311 |
Geographically distributed requirements elicitationVat, Nicholas January 2000 (has links)
The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
|
312 |
Effective action learning sets : an analysis of participant experiencesYeadon-Lee, Annie January 2010 (has links)
This thesis examines an under researched area in the field of action learning: how learning set participants experience action learning and the effectiveness of action learning sets. Through the adoption of a qualitative research approach, which utilised unstructured interviews with learning set members and employed a grounded theory approach to analysis, the thesis thus provides a unique insight into action learning practices and group processes, the latter significantly adding to knowledge in the field of organisational behavior. The research presented, which traces the connections between the research process, methodology and the ongoing development of analysis, also adds to existing knowledge in organisational research methods. Within the thesis, a number of significant issues concerning group processes within action learning sets are discussed. Through analysis of the data it is shown that differing hierarchies exist amongst set members and that these affect the contribution that individual members make to the operations in the set. Furthermore, trust is shown to be vital to the effective working of the set, with members needing to feel psychologically and politically safe before they will self disclose. Finally, member?s self disclosure is revealed to be located on a continuum ranging from comfort to discomfort, with a possibility that some set members may actively engage in dissimulation as a way of reducing cognitive dissonance in self disclosure. Analysis within the thesis also provides a unique insight into action learning practices. A discussion of the findings reveals several significant issues in relation to both set members and facilitators. These include the effect of the location of the set, member?s expectations of the facilitator?s role and the extent to which these expectations accord with the facilitator?s style of facilitation. Analysis of this latter point directly adds to the body of literature concerning the skills of facilitators in action learning sets.
|
313 |
An assessment of the records management system with reference to the Amathole District MunicipalityNcamani, Nomsa January 2015 (has links)
Section 13 of the Eastern Cape Provincial Archives and Records Act, 2003 requires the Amathole District Municipality to manage its records in a well-structured record-keeping system, and to put the necessary policies and procedures in place to ensure that record- keeping and records management practices comply with the requirements of the Act. The study investigated the interventions that can be made to improve and promote the best system (centralised versus a decentralised records system) in terms of space resources through greater co-ordination of information management and storage systems with reference to the Amathole District Municipality. A quantitative research methodology was employed to collect data. The empirical component of the treatise utilised self-administered questionnaires. Purposive sampling was used to identify the target population at the ADM. The researcher specifically selected the users of records, namely; senior manager, mid-managers, supervisors and administration assistants. The need for training, workshops and awareness were identified as the main challenges to records management and to the employees’ understanding of the system in place at the ADM. The findings recommended that the municipality should select the records management system that best supports the conduct of business in an orderly, efficient, and accountable manner. The system should ensure that documents provide evidence of business and contribute to the cultural identity and collective memory of the ADM. Further research on the existing records management system is recommended for the Amathole District Municipality.
