Spelling suggestions: "subject:"business enterprises:compared networks"" "subject:"business enterprises.despite networks""
51 |
A preliminary study into strategies for determining the level to start e-commerce adoption for success in SMMEsMotjolopane, Ignitia January 2006 (has links)
THESIS
Submitted in fulfilment
of the requirements for the degree
MAGISTER TECHNOLOGIAE
in
BUSINESS INFORMATION SYSTEMS
in the
FACULTY OF BUSINESS INFORMATICS
at the
CAPE PENINSULA UNIVERSITY OF TECHNOLOGY
2006 / E-commerce improves value chain integration, enables customisation and
also provides smaller companies opportunity to reach customers worldwide.
However e-commerce poses challenges to companies, including how to
approach e-commerce to gain competitive advantage.
Although a number of studies report on e-commerce adoption,
these do not provide clear guidelines to determine how SMMEs should
progress or move into e-commerce adoption. The aim of this research study
is to examine the various available approaches and propose a model to assist
SMMEs to determine how to start e-commerce adoption.
Findings from this research study indicate that a small percentage of SMMEs
are selling online in the Western Cape and realizing benefits derived from ecommerce
adoption. The SMMEs interviewed followed an “adoption ladder”
approach to e-commerce adoption, however, some had the perception that
with maturity of e-commerce, a “managed strategic” approach would be
possible. In conclusion the research study proposes a model to assist
SMMEs to progress into e-commerce adoption, illustrating two available
approaches.
|
52 |
Decision support systems adoption by emerging farmers in the wine industry : a case study of the Western Cape, South AfricaSimbanegavi, Godwishes January 2012 (has links)
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2012. / The wine industry is complex hence the farmers and emerging farmers who operate in it are
faced with environmental, social and economic constraints. Even though various issues have
been pointed out to be contributing to the slow uptake of ICT by emerging farmers (Cox,
1995), McCartney (2007) however pointed out that DSSs can enhance gains in economic,
social and environmental benefits. This study investigates how wine farmers use ICTs to
support decision making in order to assist emerging farmers adopt and use the ICTs for
decision making. Decision making is crucial; it is one of the most important tasks of
management in running a successful business (Dralega, 2007). Emerging farmers have to
operate in a complex environment and ICT use can lead to the effective use of information to
support decision making in the industry. Experienced farmers use ICT tools to support
decision making and use information to make informed decisions in their operations.
Emerging farmers are at a distinct disadvantage as they have no previous knowledge of
farming and have to find their way on a day to day basis. This has the potential of reducing
profitability and sustainability of the emerging farmers who have entered the industry. The
main research question is: "how can emerging farmers utilise ICT for decision making in the
wine industry in the Breede River Valley region in the Western Cape?" Interviews were done
to gather primary data. In this case it is information about the technological and information
needs of farmers which might help them in decision making. The literature is reviewed in this
study to gather secondary data. The study took an inductive approach and the
epistemological stance in this study is interpretivism. The case study was used as strategy
for the study. The interviewees emphasised the importance of ICTs in their decision making;
they mentioned that without the use of ICTs in decision their businesses will crumble. In
order to prosper in their business, emerging farmers need to invest in ICTs as this will also
assist in improving livelihoods of the farmers and their workers.
|
53 |
Implementing a robust, cost effective, e-commerce platform for a disadvantaged community of the Eastern Cape, South AfricaNjeje, Sicelo Given January 2008 (has links)
The development of electronic commerce (e-commerce) is the most visible business use of the World Wide Web. The primary goal of an e-commerce site is to sell goods and services online. This project deals with developing an e-commerce platform for marginalized communities of the Eastern Cape region, South Africa. An online “shopping mall” to support the marketing of art and crafts from disadvantaged communities is presented, with Linux-Apache-MySQL-PHP (LAMP) as the development environment. Free and Open Source Software has been chosen to develop the virtual shopping mall system because the use of Open Source allows easy localization and extensions to the system developed and long term sustainability, as the source code is available. Also, it might start a “virtuous” circle, whereby young members of the communities hosting art and craft makers become involved in maintenance, and then production, of software systems. One important design constraint from the e-commerce platform presented in this thesis is the possibility for the art and craft makers to manage their shops directly, from the initial loading of their wares to the day-to-day maintenance, such as changes of price or items. The user requirement elicitation and initial field testing were conducted in Dwesa, an area on the wild coast, South Africa. The system currently comprising two shops is live at the time of writing this thesis at www.dwesa.com.
