• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4707
  • 3782
  • 887
  • 123
  • 113
  • 82
  • 47
  • 44
  • 38
  • 33
  • 27
  • 25
  • 23
  • 19
  • 17
  • Tagged with
  • 11092
  • 11092
  • 5631
  • 5603
  • 5594
  • 2115
  • 2006
  • 1728
  • 1697
  • 1684
  • 1683
  • 1522
  • 1072
  • 960
  • 946
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

A method for implementing an information security awareness campaign within an organisation

Scrimgeour, Juan-Marc 06 May 2020 (has links)
Research has shown that educating end-users on information security awareness plays an essential part in securing any environment. While best practice standards provide a set of minimum information security awareness controls that should be implemented, little guidance exists on how to implement these controls to ensure the effectiveness of the training. This research set out to define and evaluate a method for implementing an Information Security Awareness Campaign within an organisation based on existing research and standards while assisting the organisation in improving their information security awareness campaign through the creation of artifacts and measurement techniques. A design science research approach guided the research to evaluate changes in the information security awareness campaign implementation method through several research cycles. The method was implemented within an organisation and evaluated based on the impact, effectiveness and results of each step as well as the feedback from participants. The research found both positive and negative results throughout the method. Specific steps within the method proved to be lengthy, time-consuming and confusing to participants. Although many improvements can yet be made, the method was suitable as it achieved the required objective within the organisation. The research outcome provided a risk-based method with a visual representation that demonstrated the lack of awareness of specific information security awareness topics to the organisation. The results of the study not only provided value to the organisation but provided a tried and tested method for implementing an Information Security Awareness Campaign within other organisations.
72

Knowledge transformation in a mobile learning environment : an interpretive inquiry of ubiquitous context and social presence awareness

Kekwaletswe, Raymond M January 2007 (has links)
Includes bibliographical references (leaves 277-299). / One of the most fundamental facets of knowledge is that it transforms as an outcome of individuals sharing experiences through interaction. Knowledge transformation is when there is a shift in view, perspective and the thought process consequent to a social activity. The problem for a contact university is that mobile learners do not have access to consistent social resources for academic support as they drift from formal to informal learning contexts. The alternative for these learners is to engage in a learning activity though social interaction with knowledgeable peers who share a background. Learning actions are influenced gy changes in the environment and social awareness. Social awareness is synonymous with awareness of context and social presence. This research was a learning expedition towards understanding the phenomenon of ubiquitous mobile learning where knowledge transformation is a result of social awareness activities of mobile learners as they traverse varied learning contexts. Mobile learning is signified by mobility of learners regardless of mobile technology.
73

Theorizing ICT-based social innovation on development in the context of developing countries of Africa

Ngonzi, Tibuhinda T January 2016 (has links)
Background - The main concern of this study is that the perspectives at the foundation of the deployment of information and communication technologies (ICT) undermine the pertinent long-term benefits in developing countries. Not only that, but they also affect the ways in which communities in the global information society engage themselves in the diffusion process of ICT. Claim of the study - The innovation and diffusion process of ICT in developing countries of Africa is foreign and sponsor driven. Consequently, the process is infested with a focus on the realizations in the short-term, with a continued domination of technological innovations by the technologically advanced communities. The argument in this study is that Africa's developing countries need to change their perspectives, and play an active role to drive the diffusion process of ICT in local contexts for long-term developmental impacts. Purpose of the study - The main aim of this study is to explore the conceptions surrounding ICT processes in theory and practice, for the purpose of gaining insight into the improved approaches for applied ICT. The study looks into ways through which local communities and their governments in Africa's developing countries can play a role in cultivating the enhancement of ICT to promote productivity, like it has happened in other places of the world. Problem statement - The assumption for the problem statement draws from the expressed main concern in the background. That is, there is a need for adequate theoretical foundations to appropriately guide the ICT deployment and application initiatives for effective social development in Africa's DCs. In the other words, theoretical contributions in the discipline of information systems are needed to explain the relationships between long-term impacts of ICT and societies, and the frameworks for practice to realize the impacts.
74

