Ensuring global IT project performance through effective stakeholder management
- Mutakyahwa, Augustine Andrew
- Authors: Mutakyahwa, Augustine Andrew
- Date: 2021
- Subjects: Information technology - Management , Project management
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/485391 , uj:44118
- Description: Abstract: Multinational organisations continue to operate and invest in Information Technology (IT) projects across numerous national borders in order to expand the business operations, increase performance and meet the needs of stakeholders. The implementation of global IT projects requires adherence to multiple governance frameworks, as well as appropriately managing stakeholders’ expectations. It is evident that the implementation of governance frameworks is still not followed in most of the multinational organisations. Meeting the heterogeneous stakeholders’ needs and expectations across different countries, adds to the complexity of managing global IT projects. This study explores the multinational organisations’ perceptions and practices of the governance and stakeholder management practices in global IT projects. The study examined the key governance structures followed during the implementation of global IT projects. It determined what key stakeholders required from the governance structures for global IT project performance and how they were managed. In order to establish the relationship of the governance frameworks and stakeholder management, a conceptual framework was developed to ensure global IT project performance. A qualitative method was used in this study to collect the data. Interviews were conducted with project managers and practitioners, who had implemented global IT projects for multinational organisations. The data were analysed using Atlas.ti. Causal loop diagrams were developed to determine the causal relationship between the performance factors. The key findings of this study were that governance structures, global factors and stakeholder management processes were inseparable when managing global IT projects. The theoretical implication of this findings are that both local and foreign governance frameworks, as well as the stakeholders in the global perspectives, are key for global IT project performance. The practical implications of this findings is that proposed conceptual framework provided a good understanding for project managers to proactively identify, analyse, engage and monitor the key stakeholders from the corporate governance-, IT governance- and project governance frameworks, as well as the global factors. , Ph.D. (Information Technology Management)
- Full Text:
- Authors: Mutakyahwa, Augustine Andrew
- Date: 2021
- Subjects: Information technology - Management , Project management
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/485391 , uj:44118
- Description: Abstract: Multinational organisations continue to operate and invest in Information Technology (IT) projects across numerous national borders in order to expand the business operations, increase performance and meet the needs of stakeholders. The implementation of global IT projects requires adherence to multiple governance frameworks, as well as appropriately managing stakeholders’ expectations. It is evident that the implementation of governance frameworks is still not followed in most of the multinational organisations. Meeting the heterogeneous stakeholders’ needs and expectations across different countries, adds to the complexity of managing global IT projects. This study explores the multinational organisations’ perceptions and practices of the governance and stakeholder management practices in global IT projects. The study examined the key governance structures followed during the implementation of global IT projects. It determined what key stakeholders required from the governance structures for global IT project performance and how they were managed. In order to establish the relationship of the governance frameworks and stakeholder management, a conceptual framework was developed to ensure global IT project performance. A qualitative method was used in this study to collect the data. Interviews were conducted with project managers and practitioners, who had implemented global IT projects for multinational organisations. The data were analysed using Atlas.ti. Causal loop diagrams were developed to determine the causal relationship between the performance factors. The key findings of this study were that governance structures, global factors and stakeholder management processes were inseparable when managing global IT projects. The theoretical implication of this findings are that both local and foreign governance frameworks, as well as the stakeholders in the global perspectives, are key for global IT project performance. The practical implications of this findings is that proposed conceptual framework provided a good understanding for project managers to proactively identify, analyse, engage and monitor the key stakeholders from the corporate governance-, IT governance- and project governance frameworks, as well as the global factors. , Ph.D. (Information Technology Management)
- Full Text:
Evolutionary cybersecurity governance : a post-structuralist framework
- Authors: Ngwenya, Cosmas
- Date: 2021
- Subjects: Computer security - Management , Information technology - Management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/478785 , uj:43282
- Description: Abstract: Cybersecurity management is often seen as complex and non-linear because of the constantly evolving factors such as technology, agents, and the type and nature of cyber threats that make it difficult to design sustainable interventions. Importantly, institutions, society and markets are in a continuous process of evolution. It is this evolution that makes cybersecurity governance complex to manage. Management is currently faced with an insufficient understanding of sustainable interventions that would address the evolution of cybersecurity governance in meaningful ways. This study addresses this conundrum by drawing on theories such as social systems theory and post-structuralism from management and information systems disciplines to develop a solid framework for effective cybersecurity governance. The quantitative research that was carried out drew important constructs that would assist in understanding cybersecurity governance. These constructs were tested empirically to determine which of them would most likely address a sustainable cybersecurity governance approach. The quantitative research approach was useful since it was effective in answering the quantifiable ‘what’ and ‘how’ types of questions... , M.Com. (Information Technology Management)
- Full Text:
- Authors: Ngwenya, Cosmas
- Date: 2021
- Subjects: Computer security - Management , Information technology - Management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/478785 , uj:43282
- Description: Abstract: Cybersecurity management is often seen as complex and non-linear because of the constantly evolving factors such as technology, agents, and the type and nature of cyber threats that make it difficult to design sustainable interventions. Importantly, institutions, society and markets are in a continuous process of evolution. It is this evolution that makes cybersecurity governance complex to manage. Management is currently faced with an insufficient understanding of sustainable interventions that would address the evolution of cybersecurity governance in meaningful ways. This study addresses this conundrum by drawing on theories such as social systems theory and post-structuralism from management and information systems disciplines to develop a solid framework for effective cybersecurity governance. The quantitative research that was carried out drew important constructs that would assist in understanding cybersecurity governance. These constructs were tested empirically to determine which of them would most likely address a sustainable cybersecurity governance approach. The quantitative research approach was useful since it was effective in answering the quantifiable ‘what’ and ‘how’ types of questions... , M.Com. (Information Technology Management)
- Full Text:
The rationale for the position of Chief Digital Officer (CDO)
- Authors: Van Niekerk, Theunis
- Date: 2020
- Subjects: Chief executive officers , Information technology - Management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/475080 , uj:42843
- Description: Abstract: In recent times, firms have introduced a new role within top management called the chief digital officer. The strategic rationale behind introducing a chief digital officer within top management of a firm is not clear and is shrouded with confusion and ambiguity. The potential overlaps in the fields of digital transformation and information technology management might be the root cause of this confusion. The purpose of this research was to identify the strategic rationale behind introducing a chief digital officer within the top management of a firm. This has been achieved through conducting empirical research on the concept of digital transformation, contingency and institutional factors influencing a firm to introduce a chief digital officer, as well as the differences between a chief digital officer and a chief information officer within a firm. This study was deeply embedded within the philosophical ideas of interpretivism, and interpretations and understandings were created from the different narratives of top management members around the introduction of chief digital officers within firms. Qualitative research methods and a narrative research strategy were adopted. To explore the phenomenon of the introduction of chief digital officers within firms, open-ended questions were used in in-depth interviews. Data was analysed through a process of thematic content analysis, which consists of data coding as well as theme and relationship identification. Clear differences do exist between digital and information technology strategies within firms. The primary difference between these strategies relates to how information technology is incorporated within the strategy. The introduction of the chief digital officer role can be attributed to both contingency and institutional factors within and around the firm. The introduction of the chief digital officer becomes a viable option for firms when strong environmental forces due to information technology require fundamental change of the firm, but the change required is associated with high risk to the existing operations and information technology infrastructure of the firm. This study clarifies the concept of digital transformation and identifies both contingency and institutional factors that influence a firm to introduce a chief digital officer. This study also highlights key differences between the roles and responsibilities of the chief digital officer and chief information officer, and makes recommendations on the empirical findings. , M.Com. (Information Technology Management)
- Full Text:
