41 |
Addressing the incremental risks associated with social media by using the cobit 5 control frameworkGerber, Petro 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: Social media offers great opportunities for businesses and the use thereof will
increase competitiveness. However, social media also introduce significant risks
to those who adopt it. A business can use existing IT governance control
framework to address the risks introduced by social media. However a business
should combine existing control frameworks for adequate and complete IT
governance.
This study was undertaken to help businesses to identify incremental risks
resulting from the adoption of social media and to develop an integrated IT
governance control framework to address these risks both at strategic and
operational level. With the help of the processes in COBIT 5, this study provides
safeguards or controls which can be implemented to address the IT risks that
social media introduce to a business. By implementing the safeguards and
controls identified from COBIT 5, a business ensures that they successfully
govern the IT related risks at strategic level. This study also briefly discuss the
steps that a business can follow to ensure IT related risks at operational level is
addressed through the implementation of configuration controls. / AFRIKAANSE OPSOMMING: Sosiale media bied groot geleenthede vir besighede en die gebruik daarvan sal
mededingendheid verhoog. Sosiale media hou ook egter beduidende risiko's in vir
diegene wat dit aanneem. 'n Besigheid kan bestaande Informasie Tegnologie (IT)
kontrole raamwerke gebruik om die risiko's wat ontstaan as gevolg van die
gebruik van sosiale media aan te spreek. Vir voldoende en volledige IT
korporatiewe beheer moet 'n besigheid egter bestaande kontrole raamwerke
kombineer.
Hierdie studie is onderneem om besighede te help om die toenemende risiko's
wat ontstaan as gevolg van die gebruik van die sosiale media, te identifiseer en
om 'n geïntegreerde IT kontrole raamwerk te ontwikkel om hierdie risiko's op
strategiese sowel as operasionele vlak aan te spreek. Met die hulp van die
prosesse in COBIT 5 voorsien hierdie studie voorsorgmaatreëls of kontroles wat
geïmplementeer kan word om die IT-risiko's waaraan die besigheid, deur middel
van sosiale media blootgestel is, aan te spreek. Deur die implementering van die
voorsorgmaatreëls en kontroles soos geïdentifiseer uit COBIT 5, verseker ʼn
besigheid dat hulle die IT-verwante risiko's op strategiese vlak suksesvol beheer.
Hierdie studie bespreek ook kortliks die stappe wat 'n besigheid kan volg om te
verseker dat IT-verwante risiko's op operasionele vlak aangespreek word deur die
implementering van konfigurasie kontroles.
|
42 |
A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component levelSahd, Lize-Marie 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and
enterprises are forced to incorporate mobile solutions into their business processes
in order to remain competitive. While there are many benefits relating to the
investment in and use of mobile technology, significant risks are also being
introduced into the business. The fast pace of technological innovation and the rate
of adoption of mobile technology by employees has, however, created an
environment where enterprises are deploying mobile solutions on an ad hoc basis.
Enterprises are only addressing the risks as they are occurring and resulting in
losses. The key contributing factor to this lack of governance and management is the
fact that those charged with governance do not understand the underlying mobile
technology components.
The purpose of this research is to improve the understanding of the underlying
components of mobile technology. The research further proposes to use this
understanding to identify the significant risks related to mobile technology and to
formulate appropriate internal controls to address these risks. The findings of the
research identified the following underlying components of mobile technology: mobile
devices; mobile infrastructure, data delivery mechanisms and enabling technologies;
and mobile applications. Based on an understanding of the components and
subcategories of mobile technology, a control framework was used to identify the
significant risks related to each component and subcategory. The significant risks
identified included both risks to the users (including interoperability, user experience,
connectivity and IT support) as well as risks to the enterprise’s strategies (including
continuity, security, cost and data ownership). The research concludes by
formulating internal controls that the enterprise can implement to mitigate the
significant risks. This resulted in two matrixes that serve as quick-reference guides to
enterprises in the identification of significant risks at an enterprise specific mobile
technology component level, as well as the relevant internal controls to consider.