|
54 |
Implement electronic commerce with Dreamweaver UltraDev 4.0Loh, Anson Wing Hong 01 January 2003 (has links)
This project simulates a real company by using Dreamweaver UltraDev, 4.0. A simulated electronic commerce web site was created to present all aspects of electronic commerce including future trends.
|
55 |
Towards a model for ensuring optimal interoperability between the security systems of trading partners in a business-to-business e-commerce contextPather, Maree 25 August 2009 (has links)
A vast range of controls/countermeasures exists for implementing security on information systems connected to the Internet. For the practitioner attempting to implement an integrated solution between trading partners operating across the Internet, this has serious implications in respect of interoperability between the security systems of the trading partners. The problem is exacerbated by the range of specification options within each control. This research is an attempt to find a set of relevant controls and specifications towards a framework for ensuring optimal interoperability between trading partners in this context. Since a policy-based, layered approach is advocated, which allows each trading partner to address localized risks independently, no exhaustive risk analysis is attempted. The focus is on infrastructure that is simultaneously optimally secure and provides optimal interoperability. It should also be scalable, allowing for additional security controls to be added whenever deemed necessary. / Computing / M. Sc. (Information Systems)
|
56 |
Profiling the customers of the e-commerce company Kalahari.netGeel, Mildred 30 November 2003 (has links)
Profiling the customers of the e-commerce company Kalahari.net.
The purpose of the study was to profile the customers of the e-commerce company, Kalahari.net which sells books, music CDs, DVDs, videos, computer software and hardware amongst others.
The literature study includes a discussion of marketing management and e-commerce in South Africa. Customer profiling is discussed to indicate the need and importance of knowing the customer. The quantitative research was done amongst the customers of Kalahari.net by means of an online questionnaire in 2003.
The findings concluded that the customers browse the Internet between one and five hours per week. The customers are aged between 21 and 25, mostly female, predominantly English-speaking, married, two to three people per household, have a monthly household income of more than R18 000, are well-educated and are residing predominantly in Gauteng.
The study was concluded with the limitations experienced by the researcher and a short discussion of the general usability of the study. / The purpose of the study was to profile the customers of the e-commerce company,
Kalahari.net which sells books, music CDs, DVDs, videos, computer software and
hardware amongst others.
The literature study includes a discussion of marketing management and e-commerce
in South Africa. Customer profiling is discussed to indicate the need and importance of
knowing the customer. The quantitative research was done amongst the customers of
Kalahari.net by means of an online questionnaire in 2003.
The findings concluded that the customers browse the Internet between one and five
hours per week. The customers are aged between 21 and 25, mostly female,
predominantly English-speaking, married, two to three people per household, have a
monthly household income of more than R18 000, are well-educated and are residing
predominantly in Gauteng.
