Spelling suggestions: "subject:"communmunication planning -- south africa"" "subject:"communmunication planning -- south affrica""
1 |
A framework to guide development through ICT in rural areas in South AfricaMamba, Malungelo Siphiwosami Njinga January 2012 (has links)
Information and Communication Technology (ICT) is widely regarded as a key tool for bringing about development to people who live in underserved areas. Technologies such as mobile phones and Wi-Fi are seen as advantageous because they can be made available to poor places without the cost of building extensive physical infrastructure. However, researchers argue that ICTs have failed to live up to their potential in the context of development. Researchers point out developing countries lack frameworks to guide them through the implementation of ICTs in this context. The objective of this study is to come up with a framework that can be used in rural areas in South Africa to implement ICT projects. The researcher interviewed individuals who have been directly involved in an ICT initiative in a rural setting in the Eastern Cape Province to learn from their experiences. The researcher also studied publications that have been produced from these initiatives in order to gain a richer understanding. The findings of the study show that participants share similar views about how ICT projects should be approached and implemented in rural areas in South Africa. The views are grouped according to similarity into themes and discussed in detail in the study. From these themes a framework that can help implement ICT projects in rural areas is developed.
|
2 |
Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government TendersRama, Sobhana January 2013 (has links)
Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
|
Page generated in 0.1574 seconds