111 |
Successful Strategies for Retaining Profitability in an Education-Sector IT ProjectMiddleton, Cassandra Romae 01 January 2019 (has links)
Many information technology (IT) project managers (PMs) and other business leaders lack effective strategies for enhancing communication among their project team members, thereby reducing profitability and organizational cohesion. The purpose of this multiple case study was to explore communication strategies that IT PMs used to successfully complete IT mobile device projects. The conceptual framework for this study was McQuail's mass communication, Craig's communication, and Deming's profound knowledge theory. Purposive sampling method was used to identify 6 successful IT PMs and leaders who worked at 2 leading educations settings located in southeastern South Carolina. Data gathered from the semistructured interviews and collected from publicly available documents were analyzed using coding techniques, constant comparison, and keyword phrases. After methodological triangulation of the data sources collected and completion of Yin's 5-step process of data analysis, 3 key themes emerged from data analysis: standardized project communication, project team building, and positive customer focus. Findings from this study may contribute to positive social change by providing IT PMs with evidence to support efficient communication strategies in the education sector to increase organizational performance and profitability, which may positively contribute to improving quality of life for employees, driving economic development, and improving community relations.
|
112 |
Exploring Capability Maturity Models and Relevant Practices as Solutions Addressing IT Service Offshoring Project IssuesSalman, Rosine Hanna 10 June 2014 (has links)
Western countries' information technology and software intensive firms are increasingly producing software and IT services in developing countries. With this swift advancement in offshoring, there are many issues that can be investigated which will enable companies to maximize their benefits from offshoring. However, significant challenges can occur throughout the lifecycle of offshoring IT service projects that turn the potential benefits into losses. This research investigated CMM/CMMI best practices and their effects on managing and mitigating critical issues associated with offshore development.
Using a web based survey, data was collected from 451 Information Technology and software development firms in the US. The survey instrument was validated by an expert panel which included practitioners and researchers. The survey population consisted of Information Technology and software engineering managers who work on offshore IT and software development projects. Statistical methods including Chi Square and Cramer's V were used to test the research hypotheses.
The results of the analysis show that IT companies applying CMM/CMMI models have fewer issues associated with IT offshoring. When US IT companies utilize and incorporate different practices from TSP and People CMM into CMMI for DEV/SVC and CMMI for ACQ, they have fewer offshoring issues related to language barriers and cultural differences.
The results of this research contribute to the existing body of knowledge on the offshoring of IT services from the client management perspective and provide practitioners with increased knowledge regarding IT offshoring decisions.
|
113 |
Supporting working time interruption management through persuasive designLiu, Yikun 03 April 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Knowledge workers often suffer productivity loss because of unsuccessful interruption handling, which can lead to even more detrimental behaviors like "cyber-slacking" and procrastination. Many of the interruption management techniques proposed in the research literature focus on minimizing interruption occurrences. However, given the inevitability of internal and external interruptions in everyday life, it may be more practical to help people regulate how they respond to interruptions using persuasive technologies. The aim of this dissertation is to explore and evaluate the design of persuasive computer agents that encourage information workers to resume interrupted work. Based on a systematic review of interruptions in the workplace, theories of self-regulation, and theories guiding the design of persuasive technologies, this dissertation describes the creation of a prototype research platform, WiredIn. WiredIn enables researchers to explore a variety of interruption resumption support strategies on desktop computers. Two empirical studies that investigate the efficacy, attributes, and consequences of applying the paradigms embodied in WiredIn in controlled and real-life working environments are presented here. Both studies validate the effect of persuasive interventions on improving interruption management behaviors; the second study also provides design suggestions that can inform future work in supporting interruption management and multitasking.
|
114 |
Information administration technologies, ergonomics and health : regulatory compliance in an e-environmentStrydom, Esna Amanda 02 1900 (has links)
A new administrative scenario - the virtual office - emerged in organisations because of the influence of technological developments that drastically changed the traditional office scenario. The virtual office is a worksite that is situated outside of the traditional office, where people still do the work associated with a traditional office, whilst maintaining their status as full-time employees. Although telework has been practiced internationally for several decades, it is a new concept in South Africa with only a few large organisations embarking on telework.