Mobile phone use for empowerment in the context of social exclusion: an ethnographic study of urban refugees in South Africa

Bisimwa, Kasky Bacishoga January 2017 (has links)
Problem Statement: Calls have been made to find ways to address the problem of urban refugees who are now acknowledged as a universal, continuing, and recurring phenomenon. There is a dominant optimism about the contribution of mobile phones to the empowerment of refugees in the host countries. However, there is a dearth of knowledge on exactly how mobile phones contribute to empowerment, and also the use of mobile phones by urban refugees in developing countries has received only minimal attention. The purpose of the research: The main objective of this research was to empirically investigate whether the use of mobile phones by urban refugees in South Africa generates or fails to generate capabilities for empowerment. The specific aim was to critically explore the factors which shape the use of mobile phones by urban refugees in South Africa and their capabilities for empowerment. Design / methodology / approach: This research adopted a critical orientation to knowledge, used critical ethnographic methods and drew on a theoretical lens developed from the integration of Sen's Capability Approach and Bourdieu's Theory of Practice. The data were collected through observations and in-depth interviews with 22 urban refugees in South Africa. Documents and website corroborating evidence have provided secondary data. Data were analysed using thematic analysis. Findings: The findings suggest that mobile phone use affords valuable capabilities for empowerment in three main ways. First, the capabilities to negotiate ways to participate in the information society by: participating in economic and financial activities, improving access to services and to sources of information. Second, the capabilities to effectively engage with wider networks by: developing and maintaining relationships, being socially and culturally connected, and communicating effectively. Third, the capabilities to manage one's own situation and solve problems by: multi-tasking easily, and a guarantee of transparency and security. However, the generation of these capabilities is contingent on power relations in the social field - between social structures and individual's agency. In South Africa, the capabilities of empowerment that urban refugees can generate through mobile phone use are either enhanced or hindered by interrelated factors, namely the affordances of mobile phones, socio-environmental factors, and personal factors. The availability of capital is very crucial for personal factors, to which they confer more, or less, power to influence the power relations. Originality / contribution: This research contributes to the theory in the field of Information Systems by proposing a dynamic framework with precise constructs for theorising and explaining the mechanisms and social practices that shape mobile phone use and the capabilities for empowerment. This research suggests that to research mobile phone use for empowerment in the context of social exclusion and inequality in developing countries, researchers need to look beyond social agents' immediate behaviours to take into consideration the broader context of social exclusion, by focusing on conversion factors, human diversity, and capabilities. This research has exposed the explicitly or implicitly hidden interests, important beliefs, assumptions and social practices that facilitate or constrain capabilities for empowerment. It contributes to the empowerment of the ethnographic researcher who is himself an urban refugee in South Africa, but also to the empowerment of urban refugees in South Africa and perhaps of other individuals in a similar situation. That is because empowerment starts with the enlightenment and the realisation of one's own true interest and situation. The findings can also contribute to the policy-setting process of government or organisations seeking to assist urban refugees, by facilitating the formulation of their intervention strategies.
75

Using software as a service to support the academic activities of students in higher education institutions with a relative lack of resources

