• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4595
  • 3576
  • 887
  • 123
  • 113
  • 82
  • 47
  • 44
  • 35
  • 33
  • 27
  • 25
  • 23
  • 19
  • 17
  • Tagged with
  • 10762
  • 10762
  • 5322
  • 5296
  • 5287
  • 2092
  • 1825
  • 1554
  • 1521
  • 1515
  • 1510
  • 1509
  • 1060
  • 936
  • 929
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Identifying socio-cultural determinants to access : implications for e-governance in the water & sanitation sector

Hill, Wesley Clifton January 2016 (has links)
This study identifies socio-cultural determinants to both access to technology, as well as access to water and sanitation services, to build an understanding of how technology use and service delivery interact to either restrict or empower groups to communicate their water and sanitation needs through e-government platforms. Even though South Africa's racist apartheid laws were repealed over two decades ago, water and sanitation services in predominantly black areas of Cape Town are still effected by the structural inequalities rooted in apartheid policies. Frustration over the state of water and sanitation services in these areas frequently erupts into violent and destructive protests. A key piece to reducing these inequalities lies in the city's ability to collect data on the state of water and sanitation infrastructure, and the City of Cape Town has promoted a number of e-Governance initiatives to streamline the process of collecting information from users of water and sanitation services. Among these initiatives is an SMS based fault reporting system, which was envisioned as an inexpensive method for users to easily report service failures to the city. Additionally, the city has adopted other web-based reporting platforms based on popular social media sites and email, which can be accessed using internet enabled mobile phones. However, despite high rates of mobile phone ownership in Cape Town, little is known about how people use them. It is important to know how people use mobile phones in order to gauge whether e-Governance initiatives are accessible to poor and vulnerable populations. This analysis is particularly important for highly stratified societies such as South Africa, since it has been shown that introducing ICT into a service delivery system will not result in social change, but will simply act to amplify the underlying intents and capacities that are already present in the system. The purpose of this study was to identify socio-cultural determinants to water and sanitation access and ICT use, to gauge the capacity of groups with marginal access to water and sanitation services to advocate for improvements using mobile phone enabled fault reporting. The study was carried out as a cross-sectional analysis using chi-square tests to identify correlations between socio-cultural data that was collected during three days of interviews in the township of Imizamo Yethu. A spatial analysis was also employed to visualise geographic patterns of access to water and mobile technology. The results indicate that mobility challenged township residents face barriers to accessing water and sanitation services, and also have limited options for reporting faults using mobile phones. Additional disparities in access to services and mobile phone use were found to be based on geography, economic ability, education, as well as place of birth (foreign born vs. South African born). The results indicate that marginalised segments of the population have very limited capacity to communicate their needs to the municipal government. Therefore it seems that e-Governance in the water and sanitation sector likely perpetuates some of the existing inequalities. Hopefully the information and recommendations brought forward in this study will prove helpful to those working to undo the social fractures caused by decades of exclusionary policies.
82

Factors influencing software development in complex IT Projects using Agile approaches - A single telecoms case study