The purpose of this study was to determine the extent to which organisations in trade and industry are aware of and comply with the required policies, regulations and legislation in terms of ergonomics, technology and health in the e-environment. The preferred kind of telework and information and communication technologies for the South African context was determined. The study investigated the prevalence and extent of health and wellness aspects that teleworkers could be exposed to in the e-environment. The role that ergonomics could play in the prevention of work-related musculoskeletal disorders that could lead to compensation claims and other legal actions was investigated. The elements that could ensure the successful implementation of a telework programme were identified and were presented as a conceptual telework framework.
Within the parameters of applied research, a descriptive quantitative research design has been followed. The mode of enquiry followed in this research was a quantitative, non-experimental, survey method. A baseline study has been conducted followed by an empirical study using two structured online questionnaires, one for managers of teleworkers and one for teleworking employees.
The findings indicated that although the policies, regulations and legislation existed, organisations did not diligently comply with it. The lack of training for the managers and teleworkers on the applicable policies and legislation caused concern. The application of ergonomic specifications on the use of equipment, furniture and services at the preferred home office, is mainly done to avoid ergonomic risk factors that may lead to the development of work-related musculoskeletal disorders. Although teleworkers suffered from disorders, there was a lack of knowledge on ergonomic interventions and on the processes to claim compensation. The need for an instrument that will assist organisations to implement telework successfully has been identified. Therefore, a conceptual telework framework that provides a structure of the elements that need to be in place to implement a telework programme successfully has been proposed. / Business Management / D. Admin. (Business Management)
|
115 |
Exploring the value of business intelligence using a second generation balanced scorecard approachEybers, Susanna S. A. 02 1900 (has links)
As with many new technology implementations before, Business Intelligence (BI) implementations have come under scrutiny in terms of the value added to organisations. The latest academic research uses various different ‘traditional financial methods’ such as the Return on Investment (ROI) calculations to determine the value of investments. In some instances customized measurement tools are proposed as a result of empirical studies conducted.
The main objective of this study is to perform qualitative investigation on the theoretical value of BI implementations in organisations. If it is assumed that BI does add value to organisations, the primary research question aims to investigate how this value is added. A balanced scorecard second generation approach is used as theoretical framework in order to address the question. This approach is also known as strategy mapping.
The research process starts with an extensive literature review on the topic of BI value evaluations and BI related balanced scorecards and strategy maps. As a result, various theoretical and practical research contributions are produced. One of the theoretical contributions includes an inventory of previous academic literature on the topic of BI value evaluations. This inventory is also presented diagrammatically.
A preliminary version of the BI balanced scorecard is developed and used as foundation for a semi-structured interview template to investigate the value of BI in organisations.\
The semi-structured interview template was used as primary data generation instrument to gather data for this multiple-case study project. Four organisations participated in the study. The data obtained from the study was analysed and presented using an updated version of the theoretical framework of the study and was labelled as the intermediate version of the scorecard.
The intermediate version of the BI balanced scorecard provided valuable input towards investigating how value was achieved as a result of BI implementations. These results were verified as part of a final verification process through a consultation process with the same study participants. A final version of the BI balanced scorecard is presented and included in a complete BI value solution. This version of the balanced scorecard is also a valuable practical contribution of the study.
The verified results of the investigation indicated the following:- (1) BI adds value to organisations in all four perspectives of the organisation, namely the business value perspective, user orientation perspective, operational excellence perspective as well as the future orientation perspective. (2) Furthermore, the study confirmed that BI adds value to organisations through a number of benefits including an increase in sales and compliance to regulatory requirements (to name a few). (3) However, the study also indicated that value-related studies must adopt a holistic approach in an attempt to cater for the many facets of the topic. (4) Despite the challenge of implementing BI in organisations, the perceived value of BI implementations amongst senior management remained positive. This was supported by the continuous implementation of new BI projects in organisations. (5) There was a definite relationship between BI implementations and organisational performance. This is evident through the positive impact on sales figures, risk and compliance management and operational management.