|
314 |
Business process security maturity: a paradigm convergenceBox, Debra January 2008 (has links)
Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
|
315 |
An evaluation of management information systems in the Department of Social Development, province of the Eastern CapeNgqungqu, Siphokazi January 2014 (has links)
The alignment of information systems with organisational objectives and strategies is crucial to the efficient performance of any organisation. There is a growing focus on the effectiveness of management and evidence-based decision making in public institutions in South Africa. The Eastern Cape Department of Social Development and Special Programmes (ECDSD) implemented a Social Development Information Management System (SDIMS), which is an information system that supports various functions performed by the Department. While SDMIS provides large amounts of valuable information, it still has much ground to cover in terms of fully meeting the Department’s information needs. There is an increasing demand for information to inform decision making with regards to priority setting, resource usage, monitoring the impact of the Department’s intervention programmes, and monitoring the progress of the Department’s strategic goals. The main purpose of this study was to analyse the extent to which MIS is utilised in the Eastern Cape Department of Social Development and Special Programmes and to make recommendations for the alignment of MIS with organisational objectives in order to achieve these objectives. Furthermore, the study intends to investigate the extent to which the information needs of managers are considered in designing and providing information. The objectives of the study are, firstly, to analyse the current state of MIS utilisation in the Department. Secondly, to evaluate the utilisation of information provided by the MIS unit for decision making, and, thirdly, to make recommendations on how to improve MIS utilisation. Qualitative approach techniques were utilised to collect data for the study. Research questionnaires were distributed to thirty respondents. Semi-structured interviews were conducted with seven interviewees out of a target number of ten. The response rate was 68 percent and this was considered as adequate for scientific analysis and reporting. The study produced the following research findings: Mainly, the MIS users believe that they understand MIS and its capabilities, and have received training on how to use the system. The quality of information provided by MIS is mostly complete and largely meets user requirements and expectations. MIS information is for the most part accurate and comprehensive enough to expedite decision-making. Although MIS largely meets user requirements and expectations in terms of completeness, accuracy and reliability, the study indicates that it still falls short in integrating information from other sources, which include government transversal systems such as the Basic Accounting System (BAS) and the Personnel Salary System (PERSAL). MIS information is mostly available and easy to access, but occasionally not timely. This is mostly caused by the unavailability of real-time information synchronisation between MIS and other government systems. In light of the above findings, the researcher recommends that: There is still more to be done in order to continuously inform and train users on the latest MIS capability developments in the form of awareness workshops, contact and remote support, and through internal news bulletins. The Department needs to work with other government entities that are custodians of transversal systems in finding a solution to the creation of real-time integration of MIS with other external sources of information. Even though the level of MIS utilisation is not too much of a concern, the Department needs to ensure that users of information are kept up to date with new MIS reporting capabilities so as not to underutilise the system. It is therefore recommended that the Department ensure that information is more often reviewed and reports are customised to meet the ever-changing needs of the Department.
|
316 |
Navigating between information security management documents : a modeling methodologyDomingues, Steve January 2010 (has links)
Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a control in one standard may relate to other standards. This allows the end user to navigate between the standards documents. These mapping documents are valuable to a person who wishes to grasp how different standards deal with a specific control. However, the navigation between standards is a cumbersome task. In order to navigate between the standards the end user is required to consult three or more documents, depending on the number of standards that are mapped to the control being investigated. The need for a tool that will provide fast and efficient navigation between standards was identified. The data tier of the tool is the focus of this dissertation. As a result, this research proposes a modeling methodology that will allow for the modeling of the standards and the information about the mapping between standards, thereby contributing to the creation of tools to aid in the navigation between standards. A comparison between the major data modeling paradigms identifies multi-dimensional modeling as the most appropriate technique to model standards. Adapting an existing modeling methodology to cater for the modeling standards, yield a five step standard modeling methodology. Once modeled, the standards can be physically implemented as a database. The database schema that results from the standard modeling methodology adheres to a specific pattern and can thus be expressed according to well-defined meta-model. This allows for the generation of SQL statements by a tool with limited knowledge of the standards in a way that allows the quick navigation between standards. To determine the usefulness of the standards modeling methodology the research presents iv a prototype that utilizes the well-defined meta-model to navigate between standards. It is shown that, as far as navigation is concerned, no code changes are necessary when adding a new standard or new mappings between standards. This research contributes to the creation of a tool that can easily navigate between standards by providing the ability to model the data tier in such a way that it is extensible, yet remains independent of the application and presentation tiers.
