• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 45
  • 14
  • 2
  • 1
  • Tagged with
  • 74
  • 74
  • 74
  • 74
  • 33
  • 31
  • 23
  • 22
  • 21
  • 21
  • 21
  • 16
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Addressing the incremental risks associated with social media by using the cobit 5 control framework

Gerber, Petro 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: Social media offers great opportunities for businesses and the use thereof will increase competitiveness. However, social media also introduce significant risks to those who adopt it. A business can use existing IT governance control framework to address the risks introduced by social media. However a business should combine existing control frameworks for adequate and complete IT governance. This study was undertaken to help businesses to identify incremental risks resulting from the adoption of social media and to develop an integrated IT governance control framework to address these risks both at strategic and operational level. With the help of the processes in COBIT 5, this study provides safeguards or controls which can be implemented to address the IT risks that social media introduce to a business. By implementing the safeguards and controls identified from COBIT 5, a business ensures that they successfully govern the IT related risks at strategic level. This study also briefly discuss the steps that a business can follow to ensure IT related risks at operational level is addressed through the implementation of configuration controls. / AFRIKAANSE OPSOMMING: Sosiale media bied groot geleenthede vir besighede en die gebruik daarvan sal mededingendheid verhoog. Sosiale media hou ook egter beduidende risiko's in vir diegene wat dit aanneem. 'n Besigheid kan bestaande Informasie Tegnologie (IT) kontrole raamwerke gebruik om die risiko's wat ontstaan as gevolg van die gebruik van sosiale media aan te spreek. Vir voldoende en volledige IT korporatiewe beheer moet 'n besigheid egter bestaande kontrole raamwerke kombineer. Hierdie studie is onderneem om besighede te help om die toenemende risiko's wat ontstaan as gevolg van die gebruik van die sosiale media, te identifiseer en om 'n geïntegreerde IT kontrole raamwerk te ontwikkel om hierdie risiko's op strategiese sowel as operasionele vlak aan te spreek. Met die hulp van die prosesse in COBIT 5 voorsien hierdie studie voorsorgmaatreëls of kontroles wat geïmplementeer kan word om die IT-risiko's waaraan die besigheid, deur middel van sosiale media blootgestel is, aan te spreek. Deur die implementering van die voorsorgmaatreëls en kontroles soos geïdentifiseer uit COBIT 5, verseker ʼn besigheid dat hulle die IT-verwante risiko's op strategiese vlak suksesvol beheer. Hierdie studie bespreek ook kortliks die stappe wat 'n besigheid kan volg om te verseker dat IT-verwante risiko's op operasionele vlak aangespreek word deur die implementering van konfigurasie kontroles.
42

A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level

Sahd, Lize-Marie 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment. / AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
43