The study was concluded with the limitations experienced by the researcher and a short
discussion of the general usability of the study. / Business Management / M. Comm. (Business Management)
|
57 |
Digital identity: an emergent legal concept; an analysis of the role and legal nature of digital identity in a transactional context.Sullivan, Clare Linda January 2009 (has links)
This thesis examines the emergent legal concept of digital identity under the United Kingdom National Identity Scheme ('NIS') and its Australian counterpart, the Access Card Scheme('ACS') proposed in 2007. The Identity Cards Act 2006 UK c 15 ('Identity Cards Act’) and the Human Services (Enhanced Service Delivery) Bill (Cth) 2007 ('Access Card Bill') reveal a remarkably similar concept of identity in terms of its constitution and especially its functions. The United Kingdom scheme is currently being established, whereas the proposed Australian Scheme has been shelved following a change of government late in 2007. The NIS is therefore used as the model for this study but the analysis applies to any such scheme based on digital technology, including the ACS, should it be resurrected. The emergent concept of digital identity which is the subject of this thesis arises from legislation. It is a legal construct which consists of a collection of information that is stored and transmitted in digital form, and which has specific functions under the identity scheme. In this study, the information recorded about an individual for an identity scheme is referred to as an individual's 'database identity.' Database identity consists of information prescribed by legislation. Collectively, that information comprises an individual's registered identity. Under the United Kingdom scheme, it includes an individual's name/s, gender, date and place of birth and date of death, photograph, signature and biometrics, and other information such as citizenship and residential status including residential address/es, nationality, identity card number, passport number, work permit number, driver‘s licence number, and administrative information such as security and verification details. Within database identity is a small subset of information which is an individual‘s transactional identity, that is, an individual‘s identity for transactional purposes. In this study, that subset of database identity is called an individual‘s 'token identity'. Under the NIS, token identity consists of name, gender, date and place of birth, date of death and biometrics. Token identity is the gateway to the other information which makes up database identity and token identity has specific functions at the time of a transaction which give it legal character. In effect, it operates as the individual‘s transactional 'key.' Presentation of the required token identity at the time of the transaction enables the system to recognise, and to deal with, the registered identity. This thesis is therefore not about identity in the deep philosophical sense of 'who am I?' or 'what makes me, me?' It is about a legal concept of individual identity for specific purposes under a national identity scheme. In many ways, though, the concept of digital identity which is the subject of this thesis is just as important in a modern legal context. Under a national identity scheme, the response to the question 'who am I? ' is 'you are who the scheme (and in particular, the National Identity Register ('NIR')) says you are.' As the first conceptual legal analysis of identity in a transactional context, this thesis examines the functions and legal nature of database identity, and particularly token identity. Token identity has specific functions at the time of a transaction which are analysed from a legal perspective to determine whether token identity is a form of legal personality. This thesis also contends that individual personal and proprietary rights necessarily apply as a result of the functions and legal nature of this emergent concept of identity. In addition to the well- recognised right to privacy, this thesis argues that the concept gives rise to the right to identity which has been overlooked in this context. For the first time, identity as a legal concept is distinguished from privacy which is the focus of legal scholarship and jurisprudence in this area. The right to identity is contrasted with the right to privacy and the protection afforded by the right to identity in this context by those human rights in the United Kingdom is considered. The protection afforded to an individual in the United Kingdom is contrasted with the situation in Australia which does not currently have a comprehensive national human rights charter. In view of the limited protection which is currently provided to token identity by the civil law, the protection provided by the criminal law in both the United Kingdom and Australia becomes particularly significant in considering the obligations and rights which arise under the scheme. The adequacy of the criminal law in addressing the nature and consequences of the dishonest use by a person of another person‘s identity information is therefore also examined. Identity theft is defined and distinguished from identity fraud, having regard to the emergent concept of digital identity and the wrong and the harm caused by its misuse. In particular, the nature of token identity is examined and the consequences of its misuse by another person are considered in determining whether token identity is property which is capable of being the subject of theft and criminal damage. The thesis concludes by summarising the major insights provided by chapters 1-6 with a view to the future when national identity schemes like that of the United Kingdom, and indeed international schemes, will be commonplace and token identity routinely required for most commercial transactions. In that environment, being asked to provide one‘s token identity is likely to be as common and as routine as being asked one's name. / Thesis (Ph.D.) -- University of Adelaide, Law School, 2009
|
58 |
Digital identity: an emergent legal concept; an analysis of the role and legal nature of digital identity in a transactional context.Sullivan, Clare Linda January 2009 (has links)
