• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31780
  • 8646
  • 6248
  • 2716
  • 1510
  • 976
  • 454
  • 436
  • 431
  • 382
  • 226
  • 226
  • 226
  • 226
  • 226
  • Tagged with
  • 65434
  • 14040
  • 10983
  • 9377
  • 7507
  • 6494
  • 6451
  • 5955
  • 5689
  • 5571
  • 5265
  • 5197
  • 4939
  • 4783
  • 3801
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
281

Perceived influence of cybersecurity on the intention to use mobile banking applications

Chikoo, Ishmael 22 April 2020 (has links)
Banking institutions see the adoption and usage of mobile devices for banking namely mobile banking as an innovative financial service delivering strategy that bridges the gap between customers and banks. Mobile banking eliminates the need to visit bank branches for banking services and it eliminates the need to only perform banking services within fixed business hours. In mobile banking, mobile devices such as a cellphone, smartphone, or tablet’ are used to conduct non-financial and financial transactions such as checking account status, transferring money, making payments, or selling stocks. Mobile banking is suggested to take over the banking sector because it is economising and timesaving benefits. Despite these benefits, the adoption rate amongst consumers remains low, especially in developing countries where there is a knowledge gap in understanding why consumers do not engage in the frequent use of mobile banking applications. Apart from several factors identified in previous literature on mobile banking as influencers of limited usage and adoption of mobile banking, trust remains an important factor in the intention to adopt or use mobile banking applications. Also, because of the increasing prevalence of cyber threats in developing countries, the influence of cybersecurity is still questionable on their influences on the intention to adopt or use mobile baking applications. The increase in cyber threats and attacks has birthed the need for cybersecurity to be addressed. Given that most financial institutions see mobile banking as a strategy for their competitive advantage; it is important that they understand how best to address consumer’s fears brought about by cybersecurity threats. Literature has not covered more ground on the analysis of mobile banking applications (Uduimoh., Osho., Ismaila, & Shafi’i, 2019). The purpose of this study is to investigate the perceived influence of cybersecurity on the user’s intentions to use mobile banking applications. The study identified seven salient cybersecurity factors that influence the intention to use mobile banking applications. These cybersecurity factors were grouped into two groups, namely intrinsic factors and extrinsic factors and resulted in the development of a conceptual model. With this model, hypothesises were developed and tested statistically using quantitative data from an online selfadministered Qualtrics survey questionnaire. Data collected from 90 participants was statistically analysed in Smart PLS 3 (a quantitative data analysis software). Structural Equation Modeling (SEM) and Partial Least Squares path modelling approaches were adopted for data analysis. Hypothesis testing was performed on salient factors that influence the perception of cybersecurity on the intention to use mobile banking applications. The findings concluded that salient significant factors that influence the perception of mobile banking cybersecurity on the intention to use mobile banking applications were perceived data confidentiality and cybersecurity awareness. As a result, the study concluded that one’s perception on ability to avert cybersecurity threats and attacks, how they perceived the protection of their data from being modified by unauthorised users, how they perceive their data to be kept confidential and their knowledge of cybersecurity from legitimate sources influences their intention to use mobile banking applications. Finally, this study investigated the empirical evidence of the knowledge gap concerning the perceived influence of cybersecurity on the intention to use mobile banking applications.
282

The effectiveness of school-based interventions addressing adolescent mental health in Low- and Middle-Income Countries: A Systematic Review and Meta Analysis

Albertus, Cleo Alyssa 09 September 2020 (has links)
Mental health is fundamental to a person's wellbeing and quality of life, as well as, influences social and economic outcomes across an individual's lifespan (Barry, Clarke, Jenkins, & Patel, 2013). The World Health Organization (WHO) defines mental health as a “state of well-being in which an individual realizes his or her own abilities, can cope with the normal stresses of life, can work productively and is able to make a contribution to his or her community” (WHO, 2018). Mental health is considered integral to a person's overall wellbeing and can be determined by a variety of factors such as socioeconomic, environmental and biological (WHO, 2018). Mental health disorders are considered one of the most common causes of disability worldwide, thus resulting in the disease burden of mental illness being an important public health concern (ODPHP, 2019). Mental illness refers to all diagnoseable mental disorders and conditions, which result in significant emotional, social and behavioural changes that cause distress and hamper the individual's ability to function in everyday life (Pareketh, 2018).
283

A comparison of alternative technology adoption models : the adoption of a CASE tool at a university

