Spelling suggestions: "subject:"business enterprises:compared networks"" "subject:"business enterprises.despite networks""
31 |
The impact of cloud computing on the role of an IT department : a case study of a higher education institution in the Western CapeToutcha, N'souh Yonkwa January 2017 (has links)
Thesis (MTech (Business Administration))--Cape Peninsula University of Technology, 2017. / Information and communication technologies are moving fast. Consequently, organisations must be aware of this evolution and adapt to take full advantage of the benefits offered by these technologies. Cloud computing is a new concept of accessing data centers and various computing resources via the internet through any devices and from anywhere. Large organizations, such as Higher Education Institutions (HEI), are gradually adopting cloud computing to reduce their very high budgets. In emerging countries, more and more HEIs are adopting the services offered by cloud computing, more precisely in South Africa in the Western Cape. However, cloud computing affects the way IT services are delivered by traditional HEI IT departments. Thus the objective of this study is to explore the impact of cloud computing on the role of the IT department of HEIs, using a case study. To fulfil this objective, interviews were conducted within the IT department of an HEI, including the IT staff, and it was found that cloud computing affects the role of the IT department by changing the roles and responsibilities of some IT staff, as well as the focus of certain posts in the department. In addition, cloud computing also affects the department's culture. Fortunately, no IT staff have lost their posts. Other results show that training and certification were necessary for the IT to adapt to the changes. Cloud computing adds value to the IT department because it offers a daily 24-hour service as opposed to the traditional IT department.
|
32 |
Critical success factors of information security projectsTshabalala, Obediant January 2016 (has links)
The research shows the critical success factors when implementing information security projects. Many Information security projects in the past have not been successful because these factors were not identified and emphasised effectively. By identifying these factors the research basically presents a model by which information security projects can be executed with guaranteed success. The factors identified during the study cover the following streams: top management commitment as a factor of success; accountability as a factor of success; responsibility as a factor of success; awareness as a factor of success and an information security policy as a factor of success. For the empirical study, a physical questionnaire was administrated to a pool of experts in project management and information security. The study consisted of 60 participants who were verified to have minimum requirements core for questionnaire completion. The questionnaire requested for biological information of the participants and their perceived relations (based on their experience) between project success versus accountability, information security project success versus responsibilities, information security project success versus training & awareness, information security project success versus top management commitment and information security project success versus information security policy. The participants’ responses were structured according to a Likert-type scale. Participants had to indicate the extent to which they agreed with each of the statements in the questionnaire. The responses obtained from the survey were presented and analysed. The researcher observed in this study that information security projects are so specific that critical success factors need to be emphasised from project inception. With the identified critical success factors, the researcher recommends that a project methodology be structured to include these factors so that there is a standard in running information security projects successfully. The researcher also identified that amongst the critical success factors identified, there are some that need to be emphasised more than the others due to their level of importance in such projects.
|
33 |
Utility computing: Certification model, costing model, and related architecture developmentFaruqui, Saif Ahmed 01 January 2005 (has links)
The purpose of the thesis was to propose one set of solutions to some of the challenges that are delaying the adoption of utility computing on a wider scale. These components enable effective deployment of utility computing, efficient look-up, and comparison of service offerings of different utility computing resource centers connected to the utility computing network.
|
34 |
The internet as a strategic business management tool14 August 2012 (has links)
M.Comm. / This study was conducted with the intent of understanding and evaluating the commercial use and possibilities that the Internet offers, as well as the strategic approach businesses should take when commencing with electronic commerce on the Internet. The potential value of Intranets and Extranets has also been examined briefly. The Internet is a very useful mechanism for marketing as well as sales of products or services on a domestic or international basis. Various other commercial possibilities and uses exist for the Internet, as well as for its derivatives — the Intranet and Extranet. In the fiercely competitive market of today, companies research, develop and invest resources in various methods and tools in the hope to gain competitive advantage over their rivals. The Internet, Intranet and Extranet, used in isolation or conjunction, pose an extremely attractive alternative to gaining competitive advantage in a specific sector or market niche.The success of the Internet as a business tool depends directly on the overall business strategy that is driving the approach. For optimum success the main business strategy must be aligned with the Information Technology Strategy, and especially include thorough consideration as well as planning when implementing the Internet or one of its derivatives as a business tool.
|
35 |
E-commerce application utilisation by South African SMME’sFitzgerald, Kyle Andrew January 2005 (has links)
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2005 / The Internet was functioning on Internet protocol (IP) and transmission control
protocol (TCP) in the 1970s and soon afterwards electronic mail (email) was
invented allowing messages to be sent from one person to another using packet
switch services (PSS). However email did not form an information space for
information to permanently exist. The World Wide Web (Web) arrived in the late
1980s, riding on top of the Internet providing a global and persistent information
space available to everyone.