This thesis examines the emergent legal concept of digital identity under the United Kingdom National Identity Scheme ('NIS') and its Australian counterpart, the Access Card Scheme('ACS') proposed in 2007. The Identity Cards Act 2006 UK c 15 ('Identity Cards Act’) and the Human Services (Enhanced Service Delivery) Bill (Cth) 2007 ('Access Card Bill') reveal a remarkably similar concept of identity in terms of its constitution and especially its functions. The United Kingdom scheme is currently being established, whereas the proposed Australian Scheme has been shelved following a change of government late in 2007. The NIS is therefore used as the model for this study but the analysis applies to any such scheme based on digital technology, including the ACS, should it be resurrected. The emergent concept of digital identity which is the subject of this thesis arises from legislation. It is a legal construct which consists of a collection of information that is stored and transmitted in digital form, and which has specific functions under the identity scheme. In this study, the information recorded about an individual for an identity scheme is referred to as an individual's 'database identity.' Database identity consists of information prescribed by legislation. Collectively, that information comprises an individual's registered identity. Under the United Kingdom scheme, it includes an individual's name/s, gender, date and place of birth and date of death, photograph, signature and biometrics, and other information such as citizenship and residential status including residential address/es, nationality, identity card number, passport number, work permit number, driver‘s licence number, and administrative information such as security and verification details. Within database identity is a small subset of information which is an individual‘s transactional identity, that is, an individual‘s identity for transactional purposes. In this study, that subset of database identity is called an individual‘s 'token identity'. Under the NIS, token identity consists of name, gender, date and place of birth, date of death and biometrics. Token identity is the gateway to the other information which makes up database identity and token identity has specific functions at the time of a transaction which give it legal character. In effect, it operates as the individual‘s transactional 'key.' Presentation of the required token identity at the time of the transaction enables the system to recognise, and to deal with, the registered identity. This thesis is therefore not about identity in the deep philosophical sense of 'who am I?' or 'what makes me, me?' It is about a legal concept of individual identity for specific purposes under a national identity scheme. In many ways, though, the concept of digital identity which is the subject of this thesis is just as important in a modern legal context. Under a national identity scheme, the response to the question 'who am I? ' is 'you are who the scheme (and in particular, the National Identity Register ('NIR')) says you are.' As the first conceptual legal analysis of identity in a transactional context, this thesis examines the functions and legal nature of database identity, and particularly token identity. Token identity has specific functions at the time of a transaction which are analysed from a legal perspective to determine whether token identity is a form of legal personality. This thesis also contends that individual personal and proprietary rights necessarily apply as a result of the functions and legal nature of this emergent concept of identity. In addition to the well- recognised right to privacy, this thesis argues that the concept gives rise to the right to identity which has been overlooked in this context. For the first time, identity as a legal concept is distinguished from privacy which is the focus of legal scholarship and jurisprudence in this area. The right to identity is contrasted with the right to privacy and the protection afforded by the right to identity in this context by those human rights in the United Kingdom is considered. The protection afforded to an individual in the United Kingdom is contrasted with the situation in Australia which does not currently have a comprehensive national human rights charter. In view of the limited protection which is currently provided to token identity by the civil law, the protection provided by the criminal law in both the United Kingdom and Australia becomes particularly significant in considering the obligations and rights which arise under the scheme. The adequacy of the criminal law in addressing the nature and consequences of the dishonest use by a person of another person‘s identity information is therefore also examined. Identity theft is defined and distinguished from identity fraud, having regard to the emergent concept of digital identity and the wrong and the harm caused by its misuse. In particular, the nature of token identity is examined and the consequences of its misuse by another person are considered in determining whether token identity is property which is capable of being the subject of theft and criminal damage. The thesis concludes by summarising the major insights provided by chapters 1-6 with a view to the future when national identity schemes like that of the United Kingdom, and indeed international schemes, will be commonplace and token identity routinely required for most commercial transactions. In that environment, being asked to provide one‘s token identity is likely to be as common and as routine as being asked one's name. / Thesis (Ph.D.) -- University of Adelaide, Law School, 2009
|
59 |
The status of information security in South AfricaWarricker, Anina M. 03 1900 (has links)
Thesis (MPhil)--Stellenbosch University, 2005. / ENGLISH ABSTRACT: The business and social environments are increasingly reliant on the information
network, and the quality and integrity of the information to effectively conduct
transactions, and "survive" in the new economy. These information networks facilitate
communication and transactions between customers, suppliers, partners, and
employees. Emerging technologies further encourage the extension of network
boundaries beyond the branch office, to private homes, airports, and even the comer
coffee shop, e.g. wireless internet access. Although technology advances contribute to
significant increases in productivity, convenience, and competitive advantage, it also
increases the risk of attacks on the integrity and confidentiality of any information
interaction. One of the key questions is how to achieve the right level of information
network security and implement effective protection systems, without impacting
productivity by excessively restricting the flow of information.