Griebenouw, Willem 15 February 2022 (has links)
Customer's needs and wants are forever changing and organistion need to be able to rapidly respond to the shifts in the market coupled with changing customer behaviour. Companies are continuously striving for different and innovative approaches to address these challenges. Several different approaches ranging are used by these organisation which range from incorporating new technologies, developing new products and services, and thoroughly understanding customer needs and requirements. These approaches require the organisation to adapt and adopt to new ways of working and moving away from traditional project management methods to agile methods. However, this transition gives rise to challenges such as the natural human resistance to change, needing to ensure that staff remain positive during these periods of uncertainty and change, ensuring that the organization does not backslide into its old ways of working (whilst under immense pressure to conform), effectively prioritizing projects and resources, as well as managing the cultural shift required to support these (organisational) changes. Coupled with these various challenges is a steep learning and adoption curve that must be overcome if the newly embedded technologies and processes are to be successfully assimilated into the organization. Thus it is crucially important that organisation not only understand the benefits associated with transitioning to agile methods, but also those barriers that need to be overcome to ensure a successful transition. Therefore this research is aimed at providing insight into the barriers and benefits associated with transitioning from Traditional Project Management (TPM) methods to agile approaches, specifically in the context of large complex IT projects. Throughout the study an inductive approach to data analysis was used to categorise the findings into broader themes after which two frameworks were used to interpret these findings. The Technology organisation environment framework (TOE) as well as the Socio-Technical Theory (STT/STS) framework were used to interpret the findings obtained. TOE assisted in analysing the relationships between the organisation, the external environment and the technological environment in which it operates. STT/TSS supported the TOE framework by guiding the analysis of the technical subsystem (agile tools) in conjunction with the social subsystem (employees) within the organisation. The study included a combination of of agile- and non-agile practioners within a telecommunications organisation, who all had previous experience of working on complex IT projects in a traditional and agile construct. The research provides insights into those themes that are associated with these barriers, for example poor and ineffective management style being displayed, teams still using a traditional TPM mindset when placed under duress, ineffective agile adoption within the teams, poor change management within the organisation, lack of support from business to enable delivery, and ineffective or unclear roles within teams and management, etc. and also highlighted several benefits to the transitioning which include empowered teams that are able to function autonomously, improved transparency and visibility within teams, improved speed of delivering and improved performance metrics in use within the organisation. During the course of the research several differing opinions were found which lead to contradiciting themes arising as each team witnessed the agile transition and implementation differently, which highlighted areas of future research. For example team autonomy was identified as a benefit to the transition allowing for self-direction but also sighted as a negative themes where teams empowerment is lacking; Traditional Project Management methods still providing improved speed of delivery when compared to agile methods. Other examples include some teams being disempowered with little or no decision-making authority, whilst others were able to self-direct and manage. Measurement metrics had been identified as both an advantage as well as a barrier to successfully transition to agile approaches as some felt the teams were measured effectively, whist others lamented a lack of appropriate metrics.
83

Factors influencing the intention of youth to adopt electronic voting in South Africa

Moletsane, Tankiso 03 March 2022 (has links)
Background: The rapid increase in the adoption of the internet in developing countries and the growth of citizen-centric e-government technologies has sparked interest in electronic voting (e-voting) systems. E-voting systems enable voters to participate in elections remotely, using internet-based technologies. In 2020, the Independent Electoral Commission of South Africa stated its intention to introduce e-voting to lower the costs of voting, improve electoral transparency and efficiency, and to improve overall voter participation. There is, however, little research to explain the factors that could potentially influence voters, particularly young people (18-35 years) who are a growing voting demographic with a declining interest in electoral participation. Objective: The primary objective of this research is to investigate the factors that influence the intention of young people to adopt electronic voting in South Africa. Secondarily, the study seeks to investigate how South African youth perceive e-voting. Research methodology: Using a deductive approach, a conceptual model with constructs from the technology acceptance model (TAM), the theory of planned behaviour (TPB), and the diffusion of innovation theory (DOI) is proposed. An online survey is used to collect data (n = 412) from South African youth between the ages of 18 – 35 years. Key Findings: Structural equation modelling and factor analysis applied on a pretested and pre-validated quantitative survey reveal that technology stickiness, access to ICT, skills in ICT, attitude towards ICT, relative advantage and political affiliation positively impact the intention to use e-voting. Eighty-one (81%) percent of respondents agree that they will use e-voting should it become available. Value of the study: The study contributions are twofold. First, the research proposes an empirically tested theoretical framework to assess the intentions of youths to participate in e-voting and second, the study the study makes recommendations for policymakers regarding the e-voting perceptions of young people.
84

The association of matriculation English scores with the performance of Information Systems majors at the University of Cape Town

Nash, Jane January 2003 (has links)
Bibliography: leaves 97-103. / This study examines the role of language proficiency in the performance of university students within the specialised field of IS, with particular focus on second language speakers. Quantitative analysis is used to investigate the association between academic performance and matriculation results (particularly English), as well as a number of demographic factors, based on a cohort of 241 undergraduate students following an IS major curriculum at the University of Cape Town over a four year period.
85

Perceived influence of cybersecurity on the intention to use mobile banking applications

