591 |
Geographically distributed requirements elicitationVat, Nicholas January 2000 (has links)
The technology revolution has transformed the way in which many organisations do their business. The resultant information systems have increased the decision making powers of executives, leading to increased effectiveness and ultimately to improved product delivery. The process of information systems development is, however, complex. Furthermore, it has a poor track record in terms of on-time and within-budget delivery, but more significantly in terms of low user acceptance frequently attributable to poor user requirements specification. Consequently, much attention has been given to the process of requirements elicitation, with both researchers and businessmen seeking new, innovative and effective methods. These methods usually involve large numbers of participants who are drawn from within the client and developer organisations. This is a financially costly characteristic of the requirements elicitation process. Besides information systems, the technology revolution has also brought sophisticated communication technologies into the marketplace. These communication technologies allow people to communicate with one another in a variety of different time and space scenarios. An important spin-off of this is the ability for people located in significantly different geographical locations to work collaboratively on a project. It is claimed that this approach to work has significant cost and productivity advantages. This study draws the requirements elicitation process into the realm of collaborative work. Important project management, communication, and collaborative working principles are examined in detail, and a model is developed which represents these issues as they pertain to the requirements elicitation process. An empirical study (conducted in South Africa) is performed in order to examine the principles of the model and the relationships between its constituent elements. A model of geographically distributed requirements elicitation (GDRE) is developed on the basis of the findings of this investigation. The model of GDRE is presented as a 3-phased approach to requirements elicitation, namely planning, implementation, and termination. Significantly, the model suggests the use of interviews, structured workshops, and prototyping as the chief requirements elicitation methods to be adopted in appropriate conditions. Although a detailed study of communications technology was not performed, this thesis suggests that each individual GDRE implementation requires a different mix of communication technologies to support its implementation.
|
592 |
An investigation of a framework for the implementation of service management in the information and communication technology sectorBenyon, Robert Victor January 2006 (has links)
Service Management (SM) is an integrated, cyclical and collaborative approach to the management of service requirements and levels. It involves the definition of client expectations, the satisfying of those expectations and the perpetual refining of the business agreement (Sturm 2001). SM in the ICT sector is a comprehensive process that extends beyond the development of Service Agreements (SAs). A number of identifiable steps constitute the progressive implementation of a managed services environment, the key components of which are a readiness to provide services, the accurate elicitation, management and satisfying of client requirements and the continual improvements to the business relationship. Unfortunately, a number of SM initiatives fail. These failures can be attributed to a lack of SM understanding, the absence of a fully implemented SM strategy, poor communication and people issues. This research describes an investigation of SM implementation. A number of recognised frameworks are explored and critically analysed. The common strengths of these frameworks and the results of an exploratory pilot study are used to construct an SM implementation framework. This framework is then tested empirically by means of an online survey, and revised in the light of the results of this survey. The framework comprises two distinct phases, namely a Foundation phase and a Managed Services phase. The Foundation phase comprises 8 critical preparatory activities that take a service provider to state of readiness to provide and manage ICT services. The Managed Services phase comprises 5 key cyclical steps for the management of ICT services, including Planning, Analysis, Design, Implementation and Review.
|
593 |
A framework for the development and measurement of agile enterprise architectureMthupha, Bokang January 2012 (has links)
Enterprise architecture is the high-level design of the entire business, facilitated by enterprise architects. "Agile enterprise architecture" is the term used in enterprise architecture to describe an architecture that caters for future unknowns, enabling change to occur rapidly without undue resource utilization, yet in a controlled manner and with minimal adverse impact. Some enterprise architects still use outdated, rigid approaches to enterprise architecture which are incompatible with today‟s business environment. In addition, there is limited research into methods that can be applied to measure the agility of enterprise architecture. The current environment is such that there is a need for a more agile approach to developing and measuring enterprise architecture. This work will lead to the creation of a Framework for The Development and Measurement of Agile Enterprise Architecture. In support of the main goal of the development of the framework, a literature review will be conducted focusing on the necessary sub-goals of the research. The first sub-goal of the literature review is to develop a comprehensive definition for enterprise architecture (referred to as EA), as well as discover how it is currently practiced. Thereafter, the literature review will investigate a comprehensive definition for agility and research why it is emerging as a critical topic. The next chapter of the literature review will research how agility fits within the context of EA, uncovering a comprehensive definition for agile EA and the best practices in agile EA development. The final chapter of the literature review will investigate suitable measurement techniques that can be used to assess the level of agility of EA. On completion of the literature review, a preliminary framework will be created using the most important contributions from the literature. An empirical study will be conducted to explore the definitions for EA, agility, agile EA, the methods to measure the agility of EA and the concepts for the development of agile EA summarised in the preliminary framework. Data analysis follows an interpretive and qualitative approach based on four case studies through interviews with systems experts in four South African organizations in one province. Each interviewee was interviewed once. The initial interview with a Principal Consultant on Enterprise Strategy Consulting at organisation # 1 formed the basis of an exploratory study; the results of which were used to refine the research instrument and preliminary framework. Thereafter, a more rigorous empirical study focused on interviews with the Chief Architect, Senior Manager in Advisory Services and an Enterprise Architect at organizations 2, 3 and 4 respectively was conducted. The research follows an inductive approach to capture the interpretive experiences of participants and develop theoretical propositions from them. Following the exploratory pilot study it became necessary to make changes to the preliminary framework and initial survey instrument created. Thereafter, the empirical study consisting of the remaining three cases was conducted to test the important aspects of the framework and literature definitions. The analysis of the results of the empirical study prompted further changes to the theoretical framework and definitions created. The interviews conducted with each of the organizations confirmed the factors for agile EA development as well as the effectiveness of the definitions created in the literature review. The research uncovered that the need for a more agile approach to developing EA and a way to measure the level of agility of EA has become more and more significant in organizations. This begins with a better understanding of EA, agility, how agility fits within the context of EA, as well as appropriate methods to measure agility.
