as “the harnessing of organisation member’s selves to their work roles; in engagement people employ and express themselves physically, cognitively, and emotionally during role performances.” This research regards employee engagement as a three part concept composed of a trait (personality/cognitive) aspect, a state (emotional) aspect, and a behavioural aspect. Research has shown that employee engagement has an unequivocal positive impact on business outcomes, such as profitability, business performance, employee retention and productivity. Employee engagement can be regarded as a culture if it is abundant within the organization’s employee population. Gatenby et al. (2009) propose that employee engagement is fostered by creating the desire and opportunity for employees to connect with colleagues, managers and the wider organisation. This standpoint is supported by Kular et al. (2008) who state that the “key drivers of employee engagement identified include communication, opportunities for employees to feed their views upward and thinking that their managers are committed to the organisation.” Further indicators of employee engagement include strong leadership (particularly in the form of servant leadership), accountability, a positive and open organisational culture, autonomy, and opportunities for development. One of the key facets of employee engagement is connection. A complementary definition of social media, an umbrella under which enterprise social networks fall, is that “(it) is more of a relationship channel, a connection channel. Each and every tweet, update, video, post, is a connection point to another human being. And it’s the other human being who will determine your worth to them.” Social media provides participants with access to a larger pool of resources and relationships than they would normally have access to. This enlarged relationship/resource pool is a result of expanding human and social capital enabled through social media tools. In order to produce a theory of enterprise social networking sustaining and growing a culture of employee engagement a rigorous grounded theory methodology coupled with a case study methodology was applied. The case study methodology was used to identify a suitable research site and interesting participants within the site while the grounded theory process was used to produce both qualitative and quantitative data sets in a suitability rigorous fashion. The corroborative data was then used to discover and define the emergent theory.
- Full Text:
- Date Issued: 2014
- Authors: Alistoun, Garth
- Date: 2014
- Subjects: Communication in organizations -- South Africa Business communication -- South Africa Social media -- South Africa -- Case studies Leadership -- South Africa -- Case studies Human capital -- Management Personnel management Organizational effectiveness
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: vital:1154 , http://hdl.handle.net/10962/d1010869
- Description: This research aims to provide a theory of enterprise social networking that generates and/or sustains a culture of employee engagement within a chosen South African private sector company. Based on an extensive review of interesting literature and the application of a grounded theory process in a chosen case, this research work provides a theory of enterprise social networking sustaining and growing employee engagement together with an explanatory theoretical framework that makes the theory more practical. Employee engagement is defined as “the harnessing of organisation member’s selves to their work roles; in engagement people employ and express themselves physically, cognitively, and emotionally during role performances.” This research regards employee engagement as a three part concept composed of a trait (personality/cognitive) aspect, a state (emotional) aspect, and a behavioural aspect. Research has shown that employee engagement has an unequivocal positive impact on business outcomes, such as profitability, business performance, employee retention and productivity. Employee engagement can be regarded as a culture if it is abundant within the organization’s employee population. Gatenby et al. (2009) propose that employee engagement is fostered by creating the desire and opportunity for employees to connect with colleagues, managers and the wider organisation. This standpoint is supported by Kular et al. (2008) who state that the “key drivers of employee engagement identified include communication, opportunities for employees to feed their views upward and thinking that their managers are committed to the organisation.” Further indicators of employee engagement include strong leadership (particularly in the form of servant leadership), accountability, a positive and open organisational culture, autonomy, and opportunities for development. One of the key facets of employee engagement is connection. A complementary definition of social media, an umbrella under which enterprise social networks fall, is that “(it) is more of a relationship channel, a connection channel. Each and every tweet, update, video, post, is a connection point to another human being. And it’s the other human being who will determine your worth to them.” Social media provides participants with access to a larger pool of resources and relationships than they would normally have access to. This enlarged relationship/resource pool is a result of expanding human and social capital enabled through social media tools. In order to produce a theory of enterprise social networking sustaining and growing a culture of employee engagement a rigorous grounded theory methodology coupled with a case study methodology was applied. The case study methodology was used to identify a suitable research site and interesting participants within the site while the grounded theory process was used to produce both qualitative and quantitative data sets in a suitability rigorous fashion. The corroborative data was then used to discover and define the emergent theory.
- Full Text:
- Date Issued: 2014