The matrixes also assist enterprises in determining the best mobile solutions to
deploy in their business, given their strategies, risk evaluation and control
environment. / AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en,
ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie
in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is
aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter
ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele
tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing
geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi.
Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as
gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur
van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie
onderliggend mobiele tegnologie komponente verstaan nie.
Die doel van hierdie navorsing is om die begrip van die onderliggende komponente
van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike
risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne
beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die
navorsing het die volgende onderliggende komponente van mobiele tegnologie
geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes,
en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op
ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole
raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en
subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide
risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en
IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend
kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die
formulering van die beheermaatreëls wat geïmplementeer kan word om die
wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige
verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van
wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die
oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings
ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op
hul strategie, risiko evaluering en beheeromgewing.
|
43 |
Web-based business positioning : an investigation in the tourism industryNocanda, Xolani Wittleton 03 1900 (has links)
Thesis (MBA) -- Stellenbosch University, 2011. / The use of the web-based technology to conduct business has been growing in many industries globally, this has been the case in the tourism industry. The growing popularity of the web-based technology can be attributed to the benefits it brings to the tourism industry. The study has look into the overall benefits brought by the web-based technology in the tourism industry and how it can be further exploited to benefit the organizations. The application of the web-based technology has included the introduction of the website. The website has given companies exposure to the global market and has been a platform for conducting marketing activities. The website has been used extensively in the tourism industry as a source of information. The website has enabled travel consumers purchase tourism products and services. Having a website may not be sufficient in meeting an organisation’s intended objectives. Many companies in the tourism industry are making use of the website, hence the use of website in search engines has become competitive. Companies need to implement website optimisation techniques to benefit both the travel suppliers and travel consumers. To conduct the organisations marketing activities successfully, the websites needs maximum exposure to the target audience. This can be achieved through the website design aimed at ensuring that the website is highly ranked by search engines. Added features like video, up to date information and photos add value to travel consumers. Through these features travel consumers are able to understand tourism products and services, and hence make informed decisions. The study has looked at the application of the web-based technology in four sectors of the tourism industry in South Africa. These are attraction, accommodation, tour operators and transport. Suppliers in each sector were selected for analysis and they are: - in attraction, Kruger National Park and Hluhluwe Game Reserve; - in accommodation, Hilton hotel and Southern Sun hotel; - in tour operator, Thompson Holiday and Tourvest; and - in transport, Kulula, South African Airways, Avis and Europcar. Suppliers in the tourism industry in South Africa were found to use the website for the following reasons: - Provides information about the organisation and its products and services. - Used as a marketing tool: The website is used to facilitate communication between the travel supplier and the travel consumer. It is also a platform to sell tourism products and services. - Used to enhance collaboration in the industry. Collaboration through websites has resulted in a better supply chain. Customers have been able to buy one package including the airline ticket, accommodation and car hire using one website. - Used to conduct business transactions: Customers have been able to make bookings and reservations and payments through the website. - Used to attract customers to the organisation’s products and services. Attractive features such as photos and videos have been included in the website. The Safari Company is a tour operator in South Africa. Using web-based technology; the company has changed its business model to be able to serve its customers better. The company has developed a new website that adds value to both travel suppliers and travel consumers. Travel suppliers are able to market their services and products through the website. The website provides travel consumers with the latest information and expert advice in tourism products in the Southern and Eastern Africa. The Safari Company website has been a platform for the company to communicate its social responsibility with the global community. The Safari Company donates 10% of its revenue to an organization called Touch the Land. Touch the Land is a foundation that implements projects in Southern and Eastern Africa aimed at poverty alleviation.
|
44 |
Creating business value through e-marketplace participation: a South African exploratory case study – Kalahari MarketplaceBlanken, Olaf 03 1900 (has links)
Thesis (MBA)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: E-commerce in South Africa is currently experiencing considerable growth, as in the rest of the world. Substantial foreign investments are being made in selected South African online retail stores and the majority of businesses have an online presence to sell or promote their products and services. Yet, as e-commerce is a dynamic and relatively new industry, there is a need for South African companies to understand business model adaptation for e-commerce, and specifically for successful e-marketplace participation.