Akande, Akinlolu Olumide 25 January 2019 (has links)
The contribution of Software as a Service (SaaS) towards improved access to software, cost reduction, better quality of learning and enhanced communication and collaboration in higher education institutions (HEIs) cannot be over emphasised. Some HEIs are faced with issues such as tight budget, lack of needed software, inadequate human resources and lack of adequate infrastructure. This research refers to such HEIs as those with a relative lack of resources because the resources intended for a single student are often shared among ten or more students. Hence many students are unable to cope with their academic activities and some end up failing or even dropping out. Finding alternative ways to provide the necessary software for students is therefore a priority for HEIs with a relative lack of resources. SaaS offers a possible alternative for them and it is gaining their attention. The goal of this research was to empower HEIs, their students, lecturers and Information Technology (IT) staff by providing them with a better understanding of SaaS and to provide them with a tool to manage the adoption and implementation of SaaS. Also, the intention was to make practical, theoretical and methodological contributions to the scientific body of knowledge in the area of Software as a Service. To achieve the goals, this research investigated the use of SaaS in HEIs with a relative lack of resources and found SaaS to be effective in providing wider access to software for students in HEIs with a relative lack of resources. This research also identified benefits and limitations of SaaS and how SaaS can help in addressing the barriers to learning and contribute towards the creation of a conducive learning environment for students. The different SaaS offerings available for education and the issues and contradictions associated with the use of SaaS in HEIs were also identified. Furthermore, a set of propositions and an integrated framework were developed using the data from the literature, books, institutional documents and interview data. Although HEIs are continuously introducing SaaS offerings into their academic activities and SaaS promises to improve the learning experience of students in HEIs by improving access to software, improving the sharing of documents and files, improving collaboration as well as communication, this research found that the use of SaaS by students in HEIs is still relatively low and uncovered the reasons for this. The HEIs in Nigeria and South Africa were used as exemplars and the problems they face with regards to resource availability were identified using the activity theory (AT) as a theoretical lens. The Astin’s IEO model and the Students involvement theory were also used to explain some issues relating to the importance of student participation in academic activities involving the use of SaaS. Although the study was focused on students, data from lecturers and IT staff was used for triangulation to increase the credibility and validity of the data obtained from the students. This research found that students believe that SaaS can improve their learning experience and there is an unwavering support for the campus wide implementation of SaaS among students. In the Nigerian HEIs, software piracy was found to be a major problem as students cannot afford to buy the original software needed for academic activities. Another major finding from the Nigerian HEIs is the rampant claims that corruption affects the implementation of SaaS and other ICT initiatives as funds meant for implementation are often diverted for personal gains. In both Nigeria and South Africa, this research found that there is limited or no internet access in some areas and the students who come from such areas are unable to access SaaS from home. This limits their ability to enjoy the anytime, anywhere access advantage of SaaS. This research concluded by suggesting the need for the government and education institutions to provide training for learners and encourage them to be computer literate from an early stage as this could improve their confidence in using technologies such as SaaS when they get to higher education level.
76

Conceptualising improvisation in information security risk management activities : a South Africa case study

Njenga, Kennedy Nduati January 2009 (has links)
Includes abstract. / Includes bibliographical references (leaves 286-299). / The aim of this research was to understand how functionalist approaches and the incremental approaches are manifested in ISRM activities. New insights and meaning to the ISRM activities were presented when the incrementalist approaches to ISRM and the functionalist approaches to ISRM were examined holistically. Improvisation, for the purpose of this research, was used to explain this holistic understanding.
77

Towards a regional ontology for information systems project management

Sewchurran, Kosheek January 2008 (has links)
Includes bibliographical references (leaves [170]-185). / The extant research literature on Information Systems (IS) project management illustrates that there is considerable confusion about the true nature of IS project management. The bewilderment is expressed in a number of ways. Practitioners are reporting that there is considerable mismatch between the prescribed practices they are socialised into and their actual experiences of project work. Appropriately, there are also debates about what constitutes project success and about what factors influence project success and failure. Whilst these fundamentals are being debated there are also concerns expressed about the lack of adequate underlying theoretical constructs to give coherence to the kinds of questions raised. As the essence of IS project management is being debated there is evidence suggesting that the project-driven organisational form is growing in popularity. Together with the concerns there are proposals being offered as alternatives to improve understanding of project management. The review undertaken in this thesis illustrates that alternatives are emerging despite the existence of an entrenched value system that makes society prone to unwittingly accept and be attracted to the adoption of best practices such as PMBOK, which is central to the debate taking place in IS project management.
78