This information space has assisted in small business facing dramatic change,
often referred to as the 'e-commerce evolution'. Compared to the industrial
revolution with the advent of the railways and electricity the magnitude of ecommerce
is no less. Advances in the information technology (or e-comrnerce
elements) and the use of Information systems (or applications) are the main
drivers behind this e-commerce evolution.
Some authors believe all businesses will be equal in the utilisation of e-commerce
eroding any competitive advantage the one may have over the other. The 'digital
economy' is now available with the explosive popularity of the Internet and the
Web as seminal applications of e-commerce.
In South Africa the maturity level of e-commerce adoption has increased from
skepticism to positivism since the world wide availability of the Internet. Although
e-commerce has generated a profusion of articles in South Africa, there has been
a lack of research into the effects and benefits of e-commerce utilisation by small
business. Various elements of e-commerce are explored highlighting the suitability
of use towards a small business. This stUdy will explain the fundamentals that
small business owners will need to understand to enable them to knowledgably
participate in the global phenomenon of e-commerce. Authors nationally and
internationally have explored the applications of e-commerce for example email
and electronic data interchange (EDI).
|
36 |
Social media risks in large and medium enterprises in the Cape Metropole : the role of internal auditorsGwaka, Leon Tinashe January 2015 (has links)
Thesis (MTech (Internal Auditing))--Cape Peninsula University of Technology, 2015. / Social media has undoubtedly emerged as one of the greatest developments in this technology driven generation. Despite its existence from years back, social media popularity has recently surged drastically, with billions of users worldwide reported to be on at least one social media platform. This increase in users of social media has further been necessitated by governmental and private-sector initiatives to boost Internet connectivity to bridge the digital divide globally.
Mobile Internet access has also fuelled the use of social media as it allows easy and economical connectivity anytime, anywhere. The availability of hundreds of social media platforms has presented businesses with several opportunities to conduct business activities using social media. The use of social media has been
reported to avail businesses with plenty of benefits when this use is strategically aligned to business objectives. On the flipside of the coin, these social media platforms have also emerged as new hunting grounds for fraudsters and other information-technology related criminals. As with any invention, engaging social media for business has its own inherent risks; this further complicates existing information-technology risks and also presents businesses with new risks.
Despite blossoming into a global phenomenon, social media has no universally accepted frameworks or approaches (thus no safeguards) when engaging with it, resulting in almost unlimited risk exposures. The uncertainly, i.e. risks surrounding social media platforms, proves problematic in determining the optimum social media platform to use in business. Furthermore, organisations are facing challenges in deciding whether to formally adopt it or totally ignore it, with
the latter emerging not to be a viable option. The complex nature of social media has made it difficult for enterprises to place a monetary value and determine a return on investment on these platforms. From a governance perspective, it remains a challenge for most enterprises to identify and appoint
individuals responsible for social media management within businesses, although recently social media strategist positions have been surfacing. Due to their nature, the social media trigger matters relating to governance, risk and compliance, which imply that internal auditors therefore are expected to champion the adoption of social media in enterprises. As a relatively new concept, the role that internal auditors should play towards social media appears not to be well defined. Through examination of existing guidelines, an attempt is made to define the role of internal auditors towards social media.
|
37 |
The application of project management tools and techniques in ICT SME projects in Western CapeChauma, Crecencia Naison January 2017 (has links)
Thesis (MTech (Business Administration))--Cape Peninsula University of Technology, 2017. / Introduction
The research looked at the application of project management tools and techniques in ICT
SME projects in the Western Cape.
Problem Statement
Previous literature revealed that small to medium enterprises (SMEs) are vital to developing
economies as they provide employment and contribute to overall sustainable economic
productivity. Literature further alludes that project management tools and techniques enhance
SME’s ability to innovate, grow and compete in industry. However, it is unclear if ICT SMEs in
Western Cape are applying project management tools and techniques in their projects.