Web-based business positioning : an investigation in the tourism industry

Nocanda, Xolani Wittleton 03 1900 (has links)
Thesis (MBA) -- Stellenbosch University, 2011. / The use of the web-based technology to conduct business has been growing in many industries globally, this has been the case in the tourism industry. The growing popularity of the web-based technology can be attributed to the benefits it brings to the tourism industry. The study has look into the overall benefits brought by the web-based technology in the tourism industry and how it can be further exploited to benefit the organizations. The application of the web-based technology has included the introduction of the website. The website has given companies exposure to the global market and has been a platform for conducting marketing activities. The website has been used extensively in the tourism industry as a source of information. The website has enabled travel consumers purchase tourism products and services. Having a website may not be sufficient in meeting an organisation’s intended objectives. Many companies in the tourism industry are making use of the website, hence the use of website in search engines has become competitive. Companies need to implement website optimisation techniques to benefit both the travel suppliers and travel consumers. To conduct the organisations marketing activities successfully, the websites needs maximum exposure to the target audience. This can be achieved through the website design aimed at ensuring that the website is highly ranked by search engines. Added features like video, up to date information and photos add value to travel consumers. Through these features travel consumers are able to understand tourism products and services, and hence make informed decisions. The study has looked at the application of the web-based technology in four sectors of the tourism industry in South Africa. These are attraction, accommodation, tour operators and transport. Suppliers in each sector were selected for analysis and they are: - in attraction, Kruger National Park and Hluhluwe Game Reserve; - in accommodation, Hilton hotel and Southern Sun hotel; - in tour operator, Thompson Holiday and Tourvest; and - in transport, Kulula, South African Airways, Avis and Europcar. Suppliers in the tourism industry in South Africa were found to use the website for the following reasons: - Provides information about the organisation and its products and services. - Used as a marketing tool: The website is used to facilitate communication between the travel supplier and the travel consumer. It is also a platform to sell tourism products and services. - Used to enhance collaboration in the industry. Collaboration through websites has resulted in a better supply chain. Customers have been able to buy one package including the airline ticket, accommodation and car hire using one website. - Used to conduct business transactions: Customers have been able to make bookings and reservations and payments through the website. - Used to attract customers to the organisation’s products and services. Attractive features such as photos and videos have been included in the website. The Safari Company is a tour operator in South Africa. Using web-based technology; the company has changed its business model to be able to serve its customers better. The company has developed a new website that adds value to both travel suppliers and travel consumers. Travel suppliers are able to market their services and products through the website. The website provides travel consumers with the latest information and expert advice in tourism products in the Southern and Eastern Africa. The Safari Company website has been a platform for the company to communicate its social responsibility with the global community. The Safari Company donates 10% of its revenue to an organization called Touch the Land. Touch the Land is a foundation that implements projects in Southern and Eastern Africa aimed at poverty alleviation.
44

Creating business value through e-marketplace participation: a South African exploratory case study – Kalahari Marketplace

Blanken, Olaf 03 1900 (has links)
Thesis (MBA)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: E-commerce in South Africa is currently experiencing considerable growth, as in the rest of the world. Substantial foreign investments are being made in selected South African online retail stores and the majority of businesses have an online presence to sell or promote their products and services. Yet, as e-commerce is a dynamic and relatively new industry, there is a need for South African companies to understand business model adaptation for e-commerce, and specifically for successful e-marketplace participation. Kalahari Marketplace was established in 2011 as a C:C platform for customers to sell books and media. In January 2014, this platform was expanded to a fully integrated B:C platform that enables third-party retailers to sell directly to Kalahari.com customers in various categories. The Kalahari Marketplace platform follows the same development outline as the very successful Amazon.com Marketplace platform in the United States. The premise is that sellers have an additional channel to sell to customers they would not normally have had, and customers benefit by having access to a wide product range and competitive pricing. The aim of this research study is to understand the typical business model of a successful e-marketplace participant. It furthermore set out to explore the success factors, which translate into value creation for the seller achieved through participation in an e-marketplace. This investigation was done through a case study approach by examining existing sellers retailing through Kalahari Marketplace. To achieve the research aim, qualitative, exploratory research was conducted. The research method involved a combination of primary and secondary research. Secondary research was conducted regarding the external environmental factors of Kalahari Marketplace sellers. Primary data was gathered through in-depth semi-structured interviews with Kalahari Marketplace sellers. The external environmental analysis for participating in an e-marketplace, such as Kalahari Marketplace, was overall positive, taking into consideration challenges such as expensive Internet and low Internet usage penetration. The key findings from the internal analyses were that participating in an e-marketplace has substantial benefits for a traditional retailer that wants to trade online. These advantages include transaction cost savings, exposure to new customers, and reduced marketing expenses. The following recommendations were made for successful e-marketplace participation: • Take an active involvement in e-marketplace listings; • Effective procurement and use of resources; • Excellent customer service; • Build reliable and cost effective delivery channels; and • Offer a wide and mixed product range. The research limitation of this study stated that Kalahari Marketplace is a moderately new B:C e-retailing platform; therefore, retailers are still learning to adapt. Suggested additional research involves a wide-reaching quantitative research into key success factors for e-marketplace participation from a South African perspective.
45

Big 4 global networks: degree of homogeneity of audit quality among affiliates and relevance of PCAOB inspections