Visualisation of data to optimise strategic decision making

Moore, Jeanne January 2017 (has links)
1.1 Purpose of the study: The purpose of this research was to explain the principles that should be adopted when developing data visualisations for effective strategic decision making. 1.1.1 Main problem statement: Big data is produced at exponential rates and organisational executives may not possess the appropriate skill or knowledge to consume it for rigorous and timely strategic decision-making (Li, Tiwari, Alcock, & Bermell-Garcia, 2016; Marshall & De la Harpe, 2009; McNeely & Hahm, 2014). 1.1.2 Sub-problems: Organisational executives, including Chief Executive Officers (CEOs), Chief Financial Officers (CFOs) and Chief Operating Officers (COOs) possess unique and differing characteristics including education, IT skill, goals and experiences impacting on his/her strategic decision-making ability (Campbell, Chang, & Hosseinian-Far, 2015; Clayton, 2013; Krotov, 2015; Montibeller & Winterfeldt, 2015; Toker, Conati, Steichen, & Carenini, 2013; Xu, 2014). Furthermore, data visualisations are often not "fit-forpurpose", meaning they do not consistently or adequately guide executive strategic decision-making for organisational success (Nevo, Nevo, Kumar, Braasch, & Mathews, 2015). Finally, data visualisation development currently faces challenges, including resolving the interaction between data and human intuition, as well as the incorporation of big data to derive competitive advantage (Goes, 2014; Moorthy et al., 2015; Teras & Raghunathan, 2015). 1.1.3 Research Questions: Based on the challenges identified in section 1.1.1 and 1.1.2, the researcher has identified 3 research questions. RQ1: What do individual organisational executives value and use in data and data visualisation for strategic decision-making purposes? RQ2: How does data visualisation impact on an executive's ability to use and digest relevant information, including on his/her decision-making speed and confidence? RQ3: What elements should data analysts consider when developing data visualisations? 1.2 Rationale: The study will provide guidance to data analysts on how to develop and rethink their data visualisation methods, based on responses from organisational executives tasked with strategic decision-making. By performing this study, data analysts and executives will both benefit, as data analysts will gain knowledge and understanding of what executives value and use in data visualisations, while executives will have a platform to raise their requirements, improving the effectiveness of data visualisations for strategic decision-making. 1.3 Research Method: Qualitative research was the research method used in this research study. Qualitative research could be described as using words rather than precise measurements or calculations when performing data collection and analysis and uses methods of observation, human experiences and inquiry to explain the results of a study (Bryman, 2015; Myers, 2013). Its importance in social science research has increased, as there is a need to further understand the connection of the research study to people's emotions, culture and experiences (Creswell, 2013; Lub, 2015). This supports the ontological view of the researcher, which is an interpretivist's view (Eriksson & Kovalainen, 2015; Ormston, Spencer, Barnard, & Snape, 2014). The epistemology was interpretivism, as the researcher interviewed executives and data analysts (Eriksson & Kovalainen, 2015; Ritchie, Lewis, Nicholls, & Ormston, 2013). Furthermore, literature relating to decision-making supported the researcher's interpretivist view, as people generally make decisions based on what they know at the time (Betsch & Haberstroh, 2014). Therefore, the researcher cannot separate the participant from his/her views (Dhochak & Sharma, 2016).The population for this research comprised of 13 executives tasked with strategic decision-making, as well as 4 data analysts who are either internal (permanent employees) or external (consultants) of the organisation within the private sector. 1.4 Conclusion: RQ1: What do individual organisational executives value and use in data and data visualisation for strategic decision-making purposes? Based upon the findings, to answer RQ1, organisational executives must first be clear on the value of the decision. No benefit will be derived from data visualisation if the decision lacks value. The executives also stressed the importance of understanding how data relevancy was identified, based on the premise used by the data visualisation developers. Executives also value source data accuracy and preventing a one-dimensional view by only incorporating data from one source. Hence the value of dynamism, or differing data angles, is important. In terms of the value in data visualisation, it must provide simplicity, clarity, intuitiveness, insightfulness, gap, pattern and trending capability in a collaboration enabling manner, supporting the requirements and decision objectives of the executive. However, an additional finding also identified the importance of the executive's knowledge of the topic at hand and having some familiarity of the topic. Finally, the presenter of the visualisation must also provide a guiding force to assist the executive in reaching a final decision, but not actually formulate the decision for the executive. RQ2: How does data visualisation impact on an executive's ability to use and digest relevant information, including on his/her decision-making speed and confidence? Based on the findings, to answer RQ2, themes of consumption, speed and confidence can be used. However; the final themes of use and trust overlap the initial 3 theme. Consumption is impacted by the data visualisation's ability to talk to the objective of the decision and the ability of the technology used to map the mental model and thinking processes of the decision-maker. Furthermore, data visualisations must not only identify the best decision, but also help the executive to define actionable steps to meet the goal of the decision. Executives appreciate the knowledge and skill of peers and prefer an open approach to decision-making, provided that each inclusion is to the benefit of the organisation as a whole. Benchmark statistics from similar industries also add to the consumption factor. Speed was only defined in terms of the data visualisation design, including the use of contrasting elements, such as colour, to highlight anomalies and areas of interest with greater speed. Furthermore, tolerance limits can also assist the executive in identifying where thresholds have been surpassed, or where areas of underperformance have occurred, focussing on problem areas within the organisation. Finally, confidence is not only impacted by the data visualisation itself but is also affected by the executive's knowledge of the decision and the factors affecting the decision, the ability of the data visualisation presenter to understand, guide and add value to the decision process, the accuracy and integrity of the data presented, the familiarity of the technology used to present the data visualisation and the ability of the data visualisation to enable explorative and collaborative methods for decision-making. RQ3: What elements should data analysts consider when developing data visualisations? Based on the findings, to answer RQ3, the trust theme identifies qualitative factors, relating to the presenter. The value, consumption and confidence themes all point to the relevance of having an open and collaborative organisational culture that enables the effective use of data visualisation. Collaboration brings individuals together and the power of knowledgeable individuals can enhance the final decision. In terms of the presenter, his/her organisational ranking, handling of complexity and multiple audience requirements, use of data in the data visualisation, ability to answer questions, his/her confidence and maturity, professionalism, delivery of the message when presenting, knowledge of the subject presented, understanding of the executive's objectives and data visualisation methodology, creation of a "WOW" factor and understanding the data journey are all important considerations.
79

