Spelling suggestions: "subject:"forminformation lemsystems"" "subject:"forminformation atemsystems""
131 |
An analysis of factors affecting the adoption of business-to-consumer e-commerce by SMEs in developing countries: case study ZimbabweMashanda, Precious R January 2012 (has links)
Includes abstract. / Includes bibliographical references. / Most researchers indicate that electronic-commerce (e-commerce) offers viable solutions for businesses trying to meet the challenges of a changing environment. However, the few available studies concerned with Small and Medium Enterprises (SMEs) in developing countries show evidence of delays, and failure to adopt e-commerce solutions in those countries. In the past, little research has been done to identify the reasons for this. This study seeks to explore the factors that influence a decision to adopt Business-to-Consumer (B2C) e-commerce by SMEs in developing countries, using Zimbabwe as a case study.
|
132 |
The impact of Information Technology (IT) on the financial performance of organizations in a developing countryLubbe, Samuel Izak January 1994 (has links)
Bibliography: pages 84-90. / The effect of IT investment on the risk and risk profile of managers were studied in the IT-using industry in Namibia. IT investment uses certain of an organization's resources. The following models (computerization index (CI), IT expense ratio (ITEX) , IT costs efficiency ratio (ITCE), operating cost efficiency ratio (OPEX), operating leverage, cost-benefit ratio, return on IT assets ratio and profitability performance measurements in terms of six strategic ratios; profit/total assets, profit/turnover, turnover/total assets, gross margin/turnover, profit growth rate and sales growth rate) were used. The study also established the importance of perceived risk in any organization's and managers' daily activities. The study further investigated the close link between calculated organizational risk and IT investment decisions. The results displayed a positive association between the CI and turnover growth. A link was shown between ITEX and OPEX and OPEX and the monetary value of IT, allowing the study to accept these two hypotheses. It was thus concluded that CI and ITEX could be used as a possible measurement of computerization. On the other hand, managerial perceived and calculated organizational risk were not found to be the deciding factors while an IT investment was being made.
|
133 |
Investigating the impact of institutional forces on the operations of an organisation-implemented ERP system in a developing countryBitsini, Nkosinathi January 2016 (has links)
In response to the pressure of the ever-changing and dynamic global market, enterprise resource planning (ERP) systems have become the cornerstone for organisations of all sizes to compete internationally. However, implementing organisations in developing countries doesn't enjoy the same benefits as implementing organisations from developed countries, because ERP systems general originate from developed countries and these do not necessarily fit the requirements of implementing organisations in developing countries owing to the different business practices, legal and government regulations. ERP systems are built on institutional models, procedures and forces that set the rules of rationale and these forces serve to bind implementing organisations to fundamental choices about how organisational operations and processes should be organised. Limited studies have been done on the impact of institutional forces on implementing organisations from developing countries, particularly in South Africa, yet these organisations continue to invest huge amounts of their financial resources in ERP systems. Until implementing organisations understand the impact of institutional forces on their operations, misalignment will continue to deny realisation of the full benefits of these systems. This study aimed at exploring the institutional forces and their impact on the operations of the implementing organisation within the South African context. A qualitative research approach was undertaken from an interpretive epistemological position. A single case study was conducted at Organisation X. Organisation X is a public sector organisation formed in 1999 and implemented an ERP system in 2006. Thirty employees participated in the study and the data were analysed using the thematic analysis qualitative technique. The selected participants only include those who joined the Organisation X before the implementation of the ERP system because they have a broad general knowledge of the ERP and have undergone the experience during this time. These include executive managers, senior managers and support staff. Major themes from the data illustrate that implementing organisations from the public sector resort to modifying the ERP because they operate in highly regulated environments. These themes also demonstrate that economic differences, sector requirements, organisational culture, IT infrastructure and operational differences are the institutional forces that affect the implementation and use of software packages. The findings reveal that ERP-embedded institutional forces have a negative impact on the implementing organisational structures, bring changes to the process controls and procedures of the implementing organisation, affect the reporting structure of the organisation, create additional roles and responsibilities, bring undesirable changes to organisational culture and increase organisational spending in IT infrastructure. Institutional forces also have positive impact on implementing organisation operations, including improved availability, accessibility, accuracy and reliability of the information and, lastly, thus improve the effectiveness and efficiency of operations. The findings of this study help to build a body of knowledge on ERP misalignment for organisations planning to implement or adopt ERP systems. This study alerts implementing organisations of the need to systemically review regulations and national rules together with industry best practices prior to deployment.