The issue of information security is not a localised problem, but a problem on global
scale, and South African businesses are no less at risk than any other geographically
located business. The risk of information security is even greater if aspects like
globalisation are taken into account, and the growing inter-connectedness of the global
business environment. The central question is: How does the South African business
environment view information security, their perceived success in implementing
information security measures, and their view of future trends in information security.
Ingenue- Consulting is a global business focusing on technology consulting services,
across a wide range of industries and technologies. Information security has been
identified by Ingenue Consulting to be a global problem, and primary research into this
business issue have been undertaken in different locations globally, e.g. Australia and South African executive level survey of what the perception and importance are of
information security, of business leaders across public and private industries.
Ingenue Consulting has an in-house research facility, and tasked them with conducting
a survey in South Africa. The survey results can then be compared with global trends,
and applied in the business environment, to highlight the impact of information security
risks, and to help businesses to change and improve their information security
processes and technologies. The research department started out doing an extensive
literature study to identify global and local trends in information security, and to assist in
the compilation of the survey questionnaire. A sample group of "blue chip" businesses
across all industries was targeted at executive level to conduct a research survey - fifty
interviews were conducted. The raw data was collated and analysed to formulate an
opinion of the information security practices and perceptions of the business
environment in South Africa.
The survey confirmed that the South African market risks in terms of information
security are very similar to global trends. Some of the key trends are: Information
security agreements are normally signed at the onset of employment, but rarely
updated or highlighted to ensure continued support and implementation. This is almost
contradictory to the fact that information security are taken seriously by the executive
level, and often discussed at board level. The mobility of information with the
emergence of wireless networks is a key issue for most businesses - as information
security is at its most vulnerable.
Most of the respondents rated themselves ahead of the curve and their competitors -
overestimation of competencies, could lead to larger future risks. The sensitive nature
of information security industry makes benchmarking against local or global players
difficult due to the sensitive nature -limited willingness to participate in a consultative
forum. Companies that outsouree IT tend to "wash their hands off' security issues as the responsibility of the outsourcing vendor. Most local businesses haven't got a worldly
view - they do not have an active process to find out what their peers are doing locally
or globally, they rely mostly on vendor and consulting advice, or media coverage. / AFRIKAANSE OPSOMMING: Die besigheids en sosiale omgewings is toenemend afhanklik van die inligtings
netwerke, en die kwaliteit en integriteit van inligting om transaksies effektief uit te voer,
en om te "oorleef" in die nuwe ekonomie. Inligtings netwerke fasiliteer kommunikasie
en transaksies tussen kliente, verskaffers, vennote, en werknemers. Nuwe tegnologiee
verder veskuif netwerk grense, wyer as die tak-kantoor, na private huise, lughawens, of
die koffie kafee - deur middel van draadlose internet toegang. Alhoewel tegnologie
ontwikkelings bydra tot verbeterde produktiwiteit, en gemak van gebruik - dra dit ook by
tot groter gevaar van aanvalle op die integriteit en konfidensialiteit van enige inligtings
transaksie. Een van die sleutel vrae is hoe om die regte vlak van inligting netwerk
sekuriteit te bereik, en om die regte beskermings metodes te implementeer - sonder
om die produtiwiteit te inhibeer.
Die inligting sekuritets vraagstuk is nie bloot 'n lokale vraagstuk nie, maar van globale
skaal, en Suid-Afrikaanse besighede is nie minder in gevaar as enige ander besigheid
in 'n ander lande nie, veral nie as aspekte soos globaliseering in ag geneem word nie.