Therefore, this study aimed to investigate whether ICT SMEs in Western Cape applied these
tools and techniques in their projects.
Aims / Objectives
The primary objective of the research was to determine the extent to which ICT SMEs in
Western Cape were using project management tools and techniques. The secondary research
objectives were: to determine the extent to which ICT SMEs in Western Cape knew about the
project management tools and techniques and how to use them; to establish the extent to
which the ICT SMEs knew the benefits of using project management tools and techniques; and
to determine the extent to which project management tools and techniques were used by
SMEs to achieve success.
Methodology
The research was non experimental. An electronic questionnaire was distributed using Survey
Monkey and Mail Chimp to collect responses. Some questionnaires were hand delivered to ICT
SMEs based in the Cape Town CBD areas accessible to the researcher. The results presented
in the research were based on a survey of ICT SMEs, located in Western Cape. Out of the 341
responses targeted a total of 210 responses were obtained. The results obtained represent 60-
70% of the population interviewed. The sample was chosen using stratified random sampling
that classified the respondents according to organisational hierarchy, and the amount per
strata was noted. The respondents within each stratum were chosen using simple random
sampling thus eliminating bias.
|
38 |
Lightweight framework for mobile documentation of very small enterprise business transactionsNdhlovu, Brenda Malese 03 October 2014 (has links)
Submitted in fulfillment of the requirements of the degree of Master of Technology: Information Technology, Durban University of Technology, 2013. / In this study, an investigation was conducted to determine an appropriate lightweight framework that could adequately support Very Small Enterprises (VSEs) in documenting their daily business transactions. The VSEs play a significant role in the socioeconomic development of nations by providing employment opportunities. They contribute to the Gross Domestic Product (GDP) and provide a platform for entrepreneurial skills advancement. However, VSEs have very little access to innovative Information and Communication Technology (ICT) that could help to address the unique challenges that prohibit their growth and sustainability. In many instances, the documentation of VSEs business transactions is still lacking. This deficiency promotes insufficient, unreliable and untraceable business transaction records which ultimately affect the smooth growth and sustainability of VSEs. Mobile technology provides the VSEs with a unique opportunity because of its support for mobility and low costs of system procurement. Moreover, mobile technology can enable easy connection, access and retrieval of VSE services even in the resource constrained environments anytime and anywhere. However, the inherent limitations of mobile devices such as device size, storage size, computing power and battery lifespan have forced many of the existing ICT business applications to continually rely on desktop computers. The desktop computer applications are huge, complex and not compatible with the current mobile devices. The Design Science Research (DSR) method was used to understand how VSEs conduct their daily business transactions, discover essential factors that influence the business processes of VSEs and derive a lightweight framework for mobile documentation of VSE business transactions. The lightweight framework was prototyped as ICT artefact and evaluated to determine the adoption of mobile applications by VSEs for documentation of daily business transactions. The evaluation results revealed the developed lightweight framework to be effective for mobile documentation of VSEs business transactions.
|
39 |
The development of an integrated framework in order to implement information technology governance principles at a strategic and operational level for medium-to-large sized South African businessGoosen, Riana 03 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: In today's technologically advanced business environments, Information Technology (IT) has become the centre of most, if not all businesses' strategic and operational activities. It is for this reason that the King III report has dedicated a chapter to IT governance principles, in effect making the board of directors and senior management responsible for implementing such principles. King III's guidance on these principles is only described in broad terms and lack sufficient detail as how to implement these principles. Though various guidelines, in the form of IT control frameworks, -models and -standards exist, it remains highly theoretical in nature and companies tend to view these control frameworks, -models and -standards on an individual basis, implementing them in an ad hoc manner, resulting in the implementation of an inefficient IT governance system, that does not address the key strategic areas and risks in a business.
The purpose of this study is to develop an IT best practices integrated framework which can assist management in implementing an effective IT governance system at both a strategic and operational level. The integrated framework was developed by performing a detailed literature review of a best practice control framework, -model and -standard, including its underlying processes.