- Authors: Van Niekerk, Theunis
- Date: 2020
- Subjects: Chief executive officers , Information technology - Management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/475080 , uj:42843
- Description: Abstract: In recent times, firms have introduced a new role within top management called the chief digital officer. The strategic rationale behind introducing a chief digital officer within top management of a firm is not clear and is shrouded with confusion and ambiguity. The potential overlaps in the fields of digital transformation and information technology management might be the root cause of this confusion. The purpose of this research was to identify the strategic rationale behind introducing a chief digital officer within the top management of a firm. This has been achieved through conducting empirical research on the concept of digital transformation, contingency and institutional factors influencing a firm to introduce a chief digital officer, as well as the differences between a chief digital officer and a chief information officer within a firm. This study was deeply embedded within the philosophical ideas of interpretivism, and interpretations and understandings were created from the different narratives of top management members around the introduction of chief digital officers within firms. Qualitative research methods and a narrative research strategy were adopted. To explore the phenomenon of the introduction of chief digital officers within firms, open-ended questions were used in in-depth interviews. Data was analysed through a process of thematic content analysis, which consists of data coding as well as theme and relationship identification. Clear differences do exist between digital and information technology strategies within firms. The primary difference between these strategies relates to how information technology is incorporated within the strategy. The introduction of the chief digital officer role can be attributed to both contingency and institutional factors within and around the firm. The introduction of the chief digital officer becomes a viable option for firms when strong environmental forces due to information technology require fundamental change of the firm, but the change required is associated with high risk to the existing operations and information technology infrastructure of the firm. This study clarifies the concept of digital transformation and identifies both contingency and institutional factors that influence a firm to introduce a chief digital officer. This study also highlights key differences between the roles and responsibilities of the chief digital officer and chief information officer, and makes recommendations on the empirical findings. , M.Com. (Information Technology Management)
- Full Text:
The role of information technology governance frameworks on cloud computing risks
- Authors: Msimanga, Tandeka Dunyisiwe
- Date: 2020
- Subjects: Information technology - Management , Risk management , Cloud computing - Security measures
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/474863 , uj:42817
- Description: Abstract: The study evaluated cloud computing risks against IT governance frameworks. The research has become relevant because of the increasing reliance on cloud computing as a mechanism of data storage. Cloud computing is an IT service that is offered to clients on a contract basis by a third party that owns the infrastructure. Thus, organisations must consider the risks and mitigating controls to address these risks. Cloud computing risks, such as security risk, privacy risk, data integrity risk, availability and network capacity, data segregation and multitenancy risk, access controls, governance and data location risk are very common to organisations. Consequently, organisations must fully understand the impact of these risks and the mitigating controls provided by IT governance frameworks. An empirical study and a literature review were conducted to address the research problem and objective. An analysis was conducted on cloud computing risks in the context of IT Governance frameworks. The study found that IT Governance Frameworks play a vital role in mitigating cloud computing risks and organisations can place reliance on them when adopting the cloud. , M.Com. (Computer Auditing)
- Full Text:
- Authors: Msimanga, Tandeka Dunyisiwe
- Date: 2020
- Subjects: Information technology - Management , Risk management , Cloud computing - Security measures
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/474863 , uj:42817
- Description: Abstract: The study evaluated cloud computing risks against IT governance frameworks. The research has become relevant because of the increasing reliance on cloud computing as a mechanism of data storage. Cloud computing is an IT service that is offered to clients on a contract basis by a third party that owns the infrastructure. Thus, organisations must consider the risks and mitigating controls to address these risks. Cloud computing risks, such as security risk, privacy risk, data integrity risk, availability and network capacity, data segregation and multitenancy risk, access controls, governance and data location risk are very common to organisations. Consequently, organisations must fully understand the impact of these risks and the mitigating controls provided by IT governance frameworks. An empirical study and a literature review were conducted to address the research problem and objective. An analysis was conducted on cloud computing risks in the context of IT Governance frameworks. The study found that IT Governance Frameworks play a vital role in mitigating cloud computing risks and organisations can place reliance on them when adopting the cloud. , M.Com. (Computer Auditing)
- Full Text:
Translating IT project lessons learnt into organisational learning
- Authors: Mothapo, Korong
- Date: 2020
- Subjects: Information technology - Management , Organizational learning , Knowledge management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/474872 , uj:42816
- Description: Abstract: Project learning is about converting available raw data into understandable information. It contributes towards streamlining the ideas, problems, projects and deployment driving towards productivity. The purpose of this study was to determine why information technology (IT) project lessons are not integrated into organisational learning. The study explored themes of (i) understanding the different project management roles, responsibilities and experience of project managers in the organisation, (ii) determining the understanding of the concept of organisational learning and (iii) determining how project lessons are shared within the organisation... , M.Com. (Information Technology Management)
- Full Text:
- Authors: Mothapo, Korong
- Date: 2020
- Subjects: Information technology - Management , Organizational learning , Knowledge management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/474872 , uj:42816
- Description: Abstract: Project learning is about converting available raw data into understandable information. It contributes towards streamlining the ideas, problems, projects and deployment driving towards productivity. The purpose of this study was to determine why information technology (IT) project lessons are not integrated into organisational learning. The study explored themes of (i) understanding the different project management roles, responsibilities and experience of project managers in the organisation, (ii) determining the understanding of the concept of organisational learning and (iii) determining how project lessons are shared within the organisation... , M.Com. (Information Technology Management)
- Full Text:
Exigencies of Computer System failure situations : influence on Information Security behaviour
- Authors: Van den Bergh, Maureen
- Date: 2019
- Subjects: Information technology - Management , Computer system failures , Computer security
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/422312 , uj:36033
- Description: Abstract: In the technology-people-management chain, people are predominantly identified as the weakest link in properly securing information systems. Previous information security studies pursued an understanding of information security behaviour by investigating internal and external factors influencing such behaviour. With some information security studies placing great significance on the role of the situation, an external factor, when investigating human behaviour. Psychological Situationism research emphasises that behaviour is shaped mainly by the exigencies of a particular situation. An examination of information security literature indicated that the exigencies of computer system failure situations had not been explored as an external factor in influencing information security behaviour. Computer system failure situations are perceived by employees as crises that interrupt or prevent them from performing their everyday tasks. Irrespective of the technological failure, employees still need to get the job done. Because the situation and its exigencies are influential in determining and shaping behaviour, it has the potential to negatively influence employee information security behaviour. Insecure employee behaviour could cause negative outcomes for organisations, such as financial loss and damage to reputation. .. , Ph.D. (Applied Information Systems)
- Full Text:
- Authors: Van den Bergh, Maureen
- Date: 2019
- Subjects: Information technology - Management , Computer system failures , Computer security
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/422312 , uj:36033
- Description: Abstract: In the technology-people-management chain, people are predominantly identified as the weakest link in properly securing information systems. Previous information security studies pursued an understanding of information security behaviour by investigating internal and external factors influencing such behaviour. With some information security studies placing great significance on the role of the situation, an external factor, when investigating human behaviour. Psychological Situationism research emphasises that behaviour is shaped mainly by the exigencies of a particular situation. An examination of information security literature indicated that the exigencies of computer system failure situations had not been explored as an external factor in influencing information security behaviour. Computer system failure situations are perceived by employees as crises that interrupt or prevent them from performing their everyday tasks. Irrespective of the technological failure, employees still need to get the job done. Because the situation and its exigencies are influential in determining and shaping behaviour, it has the potential to negatively influence employee information security behaviour. Insecure employee behaviour could cause negative outcomes for organisations, such as financial loss and damage to reputation. .. , Ph.D. (Applied Information Systems)
- Full Text:
Managing information technology service delivery : a conceptual frame work