Chikoo, Ishmael 22 April 2020 (has links)
Banking institutions see the adoption and usage of mobile devices for banking namely mobile banking as an innovative financial service delivering strategy that bridges the gap between customers and banks. Mobile banking eliminates the need to visit bank branches for banking services and it eliminates the need to only perform banking services within fixed business hours. In mobile banking, mobile devices such as a cellphone, smartphone, or tablet’ are used to conduct non-financial and financial transactions such as checking account status, transferring money, making payments, or selling stocks. Mobile banking is suggested to take over the banking sector because it is economising and timesaving benefits. Despite these benefits, the adoption rate amongst consumers remains low, especially in developing countries where there is a knowledge gap in understanding why consumers do not engage in the frequent use of mobile banking applications. Apart from several factors identified in previous literature on mobile banking as influencers of limited usage and adoption of mobile banking, trust remains an important factor in the intention to adopt or use mobile banking applications. Also, because of the increasing prevalence of cyber threats in developing countries, the influence of cybersecurity is still questionable on their influences on the intention to adopt or use mobile baking applications. The increase in cyber threats and attacks has birthed the need for cybersecurity to be addressed. Given that most financial institutions see mobile banking as a strategy for their competitive advantage; it is important that they understand how best to address consumer’s fears brought about by cybersecurity threats. Literature has not covered more ground on the analysis of mobile banking applications (Uduimoh., Osho., Ismaila, & Shafi’i, 2019). The purpose of this study is to investigate the perceived influence of cybersecurity on the user’s intentions to use mobile banking applications. The study identified seven salient cybersecurity factors that influence the intention to use mobile banking applications. These cybersecurity factors were grouped into two groups, namely intrinsic factors and extrinsic factors and resulted in the development of a conceptual model. With this model, hypothesises were developed and tested statistically using quantitative data from an online selfadministered Qualtrics survey questionnaire. Data collected from 90 participants was statistically analysed in Smart PLS 3 (a quantitative data analysis software). Structural Equation Modeling (SEM) and Partial Least Squares path modelling approaches were adopted for data analysis. Hypothesis testing was performed on salient factors that influence the perception of cybersecurity on the intention to use mobile banking applications. The findings concluded that salient significant factors that influence the perception of mobile banking cybersecurity on the intention to use mobile banking applications were perceived data confidentiality and cybersecurity awareness. As a result, the study concluded that one’s perception on ability to avert cybersecurity threats and attacks, how they perceived the protection of their data from being modified by unauthorised users, how they perceive their data to be kept confidential and their knowledge of cybersecurity from legitimate sources influences their intention to use mobile banking applications. Finally, this study investigated the empirical evidence of the knowledge gap concerning the perceived influence of cybersecurity on the intention to use mobile banking applications.
86

A comparison of alternative technology adoption models : the adoption of a CASE tool at a university

Pollock, Michael A January 2004 (has links)
Bibliography: leaves 95-105. / In a field such as that of Information Systems the emergence of new technologies is one of the only constants. It is therefore necessary, indeed vital, to be able to measure, as well as anticipate, the adoption and diffusion of these new technologies into organisations. For this purpose adoption models came to the fore. Such models include the Technology Acceptance Model (TAM) (Davis, 1989), the Technology Acceptance Model 2 (T AM2) (Venkatesh & Davis, 2000), the Decomposed Theory of Planned Behaviour (DTPB) (Taylor & Todd, 1995b), and the Perceived Characteristics of Innovating model (PCI) (Moore & Benbasat, 1991). Adoption models test the perceptions and attitudes of potential and actual adopters of a new technology. Although all of the adoption models test adoption of a new technology, each tests different aspects of this adoption. Through the comparison of the four adoption models mentioned above, this study determines which constructs mostly strongly explain the adoption of a CASE tool by university students. These constructs are then combined to form a new technology adoption model, the Perceived Characteristics of Technology Adoption CPCTA), which is tested and found to explain a significant degree of variance in the context of CASE tool adoption amongst students at a university.
87

Broadband diffusion in households of South Africa

Naidoo, Mogen January 2011 (has links)
Includes abstract. / Includes bibliographical references (p. 272-281). / This research attempts to investigate the adoption, use and impact of broadband services from a holistic point of view encompassing the factors influencing the adoption, use and impact of broadband. This study explores the broadband developments in South Africa and discusses the challenges faced in increasing the broadband penetration rate within the country.
88