Kalahari Marketplace was established in 2011 as a C:C platform for customers to sell books and media. In January 2014, this platform was expanded to a fully integrated B:C platform that enables third-party retailers to sell directly to Kalahari.com customers in various categories. The Kalahari Marketplace platform follows the same development outline as the very successful Amazon.com Marketplace platform in the United States. The premise is that sellers have an additional channel to sell to customers they would not normally have had, and customers benefit by having access to a wide product range and competitive pricing.
The aim of this research study is to understand the typical business model of a successful e-marketplace participant. It furthermore set out to explore the success factors, which translate into value creation for the seller achieved through participation in an e-marketplace. This investigation was done through a case study approach by examining existing sellers retailing through Kalahari Marketplace.
To achieve the research aim, qualitative, exploratory research was conducted. The research method involved a combination of primary and secondary research. Secondary research was conducted regarding the external environmental factors of Kalahari Marketplace sellers. Primary data was gathered through in-depth semi-structured interviews with Kalahari Marketplace sellers.
The external environmental analysis for participating in an e-marketplace, such as Kalahari Marketplace, was overall positive, taking into consideration challenges such as expensive Internet and low Internet usage penetration. The key findings from the internal analyses were that participating in an e-marketplace has substantial benefits for a traditional retailer that wants to trade online. These advantages include transaction cost savings, exposure to new customers, and reduced marketing expenses.
The following recommendations were made for successful e-marketplace participation:
• Take an active involvement in e-marketplace listings; • Effective procurement and use of resources;
• Excellent customer service;
• Build reliable and cost effective delivery channels; and
• Offer a wide and mixed product range.
The research limitation of this study stated that Kalahari Marketplace is a moderately new B:C e-retailing platform; therefore, retailers are still learning to adapt. Suggested additional research involves a wide-reaching quantitative research into key success factors for e-marketplace participation from a South African perspective.
|
45 |
Big 4 global networks: degree of homogeneity of audit quality among affiliates and relevance of PCAOB inspectionsUnknown Date (has links)
The Big 4 global networks (Deloitte, Ernst & Young [E&Y], KPMG, and
PricewaterhouseCoopers [PwC]) market themselves as providers of worldwide seamless services and consistent audit quality through their members. Under the current environment in which these auditors operate, there are three types of global network members: inspected non-U.S. affiliates (inspected affiliates, hereafter), non-inspected non-U.S. affiliates (non-inspected affiliates, hereafter), and inspected U.S. offices (U.S. offices, hereafter). The recent suspension of the China-based Big 4 affiliates from auditing U.S.-listed companies calls into question whether these global networks can deliver the same level of audit quality across all their members and whether those located in jurisdictions denying access to the Public Company Accounting Oversight Board (PCAOB or Board, hereafter) to conduct inspections may benefit from such inspections. This study examines the effect of being an affiliate and the effect of PCAOB inspections on perceived audit quality. I use earnings response coefficients (ERCs) as a proxy for perceived audit quality. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2015. / FAU Electronic Theses and Dissertations Collection
|
46 |
Internet payment system--: mechanism, applications & experimentation.January 2000 (has links)