Unknown Date (has links)
The Big 4 global networks (Deloitte, Ernst & Young [E&Y], KPMG, and PricewaterhouseCoopers [PwC]) market themselves as providers of worldwide seamless services and consistent audit quality through their members. Under the current environment in which these auditors operate, there are three types of global network members: inspected non-U.S. affiliates (inspected affiliates, hereafter), non-inspected non-U.S. affiliates (non-inspected affiliates, hereafter), and inspected U.S. offices (U.S. offices, hereafter). The recent suspension of the China-based Big 4 affiliates from auditing U.S.-listed companies calls into question whether these global networks can deliver the same level of audit quality across all their members and whether those located in jurisdictions denying access to the Public Company Accounting Oversight Board (PCAOB or Board, hereafter) to conduct inspections may benefit from such inspections. This study examines the effect of being an affiliate and the effect of PCAOB inspections on perceived audit quality. I use earnings response coefficients (ERCs) as a proxy for perceived audit quality. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2015. / FAU Electronic Theses and Dissertations Collection
46

Internet payment system--: mechanism, applications & experimentation.

January 2000 (has links)
Ka-Lung Chong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 80-83). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgments --- p.iii / Chapter 1 --- Introduction & Motivation --- p.1 / Chapter 1.1 --- Introduction --- p.1 / Chapter 1.2 --- Internet Commerce --- p.3 / Chapter 1.3 --- Motivation --- p.6 / Chapter 1.4 --- Related Work --- p.7 / Chapter 1.4.1 --- Cryptographic Techniques --- p.7 / Chapter 1.4.2 --- Internet Payment Systems --- p.9 / Chapter 1.5 --- Contribution --- p.16 / Chapter 1.6 --- Outline of the Thesis --- p.17 / Chapter 2 --- A New Payment Model --- p.19 / Chapter 2.1 --- Model Description --- p.19 / Chapter 2.2 --- Characteristics of Our Model --- p.22 / Chapter 2.3 --- Model Architecture --- p.24 / Chapter 2.4 --- Comparison --- p.30 / Chapter 2.5 --- System Implementation --- p.30 / Chapter 2.5.1 --- Acquirer Interface --- p.31 / Chapter 2.5.2 --- Issuer Interface --- p.32 / Chapter 2.5.3 --- Merchant Interface --- p.32 / Chapter 2.5.4 --- Payment Gateway Interface --- p.33 / Chapter 2.5.5 --- Payment Cancellation Interface --- p.33 / Chapter 3 --- A E-Commerce Application - TravelNet --- p.35 / Chapter 3.1 --- System Architecture --- p.35 / Chapter 3.2 --- System Features --- p.38 / Chapter 3.3 --- System Snapshots --- p.39 / Chapter 4 --- Simulation --- p.44 / Chapter 4.1 --- Objective --- p.44 / Chapter 4.2 --- Simulation Flow --- p.45 / Chapter 4.3 --- Assumptions --- p.49 / Chapter 4.4 --- Simulation of Payment Systems --- p.50 / Chapter 5 --- Discussion of Security Concerns --- p.54 / Chapter 5.1 --- Threats to Internet Payment --- p.54 / Chapter 5.1.1 --- Eavesdropping --- p.55 / Chapter 5.1.2 --- Masquerading --- p.55 / Chapter 5.1.3 --- Message Tampering --- p.56 / Chapter 5.1.4 --- Replaying --- p.56 / Chapter 5.2 --- Aspects of A Secure Internet Payment System --- p.57 / Chapter 5.2.1 --- Authentication --- p.57 / Chapter 5.2.2 --- Confidentiality --- p.57 / Chapter 5.2.3 --- Integrity --- p.58 / Chapter 5.2.4 --- Non-Repudiation --- p.58 / Chapter 5.3 --- Our System Security --- p.58 / Chapter 5.4 --- TravelNet Application Security --- p.61 / Chapter 6 --- Discussion of Performance Evaluation --- p.64 / Chapter 6.1 --- Performance Concerns --- p.64 / Chapter 6.2 --- Experiments Conducted --- p.65 / Chapter 6.2.1 --- Description --- p.65 / Chapter 6.2.2 --- Analysis on the Results --- p.65 / Chapter 6.3 --- Simulation Analysis --- p.69 / Chapter 7 --- Conclusion & Future Work --- p.72 / Chapter A --- Experiment Specification --- p.74 / Chapter A.1 --- Configuration --- p.74 / Chapter A.2 --- Experiment Results --- p.74 / Chapter B --- Simulation Specification --- p.77 / Chapter B.1 --- Parameter Listing --- p.77 / Chapter B.2 --- Simulation Results --- p.77 / Bibliography --- p.80
47