Pollock, Michael A January 2004 (has links)
Bibliography: leaves 95-105. / In a field such as that of Information Systems the emergence of new technologies is one of the only constants. It is therefore necessary, indeed vital, to be able to measure, as well as anticipate, the adoption and diffusion of these new technologies into organisations. For this purpose adoption models came to the fore. Such models include the Technology Acceptance Model (TAM) (Davis, 1989), the Technology Acceptance Model 2 (T AM2) (Venkatesh & Davis, 2000), the Decomposed Theory of Planned Behaviour (DTPB) (Taylor & Todd, 1995b), and the Perceived Characteristics of Innovating model (PCI) (Moore & Benbasat, 1991). Adoption models test the perceptions and attitudes of potential and actual adopters of a new technology. Although all of the adoption models test adoption of a new technology, each tests different aspects of this adoption. Through the comparison of the four adoption models mentioned above, this study determines which constructs mostly strongly explain the adoption of a CASE tool by university students. These constructs are then combined to form a new technology adoption model, the Perceived Characteristics of Technology Adoption CPCTA), which is tested and found to explain a significant degree of variance in the context of CASE tool adoption amongst students at a university.
284

Broadband diffusion in households of South Africa

Naidoo, Mogen January 2011 (has links)
Includes abstract. / Includes bibliographical references (p. 272-281). / This research attempts to investigate the adoption, use and impact of broadband services from a holistic point of view encompassing the factors influencing the adoption, use and impact of broadband. This study explores the broadband developments in South Africa and discusses the challenges faced in increasing the broadband penetration rate within the country.
285

Business priorities driving BYOD and the resulting consequences: a South African case study

Miller, Steve Gavin January 2016 (has links)
The consumerisation of information technology (IT) introduced the bring your own device (BYOD) phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organisational systems in order to perform their work tasks. Such devices include smart phones, tablets and laptop computers. BYOD provide s opportunities for both the organisation and employees, but the adoption of BYO D also introduces risks to the organisation. Mobility and management of BYOD and CYOD (choose your own device) has consistently been a top concern for business management and Chief Information Officers (CIO's) globally. In the current, challenging economic environment organisations need to use all their resources, including technology, effectively. Organisations that develop an effective BYOD program can use this to assist in achieving their organisational objectives. This study uses a case study approach to investigate how business priorities drive the adoption of BYOD and how BYOD benefits and risks are realised by the organisation. Primary empirical data was collected using semi-structured interviews with employees from a large financial services organisation. Policy documents from the organisation was analysed as secondary data. Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practises. The themes were combined into a conceptual model, showing the decision process in adopting a BYOD program. This research contributes to the body of knowledge in this area, focusing on the South African context. The conceptual model can serve as an example for organisations currently making BYOD adoption decisions or organisations that are not achieving the full benefits of their BYOD program. The conceptual model reveals that organisations can use BYOD to achieve benefits including having a mobile workforce which results in an increase in productivity. However, mobility introduces risk to the organisation where information security risks is the top concern. This study recommends using a combination of technical and human controls to manage the risks. The technical controls include the use of an enterprise mobility management system and password controls. The human controls include the creation of effective BYOD and information security policies that the employees understand and follow. Providing employees with information security awareness and training is essential.
286

The use of social media in business by women entrepreneurs in the KSA: The case of Instragram

Al-Haidari, Nawal Nasser January 2017 (has links)
There have been few studies done on Small and Medium Enterprises (SME) in the context of the Kingdom of Saudi Arabia. Furthermore, studies show that Saudi women entrepreneurs (SWE) are constrained and faced with challenges that inhibit the growth of their small businesses. Such challenges include cultural factors, lack of business knowledge and expertise by entrepreneurs, lack of financial support for entrepreneurs, lack of training from the private sector, lack of business education supported by government for entrepreneurs and limited business opportunities. However, the adoption of social media, like Instagram, has been shown to help SME address numerous challenges experienced in their business context. The Instagram application has attracted huge numbers of users and is one of the fastest growing social media platforms in the world. It differentiates itself from other social networking sites by offering people a unique and easy way to communicate, since many social media users prefer posting photos or short video clips. Instagram is characterized by its primary function of posting and sharing images. Instagram is a highly effective, time-efficient, and user-friendly social media platform for businesses. Instagram quickly gained global popularity and reached roughly 300 million users in 2014. Thus Instagram, as a tool to market products and services, could enable SWE to overcome challenges which they face in the day to day running of their businesses. While the usefulness of adopting Instagram has been highlighted, there is limited knowledge regarding how SWE can adopt this social media application to overcome the various challenges experienced in their small businesses. No studies, to the author's knowledge, have examined this phenomenon in the Kingdom of Saudi Arabia (KSA). This study, therefore aims to examine how women entrepreneurs in the KSA adopt social media, Instagram in particular, to overcome various challenges in their small businesses. The study uncovers the challenges they face while adopting Instagram, as well as the advantages of adopting the tool. This study is qualitative, assumes an interpretive epistemological stance, and uses domestication theory as a framework for the research. Domestication theory involves looking at how people adopt technologies and integrate them into their activities and relationships in their daily lives. The data for this study was gathered through semi-structured interviews with a sample of 20 women entrepreneurs in the KSA. Interviewees were identified using snowball and purposive sampling techniques. Thematic analysis was used for analysing the data collected in order to extract codes and configurations of business challenges, Instagram-related challenges and benefits that result from adopting Instagram in small businesses. The findings revealed the following business challenges incurred by SWE: lack of business experience, stringent requirements for business registration, financial restrictions, judgement by society, the need for privacy and security, poor communication, and physical access to customers. The adoption of Instagram as a marketing space helped increase flexibility in the daily lives of SWE. The findings have shown that SWE appreciate the benefits of adopting Instagram in order to overcome business challenges. Yet, the findings also displayed that despite SWE still running their businesses through Instagram, there are a number of challenges that they are faced with. These challenges include coping with the lack of time to answer all inquiries, the lack of business rights and protection, the cancellation of orders, the need for uniqueness, and trust issues.
287