- Authors: Sliep, Rachel Marie
- Date: 2019
- Subjects: Information technology - Management , Management information systems , Information technology , Strategic planning
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/422288 , uj:36030
- Description: Abstract: Managing information technology (IT) in higher education institutions (HEIs) is not merely difficult but has almost become impossible. Information technology (IT) leaders in HEIs face a challenge to integrate and provide for the continuous accelerating transformation of technology and the way it is applied in HEIs to improve the quality of IT service delivery to satisfy their stakeholders’ expectations. IT leaders need to embrace change with the understanding that IT will need more than a secure set of knowledge and skills in today’s technology demands required from the unique composition of stakeholders. To position HEIs in their current marketplace and ensure competitive advantage, just implementing new technologies and innovations is not nearly enough. It is a requirement from institutional leaders to recognise IT as a key business enabler and to ensure that IT is positioned within the organisation as an investment rather than a cost. Key requirements for IT leadership are to recognise, agree and integrate various frameworks to ensure stability and agility when addressing the continuous challenges of HEIs and providing them with a dynamic application landscape and borderless end-user experience. IT departments within HEIs should dynamically change their philosophy, standards and way of thinking to meet the rapidly changing, everyday organisational demands. .. , Ph.D. (Information Technology Management)
- Full Text:
- Authors: Sliep, Rachel Marie
- Date: 2019
- Subjects: Information technology - Management , Management information systems , Information technology , Strategic planning
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/422288 , uj:36030
- Description: Abstract: Managing information technology (IT) in higher education institutions (HEIs) is not merely difficult but has almost become impossible. Information technology (IT) leaders in HEIs face a challenge to integrate and provide for the continuous accelerating transformation of technology and the way it is applied in HEIs to improve the quality of IT service delivery to satisfy their stakeholders’ expectations. IT leaders need to embrace change with the understanding that IT will need more than a secure set of knowledge and skills in today’s technology demands required from the unique composition of stakeholders. To position HEIs in their current marketplace and ensure competitive advantage, just implementing new technologies and innovations is not nearly enough. It is a requirement from institutional leaders to recognise IT as a key business enabler and to ensure that IT is positioned within the organisation as an investment rather than a cost. Key requirements for IT leadership are to recognise, agree and integrate various frameworks to ensure stability and agility when addressing the continuous challenges of HEIs and providing them with a dynamic application landscape and borderless end-user experience. IT departments within HEIs should dynamically change their philosophy, standards and way of thinking to meet the rapidly changing, everyday organisational demands. .. , Ph.D. (Information Technology Management)
- Full Text:
Online reputation management at a HEI : social media managers’ views
- Radikariki, Nthabiseng Michelle
- Authors: Radikariki, Nthabiseng Michelle
- Date: 2019
- Subjects: Social media - Management , Information technology - Management , Social media in education
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/421306 , uj:35906
- Description: M.A. (Strategic Communication) , Abstract: The role of social media managers in Higher Education Institutions (HEI) managing online reputation management has become a multifaceted and challenging profession in today’s contemporary world; this is due to technological advancements, virtual communities where information is easily created, accessible and shared openly and freely among these communities thus affecting an organisation’s reputation. The purpose of this study was to investigate the perceptions of the University of Johannesburg’s (UJ’s) social media managers in faculties regarding their role in managing the online reputation of a HEI. The study further intended to explore if social media managers have clearly defined roles that are guided by the UJ social media policy and appropriate training to assist in executing their roles effectively and strategically when a crisis occurs. The literature discusses three key concepts namely online reputation management, social media and strategic communication. The population of this study was specialist staff members at the University of Johannesburg (UJ), appointed with the task of managing the social media of the university and/or faculties. This research made use of a census to investigate their perceptions regarding their role as social media managers. The census consisted of two staff members from the College of Business and Economics, seven marketing executives from UJ Faculties (who manage social media platforms such as Facebook and Twitter) and the UJ social media manager. Data was collected by means of an interview schedule using semi-structured open-ended questions during face-to-face interviews. The semi-structured open-ended questions included the use of probes to elicit detailed information. All interviews were recorded and transcribed for thematic analysis by identifying common themes and differences. The research findings showed that although social media managers in faculties and departments are aware of their roles and responsibilities, a crises plan needed to be made available to all social media managers in faculties and departments of a HEI, should a crisis occur. The researcher recommends that social training should be compulsory to all faculty and department social media managers and that the social media policy needs to be simplified and shortened.
- Full Text:
- Authors: Radikariki, Nthabiseng Michelle
- Date: 2019
- Subjects: Social media - Management , Information technology - Management , Social media in education
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/421306 , uj:35906
- Description: M.A. (Strategic Communication) , Abstract: The role of social media managers in Higher Education Institutions (HEI) managing online reputation management has become a multifaceted and challenging profession in today’s contemporary world; this is due to technological advancements, virtual communities where information is easily created, accessible and shared openly and freely among these communities thus affecting an organisation’s reputation. The purpose of this study was to investigate the perceptions of the University of Johannesburg’s (UJ’s) social media managers in faculties regarding their role in managing the online reputation of a HEI. The study further intended to explore if social media managers have clearly defined roles that are guided by the UJ social media policy and appropriate training to assist in executing their roles effectively and strategically when a crisis occurs. The literature discusses three key concepts namely online reputation management, social media and strategic communication. The population of this study was specialist staff members at the University of Johannesburg (UJ), appointed with the task of managing the social media of the university and/or faculties. This research made use of a census to investigate their perceptions regarding their role as social media managers. The census consisted of two staff members from the College of Business and Economics, seven marketing executives from UJ Faculties (who manage social media platforms such as Facebook and Twitter) and the UJ social media manager. Data was collected by means of an interview schedule using semi-structured open-ended questions during face-to-face interviews. The semi-structured open-ended questions included the use of probes to elicit detailed information. All interviews were recorded and transcribed for thematic analysis by identifying common themes and differences. The research findings showed that although social media managers in faculties and departments are aware of their roles and responsibilities, a crises plan needed to be made available to all social media managers in faculties and departments of a HEI, should a crisis occur. The researcher recommends that social training should be compulsory to all faculty and department social media managers and that the social media policy needs to be simplified and shortened.
- Full Text:
Systematic innovation : a comprehensive model for business and management with treatment on a South African case
- Authors: Krüger, Louis L.S.J.
- Date: 2019
- Subjects: Industrial management , Information technology - Management , Business enterprises , Continuous improvement process
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/413098 , uj:34789
- Description: Abstract: This thesis addresses innovation of business and management with the purpose of advancing innovation in South Africa. A Design Science Research methodology is utilised to evaluate the current knowledge base of business and management innovation and construct a high level model for Management Innovation that pertains to all management areas of business including technology and innovation management. This thesis evaluates Learn-by-Experimentation (Trial and Error), Van Gundy’s Structured Creative Processes and Mann’s model constructed in practice. The Learn-by-Experimentation is a methodology only suited for physical innovation. The Structured Creative Processes are found to be of a generic nature which is not suitable for Innovation of Business and Management. Mann’s model is a projection of TRIZ onto business and management that addresses a subset of the business areas. The literature study in this thesis showed the identification of innovation opportunities was explicitly addressed by Van Gundy and implicitly treated by Mann. The “General Internet Access” for South Africans, as envisioned in the National Development Plan to stimulate economic growth, has been analysed for systematic innovation potential and did not render the desired outcome. The NDP will require further development to enable systematic innovation. In the course of this research a spiral innovation model for systematic business and management is developed through intensive literature analysis to cover the identified gaps. The model consists of the following steps: 1. Identification 2. Analysis and Definition 3. Select Approach 4. Create Potential Solutions 5. Verify and Validate Solutions 6. Implement the best Verified and Validated Solution with the idea to converge towards an Ideal Final Result. The results of this study is a contribution to the knowledge base of business and management innovation. , D.Ing. (Engineering Management)
- Full Text:
- Authors: Krüger, Louis L.S.J.