Die sentrale vraag is: Hoe sien die Suid-Afrikaanse besigheids wereld inligtings
sekuriteit, en die waargenome sukses met die implementering van inligtings sekuriteit
prosesse, en ook hoe hul die toekoms sien van inligtings sekuriteit.
Ingenue* Consulting is 'n wereldwye besigheid, gefokus op tegnologie konsultasie
dienste, oor 'n wye reeks industriee en tegnologiee. Inligting sekuriteit is deur Ingenue
Consulting ge-identifiseer as 'n globale probleem, en primere navorsing in die area is al
onderneem in verskillende geografiee, soos Australie en die Verenigde Koninkryk. Die
Suid-Afrikaanse tak van Ingenue het vroeg in 2004 besluit om 'n lokale studie te doen
oor top bestuur se persepsies van inligting sekuriteits risikos, in beide die publieke en
privaat besigheids wereld. Die interne navorsings afdeling van Ingenue Consulting in Suid-Afrika is gevra om die
nodige studie te ondeneem, om dit dan met globale studies te vergelyk, en te kan
bepaal waar gapings mag wees, en hoe om die gapings aan te spreek. Die navorsings
afdeling het begin deur 'n ekstensiewe literatuur studie te doen, as hulp tot die
samestelling van die vrae-lys. 'n Teiken groep van top Suid-Afrikaanse besighede,
verteenwoordigend van alle industriee is genader om 'n onderhoud toe te staan om die
vrae-lys te voltooi - vyftig onderhoude was voltooi. Die rou data is gekollekteer en
geanaliseer, om 'n opinie te formuleer oor die inligtings sekuriteit persepsies en
praktyke van die besigheids omgewing in Suid-Afrika.
Die navorsing het bevestig dat die Suid-Afrikaanse mark baie dieselfde is as ander
geografiese markte - in terme van inligting sekuriteit. Van die sleutel konklusies is:
Inligting sekuriteit ooreenkomste word meestal geteken met die aanvangs van diens,
maar bitter selde dan weer opgevolg of hernu - dit is byna kontradikterend dat top
bestuur ook baie besorg is oor inligting sekuriteit, en dat dit dikwels by raads
vergaderings bespreek word. Die mobiliteit van inligting is 'n groeiende bekommernis,
omrede inligting dan nog meer op risiko is.
Meeste respondente sien hulself as beter of meer gevorderd as hul kompeteerders - 'n
oor-estimasie van sukses in inligtings sekuriteit kan lei tot groter probleme in die
toekoms. Die sensitiewe natuur van inligting sekuriteit maak ope vergelyking van
gedetaileerde prosesse moeilik - en meeste besighede is nie bereid om deel te neem
aan algemene gesprekke nie. Terwyl besighede wat hul tegnologie afdeling deur 'n
derde party bestuur, neem geen verantwoordelikheid vir hul inligtings sekuriteit nie. 'n
Groter bekommernis is dat besighede in Suid-Afrika nie 'n aktiewe proses het om op
hoogte bly van wat die beste opsies is in inligtings sekuriteit nie, of wat hul
teenstanders doen nie - maar vertrou op die advies van verkoops en konsultasie
maatskappye, of media berigte.
|
60 |
Towards a model for ensuring optimal interoperability between the security systems of trading partners in a business-to-business e-commerce contextPather, Maree 25 August 2009 (has links)
A vast range of controls/countermeasures exists for implementing security on information systems connected to the Internet. For the practitioner attempting to implement an integrated solution between trading partners operating across the Internet, this has serious implications in respect of interoperability between the security systems of the trading partners. The problem is exacerbated by the range of specification options within each control. This research is an attempt to find a set of relevant controls and specifications towards a framework for ensuring optimal interoperability between trading partners in this context. Since a policy-based, layered approach is advocated, which allows each trading partner to address localized risks independently, no exhaustive risk analysis is attempted. The focus is on infrastructure that is simultaneously optimally secure and provides optimal interoperability. It should also be scalable, allowing for additional security controls to be added whenever deemed necessary. / Computing / M. Sc. (Information Systems)
|
Page generated in 0.1546 seconds