• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 140
  • 21
  • 20
  • 7
  • 7
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 235
  • 235
  • 58
  • 43
  • 37
  • 33
  • 33
  • 33
  • 29
  • 29
  • 28
  • 27
  • 23
  • 23
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Understanding the role of e-skills in the utilisation of electronic small business development support services

Katunga, Natasha January 2013 (has links)
Magister Commercii - MCom / The Internet is now facilitating the provision of an increasing number of services. Thus, technology has become a more integrated part of people‟s daily routine. Some of these technologies include electronic communication, online banking, and shopping as well as electronic learning - to name but a few. However, for various reasons, such as limited formal education (which is a key promoter of reading and writing skills), access and skills, not everyone has an equal opportunity to benefit from the use of these technologies. The unequal distribution of opportunities of such nature is often broadly referred to as the digital divide. That is the gap between those who have access to Information and Communication Technology (ICT) and those who do not. One noted challenge that influences the use of ICT consists of socioeconomic conditions, which together elicit high levels of poverty. An identified strategy for uplifting these areas was (and still is) entrepreneurship, notably small businesses. These small businesses however, generally have very short and mostly unsuccessful lives. As a result the government at all levels (national, provincial and local) has endeavoured to provide support to these businesses. Some of this support is provided through mediums, such as the Internet (here named “electronic support”) to assist these small businesses. This support, which comes from government, is however, not being fully utilised by the intended beneficiaries. Thus, the small businesses are not benefiting from the support provided. Consequently, many are still experiencing a short and unsuccessful existence. This research thus analyses the small businesses in areas of the greater Cape Town, which are characterised by high levels of poverty and unemployment. Previous studies in these areas have reported the lack of ICT related skills, also known as electronic skills (e-skills), as one of the reasons for the low uptake of electronic support (e-support). This e-support is provided by various levels of government through selected agencies (service providers). In essence, this study is aimed at investigating the influence of e-skills in the access and use of the provided e-support by owners of small businesses. Considering that the lack of adequate e-skills has been identified as influencing the use of e-support, the study also aims to identify the e-skills needed to fully utilise the provided e-support. The approach to this investigation included a review of pertinent literature and devising a conceptual model. This model was then tested in the empirical setting of this study. This setting included: (i) Providers of e-support (various specialised government agencies) and (ii) the intended beneficiaries of this esupport, i.e. small businesses in the previously disadvantaged areas (PDAs) of the greater Cape Town. Through the use of case study methodology and face to face interviews, it was found that many small business owners were not able to appropriately use the provided e-support. This was due to their lack of e-skills, which resulted in their inability to use ICT. Additionally, some were unaware of the existence of the e-support or the service providers. During the review of pertinent literature done as part of the study, an e-skills framework was designed. The framework identified the e-skills considered necessary in order for small business owners to effectively utilise the provided e-support and other technologies. The e-skills framework suggested by this study could be used as a tool to assist: (i) The providers of e-support to understand the usage of their services and enable (ii) a more informed understanding of the need for appropriate e-skills among small business owners, in relation to their use of the provided e-support. Additionally, (iii) small business owners should be in a better position to recognise the benefits of using technology, especially the Internet. The contribution of this study is seen as twofold. Firstly, it should assist the providers and users of e-support. This is done by addressing the practical side of the provision and usage of these services. Secondly, the study contributes an informative e-skills framework related to the effective use of esupport. This study also furthers academic knowledge in the area of the investigation, and suggests further directions for research. Considering, the limited small business sample (only participants from three PDAs), the generalisation of this study is limited. This limitation does not however, influence the validity of this research, or the credibility of the findings.
202

Zákon č. 108/2006 Sb., o sociálních službách a byrokratizace činnosti NNO / Act No. 108/2006 Coll., on social services and bureaucratization of the activities of NGOs

Kádner, Filip January 2011 (has links)
Act No. 108/2006 Coll., on social services and bureaucratization of the activities of NGOs This thesis deals with the Social Services Act (No. 108/2006 Coll.) in the context of the bureaucratization of the activities of nongovernmental organizations (NGOs) that are providers of social services. The first order of business is to answer the question whether the law contains elements of the bureaucracy, which the law establishes in the activities of social services providers. A second related objective is to determine whether NGO consider the elements of bureaucracy contained in the Act on Social Services as the main obstacles for the way they operate and whether in connection with their introduction observe within their organization typical dysfunctions associated with the process of bureaucratization. Theoretical background and set of research tools are based on R.H. Hall's research in the field of dimensional analysis of elements present in the structure of bureaucratic organizations. As a research method to achieve the first objective is used quantitative content analysis. The results of the analysis confirm that the Social Services Act contains elements that bureaucratise activities of social services providers. As a research method to achieve the second objective of the thesis is a quantitative...
203