|
317 |
An investigation of the role of records management with specific reference to Amathole District MunicipalityKanzi, Noluvuyo January 2010 (has links)
The purpose of this study was to investigate the role played by records management in an organisation. The primary question that was explored was whether the management of records receives the attention it deserves at the Amathole District Municipality. In order to achieve the research objectives, an in-depth literature study was undertaken. A survey was also conducted to examine the current records management practices at ADM and the data was collected by means of self-administered questionnaires. The literature study proved the hypothesis to be correct, which stated that effective records management plays a significant role in the effective administration of an organization. The empirical study revealed that the records management function is not receiving the attention it deserves at ADM. Even though participants acknowledged the importance of records management in the decision-making process, strategic planning process (Integrated Development Plan), the realisation of the Batho Pele Principles and the overall performance of ADM, it was evident that ignorance was displayed with regard to the management of records. It has been discovered that Amathole District Municipality has a good Records Management Policy, Procedure manual and File Plan, but adherence to these policies should be continuously monitored. Regular training has been identified as one of the areas on which ADM should apply its focus to ensure sound records management. Recommendations were made within the context of empirical survey findings and the regulatory framework for records management. To improve the current records management practices at ADM, it has been recommended that the records management function be incorporated into the organisation-wide strategic plans and that records management forms part of the key performance areas of senior managers.
|
318 |
On the Origin of PCsAtkinson, Paul January 2008 (has links)
The electronic computer is the most significant tecnological product of the 20th Century. It has changed the lives of a vast number of people beyond recognition. It has changed our work, our leisure, and our relationships with each other. Its development has taken place in a period where an increasing amount of information is documented and recorded, and yet elements of its history, particularly its social history are distinct. A number of histories have been written about the computer. Mostly, these address the technical developments and economic or business histories behind the products rather than the designed form of the computer itself. They have tended to view the development of computing from a technologically deterministic perspective. By presenting the computer as the reseult of inevitable technological progress, they have ignored the social agency of their users and the cultural contexts in which they operate. Over the past ten years, i have researched and published on vaious aspects of computing technology from a social construction perspective. Using a novel methodology developed and tested over a significant period, this body of work has considered the acceptance and use of computers by different social groups, exploring the role of a computer as a tool of production, a means of control, and as an indicator of status. It has considered the design form and the depiction of computers in the mass media and popular culture to assess the influences on its design and its role in social relations, and in the process has made an original contribution to knowledge in the field of design history. This submission draws together five published articles from this body of work, which individually trace the history of the conception, production, representation and consumption of different types of computer. Collectively, these articles construct a coherent account exploring the design history of the computer as a social and cultural artefact.
|
319 |
ICTs and poverty reduction in rural Java : information, access and marketsRobinson, Alex James January 2009 (has links)
Towards the end of the twentieth century there was a furore of activity and interest regarding the potential of information communication technologies (ICTs) to contribute towards a process of development. The growing interest in ICT for development (ICT4D) resulted in a World Summit held over two stages in 2003 and 2005 and a plethora of initiatives and interventions. However to date, the mechanisms and ways in which ICTs may best be applied to development, and in particular poverty reduction, remain unclear. The study described herein contributes to this debate. The study is concerned with the analysis of a single ICT based intervention in rural Java in the Republic of Indonesia; the e-Pabelan telecentre project. The objective of e-Pabelan was to overcome information asymmetries and improve the market participation of poor rural farmers. The objective of this study is to analyse the impacts of this intervention and its underlying conceptual basis. In order to facilitate the research a conceptual framework is presented that draws on Richard Heeks’ (1999b) concept of the information chain and Stuart Plattner’s (1985) concept of equilibrating markets. After Heeks, the conceptual framework emphasises that the assimilation and application of information towards a desired development outcome is a staged process. In order to better contextualise and understand such a process the research presents an analysis of actors, goods and transactions in relation to the market relations of poor farmers after Plattner. The research consists of an extended case study. Two key survey instruments are also employed. One is a survey of 216 poor households and the other is a survey of 70 poor farmers. These survey instruments are employed within a broader research context that utilises participant observation, informal interviews and occasional participatory rural appraisal (PRA) instruments. The research emphasises the importance of contextualisation in seeking to better understand the application of ICT based intervention towards poverty reduction. The research highlights issues of access within ICT4D and challenges approaches that see ICT4D as universally applicable and relevant. Instead, the research demonstrates that the institutional context that ICT4D initiatives are placed into and implemented through can have significant bearings on the perceived utility of the intervention by the intended beneficiaries. The research shows that a failure to engage with local contexts during the establishing of access to ICTs can result in such initiatives being disempowering rather than empowering. The research also questions conceptualisations of poverty within ICT4D that emphasise the widening of opportunities over and above the increasing of security. With regard to markets the research demonstrates that the received view not uncommon within ICT4D literature of the farmer as a passive victim of impersonal markets is flawed. The research shows that the way in which poor farmer in Java manage risk through their selection of differing crops and the manner in which these farmers play the market is central to understanding how ICT4D interventions are assessed in terms of utility and relevance. The research concludes that there is a need for greater engagement between the emerging field of ICT4D and the broader field of development studies. There is also a need to better contextualise and target ICT4D interventions in relation to the specific needs and conditions of the intended beneficiaries. Such an approach requires acknowledging that the adoption and application of information will be subject to a process of continual assessment; rather than seeing assessment as a separate stage within the information chain. In this regard a framework for the analysis of market based ICT4D interventions seeking to impact upon poverty is developed via the research from the original conceptual framework outlined above.