Ka-Lung Chong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 80-83). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgments --- p.iii / Chapter 1 --- Introduction & Motivation --- p.1 / Chapter 1.1 --- Introduction --- p.1 / Chapter 1.2 --- Internet Commerce --- p.3 / Chapter 1.3 --- Motivation --- p.6 / Chapter 1.4 --- Related Work --- p.7 / Chapter 1.4.1 --- Cryptographic Techniques --- p.7 / Chapter 1.4.2 --- Internet Payment Systems --- p.9 / Chapter 1.5 --- Contribution --- p.16 / Chapter 1.6 --- Outline of the Thesis --- p.17 / Chapter 2 --- A New Payment Model --- p.19 / Chapter 2.1 --- Model Description --- p.19 / Chapter 2.2 --- Characteristics of Our Model --- p.22 / Chapter 2.3 --- Model Architecture --- p.24 / Chapter 2.4 --- Comparison --- p.30 / Chapter 2.5 --- System Implementation --- p.30 / Chapter 2.5.1 --- Acquirer Interface --- p.31 / Chapter 2.5.2 --- Issuer Interface --- p.32 / Chapter 2.5.3 --- Merchant Interface --- p.32 / Chapter 2.5.4 --- Payment Gateway Interface --- p.33 / Chapter 2.5.5 --- Payment Cancellation Interface --- p.33 / Chapter 3 --- A E-Commerce Application - TravelNet --- p.35 / Chapter 3.1 --- System Architecture --- p.35 / Chapter 3.2 --- System Features --- p.38 / Chapter 3.3 --- System Snapshots --- p.39 / Chapter 4 --- Simulation --- p.44 / Chapter 4.1 --- Objective --- p.44 / Chapter 4.2 --- Simulation Flow --- p.45 / Chapter 4.3 --- Assumptions --- p.49 / Chapter 4.4 --- Simulation of Payment Systems --- p.50 / Chapter 5 --- Discussion of Security Concerns --- p.54 / Chapter 5.1 --- Threats to Internet Payment --- p.54 / Chapter 5.1.1 --- Eavesdropping --- p.55 / Chapter 5.1.2 --- Masquerading --- p.55 / Chapter 5.1.3 --- Message Tampering --- p.56 / Chapter 5.1.4 --- Replaying --- p.56 / Chapter 5.2 --- Aspects of A Secure Internet Payment System --- p.57 / Chapter 5.2.1 --- Authentication --- p.57 / Chapter 5.2.2 --- Confidentiality --- p.57 / Chapter 5.2.3 --- Integrity --- p.58 / Chapter 5.2.4 --- Non-Repudiation --- p.58 / Chapter 5.3 --- Our System Security --- p.58 / Chapter 5.4 --- TravelNet Application Security --- p.61 / Chapter 6 --- Discussion of Performance Evaluation --- p.64 / Chapter 6.1 --- Performance Concerns --- p.64 / Chapter 6.2 --- Experiments Conducted --- p.65 / Chapter 6.2.1 --- Description --- p.65 / Chapter 6.2.2 --- Analysis on the Results --- p.65 / Chapter 6.3 --- Simulation Analysis --- p.69 / Chapter 7 --- Conclusion & Future Work --- p.72 / Chapter A --- Experiment Specification --- p.74 / Chapter A.1 --- Configuration --- p.74 / Chapter A.2 --- Experiment Results --- p.74 / Chapter B --- Simulation Specification --- p.77 / Chapter B.1 --- Parameter Listing --- p.77 / Chapter B.2 --- Simulation Results --- p.77 / Bibliography --- p.80
|
47 |
Supporting system deployment decisions in public cloudsKhajeh-Hosseini, Ali January 2013 (has links)
Decisions to deploy IT systems on public Infrastructure-as-a-Service clouds can be complicated as evaluating the benefits, risks and costs of using such clouds is not straightforward. The aim of this project was to investigate the challenges that enterprises face when making system deployment decisions in public clouds, and to develop vendor-neutral tools to inform decision makers during this process. Three tools were developed to support decision makers: 1. Cloud Suitability Checklist: a simple list of questions to provide a rapid assessment of the suitability of public IaaS clouds for a specific IT system. 2. Benefits and Risks Assessment tool: a spreadsheet that includes the general benefits and risks of using public clouds; this provides a starting point for risk assessment and helps organisations start discussions about cloud adoption. 3. Elastic Cost Modelling: a tool that enables decision makers to model their system deployment options in public clouds and forecast their costs. These three tools collectively enable decision makers to investigate the benefits, risks and costs of using public clouds, and effectively support them in making system deployment decisions. Data was collected from five case studies and hundreds of users to evaluate the effectiveness of the tools. This data showed that the cost effectiveness of using public clouds is situation dependent rather than universally less expensive than traditional forms of IT provisioning. Running systems on the cloud using a traditional 'always on' approach can be less cost effective than on-premise servers, and the elastic nature of the cloud has to be considered if costs are to be reduced. Decision makers have to model the variations in resource usage and their systems' deployment options to obtain accurate cost estimates. Performing upfront cost modelling is beneficial as there can be significant cost differences between different cloud providers, and different deployment options within a single cloud. During such modelling exercises, the variations in a system's load (over time) must be taken into account to produce more accurate cost estimates, and the notion of elasticity patterns that is presented in this thesis provides one simple way to do this.