Misdade teen vroue in die Gautengprovinsie

Jooste, Thomas Ignatius Muller 01 January 2002 (has links)
The purpose of this research was to describe and explain crimes against women in the Gauteng Province of South Africa. It was conducted by means of a literature review, followed by empirical research, based on police dockets, against the background of Seligman's theory on learned helplessness. The literature review was used to design a research schedule. The schedule was used for data capturing from police dockets from the Crime Information Analysis Centre (QAQ at their Gauteng Regional office in Johannesburg. From this data, a convenience sample, consisting of 303 cases, was compiled. These cases were reported at the charge offices of Pretoria-Moot Villieria, Pretoria-North, Pretoria-West Eersterust and Hillbrow, for the period between 1 January 1997 and 1 March 1998. Finally, recommendations are made for the design of preventative strategies, and suggestions are made for possible future research. / Die doel van hierdie navorsing was om misdade teen vroue in die Gauteng Provinsie van Suid-Afrika te beskryf en te verklaar. Dit is gedoen aan die hand van literatuurstudie, en is uitgebrei met 'n empiriese ondersoek wat op polisiedossiere ebaseer is, teen die agtergrond van Seligman se teorie van aangeleerde hulpeloosheid. Die literatuurstudie is gebruik om 'n skedule te ontwerp. Die navorsingskedule is gebruik vir datavangs uit polisiedossiere. Die polisiedossiere van die Misdaadinligting-Analisesentrum (MIAS) van Gauteng se streekkantoor in Johannesburg is gebruik vir die samestelling van 'n gerieflikheidsteekproef bestaande uit 303 gevalle. Hierdie gevalle kom uit die aanmeldings by die aanklagkantore van Pretoria-Moot/ Villieria, Pretoria-Noord, Pretoria-Wes, Eersterust en Hillbrow, en wel tussen 1 Januarie 1997 en 1 Maart 1998. Ten slotte word aanbevelings vir die ontwerp van voorkomingstrategie gedoen en voorstelle vir moontlike toekomstige navorsing gemaak. / Criminology / M.A. (Criminology)
204

Bulk unsolicited electronic messages (spam) : a South African perspective

Geissler, Michelle Lara 30 November 2004 (has links)
In the context of the Internet, spam generally refers to unsolicited and unwanted electronic messages, usually transmitted to a large number of recipients. The problem with spam is that almost all of the related costs are shifted onto the recipients, and many of the messages contain objectionable content. Spam has become a significant problem for network administrators, businesses and individual Internet users that threatens to undermine the usefulness of e-mail. Globally, spam spiralled to account for over 60% of all e-mail near the end of 2004. It is a problem that costs the global economy billions of dollars a year in lost productivity, anti-spam measures and computer resources. It has forced governments to enact legislation against the problem and it has prompted the development of numerous technical countermeasures. Spam can only be defeated by a combination of legal measures, informal measures (including self regulation and social norms), technical measures and consumer education. Because spam is a relatively recent and evolving problem, the application of various common law mechanisms are explored, including the law of privacy and the law of nuisance. Various constitutional concerns may also arise in the context of spam, and the right to freedom of expression must be balanced against other competing rights and values, including the right to privacy. Comparative legislation is examined, because it is important to recognise trends in spam legislation in other jurisdictions so as to ensure a measure of interoperability with those laws. The practical difficulties in identifying spammers, and the lack of jurisdiction over offshore offenders affect the practical implementation of the current protection offered by the ECT Act. In conclusion, this thesis identifies the need for direct anti-spam legislation in South Africa, and suggests various clauses that will need to be catered for in the legislation. It is submitted that "opt-in" legislation should be preferred over "opt-out" legislation. It is further submitted that a definition of spam should be based on the volume and indiscriminate nature of the e-mail, and not only on whether the communication was commercial. Therefore, a definition of bulk unsolicited e-mail is proposed. / Criminal & Procedural Law / LLD
205