Supporting system deployment decisions in public clouds

Khajeh-Hosseini, Ali January 2013 (has links)
Decisions to deploy IT systems on public Infrastructure-as-a-Service clouds can be complicated as evaluating the benefits, risks and costs of using such clouds is not straightforward. The aim of this project was to investigate the challenges that enterprises face when making system deployment decisions in public clouds, and to develop vendor-neutral tools to inform decision makers during this process. Three tools were developed to support decision makers: 1. Cloud Suitability Checklist: a simple list of questions to provide a rapid assessment of the suitability of public IaaS clouds for a specific IT system. 2. Benefits and Risks Assessment tool: a spreadsheet that includes the general benefits and risks of using public clouds; this provides a starting point for risk assessment and helps organisations start discussions about cloud adoption. 3. Elastic Cost Modelling: a tool that enables decision makers to model their system deployment options in public clouds and forecast their costs. These three tools collectively enable decision makers to investigate the benefits, risks and costs of using public clouds, and effectively support them in making system deployment decisions. Data was collected from five case studies and hundreds of users to evaluate the effectiveness of the tools. This data showed that the cost effectiveness of using public clouds is situation dependent rather than universally less expensive than traditional forms of IT provisioning. Running systems on the cloud using a traditional 'always on' approach can be less cost effective than on-premise servers, and the elastic nature of the cloud has to be considered if costs are to be reduced. Decision makers have to model the variations in resource usage and their systems' deployment options to obtain accurate cost estimates. Performing upfront cost modelling is beneficial as there can be significant cost differences between different cloud providers, and different deployment options within a single cloud. During such modelling exercises, the variations in a system's load (over time) must be taken into account to produce more accurate cost estimates, and the notion of elasticity patterns that is presented in this thesis provides one simple way to do this.
48

Networking the enterprise : a solution for HBR personnel

Honniger, Werner 12 1900 (has links)
Thesis (MPhil)--Stellenbosch University, 2004. / ENGLISH ABSTRACT: This Extended Research Assignment discusses the information systems found in HBR Personnel. The discussion, based on the research problems, proposes steps in which the systems of HBR can be integrated so that they add the most value. Furthermore, a review of Corporate Portals is undertaken to show the potential impact it may have on organisational efficiencies and knowledge. The Assignment, according to the methodologies given, analyses the HBR information system for system incompatibilities and bottlenecks and proposes solutions for these problems. The solutions include changing core system databases and computer systems, together with a portal to fully integrate HBR Personnel’s information systems. / AFRIKAANSE OPSOMMING: Hierdie Uitgebreide Navorsingsopdrag bespreek die informasiestelsels gevind in HBR Personnel. Die bespreking, gebaseer op die navorsingsprobleme, stel stappe voor waardeur die stelsels van HBR geïntegreer kan word om die meeste waarde toe te voeg. Verder word ‘n oorsig gedoen van Korporatiewe Portale om te wys watter potensiële impak dit kan hê op organisatoriese doeltreffendheid en kennis. Na aanleiding van die gegewe metodologieë analiseer die opdrag HBR se informasiestelsel vir sistemiese probleme en bottelnekke en stel oplossings voor vir hierdie probleme. Die oplossings sluit in ‘n verandering van kern-sisteem databasisse en rekenaarstelsels, tesame met ‘n portaal om HBR Personnel se informasiestelsels ten volle te integreer.
49