|
48 |
Networking the enterprise : a solution for HBR personnelHonniger, Werner 12 1900 (has links)
Thesis (MPhil)--Stellenbosch University, 2004. / ENGLISH ABSTRACT: This Extended Research Assignment discusses the information systems found in HBR
Personnel. The discussion, based on the research problems, proposes steps in which the
systems of HBR can be integrated so that they add the most value. Furthermore, a review of
Corporate Portals is undertaken to show the potential impact it may have on organisational
efficiencies and knowledge. The Assignment, according to the methodologies given, analyses
the HBR information system for system incompatibilities and bottlenecks and proposes
solutions for these problems. The solutions include changing core system databases and
computer systems, together with a portal to fully integrate HBR Personnel’s information
systems. / AFRIKAANSE OPSOMMING: Hierdie Uitgebreide Navorsingsopdrag bespreek die informasiestelsels gevind in HBR
Personnel. Die bespreking, gebaseer op die navorsingsprobleme, stel stappe voor waardeur
die stelsels van HBR geïntegreer kan word om die meeste waarde toe te voeg. Verder word ‘n
oorsig gedoen van Korporatiewe Portale om te wys watter potensiële impak dit kan hê op
organisatoriese doeltreffendheid en kennis. Na aanleiding van die gegewe metodologieë
analiseer die opdrag HBR se informasiestelsel vir sistemiese probleme en bottelnekke en stel
oplossings voor vir hierdie probleme. Die oplossings sluit in ‘n verandering van kern-sisteem
databasisse en rekenaarstelsels, tesame met ‘n portaal om HBR Personnel se
informasiestelsels ten volle te integreer.
|
49 |
Knowledge assets in enterprise architectureJoubert, Francois 12 1900 (has links)
Thesis (MPhil (Information Science))--University of Stellenbosch, 2010. / ENGLISH ABSTRACT:
Knowledge assets can be defined as anything that affects a business’s disposition to act on
data received from the environment. Knowledge assets are embedded in the objects within an
organisation and are the source of an organisation’s competitive advantage, by being closely
linked to what the organisation knows and by allowing the organisation to act and to be
innovative.
Knowledge assets evolve over time as knowledge agents, through a process of sense making,
substitute physical resources for informational resources by codifying and abstracting
knowledge assets, in the process increasing their value and ability to be diffused to wider
audiences. These knowledge assets are internalised in an organisation and impact on the
organisation when they are applied to concrete problems.
Knowledge assets play an important role in the creation of information assets in an
organisation. Information assets are created when a knowledge agent makes use of his or her
knowledge to make sense of data received from sources in the environment. The creation of
information through the sense making process creates new knowledge which is added to the
agent’s knowledge base.