Integration of palliative care in African health systems: a systematic review

Court, Lara A 31 January 2019 (has links)
Millions of people need palliative care worldwide for symptoms associated with life-threatening illnesses, yet few receive it. This is particularly true in low-and-middle income countries, meaning that most are left without support and pain relief at the end of their life. Access to palliative care is now being understood as a human right and the ethical responsibility of health systems. This has resulted in increased international focus and a call to integrate palliative care into health systems to promote access, and inversely to strengthen health systems. Yet how to do this in low-and-middle income countries is unclear. This study used scoping and systematic review methods to provide synthesised evidence on the approaches and interventions being used to integrate palliative care into African health systems, as well as describe lessons that can be learnt from these efforts. 40 articles were identified in the systematic review that described 51 different interventions that integrated palliative care into part of the health system in one or more African countries. The integration of palliative care services was rarely linked to health systems strengthening and concepts associated with integration were used inconsistently, if used at all. Core themes emerged on facilitators and barriers to the integration of palliative care into health systems. Facilitators included the use of a system-wide approach, the creation of sustainable partnerships, and making the patient central to integration interventions. The health system also needs to be able to support integration. This requires the presence of necessary policies and resources for palliative care, together with sufficient health workers who are trained and motivated to provide palliative care. Findings provide contextual evidence to guide implementors and decision makers seeking to integrate palliative care into health systems in Africa, as well as other low and-middle income countries.
288

BYOD: Risk considerations in a South African organisation

Veljkovic, Ivan 25 February 2019 (has links)
In recent times, while numerous organisations have difficulty keeping abreast with the frequent year-on-year technology changes, their employees on the other hand, continue to bring their personal devices to work to more readily access organisational data. This concept is known as Bring Your Own Device (BYOD). Studies have demonstrated that the introduction of BYOD commonly has a positive effect on both organisation and employees: increased optimism, job satisfaction and productivity are some of the perceived positive effects. Furthermore, BYOD can improve employees’ opportunities for mobile working and assist with the work flexibility they seek. This phenomenon, however, is still not well understood. In the South African context, this refers particularly to an inadequate understanding of risks associated with the introduction of BYOD into organisations. Some of the risks associated with this phenomenon are, for instance, related to information security, legislation and privacy issues. Hence, the intention of this research was to investigate, determine and assess BYOD risk considerations in a South African organisation. Using the available literature on this subject and an interpretative exploratory case study approach, this research explored various facets of BYOD-related risks (e.g. implementational, technological, legislation, regulation and privacy risks, human aspects and organisational concerns) as well as the impact these risks may have on both employees and an organisation. The organisation under investigation – from this point onward referred to as “Organisation A” – is a South African based information technology (IT) security consulting and service management organisation, which has seen increased expansion in its business and thus an increase in the number of its employees utilising their personal devices at the workplace. Even so, Organisation A was uncertain regarding possible risks that might hinder benefits of BYOD. Hence, this researcher defined the main research question as “What are the risks of introducing the BYOD in the South African organisation and what is an effective approach to address identified risks?”. The main objective was to identify and describe BYOD-related risks and to propose an appropriate model for addressing these risks. To answer the main research question, this researcher reviewed the applicable literature on the BYOD, including the limited South African literature pertaining to the subject. The review elicited the most common BYOD-related risks but also some models, frameworks and standards that may be applied for addressing these risks. Based on these revelations, an applicable BYOD risk management model was created and proposed. The literature review findings were subsequently tested in the empirical setting (in Organisation A) by conducting comprehensive interviews with research participants. This research adopted a qualitative approach in general and a case study methodology in particular. The collected data were analysed using the interpretative phenomenological analysis (IPA), which aided in providing a comprehensive understanding of the interviewees’ responses regarding the BYOD risks. The interviewees were selected based on a purposeful (pre-defined) sampling. The results of this interpretative research suggest that the interviewees’ responses are closely aligned with the information on BYOD risks collected from the pertinent literature. The results show that successful introduction and usage of BYOD in the studied organisation requires the implementation of mixed risk management measures: technological (e.g. mobile device management and its additional components), non-technological (e.g. IT or BYOD security policies), the usage of general risk management frameworks (e.g. ISO 27001), the development of an organisational security culture and skilling of the human factor (e.g. employee awareness, training and education, for example). Additionally, it was found that participation of employees in the development of BYOD policies is an essential and effective tactic for transforming a fragile BYOD risk link (i.e. employees) into a strong risk prevention mechanism. Furthermore, this research also revealed that in the South African context, it is important that an organisation’s BYOD security policies are sound, preferably meeting the POPI Act requirements and thereby avoiding legislation risks. The contribution of this research is twofold: first academic, and second, practical. The academic contribution is realised by adding to the body of knowledge on the BYOD risks – most particularly in terms of understanding potential risks when introducing BYOD in the South African context. The practical contribution manifests through the provision of detailed risk considerations and mitigation guidelines for organisations wishing to introduce BYOD practices or considering ways to improve their current BYOD risk management strategy. It is acknowledged that this research has some limitations, particularly in regard to the limited generalisation of the findings due to the limited sample provided by only one organisation. Although the results are not necessarily applicable to other South African organisations, these limitations did not impact the relevance and validity of this research.
289