The study contributes to the broader field of Information Systems (IS) in numerous ways. Firstly the research discovers gaps in existing research, then proposes a method to investigate the research question as a result of the gaps identified, and
-iiiuses
this method as a tool to investigate the problem. The main contribution of the study is to contribute to the body of knowledge by investigating the value of business intelligence to organisations. / College of Engineering, Science & Technology / D. Litt et. Phil. (Information Systems)
|
116 |
Theorizing outliers : explaining variation in IT project performanceBudzier, Alexander January 2014 (has links)
IT projects are temporary organizations of strategic importance. Companies invest large amounts of money, time, and resources into business-embedded IT projects in order to change and gain a competitive advantage. Extreme cases of failures were previously only analyzed as case studies, e.g., Denver Airport, London Stock Exchange Taurus, London Ambulance Service. The research poses an important question: What is the risk of these outliers, that is markedly deviant observations of IT project performance? What causes outliers in IT project performance? Only very few studies problematized the frequency of outliers directly. Reported numbers range from 33% to as low as 0.2%. The variation has been explained through biases in planning processes of organizations and as artefact of data collection. An alternative explanation is that the true nature of IT projects contains more variation than commonly assumed. A rich body of organizational, project management, and IT project management literature offers antecedents of outliers. The extant literature falls broadly into three schools of thought: (1) system-centric, (2) event-centric, and (3) process-centric theories of why outliers occurred. System-centric explanations focus on the question of system design, based on theories of normal accidents and high reliability organizations. Event-centric explanations focus on how organizations respond to rare events that impact the organization, based on theories of crisis management, management of organizational turbulence, and strategic surprises. Process-centric explanations focus on the role of managing uncertainty and risk over time, based on theories of man-made disasters, escalation of commitment to a failing course of action, and the normalization of deviance. The study is based on the archival research of 4,307 IT projects from 190 organizations. The findings show that the tail of the cost, schedule, and effort performance distributions is best fitted by a power law, with overwhelming goodness of fit. Moreover, the findings show that system-centric explanations and process-centric theories offer explanations for the thickness of the tail and the odds of an outlier occurring. In particular five variables were associated with outliers: estimated cost and duration, perceived uniqueness of the project, the qualification and motivation of the project team, and the effectiveness of monitoring and controlling. The results show that outliers are not chance events; they follow patterns that are describable. The study showed how design factors, that are often conceptualized as system complexities, and execution factors, that are often conceptualized as the effectiveness of project processes, explain project outliers. Lastly, the thesis draws implications for research and practice.
|
117 |
Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprisesEnslin, Zacharias 03 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consumers need to make sense of the possible advantages that may be gained from utilising cloud services, as well as the possible incremental risks it may expose an enterprise to.
The aim of this study is to inform enterprise managers, who possess business knowledge and may also be knowledgeable on the main aspects of COBIT, on the topic of cloud computing. The study focuses on the significant benefits which the utilisation of cloud computing services may bring to a prospective consumer enterprise, as well as the significant incremental risks this new technological advancement may expose the enterprise to. Proposals of possible controls that the prospective consumer enterprise can implement to mitigate the incremental risks of cloud computing are also presented. / AFRIKAANSE OPSOMMING: “Cloud computing” (wolkbewerking) het na vore getree as een van die mees opspraakwekkende inligtingstegnologieverwante onderwerpe van die dekade. Gevolglik word talle inligtingstegnologie-dienste nou as “cloud”-dienste aangebied. Uitgebreide aandag in terme van tegnologiese navorsing is en word steeds deur “cloud computing” ontlok. Weinig aandag word egter geskenk aan leiding vir voornemende verbruikers van “cloud”-dienste, wie moontlik nie tegniese kennis besit nie, of nie belangstel in die diepgrondige tegniese aspekte wat op inligtingstegnologie-spesialiste gemik is nie. Tog moet hierdie verbruikers sin maak van die moontlike voordele wat die gebruik van “cloud”-dienste mag bied, asook die moontlike inkrementele risiko’s waaraan die onderneming blootgestel mag word.