Enterprise architecture is the process of designing future states for an organisation and then
planning, leading and governing the organisation towards that future state. Enterprise
architecture focuses mostly on the organisational process, on information and technology.
Enterprise architects make use of enterprise architecture frameworks such as TOGAF or the
Zachman framework, which are primarily concerned with the domains of business,
information and technology architecture, yet none of these mainstream frameworks used by
enterprise architects takes knowledge assets into account, despite the obviously important
role that they play in the organisation and especially in the information creation process.
This research proposes to show that knowledge assets have an important role to play in
enterprise architecture by allowing enterprise architects to
• identify or facilitate the creation of knowledge assets pertaining to a specific problem;
• understand whether information assets are located in the ordered and complex or the
chaotic regimes and what would be the implication of moving them between regimes; • plot knowledge assets movements and relationships to each other on the social learning
cycle path, which would enable enterprise architects to balance the types of learning that
the organisation employs;
• define the level of codification, abstraction and diffusion of knowledge assets, based on
the intended audiences and to understand where knowledge assets could be developed to
improve quality and when outdated knowledge should be destroyed in favour of new
knowledge.
Knowledge assets are related to Enterprise Business Architecture (EBA) through the specific
knowledge domains that exist within an organisation. Understanding whether knowledge
assets exist in the ordered, complex or chaotic regimes will provide a more complete view of
the organisation. Architecture of knowledge assets in this space will provide a better
understanding of an organisation’s culture: this understanding can compensate for differences
in knowledge agents’ spatio-temporal positions, how and when they receive data and their
particular cognitive styles.
The importance of knowledge assets in the creation of information links it emphatically with
Enterprise Information Architecture (EIA). Knowledge asset architecture provides a better
understanding of how information is created and flows through an organisation, taking into
account the meaning of the information to the organisation, which compensates for that
oversight in information theory, which regards the accuracy of data that is communicated as
the only concern.
Information technology has exponentially increased mankind’s ability to codify, abstract and
diffuse knowledge assets. Enterprise Technical Architecture (ETA) is mainly concerned with
the technology infrastructure implemented within an organisation. Enterprise architects can
apply knowledge asset architecture to decide whether the technology should be used to
enhance the codification and abstraction of information, allowing more efficient diffusion of
information to a larger audience, or whether more concrete information should be diffused to
a more closely-knit audience.
This research will argue that the use of knowledge assets as a domain within enterprise
architecture will greatly enhance the enterprise architect’s ability to understand and lead the
organisation to a more desirable future state. / AFRIKAANSE OPSOMMING:
Kennisbates is vasgelê in die konkrete en abstrakte voorwerpe in die organisasie. Hierdie
voorwerpe omsluit alle voorwerpe wat ‘n effek het op hoe die organisasie reageer op data wat
vanaf die omgewing ontvang word. Kennisbates is ‘n bron vir die kompeterende voordeel wat
‘n organisasie geniet omdat dit verband hou met wat die organisasie weet en dit die
organisasie in staat stel om te innoveer.
Kennisbates sal aangaande evolueer soos wat kennisdraers, deur die sinmaak proses, fisiese
hulpbronne vervang met inligtings hulpbronne gedurende die proses van kodifisering en
abstraksie en sodoende die kennisbates se waarde vir die organisasie te verhoog en
beskikbaar te stel vir groter gehore. Die kennisbates word dan vasgelê in die organisasie
wanneer die kennis toegepas word op konkrete probleme.
Kennisbates speel ‘n belangrike rol in die skepping van inligtingsbates in die organisasie.
Inligting word slegs geskep wanneer die kennisdraer gebruik maak van sy kennis om sin te
maak van data onvang vanuit die omgewing. Die nuwe inligting word dan intern vasgelê in
die kennisdraer as nuwe kennis.
Ondernemingsargitektuur is ‘n proses waardeur die toekomstige staat van ‘n organisasie
ontwerp word deur beplanning, en daar verder leiding gegee word ter uitvoering daarvan.