Business priorities driving BYOD and the resulting consequences: a South African case study

Miller, Steve Gavin January 2016 (has links)
The consumerisation of information technology (IT) introduced the bring your own device (BYOD) phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organisational systems in order to perform their work tasks. Such devices include smart phones, tablets and laptop computers. BYOD provide s opportunities for both the organisation and employees, but the adoption of BYO D also introduces risks to the organisation. Mobility and management of BYOD and CYOD (choose your own device) has consistently been a top concern for business management and Chief Information Officers (CIO's) globally. In the current, challenging economic environment organisations need to use all their resources, including technology, effectively. Organisations that develop an effective BYOD program can use this to assist in achieving their organisational objectives. This study uses a case study approach to investigate how business priorities drive the adoption of BYOD and how BYOD benefits and risks are realised by the organisation. Primary empirical data was collected using semi-structured interviews with employees from a large financial services organisation. Policy documents from the organisation was analysed as secondary data. Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practises. The themes were combined into a conceptual model, showing the decision process in adopting a BYOD program. This research contributes to the body of knowledge in this area, focusing on the South African context. The conceptual model can serve as an example for organisations currently making BYOD adoption decisions or organisations that are not achieving the full benefits of their BYOD program. The conceptual model reveals that organisations can use BYOD to achieve benefits including having a mobile workforce which results in an increase in productivity. However, mobility introduces risk to the organisation where information security risks is the top concern. This study recommends using a combination of technical and human controls to manage the risks. The technical controls include the use of an enterprise mobility management system and password controls. The human controls include the creation of effective BYOD and information security policies that the employees understand and follow. Providing employees with information security awareness and training is essential.
89

The use of social media in business by women entrepreneurs in the KSA: The case of Instragram

Al-Haidari, Nawal Nasser January 2017 (has links)
There have been few studies done on Small and Medium Enterprises (SME) in the context of the Kingdom of Saudi Arabia. Furthermore, studies show that Saudi women entrepreneurs (SWE) are constrained and faced with challenges that inhibit the growth of their small businesses. Such challenges include cultural factors, lack of business knowledge and expertise by entrepreneurs, lack of financial support for entrepreneurs, lack of training from the private sector, lack of business education supported by government for entrepreneurs and limited business opportunities. However, the adoption of social media, like Instagram, has been shown to help SME address numerous challenges experienced in their business context. The Instagram application has attracted huge numbers of users and is one of the fastest growing social media platforms in the world. It differentiates itself from other social networking sites by offering people a unique and easy way to communicate, since many social media users prefer posting photos or short video clips. Instagram is characterized by its primary function of posting and sharing images. Instagram is a highly effective, time-efficient, and user-friendly social media platform for businesses. Instagram quickly gained global popularity and reached roughly 300 million users in 2014. Thus Instagram, as a tool to market products and services, could enable SWE to overcome challenges which they face in the day to day running of their businesses. While the usefulness of adopting Instagram has been highlighted, there is limited knowledge regarding how SWE can adopt this social media application to overcome the various challenges experienced in their small businesses. No studies, to the author's knowledge, have examined this phenomenon in the Kingdom of Saudi Arabia (KSA). This study, therefore aims to examine how women entrepreneurs in the KSA adopt social media, Instagram in particular, to overcome various challenges in their small businesses. The study uncovers the challenges they face while adopting Instagram, as well as the advantages of adopting the tool. This study is qualitative, assumes an interpretive epistemological stance, and uses domestication theory as a framework for the research. Domestication theory involves looking at how people adopt technologies and integrate them into their activities and relationships in their daily lives. The data for this study was gathered through semi-structured interviews with a sample of 20 women entrepreneurs in the KSA. Interviewees were identified using snowball and purposive sampling techniques. Thematic analysis was used for analysing the data collected in order to extract codes and configurations of business challenges, Instagram-related challenges and benefits that result from adopting Instagram in small businesses. The findings revealed the following business challenges incurred by SWE: lack of business experience, stringent requirements for business registration, financial restrictions, judgement by society, the need for privacy and security, poor communication, and physical access to customers. The adoption of Instagram as a marketing space helped increase flexibility in the daily lives of SWE. The findings have shown that SWE appreciate the benefits of adopting Instagram in order to overcome business challenges. Yet, the findings also displayed that despite SWE still running their businesses through Instagram, there are a number of challenges that they are faced with. These challenges include coping with the lack of time to answer all inquiries, the lack of business rights and protection, the cancellation of orders, the need for uniqueness, and trust issues.
90