- Date: 2019
- Subjects: Industrial management , Information technology - Management , Business enterprises , Continuous improvement process
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/413098 , uj:34789
- Description: Abstract: This thesis addresses innovation of business and management with the purpose of advancing innovation in South Africa. A Design Science Research methodology is utilised to evaluate the current knowledge base of business and management innovation and construct a high level model for Management Innovation that pertains to all management areas of business including technology and innovation management. This thesis evaluates Learn-by-Experimentation (Trial and Error), Van Gundy’s Structured Creative Processes and Mann’s model constructed in practice. The Learn-by-Experimentation is a methodology only suited for physical innovation. The Structured Creative Processes are found to be of a generic nature which is not suitable for Innovation of Business and Management. Mann’s model is a projection of TRIZ onto business and management that addresses a subset of the business areas. The literature study in this thesis showed the identification of innovation opportunities was explicitly addressed by Van Gundy and implicitly treated by Mann. The “General Internet Access” for South Africans, as envisioned in the National Development Plan to stimulate economic growth, has been analysed for systematic innovation potential and did not render the desired outcome. The NDP will require further development to enable systematic innovation. In the course of this research a spiral innovation model for systematic business and management is developed through intensive literature analysis to cover the identified gaps. The model consists of the following steps: 1. Identification 2. Analysis and Definition 3. Select Approach 4. Create Potential Solutions 5. Verify and Validate Solutions 6. Implement the best Verified and Validated Solution with the idea to converge towards an Ideal Final Result. The results of this study is a contribution to the knowledge base of business and management innovation. , D.Ing. (Engineering Management)
- Full Text:
A conceptual information technology project management assurance framework
- Authors: Mkoba, Elizabeth Sylvester
- Date: 2018
- Subjects: Information technology - Management , Project management
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/282548 , uj:30441
- Description: Ph.D. , Abstract: Most organisations continue to align project activities with their business strategy to achieve strategic objectives and create business value. Most of these organisations have adopted information technology (IT) to increase performance and productivity, improve service delivery to customers and create competitive advantage in the market. Some of these initiatives are managed as IT projects. Despite this investment in IT, IT projects still fail at an alarming rate. These failed IT projects resulted in organisations wasting huge amounts of money and not realising a return on their IT investments. The purpose of this study was fourfold. Firstly, it explored the reasons why information technology (IT) projects are still failing. Secondly, it determined the factors influencing project success. Thirdly, it determined whether a positive relationship between project auditing and project success exists. Fourthly, it examined how project assurance can effectively mitigate IT project failure. These focus areas were addressed by developing a conceptual information technology project management assurance framework to successfully deliver IT projects in organisations. The research methodology employed a mixed-methods design which combined both qualitative and quantitative research methods. First, the qualitative research method was used to validate the conceptual framework through focus group discussion which was composed of IT project managers from South Africa. The results of qualitative data analysis were used to build an instrument to collect data in the follow-up quantitative research. The quantitative research method used survey questionnaires to validate the conceptual framework amongst IT project managers from Africa. The data were analysed using Atlas.ti 7.0 and SPSS 24.0. Factor analysis was conducted to determine possible correlations between the variables and factors as well as to determine how the conceptual information technology project management assurance framework fits the data. Structural Equation Modelling (SEM) was used to construct the conceptual framework. The key findings of this research are that project assurance can effectively mitigate IT project failure and the following factors influence IT project success: project auditing, top management involvement, project management methodology adherence, secure project deliverables, support and maintenance, and benefits realisation. The research also reveals that there is a strong correlation between the identified factors that influence IT project success. These factors were important in the development of a conceptual information technology project management assurance framework...
- Full Text:
- Authors: Mkoba, Elizabeth Sylvester
- Date: 2018
- Subjects: Information technology - Management , Project management
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/282548 , uj:30441
- Description: Ph.D. , Abstract: Most organisations continue to align project activities with their business strategy to achieve strategic objectives and create business value. Most of these organisations have adopted information technology (IT) to increase performance and productivity, improve service delivery to customers and create competitive advantage in the market. Some of these initiatives are managed as IT projects. Despite this investment in IT, IT projects still fail at an alarming rate. These failed IT projects resulted in organisations wasting huge amounts of money and not realising a return on their IT investments. The purpose of this study was fourfold. Firstly, it explored the reasons why information technology (IT) projects are still failing. Secondly, it determined the factors influencing project success. Thirdly, it determined whether a positive relationship between project auditing and project success exists. Fourthly, it examined how project assurance can effectively mitigate IT project failure. These focus areas were addressed by developing a conceptual information technology project management assurance framework to successfully deliver IT projects in organisations. The research methodology employed a mixed-methods design which combined both qualitative and quantitative research methods. First, the qualitative research method was used to validate the conceptual framework through focus group discussion which was composed of IT project managers from South Africa. The results of qualitative data analysis were used to build an instrument to collect data in the follow-up quantitative research. The quantitative research method used survey questionnaires to validate the conceptual framework amongst IT project managers from Africa. The data were analysed using Atlas.ti 7.0 and SPSS 24.0. Factor analysis was conducted to determine possible correlations between the variables and factors as well as to determine how the conceptual information technology project management assurance framework fits the data. Structural Equation Modelling (SEM) was used to construct the conceptual framework. The key findings of this research are that project assurance can effectively mitigate IT project failure and the following factors influence IT project success: project auditing, top management involvement, project management methodology adherence, secure project deliverables, support and maintenance, and benefits realisation. The research also reveals that there is a strong correlation between the identified factors that influence IT project success. These factors were important in the development of a conceptual information technology project management assurance framework...
- Full Text:
A framework to measure the value of Agile software projects
- Authors: Van Wyk, Louis
- Date: 2018
- Subjects: Information technology - Management , Agile software development
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/292419 , uj:31777
- Description: M.Com. (Information Technology Management) , Abstract: Software projects delivered following an Agile approach are deemed more successful than those following a traditional methodology such as Waterfall. This notion is supported by multiple studies, including the 2015 Chaos Report. The purpose of this study was to determine how the success of Agile software projects is measured, rather than to confirm the results of previous studies. This study focused on the Agile principles highlighted in the Agile Manifesto and investigated whether Agile practitioners consider these principles as success factors. It was important to determine what other success factors are currently used to ensure the successful delivery of Agile software projects. The Total Quality Framework (TQF) was adopted as a research design to maximise the quality of the data and to build the readers’ confidence in the research outcomes. An inductive approach was selected to establish an acceptance criterion or theory that can be verified through further studies. The objectives to achieve the research goal were very specific and required conversations with experienced participants with an in-depth knowledge of Agile software projects. The research method best suited to collect the rich data required was semi-structured interviews; therefore the approach followed in this study was a qualitative research approach. The TQF is based on four principles: credibility, analysability, transparency and usefulness. It was important for the researcher to adhere to these principles so that the results formulated could be generalised internally as well as externally. It is important that the results and outcome of the research be useful, i.e. the research outcome was to design a framework that Agile practitioners can use. The assumption and key finding is that all twelve Agile principles are deemed to be critical success factors in Agile software projects. Another finding is that eight of the twelve principles are also considered success measures. Traditional success measures are still considered success measures, but not deemed the only measure of success. Agile software projects consider multiple success measures, but are ultimately deemed a success when the business value has been realised. The primary success measures recognised for Agile software projects include strategic success, business success, product success and project success, measured at different stages after the product has been delivered. The product of this research is a framework consisting of 30 control objectives and 46 supporting practices that could be considered when implementing Agile software projects. The framework includes Agile-specific success factors that would improve the value delivered on Agile software projects. It further highlights the success measures that are relevant to all software projects. This framework, named COSAF, is the first version and it is the researcher’s vision that it will be implemented, adopted and improved to increase the success rate of software projects across the globe.