|
594 |
A Systems View of IS Governance and IT Governance: A Case Study of the Virginia Department of TransportationFarkas, Bernard 01 January 2017 (has links)
A review of the research related to Information Technology (IT) governance reveals that researchers have yet to use systems theory directly as a basis for understanding IT governance; however, analysis of these researchers’ various definitions of IT governance shows a concurrence between these definitions and the characteristics of a system. This case study research adopts a systems imagination to observe IS and IT governance in the Virginia Department of Transportation (VDOT), which has a budget of over $5 billion and over 7,500 employees and has recently conducted a strategic assessment of its IT organization - including IS and IT governance.
The case study posits that VDOT is an indivisible, purposeful, goal seeking (teleological) system where (1) there are three peer elements (governance, management, and operations); (2) there is a governance feedback mechanism (auditing and monitoring); (3) there are peer areas within the governance element that are specialized for a VDOT asset (e.g., capital asset governance, financial governance, human resource governance, etc.) and IS governance is the peer area that is specialized for IT assets; and (4) there are sub-peer areas within IS governance that are specialized for an IT, and this specialized form of IS governance is named IT governance.
|
595 |
Decision support systems : critical success factors for implementationAverweg, Udo Richard Franz January 1998 (has links)
Dissertation submitted in complete fulfilment for the requirements of the Degree of Master of Technology in Information Technology, M L Sultan Technikon, 1998. / Decision Support Systems (DSS) are interactive computer-based systems developed to support managers in complex tasks requiring human judgment. DSS utilise data, provide an easy user interface and allow for the decision maker's own insights. / M
|
596 |
A framework to elicit user requirements for information systems: a localised participatory approach from Southern AfricaTyukala, Mkhululi January 2014 (has links)
The “What” and “Why” in information system development in resource restricted environments is already well covered in literature. However, the “How” to do it still has not been explored. This thesis reports on the development of a locally flavoured participatory user requirements elicitation framework for the development of information systems in resource restricted environments. It uses existing participatory design practices, user requirements elicitation literature and local participatory norms and traditions to achieve this. In doing so, it takes a step towards the way information systems could be developed in resource restricted environments. The topic of this thesis is mainly motivated by the recent calls in existing literature for developing countries to start developing their own information systems in order to address their own requirements. Accordingly, and to lay a foundation towards the realisation of this goal, this research is positioned within the user requirements elicitation region of information systems development. Current user requirements elicitation methods use traditional methods where experts/designers ask system users questions through interviews or learn about their environment through observations. This research proposes a shift from this approach to one that not only views users as equal partners in the elicitation process but in the whole information systems development process. This is in the spirit of participatory design, which was developed in Scandinavia more than four decades ago. Further, recent research in participatory design emphasises the importance of its contextual nature and concedes that there is no single best practice for participatory design in information systems that applies to all contexts. This research explores the information systems development discourse in resource restricted environments in Africa. Its purpose is to enhance understanding of the local contexts, thus providing new insights on how to develop a framework that speaks to local challenges using norms and traditions in order to develop information systems that address local requirements. Thus, the main contribution of this research lies in laying a foundation for a locally flavoured participatory approach for information systems development in resource restricted environments. It contributes to the existing information systems development, participatory design and user requirements elicitation body of knowledge by developing a framework for participatory user requirements elicitation. In addition, it contributes to the participatory design body of knowledge by introducing an age-old African participatory decisionmaking approach to the academic participatory design community. In doing so, it adopts the meaning of participation from an African value system point of view, which is something that has only been previously explored in the Nordic countries and North America. Finally, recommendations for the application, limitations and avenues for further research are incorporated into the findings of this research.