Customer-based brand equity of the major cellphone network service providers amongst principal estate agents in the Gauteng province of South Africa

Mentz, Hendrik 14 September 2011 (has links)
This study investigates the customer-based brand equity of the major cellphone network service providers (Vodacom, MTN and Cell C) amongst principal estate agents registered with the Estate Agency Affairs Board in Gauteng. Secondary research covered the marketing environment of the major service providers. An extensive study of literature on branding, brand management and brand equity measurement was undertaken. An empirical study was conducted. Telephone interviews were used for initial contact and screening. An invitation to participate in the survey, with a link to a questionnaire, was e-mailed to qualified respondents. Cell C users were excluded from the quantitative analysis. There were several significant findings: Vodacom and MTN users are alike in terms of personal and estate agency-related demographics. With the exception of age and gender, the sample fits the stated descriptors of individuals in the LSM seven to LSM ten groups. Cronbach‘s alpha coefficient confirmed a high level of reliability (0.870) for the summated measurement scale developed as an indicator variable of customer-based brand equity and Vodacom and MTN‘s rating on the summated scale did not differ at a statistically significant level. The service provider used proved to be an important driver of loyalty, but overall satisfaction with the cellphone service does not differ statistically significantly between Vodacom and MTN users. Vodacom has established a much more favourable positioning on the brand association statements evaluated. Factor analysis identified five brand association dimensions that should be considered for measurement of brand associations. Multiple regression analysis identified the brand as a product dimension as the best predictor of customer-based brand equity. Vodacom received more favourable brand performance ratings than MTN. Factor analysis identified six brand performance dimensions that should be considered for inclusion when measuring brand performance. Multiple regression analysis identified the easy to use and one-stop-service dimensions as the best predictors of customer-based brand equity. The customer-based brand equity of the user group is moderate (16 out of 25, or 64%). / Business Management / D. Com. (Business Management)
206

The capability maturity model as a criminal justice process improvement paradigm

Doss, Daniel Adrian 07 1900 (has links)
Background: The administrators, managers, and leaders of criminal justice organizations experience a plethora of processes that impact the strategic, tactical, and operational facets of their respective organizations. Sound processes are central to effectively and efficiently managing criminal justice organizations and for facilitating the optimal operations of the organization. Such management characteristics are necessary to render public services towards the goals of deterring crime and maintaining societal order. Administrating and managing criminal justice organizations involves paradigms that favor process improvement and quality of processes. Existing methods include the Compstat paradigm Total Quality Management, business process management, business process improvement, business process reengineering, standards, legislation, policy, and Six Sigma. However, such paradigms not approach process improvement from the unique perspective of process maturity as a foundational basis. Additionally, no solitary foundational basis exists that uniquely addresses organizational process improvement issues, regarding criminal justice entities, from the perspective of evolutionary process maturation through time. This research examines the potential of adapting the Capability Maturity Model Integrated (CMMi) as a foundational process improvement framework among criminal justice organizations. Within the CMMi framework, process improvement begins from a state of random, ad hoc processes and culminates in a state of highly optimized processes. Through time, process maturation occurs through five primary stages sequentially: 1) random, 2) managed, 3) defined/specific, 4) quantitatively managed, and 5) optimized. This research explores the potential of leveraging the CMMi paradigm as a form of organizational process improvement within the criminal justice domain. Scope of the Study: This research investigated the potential for adapting the Capability Maturity Model (Integrated) (CMMi) within the criminal justice domain. A derivative maturity model framework, the Criminal Justice Maturity Model (CJMM), was crafted using the CMMi concept as its foundational premise. A Likert scale survey was implemented to investigate the perceptions of personnel regarding process improvement initiatives and their work settings. This study was constrained to the criminal justice domains of the states of Alabama and Mississippi. Data processing encompassed demographic descriptions of the survey instrument and the received responses, ANOVA, Chi-Square analysis, and the Cronbach Method. Stratifications involved separating the survey responses into classifications of Alabama versus Mississippi entities, urban versus rural entities, and management versus non-management entities. Findings and Conclusions: The conclusions of this research failed to show that all five levels of the maturity model framework appear to be separately perceived among the respondents. Therefore, per each individual stage of the maturity model framework, this research failed to show conclusively that the complete maturity model framework is adaptable among administrative settings in the criminal justice domain and that process maturity issues among respondent settings are addressed via a process maturity framework. Because this research failed to show the perceived characteristics of all five maturity levels of the maturity model framework separately, it is concluded that the criminal justice administrative settings of the respondents do not conform completely to the tenets of the CMMi paradigm. Future studies were recommended to pursue additional approaches of this research project. This study represents an initial starting point from which several future endeavors may be initiated. / Criminology and Security Science / D.Litt. et Phil. (Police Science)
207