Die doel van hierdie studie is om die bestuurders van ondernemings, wie besigheidskennis besit en moontlik ook kundig is oor die hoof aspekte van COBIT, in te lig oor wat “cloud computing” is. Die studie fokus op die beduidende voordele wat die benutting van “cloud computing”-dienste aan die voornemende verbruikersonderneming mag bied, asook die beduidende inkrementele risiko’s waaraan die onderneming blootgestel mag word as gevolg van hierdie tegnologiese vooruitgang. Voorstelle van moontlike beheermaatreëls wat die voornemende verbruikersonderneming kan implementeer ten einde die inkrementele risiko’s van “cloud computing” teë te werk word ook aangebied.
|
118 |
Addressing the incremental risks associated with social media by using the cobit 5 control frameworkGerber, Petro 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: Social media offers great opportunities for businesses and the use thereof will
increase competitiveness. However, social media also introduce significant risks
to those who adopt it. A business can use existing IT governance control
framework to address the risks introduced by social media. However a business
should combine existing control frameworks for adequate and complete IT
governance.
This study was undertaken to help businesses to identify incremental risks
resulting from the adoption of social media and to develop an integrated IT
governance control framework to address these risks both at strategic and
operational level. With the help of the processes in COBIT 5, this study provides
safeguards or controls which can be implemented to address the IT risks that
social media introduce to a business. By implementing the safeguards and
controls identified from COBIT 5, a business ensures that they successfully
govern the IT related risks at strategic level. This study also briefly discuss the
steps that a business can follow to ensure IT related risks at operational level is
addressed through the implementation of configuration controls. / AFRIKAANSE OPSOMMING: Sosiale media bied groot geleenthede vir besighede en die gebruik daarvan sal
mededingendheid verhoog. Sosiale media hou ook egter beduidende risiko's in vir
diegene wat dit aanneem. 'n Besigheid kan bestaande Informasie Tegnologie (IT)
kontrole raamwerke gebruik om die risiko's wat ontstaan as gevolg van die
gebruik van sosiale media aan te spreek. Vir voldoende en volledige IT
korporatiewe beheer moet 'n besigheid egter bestaande kontrole raamwerke
kombineer.
Hierdie studie is onderneem om besighede te help om die toenemende risiko's
wat ontstaan as gevolg van die gebruik van die sosiale media, te identifiseer en
om 'n geïntegreerde IT kontrole raamwerk te ontwikkel om hierdie risiko's op
strategiese sowel as operasionele vlak aan te spreek. Met die hulp van die
prosesse in COBIT 5 voorsien hierdie studie voorsorgmaatreëls of kontroles wat
geïmplementeer kan word om die IT-risiko's waaraan die besigheid, deur middel
van sosiale media blootgestel is, aan te spreek. Deur die implementering van die
voorsorgmaatreëls en kontroles soos geïdentifiseer uit COBIT 5, verseker ʼn
besigheid dat hulle die IT-verwante risiko's op strategiese vlak suksesvol beheer.
Hierdie studie bespreek ook kortliks die stappe wat 'n besigheid kan volg om te
verseker dat IT-verwante risiko's op operasionele vlak aangespreek word deur die
implementering van konfigurasie kontroles.
|
119 |
Benefits, business considerations and risks of big dataSmeda, Jorina 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: Big data is an emerging technology and its use holds great potential and benefits for
organisations. The governance of this technology is something that is still a big
concern and as aspect for which guidance to organisations wanting to use this
technology is still lacking.