- Full Text:
- Authors: Van Wyk, Louis
- Date: 2018
- Subjects: Information technology - Management , Agile software development
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/292419 , uj:31777
- Description: M.Com. (Information Technology Management) , Abstract: Software projects delivered following an Agile approach are deemed more successful than those following a traditional methodology such as Waterfall. This notion is supported by multiple studies, including the 2015 Chaos Report. The purpose of this study was to determine how the success of Agile software projects is measured, rather than to confirm the results of previous studies. This study focused on the Agile principles highlighted in the Agile Manifesto and investigated whether Agile practitioners consider these principles as success factors. It was important to determine what other success factors are currently used to ensure the successful delivery of Agile software projects. The Total Quality Framework (TQF) was adopted as a research design to maximise the quality of the data and to build the readers’ confidence in the research outcomes. An inductive approach was selected to establish an acceptance criterion or theory that can be verified through further studies. The objectives to achieve the research goal were very specific and required conversations with experienced participants with an in-depth knowledge of Agile software projects. The research method best suited to collect the rich data required was semi-structured interviews; therefore the approach followed in this study was a qualitative research approach. The TQF is based on four principles: credibility, analysability, transparency and usefulness. It was important for the researcher to adhere to these principles so that the results formulated could be generalised internally as well as externally. It is important that the results and outcome of the research be useful, i.e. the research outcome was to design a framework that Agile practitioners can use. The assumption and key finding is that all twelve Agile principles are deemed to be critical success factors in Agile software projects. Another finding is that eight of the twelve principles are also considered success measures. Traditional success measures are still considered success measures, but not deemed the only measure of success. Agile software projects consider multiple success measures, but are ultimately deemed a success when the business value has been realised. The primary success measures recognised for Agile software projects include strategic success, business success, product success and project success, measured at different stages after the product has been delivered. The product of this research is a framework consisting of 30 control objectives and 46 supporting practices that could be considered when implementing Agile software projects. The framework includes Agile-specific success factors that would improve the value delivered on Agile software projects. It further highlights the success measures that are relevant to all software projects. This framework, named COSAF, is the first version and it is the researcher’s vision that it will be implemented, adopted and improved to increase the success rate of software projects across the globe.
- Full Text:
A qualitative study of leaders’ work identity in outsourced projects
- Authors: Lategan, Liesel
- Date: 2018
- Subjects: Information technology - Contracting out , Information technology - Management , Project management , Leadership
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/293611 , uj:31928
- Description: Abstract: Orientation The study explored the experiences of ten information technology (IT) project- and programme managers who led outsource projects. It explains the complex nature of outsourcing and requirements in leading inter-organisational teams. Implementation of these outsource projects is often concluded with varying degrees of success, and poor results lead to loss of income, reputation, and intellectual property, which impact people’s work identity. The study focused on the roles these leaders have to fulfil, what motivates them, and personal attributes required to deliver successful outcomes. Finally, the strategies and competencies the project- and programme managers developed to form and maintain their work identity are also discussed. Research purpose The purpose of the study was to explore the work identity of leaders working in complex inter-organisational structures through outsource arrangements. Motivation for the study The study was motivated by my own experiences as an IT project- and programme manager leading outsource teams. More specifically, I wanted to explore my observation of leaders having various levels of success in delivering projects. In addition, I was curious about how they managed themselves and what motivated them. Lastly, I wanted to know how they managed team viability within a complex inter-organisational team, creating an environment where team members wanted to work together on future projects. Research design A qualitative grounded theory research design was employed. Convenience- and snowball sampling were used in selecting ten research participants. Data was collected, first, by conducting interviews asking open-ended questions, followed by semi-structured interviews to clarify the participants’ everyday experiences. Finally, the interviews were transcribed and, with the aid of computerised qualitative data analysis software (ATLAS.ti), thematic data analysis was undertaken. Research findings The findings identified seven themes related to leaders building and maintaining their work identities. This informed a conceptual model of leaders’ work identity within an... , M.Phil. (Personal and Professional Leadership)
- Full Text:
- Authors: Lategan, Liesel
- Date: 2018
- Subjects: Information technology - Contracting out , Information technology - Management , Project management , Leadership
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/293611 , uj:31928
- Description: Abstract: Orientation The study explored the experiences of ten information technology (IT) project- and programme managers who led outsource projects. It explains the complex nature of outsourcing and requirements in leading inter-organisational teams. Implementation of these outsource projects is often concluded with varying degrees of success, and poor results lead to loss of income, reputation, and intellectual property, which impact people’s work identity. The study focused on the roles these leaders have to fulfil, what motivates them, and personal attributes required to deliver successful outcomes. Finally, the strategies and competencies the project- and programme managers developed to form and maintain their work identity are also discussed. Research purpose The purpose of the study was to explore the work identity of leaders working in complex inter-organisational structures through outsource arrangements. Motivation for the study The study was motivated by my own experiences as an IT project- and programme manager leading outsource teams. More specifically, I wanted to explore my observation of leaders having various levels of success in delivering projects. In addition, I was curious about how they managed themselves and what motivated them. Lastly, I wanted to know how they managed team viability within a complex inter-organisational team, creating an environment where team members wanted to work together on future projects. Research design A qualitative grounded theory research design was employed. Convenience- and snowball sampling were used in selecting ten research participants. Data was collected, first, by conducting interviews asking open-ended questions, followed by semi-structured interviews to clarify the participants’ everyday experiences. Finally, the interviews were transcribed and, with the aid of computerised qualitative data analysis software (ATLAS.ti), thematic data analysis was undertaken. Research findings The findings identified seven themes related to leaders building and maintaining their work identities. This informed a conceptual model of leaders’ work identity within an... , M.Phil. (Personal and Professional Leadership)
- Full Text:
Determinants of the penetration of Software as a Service (SAAS) for improving customer service
- Authors: Motloung, Terence
- Date: 2018
- Subjects: Enterprise resource planning , Management information systems , Information technology - Management , Information technology - Customer services , Performance technology
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/292281 , uj:31760
- Description: M.Com. (Information and Knowledge Management) , Abstract: Due to immense competitive pressure which arises in the automotive industry, decision makers at Cummins Inc. are confronted by difficulties to implement effective and timely business decisions which are data-driven. The business has therefore decided to deploy new Enterprise Resource Planning (ERP) and Information Technology Applications (ITA) such as Distribution Management Systems and Guidance Application to enhance information flows and enable decision makers within the business to execute strategies that are data-driven. As a result, the business experiences some difficulties when it comes to aligning the business unit’s strategies with the corporate strategy and the cause of this is the disinvestment in the management of information systems within the branches. Therefore, the results of this challenge will normally affect the organisation negatively and this can be demonstrated when one is analysing the Key Performance Indicators (KPIs).The research method selected for this study is a mixed method. It has allowed the researcher to collect two dataset points, the quantative and qualitative information. The data was collected through surveys, interviews with participants to fully grasp their views. The analysis was done by interpreting the responses from partcipants by using analytical tools such as Minitab and smart survey analytical tool. Furthermore, integration of the enterprise resource plan, Software as a service and management information systems can enable users within the business to collect, process, store and extract data to support the managerial role of utilising information technology to enhance business and profits. According to anecdotal evidence, there are challenges which limit the implementation of SaaS at CAME (Cummins Africa Middle East) and in this case, it is recommended that the organisation evaluates its requirements before it can proceed with new technologies. It further states that new ERP-systems and applications to be deployed in the organisation, should be able to deal with more holistic business information and allow system integration to take place. Therefore, failure to invest into an ERP which can perform these functions would then lead the business into an environment where people take decisions based on feelings and not on data. In the long run this will not contribute to the organisation improving customer service.