Towards a model for ERP user adoption in SMMEs an emerging economy analysis

Jansen van Vuuren, Isabel January 2011 (has links)
Includes abstract. / Includes bibliographical references. / Small, micro and medium-sized enterprises (SMMEs) are the breeding ground for entrepreneurs, the future of emerging economies and the driving force in the global economy. A successful SMME sector holds numerous benefits for an emerging economy such as South Africa. Due to the large growth in SMMEs globally, Enterprise Resource Planning (ERP) vendors are developing products to cater for the ERP SMME sector. ERP systems provide SMMEs with a strategic tool which potentially improves their business processes, increases competitiveness and provides them with the opportunity to compete globally and sell their products internationally. While ERP systems provide an organisation with various benefits, the successful implementation of ERP systems is a challenge.
290

Investigating the use of a social networking site in the facilitation of internationalisation in higher education

Keith , Kim Jacqueline January 2014 (has links)
Includes bibliographical references. / Internationalisation is the movement of people, their belief systems, culture, technologies, education, concerns and economy across geographical borders but where the national higher education system boundaries remain intact. Internationalisation is a growing area in world-wide higher education. To respond to the challenges of internationalisation, universities need to ensure that the service to international students is improved. In order for local and international students to develop into responsible global citizens, they need to understand diverse cultures and be able to relate appropriately to individuals from different backgrounds. Both local and international students, therefore, need to interact while they are on the university campus together. However, international students tend to interact only within their own cohorts, and local students do not see the value in building relationships with international students who may not remain in the country once they graduate. International students leave the university wishing that they had made more local friends and had learned more about the cultures of the country in which they had studied. To respond to the problem of getting local and international student to interact more, a virtual environment on the SNS Facebook was proposed as a safe space for the students, and other key stakeholders, to network. A Facebook Page called IAPO @ UCT was set up by the International Academic Programmes Office (IAPO) - an administrative department at the University of Cape Town (UCT) - in order to provide IAPO stakeholders with an online community in which to interact. The page was set up and monitored over a two and a half year period to see what types of interactions would occur. Actor Network Theory (ANT) was used as the main, high level lens for analysing the interactions on IAPO @ UCT. Certain concepts from the theories of Networking, Social Capital, Social Presence and Social Identity were further used to scrutinise and explain the actions of the Page Poster on IAPO @ UCT. IAPO @ UCT was able to facilitate internationalisation at UCT as there was evidence in the page posts that key stakeholders were interacting with each other online. Supernodes were identified who could increase the dissemination of information on the page, and the value of offline events was highlighted as a means for increasing student participation both off- and online. IAPO branding and inclusion of student assistance in events was suggested in order to increase a sense of belonging to IAPO @ UCT. In addition, the effect of deleting posts and hiding comments was discussed with regard to the building of trustworthiness within the online community.

Page generated in 0.1194 seconds