Improving the adoption of cloud computing by Small & Medium Scale Enterprise (SMEs in Nigeria

Young, Destiny Assian 08 1900 (has links)
In a traditional business environment, companies set up their organisation’s IT data infrastructure, install their applications and carry out the maintenance and management of their infrastructures. Whereas Cloud computing removes the need for companies to set up own data centers and run enterprise applications. Cloud computing technology provides businesses with the advantage of on-demand access, agility, scalability, flexibility and reduced cost of computing. An appreciable increase is being observed in the acceptance and migration to this new IT model in developing economies. In Nigeria, it has been observed that there is a somewhat unimpressive rate of adoption of Cloud computing by the microfinance operators. This research investigates the reason for the slow adoption of Cloud computing by SMEs in Nigeria with special consideration to the Microfinance subsector and to develop a model for improving the adoption of cloud computing by microfinance organisations. The research was conducted using a qualitative research design method. Interview was the main data collection instrument and data collected was analysed using thematic content analysis method. The analysis of the study revealed that SMEs in Nigeria, with particular reference to microfinance subsector in Akwa Ibom State are yet fully to embrace cloud technology. It was discovered that most of the SMEs studied, has some level of reservation about cloud computing arising from not having appropriate education and enlightenment about the cloud economic offerings and potentials. From the outcome of the research, the researcher identified that most people’s concerns are as a result of lack of knowledge about cloud computing and so the researcher concluded that appropriate enlightenment by industry stakeholders, cloud service providers, cloud enthusiasts and even the government on the risks and overwhelming economic incentives of cloud computing as well as the provision of a monitored free trial services will encourage the adoption of cloud computing by SMEs. / College of Engineering, Science and Technology / M.Tech. (Information Technology)
208

Managing inclusive education at selected special schools in Pietermaritzburg with special reference to the vocational training of learners

Maniram, Radhika 02 1900 (has links)
There has been a paucity of research concerning vocational training of learners with special education needs. The literature study focused on a vocational training and transition planning programme in the United States of America, which could provide as a useful guide to educators and school managers, when implementing vocational training and transitional planning in South Africa. Research was conducted using semi-structured interviews with educators and principals at special schools, observation of learners whilst performing skills training and documentary analysis, to explore whether learners with barriers to learning are receiving skills training that could position them for employment in the open labour market after they exit school. Findings revealed that principals and educators at special schools are faced with challenges in the learner’s microsystem, exosystem and macrosystem, resulting in the inadequate preparation of learners with special education needs for employment in the open labour market. Based on the findings, recommendations in terms of Bronfenbrenner’s Ecological Systems Theory were made, to increase the opportunity for learners who experience barriers to learning, to be engaged in meaningful employment. / Education Management / M. Ed. (Education Management)
209

Information management : best practices in broad base industries / Trivko Pejanovic