In this study an extensive literature review was conducted to identify and define the
business imperatives distinctive of an organisation that will benefit from the use of
big data. The business imperatives were identified and defined based on the
characteristics and benefits of big data. If the characteristics and benefits are clear,
the relevant technology will be better understood. Furthermore, the business
imperatives provide business managers with guidance to whether their organisation
will benefit from the use of this technology or not.
The strategic and operational risks related to the use of big data were also identified
and they are discussed in this assignment, based on a literature review. The risks
specific to big data are highlighted and guidance is given to business managers as to
which risks should be addressed when using big data. The risks are then mapped
against COBIT 5 (Control Objectives for Information and Related Technology) to
highlight the processes most affected when implementing and using big data,
providing business managers with guidance when governing this technology. / AFRIKAANSE OPSOMMING: ‘Big data’ is 'n ontwikkelende tegnologie en die gebruik daarvan hou baie groot
potensiaal en voordele vir besighede in. Die bestuur van hierdie tegnologie is egter ʼn
groot bron van kommer en leiding aan besighede wat hierdie tegnologie wil gebruik
ontbreek steeds.
Deur middel van 'n uitgebreide literatuuroorsig is die besigheidsimperatiewe
kenmerkend van 'n besigheid wat voordeel sal trek uit die gebruik van ‘big data’
geïdentifiseer. Die besigheidsimperatiewe is geïdentifiseer en gedefinieer gebaseer
op die eienskappe en voordele van ‘big data’. Indien die eienskappe en voordele
behoorlik verstaan word, is 'n beter begrip van die tegnologie moontlik.
Daarbenewens bied die besigheidsimperatiewe leiding aan bestuur sodat hulle in
staat kan wees om te beoordeel of hulle besigheid voordeel sal trek uit die gebruik
van hierdie tegnologie of nie.
Die strategiese en operasionele risiko's wat verband hou met die gebruik van ‘big
data’ is ook geïdentifiseer en bespreek, gebaseer op 'n literatuuroorsig. Dit
beklemtoon die risiko's verbonde aan ‘big data’ en daardeur word leiding verskaf aan
besigheidsbestuurders ten opsigte van watter risiko's aangespreek moet word
wanneer ‘big data’ gebruik word. Die risiko's is vervolgens gekarteer teen COBIT 5
(‘Control Objectives for Information and Related Technology’) om die prosesse wat
die meeste geraak word deur die gebruik van ‘big data’ te beklemtoon, ten einde
leiding te gee aan besigheidsbestuurders vir die beheer en kontrole van hierdie
tegnologie.
|
120 |
A framework for the evaluation of the information system at EskomRamafalo, Mogale Emmanuel 01 1900 (has links)
M. Tech. (Information Technology, Faculty of Applied and Computer Sciences) Vaal University of Technology / A reliable and efficient information system (IS) is critical for Eskom so that it is able to manage and meet its energy demands. A reliable power supply provides stakeholders with the confidence that supply of power is managed sustainably, effectively and efficiently. Thus, an information system is integral in the effective and efficient generation, distribution and transmission of electricity.
The purpose of the study was to investigate IS evaluation criteria and to develop a comprehensive framework that will serve as basis for IS evaluation across Eskom. The research study additionally investigated IS evaluation methods and instruments that are currently used in Eskom. This study produced an information systems success evaluation framework. The proposed model was built by reviewing well-established information systems success models and information systems theories found in the literature.
This research study followed the interpretive research paradigm combining it with qualitative case study. The research findings linked information systems success to top management support, change management process and information quality. The findings of the study alsorevealed that quality of IS department’s service as perceived by users can greatly influence IS success. The results of this study provided enlightening reference benefit for Eskom, which was in line with Eskom’s goal of improving business processes, efficiencies and eliminating waste.
|
Page generated in 0.1789 seconds