- Full Text:
- Authors: Motloung, Terence
- Date: 2018
- Subjects: Enterprise resource planning , Management information systems , Information technology - Management , Information technology - Customer services , Performance technology
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/292281 , uj:31760
- Description: M.Com. (Information and Knowledge Management) , Abstract: Due to immense competitive pressure which arises in the automotive industry, decision makers at Cummins Inc. are confronted by difficulties to implement effective and timely business decisions which are data-driven. The business has therefore decided to deploy new Enterprise Resource Planning (ERP) and Information Technology Applications (ITA) such as Distribution Management Systems and Guidance Application to enhance information flows and enable decision makers within the business to execute strategies that are data-driven. As a result, the business experiences some difficulties when it comes to aligning the business unit’s strategies with the corporate strategy and the cause of this is the disinvestment in the management of information systems within the branches. Therefore, the results of this challenge will normally affect the organisation negatively and this can be demonstrated when one is analysing the Key Performance Indicators (KPIs).The research method selected for this study is a mixed method. It has allowed the researcher to collect two dataset points, the quantative and qualitative information. The data was collected through surveys, interviews with participants to fully grasp their views. The analysis was done by interpreting the responses from partcipants by using analytical tools such as Minitab and smart survey analytical tool. Furthermore, integration of the enterprise resource plan, Software as a service and management information systems can enable users within the business to collect, process, store and extract data to support the managerial role of utilising information technology to enhance business and profits. According to anecdotal evidence, there are challenges which limit the implementation of SaaS at CAME (Cummins Africa Middle East) and in this case, it is recommended that the organisation evaluates its requirements before it can proceed with new technologies. It further states that new ERP-systems and applications to be deployed in the organisation, should be able to deal with more holistic business information and allow system integration to take place. Therefore, failure to invest into an ERP which can perform these functions would then lead the business into an environment where people take decisions based on feelings and not on data. In the long run this will not contribute to the organisation improving customer service.
- Full Text:
The adoption of IT governance for outsourcing and virtual team management in IT projects
- Authors: Kachi, Sylvester
- Date: 2018
- Subjects: Information technology - Management , Contracting out , Virtual work teams - Management , Information technology projects
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/403173 , uj:33771
- Description: Abstract : IT governance is an important factor in the success of Information Technology systems and implementation. The adoption of IT governance and its effectiveness is not clear or documented. The purpose of this study is to understand the adoption and effectiveness of IT governance in South African organisations as they conduct Information Technology projects both internally and externally. This study is explorative in nature as it seeks to understand the effectiveness of IT governance using the questionnaire as an instrument for collecting data. The research methodology of this study is quantitative. The target sample is IT (Information Technology) employees that work in various South African organisations both private and public. The sample size is 164 employees. The findings of this study show that South African organisations make extensive use of IT governance. There is data indicating that IT governance is applied locally on their dayto- day IT projects. The study found that there is management support and deliberate effort to monitor and measure the effectiveness of IT governance. The study further shows that there is strong adoption of IT governance in external IT projects such as outsourced IT projects. Finally, it shows a strong use of virtual teams in IT projects in South African organisations, and also a relatively high application of IT governance principles in virtual teamwork. , M.Com. (Information Technology Management)
- Full Text:
- Authors: Kachi, Sylvester
- Date: 2018
- Subjects: Information technology - Management , Contracting out , Virtual work teams - Management , Information technology projects
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/403173 , uj:33771
- Description: Abstract : IT governance is an important factor in the success of Information Technology systems and implementation. The adoption of IT governance and its effectiveness is not clear or documented. The purpose of this study is to understand the adoption and effectiveness of IT governance in South African organisations as they conduct Information Technology projects both internally and externally. This study is explorative in nature as it seeks to understand the effectiveness of IT governance using the questionnaire as an instrument for collecting data. The research methodology of this study is quantitative. The target sample is IT (Information Technology) employees that work in various South African organisations both private and public. The sample size is 164 employees. The findings of this study show that South African organisations make extensive use of IT governance. There is data indicating that IT governance is applied locally on their dayto- day IT projects. The study found that there is management support and deliberate effort to monitor and measure the effectiveness of IT governance. The study further shows that there is strong adoption of IT governance in external IT projects such as outsourced IT projects. Finally, it shows a strong use of virtual teams in IT projects in South African organisations, and also a relatively high application of IT governance principles in virtual teamwork. , M.Com. (Information Technology Management)
- Full Text:
The impact of blockchain technology on information technology governance
- Authors: Katende, Melina
- Date: 2018
- Subjects: Information technology - Management , Blockchains (Databases)
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/403172 , uj:33772
- Description: Abstract : This dissertation forms a hypothesis that Blockchain technology is giving rise to a new form of enterprise IT governance. Blockchain is a computational design that first emerged as the technology underpinning the popular cryptocurrency Bitcoin. Despite its use in cryptocurrency, it has an array of different use cases that may significantly impact the global economy. Some areas that Blockchain will affect were never truly re-engineered by the internet era, namely Economics and Governance. This dissertation is a qualitative exploration and analysis of blockchain’s impact on Information Technology Governance. The research unpacks these implications by comparing governance in hierarchical organisations and decentralised autonomous organisations. The primary data is attained through a questionnaire and the secondary data from a case study. The research contains two literature reviews on Blockchain and IT governance. The primary finding of this research reveals that although conventional IT Governance will still be used in the future, fifty percent of the sentiments shared by subject matter experts indicate that unconventional governance will take precedence with decentralised autonomous organisations. This implies that changes in traditional governance frameworks may be required in the future. , M.Com. (Information Technology Management)
- Full Text:
- Authors: Katende, Melina
- Date: 2018
- Subjects: Information technology - Management , Blockchains (Databases)
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/403172 , uj:33772
- Description: Abstract : This dissertation forms a hypothesis that Blockchain technology is giving rise to a new form of enterprise IT governance. Blockchain is a computational design that first emerged as the technology underpinning the popular cryptocurrency Bitcoin. Despite its use in cryptocurrency, it has an array of different use cases that may significantly impact the global economy. Some areas that Blockchain will affect were never truly re-engineered by the internet era, namely Economics and Governance. This dissertation is a qualitative exploration and analysis of blockchain’s impact on Information Technology Governance. The research unpacks these implications by comparing governance in hierarchical organisations and decentralised autonomous organisations. The primary data is attained through a questionnaire and the secondary data from a case study. The research contains two literature reviews on Blockchain and IT governance. The primary finding of this research reveals that although conventional IT Governance will still be used in the future, fifty percent of the sentiments shared by subject matter experts indicate that unconventional governance will take precedence with decentralised autonomous organisations. This implies that changes in traditional governance frameworks may be required in the future. , M.Com. (Information Technology Management)
- Full Text:
The impact of IT risk on external audit reports
- Authors: Dempsey, Karlien
- Date: 2018
- Subjects: Auditing - Data processing , Information technology - Management , Information technology - Risk management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/292142 , uj:31743