Pejanovic, Trivko January 2006 (has links)
Many organisations recognise the importance of Information Management (IM) and are implementing it into the structure and culture of their organisation and the roles of their managers and employees. More and more, organisations are thinking and operating strategically - their very survival depends on information. Information is the lifeblood of an organisation. An essential part of any business strategy is consideration of how information systems strategy supports change. Experts agree that information management has become a competitive necessity for all types of companies. The organisations that will succeed in the global information environment are those that can identify the value of information. One of the biggest problems facing managers today at all levels is the problem of investing in and using technology efficiently, especially Information Technology (IT). Business intelligence enables organisations to make well informed business decisions and thus can be the source of competitive advantages. This is especially true when companies are able to extrapolate information from indicators in the external environment and make accurate forecasts about future trends or economic conditions. Business intelligence becomes a top initiative and investment priority for Chief lnformation Officers (CIOs) and Chief Executive Officers (CEOs). This dissertation addressed the need to identify the most important information management components as a foundation for the more in-depth discussion on information management principles and best practices in broad base industries. The elements of information management that appear the most frequent in the literature study indicate that authors place high priority on the following components: • Information security • Information management governance • IT standardisation • Regulatory requirements for information management • Business intelligence • Virtual collaboration • Management of service outsourcing • Selection of service providers • Project management • Change management • Risk management • Asset management • Knowledge management • Business processes • Balanced scorecard • Benchmarking • Competitive Intelligence • Business partnering. The empirical study was conducted in six phases. The first phase consisted of establishing a framework of information management best practices in broad base industries and the second phase was to develop a preliminary measuring instrument to investigate the perceptions of the sampling population on information management best practices. Phase three consisted of a pilot study in the development of a questionnaire. Phase four was to investigate perceptions of information management best practices in broad base industries. The analysis model was developed based on the criteria evaluated using advanced statistical procedures. The five most important components of information management that were identified were Business processes, Information security, Business intelligence, Risk management, and Information management governance. The best practices for these five most important components of information management were also identified. The five highest ranking best practices were: Virus control implemented; Information management strategy aligned with business goals; Documented business processes; Risk management framework implemented; and Support and training in place. Phase five was to describe the results of the empirical study for information management best practices in broad base industries, Phase six was to compare the perception what the information management best practices are as perceived by companies from broad base industries. The most uniform perception was identified for the information management component 'Business Intelligence'. On average, it was rated almost equally by all participants. On the other hand, there is a significant difference in perception from all industry segments and the whole industry for 'Risk Management'. / Thesis (M.B.A.)--North-West University, Potchefstroom Campus, 2007.
210

The capability maturity model as a criminal justice process improvement paradigm

Doss, Daniel Adrian 07 1900 (has links)
Background: The administrators, managers, and leaders of criminal justice organizations experience a plethora of processes that impact the strategic, tactical, and operational facets of their respective organizations. Sound processes are central to effectively and efficiently managing criminal justice organizations and for facilitating the optimal operations of the organization. Such management characteristics are necessary to render public services towards the goals of deterring crime and maintaining societal order. Administrating and managing criminal justice organizations involves paradigms that favor process improvement and quality of processes. Existing methods include the Compstat paradigm Total Quality Management, business process management, business process improvement, business process reengineering, standards, legislation, policy, and Six Sigma. However, such paradigms not approach process improvement from the unique perspective of process maturity as a foundational basis. Additionally, no solitary foundational basis exists that uniquely addresses organizational process improvement issues, regarding criminal justice entities, from the perspective of evolutionary process maturation through time. This research examines the potential of adapting the Capability Maturity Model Integrated (CMMi) as a foundational process improvement framework among criminal justice organizations. Within the CMMi framework, process improvement begins from a state of random, ad hoc processes and culminates in a state of highly optimized processes. Through time, process maturation occurs through five primary stages sequentially: 1) random, 2) managed, 3) defined/specific, 4) quantitatively managed, and 5) optimized. This research explores the potential of leveraging the CMMi paradigm as a form of organizational process improvement within the criminal justice domain. Scope of the Study: This research investigated the potential for adapting the Capability Maturity Model (Integrated) (CMMi) within the criminal justice domain. A derivative maturity model framework, the Criminal Justice Maturity Model (CJMM), was crafted using the CMMi concept as its foundational premise. A Likert scale survey was implemented to investigate the perceptions of personnel regarding process improvement initiatives and their work settings. This study was constrained to the criminal justice domains of the states of Alabama and Mississippi. Data processing encompassed demographic descriptions of the survey instrument and the received responses, ANOVA, Chi-Square analysis, and the Cronbach Method. Stratifications involved separating the survey responses into classifications of Alabama versus Mississippi entities, urban versus rural entities, and management versus non-management entities. Findings and Conclusions: The conclusions of this research failed to show that all five levels of the maturity model framework appear to be separately perceived among the respondents. Therefore, per each individual stage of the maturity model framework, this research failed to show conclusively that the complete maturity model framework is adaptable among administrative settings in the criminal justice domain and that process maturity issues among respondent settings are addressed via a process maturity framework. Because this research failed to show the perceived characteristics of all five maturity levels of the maturity model framework separately, it is concluded that the criminal justice administrative settings of the respondents do not conform completely to the tenets of the CMMi paradigm. Future studies were recommended to pursue additional approaches of this research project. This study represents an initial starting point from which several future endeavors may be initiated. / Criminology and Security Science / D. Litt. et Phil. (Police Science)

Page generated in 0.1118 seconds