|
134 |
Factors influencing the decision to adopt an Information Technology Risk Management framework at universities in South AfricaSeale, Tina January 2017 (has links)
The purpose of this research is to identify the main factors influencing universities in South Africa to adopt specific Information Technology Risk Management (ITRM) frameworks. The research has been conducted to understand why universities adopt different ITRM frameworks. The sample group of universities used in this research comprise four public universities in the Western Cape, South Africa. To gain further insights into the decision-making process, an interpretivist philosophy, using a deductive approach, has been used. Roger's Diffusion of Innovation theory is used as a lens to understand the decision-making process to adopt an ITRM framework at universities. A combination of questionnaires, interviews and secondary data has been used to collect data from the sample of universities. The findings establish that inconsistent ITRM frameworks have been adopted at the participating universities. Numerous factors, both internal and external to the university, influence the decision-making process. Internal factors which have had a strong influence on the adoption of an ITRM encompass the attitude of decision makers, strong corporate governance and strong leadership in top management and within the IT department. External factors with the strongest influence on the decision-making process are contained within the legislative and statutory requirements mandated by the Higher Education Act 101 of 1997. Additional external factors influencing choice are certain regulatory requirements as well as the perceived popularity of certain frameworks. The recommendation of external parties is often closely considered when determining framework fit and adaptability to a university's environment. The sample group of universities has been limited to four public universities within the Western Cape. As a consequence, the data collected is limited due to minimal participation across all participating universities. Further research, such as case studies, is recommended in order to gain additional in-depth knowledge of the decision-making process regarding the implementation of ITRM frameworks at universities.
|
135 |
Data preparation and visualization for the SWAN refraction modelGreen, Nicholas January 2003 (has links)
Includes bibliographical references. / This research and development project seeks to provide a usable interactive graphical interface to an environment that otherwise involves primarily numerical data in a static, non-interactive format. Tools will be developed that enable users to prepare numerical data required for the SWAN refraction model and to visualize the results in an interactivie three-dimensional graphical context. SWAN (acronym for Simulating Waves Near shore) is a numerical wave model that is used to predict wave parameters according to a given set of conditions. The design of the 2-D and 3-D graphical interfaces and their impact on the system will be discussed.
|
136 |
Examining the role of mobile phones in minimising knowledge transfer impediments in students' projec teamsShongwe, Mzwandile Muzi January 2009 (has links)
Includes bibliographical references (leaves 98-106). / Knowledge transfer is the most important process in knowledge management. In order for knowledge to be used, it has to be transferred from one knowledge source to the other. Knowledge transfer is not a smooth process. There are a lot of impediments that prevent the transfer of knowledge. Four knowledge transfer impediments were identified: nature of knowledge, social ties, time and motivation. These four were selected because literature shows that they affect project teams in academic and non-academic organisations. However the development of mobile phones and mobile technologies is promising to address this issue. Students use mobile phones to communicate with each other thus sharing knowledge. This research investigated the role that mobile phones play in minimising knowledge transfer impediments in students' project teams. A quantitative approach was used to collect data from participants to test hypothesis drawn from literature. A total of 176 responses were obtained from three groups of students doing projects. The study provides several interesting findings. The study found that, mobile phones minimise three of the four knowledge transfer impediments identified. These are motivation, social ties and time impediments. It was discovered that, a mobile phone motivates team members to share knowledge during a project. Team members with strong social ties use their mobile phones more often to share knowledge on their project. It takes less time to acquire knowledge from previous team members when a mobile phone is used. A mobile phone does not help project teams to transfer tacit knowledge. The study did not find any evidence that suggest that gender and race play role in knowledge transfer using a mobile phone. It was found that project teams from different departments transfer different forms of explicit know ledge. The study also discovered that students do not only use their mobile phones to transfer knowledge, but also use their mobile phones to create knowledge. The study reveals that mobile phones promise to bring a new era of mobile learning. Higher education institutions should cease this opportunity and introduce new interactive ways of learning. Students on the other hand should use mobile phones more often for knowledge creation and transfer to improve their academic work.