- Description: Abstract: IT is an integral part of all organisations and consequently, all organisations should be considered as IT-affected entities. IT risk is therefore an entity risk which should be managed and mitigated through effective IT governance processes and the selection or design and implementation of IT governance frameworks. These frameworks should be designed and implemented at managerial level, however, the board and / or the audit committee should take overall responsibility for IT governance. The auditor uses the audit report as the primary tool to communicate their opinion to the users of the financial statements. The new audit report format, which superseded the previous format in 2016, should address the audit expectation gap as well as the shortcomings of the previous format, namely, limited communication and standardised language. The most significant change in this new format is the disclosure of items that are deemed of most significance in the audit, namely, Key Audit Matters. Through a content analysis of the JSE top 40 listed entities, it was found that those charged with governance in 39 of these entities regard IT as a significant risk and disclosed detail on IT governance or IT committees. However, although a total of 130 Key Audit Matters were raised by the entire study, none related to IT. This suggests a disconnect between the literature and the view of those charged with IT governance on the one hand, and the disclosure made by the auditor on the other. , M.Com. (Computer Auditing)
- Full Text:
- Authors: Dempsey, Karlien
- Date: 2018
- Subjects: Auditing - Data processing , Information technology - Management , Information technology - Risk management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/292142 , uj:31743
- Description: Abstract: IT is an integral part of all organisations and consequently, all organisations should be considered as IT-affected entities. IT risk is therefore an entity risk which should be managed and mitigated through effective IT governance processes and the selection or design and implementation of IT governance frameworks. These frameworks should be designed and implemented at managerial level, however, the board and / or the audit committee should take overall responsibility for IT governance. The auditor uses the audit report as the primary tool to communicate their opinion to the users of the financial statements. The new audit report format, which superseded the previous format in 2016, should address the audit expectation gap as well as the shortcomings of the previous format, namely, limited communication and standardised language. The most significant change in this new format is the disclosure of items that are deemed of most significance in the audit, namely, Key Audit Matters. Through a content analysis of the JSE top 40 listed entities, it was found that those charged with governance in 39 of these entities regard IT as a significant risk and disclosed detail on IT governance or IT committees. However, although a total of 130 Key Audit Matters were raised by the entire study, none related to IT. This suggests a disconnect between the literature and the view of those charged with IT governance on the one hand, and the disclosure made by the auditor on the other. , M.Com. (Computer Auditing)
- Full Text:
The relationship between information and communication technology project governance and project success
- Authors: Oguntade, Oluyemi
- Date: 2018
- Subjects: Information technology - Management , Project management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/283271 , uj:30544
- Description: M.Com. (Information Technology Management) , Abstract: Information and communication technology (ICT) is used by organisations as a strategic enabler, and to drive operational efficiency. Previous research reveals that, despite the increased organisational adoption and knowledge of standard practices (both project and enterprise ICT governance), intended to elicit quality in governance and management of ICT investments, ICT project outcomes continue to deliver below stakeholder value expectations. Justifying ICT investment in this era of tight resources and conflicting priorities will therefore continue to be a laborious task unless this is addressed. This research focuses on determining the criteria stakeholders use to assess value delivered by ICT investments through project work, and explores the relationships between standard practices of project and ICT governance in order to improve stakeholder value expectations for ICT project outcomes. Literature on the evolution of ICT project stakeholder value assessment paradigms was explored, and various ICT governance and project standard practices compared and benchmarked. The research instrument was designed by factoring in common scholarly views to gather data from a group of professionals in the field of ICT project and enterprise governance. Data analysis established that there are great opportunity and synergy in ensuring that both project and ICT governance standards are entrenched in organisations. Adoption of one without the other will not deliver the desired result, as the two standard practices are complementary. The results of this study also show that these standard practices have a direct influence on the criteria stakeholders use to assess the value of ICT project outcomes; hence, ICT project stakeholder value expectations can be addressed for improvement by adopting and entrenching these standard practices in organisations.
- Full Text:
- Authors: Oguntade, Oluyemi
- Date: 2018
- Subjects: Information technology - Management , Project management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/283271 , uj:30544
- Description: M.Com. (Information Technology Management) , Abstract: Information and communication technology (ICT) is used by organisations as a strategic enabler, and to drive operational efficiency. Previous research reveals that, despite the increased organisational adoption and knowledge of standard practices (both project and enterprise ICT governance), intended to elicit quality in governance and management of ICT investments, ICT project outcomes continue to deliver below stakeholder value expectations. Justifying ICT investment in this era of tight resources and conflicting priorities will therefore continue to be a laborious task unless this is addressed. This research focuses on determining the criteria stakeholders use to assess value delivered by ICT investments through project work, and explores the relationships between standard practices of project and ICT governance in order to improve stakeholder value expectations for ICT project outcomes. Literature on the evolution of ICT project stakeholder value assessment paradigms was explored, and various ICT governance and project standard practices compared and benchmarked. The research instrument was designed by factoring in common scholarly views to gather data from a group of professionals in the field of ICT project and enterprise governance. Data analysis established that there are great opportunity and synergy in ensuring that both project and ICT governance standards are entrenched in organisations. Adoption of one without the other will not deliver the desired result, as the two standard practices are complementary. The results of this study also show that these standard practices have a direct influence on the criteria stakeholders use to assess the value of ICT project outcomes; hence, ICT project stakeholder value expectations can be addressed for improvement by adopting and entrenching these standard practices in organisations.
- Full Text:
Adapting IT management for effective IT strategy leadership
- Langa, Mthandeni, Marnewick, Carl
- Authors: Langa, Mthandeni , Marnewick, Carl
- Date: 2017
- Subjects: Information technology - Management , Strategic planning
- Language: English
- Type: Conference proceedings
- Identifier: http://ujcontent.uj.ac.za8080/10210/373894 , http://hdl.handle.net/10210/231957 , uj:23644 , Citation: Langa, M. & Marnewick, C. 2017. Adapting IT management for effective IT strategy leadership. International Association for Management of Technology IAMOT 2017 Conference Proceedings.
- Description: Abstract: This article argues that the lack of consistent information technology (IT) and organisational strategies heightens the proclivity to cancel IT initiatives. Organisational strategy loosely conveys a compounded perspective pertaining to business and organisational strategies. The combination of these strategies logically hinge on efficient enterprise IT integration concepts contextualising conceptual links between their respective architectures to best suit prevailing business and socioeconomic needs. However, an effective socioeconomy demands contextual strategic management of IT, aligned with geopolitical and other factors affecting the nature of IT, to optimise the applied context of principles of governance and management. Strategic management of IT is alleviated by the concept of levels of abstraction inherent in the principle of separation of concerns. Hence the strategic use of the concept in ‘opinion’ formulation within the paradigm of a sociotechnical system design, development and management. Accordingly, optimal business performance demands that business and IT leadership and management develop mechanisms to establish symbiosis between governance and management principles, glued together by an adaptive enterprise‐wide standard architecture. There is therefore a contended need to integrate IT, processes and strategies. This demands that business and IT professionals possess an interdisciplinary and a multidisciplinary set of competencies. The perceived set of competencies supposedly help professionals to effectively navigate the interdisciplinary and multidisciplinary nature of information technology management (ITM). Thus the ensuing sociotechnical system constructs represent the challenge imposed by the journey to purposefully adapt ITM for effective IT strategy leadership for a competitive economic system. The research used an advanced mixed research methodology embedding quantitative methods in a qualitative study...