Ondernemingsargitektuur fokus meestal op die organisasie se prosesse, inligting en
tegnologie. Ondernemingsargitekte maak gebruik van ondernemingsargitektuurraamwerke
soos TOGAF en die Zachmanraamwerk as riglyne vir hulle werk. Hierdie raamwerke fokus
primêr op die besigheid, inligting en tegniese domeine van argitektuur. Nie een van die
hoofstroom ondernemingsargitektuurraamwerke neem kennisbates in ag nie, ten spyte van
die voordiehandliggende belangrike rol wat kennisbates in die organisasie se
inligtingskeppingsproses speel.
Hierdie navorsing stel voor dat kennisbates deel kan vorm van ondernemingsargitektuur deur
ondernemingsargitekte toe te laat om
• kennisbates aangaande ‘n spesifieke probleem te identifiseer of die skepping daarvan
die fasiliteer, • te bepaal of die kennisbates in die geordende, komplekse of chaotiese regime bestaan
en wat die implikasie sou wees om hulle na ‘n ander regime te skuif, en
• die kennisbates op die sosiale leersiklus aan te stip, wat die ondernemingsargitek in
staat sal stel om die leerbenaderings van die organisasie te balanseer, die vlak van
kodifisering, abstraksie en verspreiding te definieer, gebaseer op die voornemende
gehoor vir die spesifieke inligting.
• beter begrip te hê daarvoor of die kennisbate na ‘n beter kwaliteit ontwikkel moet
word of vernietig moet word om plek te maak vir nuwe kennisbates.
Daar bestaan ‘n verwantskap tussen OBA (Ondernemingsbesigheidsargitektuur) deur die
spesifieke kennisdomein wat reeds in die organisasie bestaan. Deur te verstaan of die
kennisbates binne die geordende, komplekse of chaotiese regimes val sal beter begrip bied
van die organisasie as geheel. Al hierdie gesigshoeke word in die geordende domein beskryf.
Kennisbateargitektuur sal ‘n beter begrip van die organisasie se kultuur bewerkstellig. Die
kultuur in ‘n organisasie word gebruik om te vergoed vir die verskille in die kennisdraer se
tyd-ruimtelike ligging tydens die ontvangs van data asook hulle kognitiewe styl.
Daar bestaan ‘n daadwerklike verwantskap tussen kennisbateargitektuur en
Ondernemingsinligtingsargitektuur (OIA). Kennisbateargitektuur sal bydra tot die begrip van
hoe inligting geskep word en vloei deur die organisasie. Dit sal die betekenis van inligting in
ag neem en daardeur vergoed vir die tekortkoming van inligtingteorie wat slegs die
korrektheid van die data wat vervoer word in ag neem.
Inligtingstegnologie het die mens se vermoë om inligting te kodifiseer, abstraksie toe te pas
en te versprei eksponensieël verbeter. Ondernemingstegnieseargitektuur (OTA) is
hoofsaaklik verantwoordelik vir die tegnologiese infrastruktuur wat geïmplimenteer word
binne die organisasie. Ondernemingsargitekte kan kennisbates gebruik om te besluit of
tegnologie gebruik moet word om beter inligting te skep deur hoër kodifisering en abstraksie
toe te pas, om daardeur die vermoë te skep om die inligting vir ‘n wyer gehoor beskikbaar te
stel, of om meer konkrete inligting vir ‘n meer intieme gehoor beskikbaar te stel.
Hierdie navorsing stel voor dat kennisbates as ‘n domein binne die ondernemingsargitektuur
vervat word. Dit sal die ondernemingsargitek in staat stel om die organisasie beter te lei na ‘n
wenslike toekomstige staat.
|
50 |
Data-centric security : towards a utopian model for protecting corporate data on mobile devicesMayisela, Simphiwe Hector January 2014 (has links)
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.
|
Page generated in 0.1654 seconds