By combining and aligning the relevant processes of the control framework, -model and -standard to the business' imperatives, a framework was developed to implement IT governance principles at a strategic level. The integrated framework is extended to provide guidance on how to implement good IT controls at an operational level. The control techniques, of the applicable processes identified at a strategic level, are implemented as well as the controls around a company's various access paths, which are affected by a company's business imperatives. These access paths are controlled through the implementation of applicable configuration controls. By making use of the integrated framework which was developed, an effective and efficient IT governance system can be implemented, addressing all applicable IT risks relevant to the key focus areas of a business. / AFRIKAANSE OPSOMMING: In vandag se tegnologies gevorderde besigheids omgewings het Informasie Tegnologie (IT) die middelpunt geraak van die meeste, indien nie elke onderneming se strategiese en operasionele aktiwiteite nie. Dit is vir hierdie rede dat die King III verslag 'n hoofstuk aan die beginsels van IT korporatiewe beheer wy. Dié verslag hou die direkteure en bestuur verantwoordelik vir die implementering van hierdie beginsels. Die King III verslag verskaf egter slegs in breë trekke leiding in verband met die implementering van hierdie beginsels en 'n gebrek aan meer gedetailleerde beskrywings bestaan. Alhoewel verskeie riglyne, in die vorm van IT kontrole raamwerke, -modelle en -standaarde bestaan, bly dit steeds teoreties van aard en is maatskappye geneig om hierdie riglyne op 'n individuele vlak te hanteer en op 'n willekeurige wyse te implementeer. Hierdie proses lei tot die implementering van 'n ondoeltreffende IT korporatiewe beheerstelsel.
Die doel van hierdie studie is om 'n geïntegreerde beste praktykraamwerk te ontwikkel wat deur die direkteure en bestuur van 'n onderneming gebruik kan word om op beide 'n strategiese en operasionele vlak 'n doeltreffende IT korporatiewe beheermaatstelsel in plek te stel. 'n Geïntegreerde raamwerk is ontwikkel deur 'n volledige literatuurstudie uit te voer, gebaseer op 'n beste praktyk IT kontrole raamwerk, -model en -standaard en die gepaardgaande prosesse.
Deur die toepaslike prosesse van hierdie kontrole raamwerk, -model en -standaard te kombineer en te belyn met 'n besigheid se besigheidsimperatiewe, word IT korporatiewe beheerbeginsels op 'n strategiese vlak in plek gestel. Die geïntegreerde raamwerk sluit riglyne in om goeie IT kontroles op 'n operasionele vlak te implementeer. Die kontrole tegnieke, wat verbind word met die gepaardgaande prosesse wat tydens die strategiese vlak geïdentifiseerd is, word geimplementeer asook die die toepaslike konfigurasie kontroles oor die verskeie toegangspaaie wat beïnvloed word deur 'n besigheids se besigheidsimperatiewe. Deur gebruik te maak van die ontwikkelde geïntegreerde raamwerk kan alle geaffekteerde IT risikos nou aangespreek word en 'n doeltreffende IT korporatiewe beheerstelsel in plek gestel word.
|
40 |
Applying PRINCE2 project management disciplines to address key risks in ERP System Implementation ProjectsPlotnikova, Svetlana 03 1900 (has links)
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007. / The successful implementation of an Enterprise Resource Planning (ERP) System can help an organisation to redefine its business processes and enhance its competitive advantage. An ERP System Implementation is a transformation project, which changes the way an organisation thinks and acts about its business. An ERP System implementation is also a complex endeavour, and as such, it requires rigorous risk management. The understanding and management of risks relevant to ERP System Implementation Projects are critical in order to ensure that the project delivers on its objectives within the specified budget and timelines, and eventually realises the envisaged business benefits.
The purpose of this study is to discuss how key risks relevant to ERP System Implementation Projects could be addressed by applying project management disciplines derived from the PRINCE2 (PRojects IN Controlled Environment) project management methodology. This methodology was developed by the Office of Government Commerce in the United Kingdom. This study also provides a framework that could be applied at the outset and during an ERP System Implementation Project by business management, to understand the risks (“what could go wrong?”) and project management disciplines that should be applied to address these risks (“what must go right?”).
This framework was derived by:
• Identifying key risks relevant to ERP System Implementation Projects;
• Mapping these key risks onto SAP Implementation phases to highlight where these risks could materialise in the SAP Implementation process;
• Then mapping these key risks across PRINCE2 project management processes and SAP Implementation phases by creating the SAP Implementation Key Risks Map; and finally
• Providing a detailed description of how to apply PRINCE2 project management disciplines to address each risk in the SAP Implementation Key Risks Map.
|
Page generated in 0.1542 seconds