|
597 |
Critical success factors of information security projectsTshabalala, Obediant January 2016 (has links)
The research shows the critical success factors when implementing information security projects. Many Information security projects in the past have not been successful because these factors were not identified and emphasised effectively. By identifying these factors the research basically presents a model by which information security projects can be executed with guaranteed success. The factors identified during the study cover the following streams: top management commitment as a factor of success; accountability as a factor of success; responsibility as a factor of success; awareness as a factor of success and an information security policy as a factor of success. For the empirical study, a physical questionnaire was administrated to a pool of experts in project management and information security. The study consisted of 60 participants who were verified to have minimum requirements core for questionnaire completion. The questionnaire requested for biological information of the participants and their perceived relations (based on their experience) between project success versus accountability, information security project success versus responsibilities, information security project success versus training & awareness, information security project success versus top management commitment and information security project success versus information security policy. The participants’ responses were structured according to a Likert-type scale. Participants had to indicate the extent to which they agreed with each of the statements in the questionnaire. The responses obtained from the survey were presented and analysed. The researcher observed in this study that information security projects are so specific that critical success factors need to be emphasised from project inception. With the identified critical success factors, the researcher recommends that a project methodology be structured to include these factors so that there is a standard in running information security projects successfully. The researcher also identified that amongst the critical success factors identified, there are some that need to be emphasised more than the others due to their level of importance in such projects.
|
598 |
A computing studio method for teaching design thinkingVan der Post, Leda January 2010 (has links)
Current trends in technology have led to a need for creativity and innovation in the design of contemporary digital products and systems. This has resulted in design thinking and creative design process having a higher profile in digital design practice. In turn, this has impacted computing education, by creating a need for computing students to develop creativity and design thinking skills. Creative design is taught using design studio teaching methods, which require a culture, environment and activities that are different to the teaching methods used in traditional computing education. Some computing academics have implemented courses using aspects of studio teaching methods, but no clear guidelines for a computing academic without creative design experience to fully apply studio teaching methods in courses could be found. The reason for the change in the role of design in the digital domain and how it affected the needs of computing students was investigated and a comparison of typical design studio and computing teaching methods was conducted using a learning systems model adapted for this specific purpose. This led to an identification of areas that required further investigation, or gaps in the knowledge of how to adapt design studio methods for use within a traditional computing education environment. These gaps were used as the basis for identifying a set of research questions for an empirical study. An exploratory case study was conducted at the Nelson Mandela Metropolitan University to answer the research questions. Three computing academics implemented studio teaching methods within three separate modules, following provisional guidelines devised from the preliminary research. Feedback was collected from the lecturers and the students registered for the modules regarding their experiences. It was found that it would be possible for computing academics to implement aspects of a design studio approach within the existing computing environment. An explicit teaching method, termed the computing studio teaching method, was developed from the results of the case study. This teaching method aims to provide computing academics with little or no creative design experience with explicit methods for implementing modified design studio teaching methods in order to promote creativity and design thinking within traditional computing modules. This teaching method will be tested, validated and refined in future research.
|
599 |
An analysis of the information and communication technology initiatives needed to enhance business value at TranswerkChiambiro, Robson January 2006 (has links)
The study was triggered by a discussion with one of Transwerk’s executive management during an MBA tea break. The discussion was centred on the lack of IT Governance Structure in some organisations that are centrally managed due to geographical location and spreading of branches countrywide. The purpose of this study was to analyse the information and communication technology initiatives that can be implemented at Transwerk by the ICT department to ensure significant value from their information and communication technology investments. This was undertaken by means of a literature and an empirical study. The elements of the information and communication technology initiatives were discussed and the study then analysed the responses in an attempt to determine the initiatives that are currently implemented at Transwerk’s ICT department. The literature study indicated that is it critical for any organisation that needs to be successful should have an integrated ICT Governance Structure. The empirical study found out that the current situation at Transwerk’s ICT department requires attention because their IT Governance Structure does not involve major stakeholders from other business units. Recommendations were made as a result of analysing the literature study and empirical study to ensure the implementation of key initiatives that can add value to the organization.
|
600 |
Business process security maturity: a paradigm convergenceBox, Debra January 2008 (has links)
Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is based on a variety of codes of practice and security metrics which aim at ameliorating these increased security hazards. Its aim is to produce a balanced set of security needs which are integrated into the system activities to establish confidence in the effectiveness of the security counter-measures. It is generally accepted that security should be applied in an integrated approach, for example, in Information Systems development. This has proved to be a noble thought but is the exception to the rule. Security, historically, is generally applied as an after-thought in an Information Technology implementation. This motivated the concept of formulating a model of integrating security inherently within the paradigm of BPM. The overarching requirements of the model are to align the overall organisational security initiatives and ensure continuous improvement through constant evaluation and adaptation of the security processes. It is the intention of this research to show that these requirements are achievable through aligning the process management methodology of BPM, with the security paradigms of Information Security Management (using the ISO 17799 standard) and security engineering (using the Systems Security Engineering Capability Maturity Model – SSE-CMM). The aim of the Business Process Security Maturity model as the output of this research, is to link the SSE-CMM, as the security metric and appraisal method, to the ISO 17799 security standard, which provides the guidance for the information security management framework and security control selection, within the Business Process Management environment. The SSE-CMM, as the security version of the Capability Maturity Model, provides the necessary strategy to control the security engineering processes that support the information systems and it maintains that as processes mature they become more predictable, effective and manageable. The aim of the model is to provide an integrated, mature security strategy within the business process and monitor and correct the security posture of the implemented counter-measures.
|
Page generated in 0.1403 seconds