Knowledge assets in enterprise architecture

Joubert, Francois 12 1900 (has links)
Thesis (MPhil (Information Science))--University of Stellenbosch, 2010. / ENGLISH ABSTRACT: Knowledge assets can be defined as anything that affects a business’s disposition to act on data received from the environment. Knowledge assets are embedded in the objects within an organisation and are the source of an organisation’s competitive advantage, by being closely linked to what the organisation knows and by allowing the organisation to act and to be innovative. Knowledge assets evolve over time as knowledge agents, through a process of sense making, substitute physical resources for informational resources by codifying and abstracting knowledge assets, in the process increasing their value and ability to be diffused to wider audiences. These knowledge assets are internalised in an organisation and impact on the organisation when they are applied to concrete problems. Knowledge assets play an important role in the creation of information assets in an organisation. Information assets are created when a knowledge agent makes use of his or her knowledge to make sense of data received from sources in the environment. The creation of information through the sense making process creates new knowledge which is added to the agent’s knowledge base. Enterprise architecture is the process of designing future states for an organisation and then planning, leading and governing the organisation towards that future state. Enterprise architecture focuses mostly on the organisational process, on information and technology. Enterprise architects make use of enterprise architecture frameworks such as TOGAF or the Zachman framework, which are primarily concerned with the domains of business, information and technology architecture, yet none of these mainstream frameworks used by enterprise architects takes knowledge assets into account, despite the obviously important role that they play in the organisation and especially in the information creation process. This research proposes to show that knowledge assets have an important role to play in enterprise architecture by allowing enterprise architects to • identify or facilitate the creation of knowledge assets pertaining to a specific problem; • understand whether information assets are located in the ordered and complex or the chaotic regimes and what would be the implication of moving them between regimes; • plot knowledge assets movements and relationships to each other on the social learning cycle path, which would enable enterprise architects to balance the types of learning that the organisation employs; • define the level of codification, abstraction and diffusion of knowledge assets, based on the intended audiences and to understand where knowledge assets could be developed to improve quality and when outdated knowledge should be destroyed in favour of new knowledge. Knowledge assets are related to Enterprise Business Architecture (EBA) through the specific knowledge domains that exist within an organisation. Understanding whether knowledge assets exist in the ordered, complex or chaotic regimes will provide a more complete view of the organisation. Architecture of knowledge assets in this space will provide a better understanding of an organisation’s culture: this understanding can compensate for differences in knowledge agents’ spatio-temporal positions, how and when they receive data and their particular cognitive styles. The importance of knowledge assets in the creation of information links it emphatically with Enterprise Information Architecture (EIA). Knowledge asset architecture provides a better understanding of how information is created and flows through an organisation, taking into account the meaning of the information to the organisation, which compensates for that oversight in information theory, which regards the accuracy of data that is communicated as the only concern. Information technology has exponentially increased mankind’s ability to codify, abstract and diffuse knowledge assets. Enterprise Technical Architecture (ETA) is mainly concerned with the technology infrastructure implemented within an organisation. Enterprise architects can apply knowledge asset architecture to decide whether the technology should be used to enhance the codification and abstraction of information, allowing more efficient diffusion of information to a larger audience, or whether more concrete information should be diffused to a more closely-knit audience. This research will argue that the use of knowledge assets as a domain within enterprise architecture will greatly enhance the enterprise architect’s ability to understand and lead the organisation to a more desirable