BYOD: Risk considerations in a South African organisation

Veljkovic, Ivan 25 February 2019 (has links)
In recent times, while numerous organisations have difficulty keeping abreast with the frequent year-on-year technology changes, their employees on the other hand, continue to bring their personal devices to work to more readily access organisational data. This concept is known as Bring Your Own Device (BYOD). Studies have demonstrated that the introduction of BYOD commonly has a positive effect on both organisation and employees: increased optimism, job satisfaction and productivity are some of the perceived positive effects. Furthermore, BYOD can improve employees’ opportunities for mobile working and assist with the work flexibility they seek. This phenomenon, however, is still not well understood. In the South African context, this refers particularly to an inadequate understanding of risks associated with the introduction of BYOD into organisations. Some of the risks associated with this phenomenon are, for instance, related to information security, legislation and privacy issues. Hence, the intention of this research was to investigate, determine and assess BYOD risk considerations in a South African organisation. Using the available literature on this subject and an interpretative exploratory case study approach, this research explored various facets of BYOD-related risks (e.g. implementational, technological, legislation, regulation and privacy risks, human aspects and organisational concerns) as well as the impact these risks may have on both employees and an organisation. The organisation under investigation – from this point onward referred to as “Organisation A” – is a South African based information technology (IT) security consulting and service management organisation, which has seen increased expansion in its business and thus an increase in the number of its employees utilising their personal devices at the workplace. Even so, Organisation A was uncertain regarding possible risks that might hinder benefits of BYOD. Hence, this researcher defined the main research question as “What are the risks of introducing the BYOD in the South African organisation and what is an effective approach to address identified risks?”. The main objective was to identify and describe BYOD-related risks and to propose an appropriate model for addressing these risks. To answer the main research question, this researcher reviewed the applicable literature on the BYOD, including the limited South African literature pertaining to the subject. The review elicited the most common BYOD-related risks but also some models, frameworks and standards that may be applied for addressing these risks. Based on these revelations, an applicable BYOD risk management model was created and proposed. The literature review findings were subsequently tested in the empirical setting (in Organisation A) by conducting comprehensive interviews with research participants. This research adopted a qualitative approach in general and a case study methodology in particular. The collected data were analysed using the interpretative phenomenological analysis (IPA), which aided in providing a comprehensive understanding of the interviewees’ responses regarding the BYOD risks. The interviewees were selected based on a purposeful (pre-defined) sampling. The results of this interpretative research suggest that the interviewees’ responses are closely aligned with the information on BYOD risks collected from the pertinent literature. The results show that successful introduction and usage of BYOD in the studied organisation requires the implementation of mixed risk management measures: technological (e.g. mobile device management and its additional components), non-technological (e.g. IT or BYOD security policies), the usage of general risk management frameworks (e.g. ISO 27001), the development of an organisational security culture and skilling of the human factor (e.g. employee awareness, training and education, for example). Additionally, it was found that participation of employees in the development of BYOD policies is an essential and effective tactic for transforming a fragile BYOD risk link (i.e. employees) into a strong risk prevention mechanism. Furthermore, this research also revealed that in the South African context, it is important that an organisation’s BYOD security policies are sound, preferably meeting the POPI Act requirements and thereby avoiding legislation risks. The contribution of this research is twofold: first academic, and second, practical. The academic contribution is realised by adding to the body of knowledge on the BYOD risks – most particularly in terms of understanding potential risks when introducing BYOD in the South African context. The practical contribution manifests through the provision of detailed risk considerations and mitigation guidelines for organisations wishing to introduce BYOD practices or considering ways to improve their current BYOD risk management strategy. It is acknowledged that this research has some limitations, particularly in regard to the limited generalisation of the findings due to the limited sample provided by only one organisation. Although the results are not necessarily applicable to other South African organisations, these limitations did not impact the relevance and validity of this research.

Page generated in 0.1507 seconds