Understanding the achievement of benefits through use of Enterprise Content Management (ECM) systems in public sector organisations

Salamntu, Lumka Thami January 2016 (has links)
Public sector organisations are implementing the Enterprise Content Management (ECM) system because of their large volume of unstructured content which led to documents being stored in various repositories. This made it difficult for such organisations to access, control and locate documents. ECM systems are therefore implemented to address the uncontrolled manner in which documents are saved, stored and accessed by employees. There were a number of other anticipated benefits. This study aims to explore and understand the achievement of benefits through the use of ECM systems and to determine the barriers preventing the benefits from being achieved in public sector organisations. The study used a qualitative research approach. Two cases of the public sector organisations were investigated in a cross-sectional study. Data was collected through semi-structured interviews and by viewing organisational documentation. Data was analysed using thematic analysis with elements of deductive and inductive approaches. An ERP benefits framework and the Enhanced Impact framework formed a theoretical base and were used as a lens for collecting and analysing data.
80

Misalignment - the core challenge in integrating security and privacy requirements into mobile banking application development

Machiridza, Memory January 2016 (has links)
This study identifies and explores the core challenge faced when integrating security and privacy requirements into the mobile banking software development life cycle. Studies on key issues in Information Systems (IS) have been on-going for several decades, with security and privacy moving up the ranks of top issues in IS. Security and privacy requirements can be added into the mobile application development processes by practising secure coding, and/or, by adding a third party security tool. This study gathered data from a single case study; it employs grounded theory methodology to reveal misalignment as the core challenge to integrating security and privacy requirements into mobile banking application development. The forms of misalignment are between security and privacy requirements and (1) external entities, (2) roles, (3) skills and (4) system requirements. The nature of the mobile application domain results in the misalignment forms identified above. Some of the findings indicate the need for further research. Research indicates that mobile application development follows agile methods for development. Agile methods have been compared with Complex Adaptive Systems (CAS). For this reason, research in IS could benefit from studies that focus on CAS as a theory to provide a better explanation on the misalignment issues in mobile application development.

Page generated in 0.1187 seconds