future state. / AFRIKAANSE OPSOMMING: Kennisbates is vasgelê in die konkrete en abstrakte voorwerpe in die organisasie. Hierdie voorwerpe omsluit alle voorwerpe wat ‘n effek het op hoe die organisasie reageer op data wat vanaf die omgewing ontvang word. Kennisbates is ‘n bron vir die kompeterende voordeel wat ‘n organisasie geniet omdat dit verband hou met wat die organisasie weet en dit die organisasie in staat stel om te innoveer. Kennisbates sal aangaande evolueer soos wat kennisdraers, deur die sinmaak proses, fisiese hulpbronne vervang met inligtings hulpbronne gedurende die proses van kodifisering en abstraksie en sodoende die kennisbates se waarde vir die organisasie te verhoog en beskikbaar te stel vir groter gehore. Die kennisbates word dan vasgelê in die organisasie wanneer die kennis toegepas word op konkrete probleme. Kennisbates speel ‘n belangrike rol in die skepping van inligtingsbates in die organisasie. Inligting word slegs geskep wanneer die kennisdraer gebruik maak van sy kennis om sin te maak van data onvang vanuit die omgewing. Die nuwe inligting word dan intern vasgelê in die kennisdraer as nuwe kennis. Ondernemingsargitektuur is ‘n proses waardeur die toekomstige staat van ‘n organisasie ontwerp word deur beplanning, en daar verder leiding gegee word ter uitvoering daarvan. Ondernemingsargitektuur fokus meestal op die organisasie se prosesse, inligting en tegnologie. Ondernemingsargitekte maak gebruik van ondernemingsargitektuurraamwerke soos TOGAF en die Zachmanraamwerk as riglyne vir hulle werk. Hierdie raamwerke fokus primêr op die besigheid, inligting en tegniese domeine van argitektuur. Nie een van die hoofstroom ondernemingsargitektuurraamwerke neem kennisbates in ag nie, ten spyte van die voordiehandliggende belangrike rol wat kennisbates in die organisasie se inligtingskeppingsproses speel. Hierdie navorsing stel voor dat kennisbates deel kan vorm van ondernemingsargitektuur deur ondernemingsargitekte toe te laat om • kennisbates aangaande ‘n spesifieke probleem te identifiseer of die skepping daarvan die fasiliteer, • te bepaal of die kennisbates in die geordende, komplekse of chaotiese regime bestaan en wat die implikasie sou wees om hulle na ‘n ander regime te skuif, en • die kennisbates op die sosiale leersiklus aan te stip, wat die ondernemingsargitek in staat sal stel om die leerbenaderings van die organisasie te balanseer, die vlak van kodifisering, abstraksie en verspreiding te definieer, gebaseer op die voornemende gehoor vir die spesifieke inligting. • beter begrip te hê daarvoor of die kennisbate na ‘n beter kwaliteit ontwikkel moet word of vernietig moet word om plek te maak vir nuwe kennisbates. Daar bestaan ‘n verwantskap tussen OBA (Ondernemingsbesigheidsargitektuur) deur die spesifieke kennisdomein wat reeds in die organisasie bestaan. Deur te verstaan of die kennisbates binne die geordende, komplekse of chaotiese regimes val sal beter begrip bied van die organisasie as geheel. Al hierdie gesigshoeke word in die geordende domein beskryf. Kennisbateargitektuur sal ‘n beter begrip van die organisasie se kultuur bewerkstellig. Die kultuur in ‘n organisasie word gebruik om te vergoed vir die verskille in die kennisdraer se tyd-ruimtelike ligging tydens die ontvangs van data asook hulle kognitiewe styl. Daar bestaan ‘n daadwerklike verwantskap tussen kennisbateargitektuur en Ondernemingsinligtingsargitektuur (OIA). Kennisbateargitektuur sal bydra tot die begrip van hoe inligting geskep word en vloei deur die organisasie. Dit sal die betekenis van inligting in ag neem en daardeur vergoed vir die tekortkoming van inligtingteorie wat slegs die korrektheid van die data wat vervoer word in ag neem. Inligtingstegnologie het die mens se vermoë om inligting te kodifiseer, abstraksie toe te pas en te versprei eksponensieël verbeter. Ondernemingstegnieseargitektuur (OTA) is hoofsaaklik verantwoordelik vir die tegnologiese infrastruktuur wat geïmplimenteer word binne die organisasie. Ondernemingsargitekte kan kennisbates gebruik om te besluit of tegnologie gebruik moet word om beter inligting te skep deur hoër kodifisering en abstraksie toe te pas, om daardeur die vermoë te skep om die inligting vir ‘n wyer gehoor beskikbaar te stel, of om meer konkrete inligting vir ‘n meer intieme gehoor beskikbaar te stel. Hierdie navorsing stel voor dat kennisbates as ‘n domein binne die ondernemingsargitektuur vervat word. Dit sal die ondernemingsargitek in staat stel om die organisasie beter te lei na ‘n wenslike toekomstige staat.
50

Data-centric security : towards a utopian model for protecting corporate data on mobile devices

Mayisela, Simphiwe Hector January 2014 (has links)
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.

Page generated in 0.1281 seconds