|
320 |
An investigation of query-by-drawing image search on mobile devicesZhang, Min January 2016 (has links)
The rapid growth of touchscreen mobile devices has opened up many new opportunities for exploring Content-based Image Retrieval (CBIR) techniques, e.g., it has enabled the development of intuitive and natural user interfaces to facilitate the Query-by-Drawing (QbD) image search paradigm. Although ubiquitous mobile computing holds the promise of drastically changing the ways users search for images from large image repositories, there is yet no comprehensive and systematic study that examines the factors that influence the usability, user behaviours and task performance of a QbD image search mobile application (App). No guidelines and principles exist for designing fundamental user interface components such as the colour picker and little is known how its different designs affect system usability and task performance. Little research exists that examines how different user interface designs affect the ways users draw the queries and how users go about the search process for different types of tasks. The questions of whether or not it is possible or how well users can perform QbD image search by drawing from memory of previously-seen images are unexplored. An understanding of these questions is very important and useful in the development of effective and user-friendly systems for a QbD image search App on touchscreen mobile devices. This PhD project attempts to answer these questions and more by examining the factors that influence the usability and task performance of a QbD painting search mobile application. Starting with a comprehensive literature review and current mobile App review of various related fields, we first designed and implemented a Client-Server painting search mobile App based on an existing CBIR algorithm as the research platform for collecting empirical data; we then conducted a focus group study from whose findings we re-designed the user interfaces of our QbD App. An online survey about art preference was carried out, and we designed four comprehensive user studies and recruited a total of 123 participants to take part in the experiments. Both qualitative and quantitative measures are collected and analysed to discover the various factors that influence the usability and task performance of the interface designs of a QbD image search mobile App and the memory drawing over time. Finally, we made recommendations and suggestions on the design and implementation of various interface components of the QbD image search mobile App based on our findings. This thesis presents the following contributions summarised as: 1) We build a flexible platform that can be used for research in drawing-related fields, such as a new QbD technique or interface tests and psychological study. 2)We present a comprehensive and systematic review of the methods and techniques related to the investigation of QbD image search mobile App. 3) We propose a new way of categorising colour picker: ‘1D-1D-1D’, ‘1D-2D’, and ‘3D’ colour picker. 4) The rationales of choosing stimuli are proposed and a real-world painting database is built. 5) We also develop a variety of novel methodologies for experimental design, data collection and data analysis, and we formulated a new protocol for assessing drawing accuracy and search result. 6) We propose some colour picker design guidelines through a series of experiments and the analysis of comprehensive experimental data. 7) Although indeed memory decays over time, we found the participants are able to draw from the memory of a painting with simple compositional structure (6-7 colour blobs), even for the paintings viewed a month ago. And finally, 8) the experiments also provide valuable insights into how general users draw and modify a query, and judge the result relevance for different tasks on mobile phones, as well as search pattern and memorisation strategy, which also extend a scientific understanding of using current Query-by-Drawing techniques for real world image search.
|
Page generated in 0.1442 seconds