|
137 |
A new estimation methodology for reusable component-based software development projectsCourt, Cliff January 1999 (has links)
Bibliograhy: leaves 118-121. / Estimating the duration of software development projects is a difficult task. There are many factors that can derail software projects. However, estimation forms the fundamental part of planning and costing any project and is therefore very necessary. While several formal estimation methodologies exist, they all exhibit weaknesses in one form or another. The most established methodologies are based on early software development methods and it is questionable as to whether they can still address more modern development methods such as reusable component-based programming. Some researchers believe not and have proposed new methodologies that attempt to achieve this. Thus what is needed is a methodology that takes into account modern component-based development practices and, as a result, provides acceptable accuracy for the software organisation. This dissertation attempts to uniquely satisfy both of these requirements.
|
138 |
How business intelligence is adding business valueCrossland, Maria January 2010 (has links)
Includes bibliographical references (leaves 67-72). / Business Intelligence (BI) continues to top the list of CIO priorities, investment in BI technologies continues to grow and organizations are becoming increasingly reliant on BI to help reduce costs and grow revenues. However, structured measurement and monitoring of the business value that can be attributed to BI investment remain elusive. This study used a multiple case study approach to examine how BI is adding value to organizations, what processes and methods are being followed for the evaluation of the business value that BI delivers as well as what approaches are being used to maximize the potential value that the organization's investment on BI could deliver.
|
139 |
Towards health management intelligence: a case study from South AfricaRowles , Gregory Thomas January 2014 (has links)
Over the last two decades various information management processes have evolved in South Africa’s public health system. Most notably a self-service business intelligence tool has emerged at the national level which has been supported by the presence of a Routine Health Information System. Corporate business intelligence and its underlying process are well documented but not in the public health domain. The emergence of this tool and the underlying support processes are investigated in a longitudinal case study. Complex adaptive systems theory is used to demonstrate the evolutionary path of business intelligence processes according to four key areas, namely data quality, master data management, data warehousing and analytics. These processes have developed out of an information management culture that has been nurtured by a participatory approach which required an attractor: the improvement of health services through the collection and use of information. The evolution of these processes took place through a bottom up approach that relied on distributed control structures, self-organization and regular engagement within the CAS that is South Africa’s public health system. This created an environment in which information quality practices and master data management processes enabled the continued production of data for warehousing and analytics. Findings will show how business intelligence processes have evolved within a public health setting to the point that they are supported by a new policy that ensures data integrity, presence, quality and use processes. These processes have developed and stabilized over many iterations and have enabled the establishment of a country level self-service business intelligence platform for health managers.
|
140 |
The nature and impact of cyberbullying among South African youth : an explanatory analysisPayne, Alister January 2015 (has links)
Cyberbullying, bullying via electronic media and communication, is on the increase. It has been thrust to the forefront of the public agenda, with concerns about the psychological and health impacts resulting from online victimisation. There is limited research on the phenomenon and the extent of the problem is unknown in South Africa. Furthermore, inconsistencies between the various definitions has added to our understanding of the problem, and factors influencing cyberbullying are not comprehensively known. This dissertation proposes an alternate definition which does not rely upon repetition as a major characteristic, and investigates the extent of which guardianship and self-control influence online behaviours. 3033 adolescent children aged 11 to 17 from seventeen South African schools responded to our survey examining the nature, extent and impacts of cyberbullying. Incidents of cyberbullying were examined in relation to gender, age and school grade, internet usage, traditional bullying factors, and economic factors. There was a significant incidence of cyberbullying including in primary schools (Grades 6 and 7), and among those pupils exhibiting traditional bullying victim and perpetrator attributes. In contradiction to current research, there were correlations to gender with girls reporting significantly more incidents of cyber victimisation. Cyberbullying impacts were perceived as negative, eliciting feels of anger, fear and depression. Where significant, the results from 2014 were compared to the 2012 results. The results also indicate that in online bullying, repetition was not a factor, and victims reported no less impact from a single incident compared to repetitive incidents.
|
Page generated in 0.1339 seconds