- Full Text:
- Authors: Langa, Mthandeni , Marnewick, Carl
- Date: 2017
- Subjects: Information technology - Management , Strategic planning
- Language: English
- Type: Conference proceedings
- Identifier: http://ujcontent.uj.ac.za8080/10210/373894 , http://hdl.handle.net/10210/231957 , uj:23644 , Citation: Langa, M. & Marnewick, C. 2017. Adapting IT management for effective IT strategy leadership. International Association for Management of Technology IAMOT 2017 Conference Proceedings.
- Description: Abstract: This article argues that the lack of consistent information technology (IT) and organisational strategies heightens the proclivity to cancel IT initiatives. Organisational strategy loosely conveys a compounded perspective pertaining to business and organisational strategies. The combination of these strategies logically hinge on efficient enterprise IT integration concepts contextualising conceptual links between their respective architectures to best suit prevailing business and socioeconomic needs. However, an effective socioeconomy demands contextual strategic management of IT, aligned with geopolitical and other factors affecting the nature of IT, to optimise the applied context of principles of governance and management. Strategic management of IT is alleviated by the concept of levels of abstraction inherent in the principle of separation of concerns. Hence the strategic use of the concept in ‘opinion’ formulation within the paradigm of a sociotechnical system design, development and management. Accordingly, optimal business performance demands that business and IT leadership and management develop mechanisms to establish symbiosis between governance and management principles, glued together by an adaptive enterprise‐wide standard architecture. There is therefore a contended need to integrate IT, processes and strategies. This demands that business and IT professionals possess an interdisciplinary and a multidisciplinary set of competencies. The perceived set of competencies supposedly help professionals to effectively navigate the interdisciplinary and multidisciplinary nature of information technology management (ITM). Thus the ensuing sociotechnical system constructs represent the challenge imposed by the journey to purposefully adapt ITM for effective IT strategy leadership for a competitive economic system. The research used an advanced mixed research methodology embedding quantitative methods in a qualitative study...
- Full Text:
Improving the management of inappropriate utilisation of information technology by university students
- Authors: Ramoshaba, Sefoko
- Date: 2017
- Subjects: Information technology - Management , Information technology - Security measures , Information technology - Moral and ethical aspects , College students
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/262429 , uj:27702
- Description: D.Litt. et Phil. , Abstract: The information technology (IT) revolution has brought about many global changes, revolutionalising the world in the way people live, learn, work and interact with one another. It has improved the conditions of living in a dramatic manner, from office paper work to computerised office space and automated manufacturing plants. The IT revolution has also brought with it ethical challenges, where human beings are tempted into using IT to commit crime and unethical behaviour. This has led to the challenges of IT ethics, and how to manage the challenges. Ethical problems related to the inappropriate utilisation of IT have been transplanted from society to the university environment. Universities are experiencing the same and/or more drastic kinds of unethical behaviour. These behaviours have been committed through the inappropriate utilisation of IT by students. The increment is because of the ever-increasing sophistication of new IT devices. This research project sought answers for the better management of inappropriate utilisation of IT by students. The current literature was assessed in order to find out how students use IT to commit unethical behaviour, and the types of IT devices students utilise to do this. Students inter alia use wristwatches, cellphones, laptops, computers, cigarette lighters, ultra-violet lights, USBs, translation software, calculators, pagers, websites, printers, scanners, portable wireless devices, photoshop, electronic pens, video cameras, portable radios, faxes and emails. Students use these devices to commit the following unethical activities, among others: online plagiarism, computer fraud, cyberbullying, cyberstalking, e-cheating, hacking, cybervandalism, distributions of viruses, flaming, cyberharrassment, pornography, sexting, hiring people online to write up academic projects on their behalf, sharing of individual academic projects against the instruction of their lecturers, online fights, theft of IT devices, damage to IT networks, piracy, and copyright infringements...
- Full Text:
- Authors: Ramoshaba, Sefoko
- Date: 2017
- Subjects: Information technology - Management , Information technology - Security measures , Information technology - Moral and ethical aspects , College students
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/262429 , uj:27702
- Description: D.Litt. et Phil. , Abstract: The information technology (IT) revolution has brought about many global changes, revolutionalising the world in the way people live, learn, work and interact with one another. It has improved the conditions of living in a dramatic manner, from office paper work to computerised office space and automated manufacturing plants. The IT revolution has also brought with it ethical challenges, where human beings are tempted into using IT to commit crime and unethical behaviour. This has led to the challenges of IT ethics, and how to manage the challenges. Ethical problems related to the inappropriate utilisation of IT have been transplanted from society to the university environment. Universities are experiencing the same and/or more drastic kinds of unethical behaviour. These behaviours have been committed through the inappropriate utilisation of IT by students. The increment is because of the ever-increasing sophistication of new IT devices. This research project sought answers for the better management of inappropriate utilisation of IT by students. The current literature was assessed in order to find out how students use IT to commit unethical behaviour, and the types of IT devices students utilise to do this. Students inter alia use wristwatches, cellphones, laptops, computers, cigarette lighters, ultra-violet lights, USBs, translation software, calculators, pagers, websites, printers, scanners, portable wireless devices, photoshop, electronic pens, video cameras, portable radios, faxes and emails. Students use these devices to commit the following unethical activities, among others: online plagiarism, computer fraud, cyberbullying, cyberstalking, e-cheating, hacking, cybervandalism, distributions of viruses, flaming, cyberharrassment, pornography, sexting, hiring people online to write up academic projects on their behalf, sharing of individual academic projects against the instruction of their lecturers, online fights, theft of IT devices, damage to IT networks, piracy, and copyright infringements...
- Full Text:
Adapting information technology management for effective information technology strategy leadership
- Authors: Langa, Mthandeni
- Date: 2016
- Subjects: Information technology - Management , Strategic planning
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/237644 , uj:24352
- Description: M.Com. , Abstract: In this dissertation, it is argued that the lack of consistent information technology (IT) and organisational strategies heightens the proclivity to cancel IT initiatives in a given industry sector. Organisational strategy loosely conveys a compounded perspective pertaining to business and organisational strategies. In theory business, IT and organisational strategies are reasoned to hinge on efficient enterprise IT integration concepts that contextualise conceptual links between business, IT and organisational architectures to best address contextual business and socioeconomic needs. However, an effective socioeconomy demands contextual awareness of strategic management of IT, leadership and management, geopolitical and other factors affecting the evolutionary nature of the IT industry, enterprise architecture, enterprise risk optimisation and principles of governance and management. Business and IT leadership’s contextual awareness is necessitated by the concept of levels of abstraction inherent in the principles of separation of concerns. Hence the strategic use of the concept in ‘opinion’ formulation within the paradigm of a sociotechnical system design, development and management. Thus, optimal business performance demands that business and IT leadership and management develop mechanisms to establish symbiosis between governance and management principles, glued together by an adaptive enterprise-wide standard architecture. There is therefore a contended need to integrate IT, processes and strategies. This demands that business and IT professionals possess an interdisciplinary and a multidisciplinary set of competencies. The perceived set of competencies supposedly help professionals to effectively navigate the interdisciplinary and multidisciplinary nature of the concept of information technology management (ITM). Thus the resulting entangled sociotechnical system constituents, responsible for the overall perspective of the ITM concept, are constructs representing the challenge imposed by the journey to purposefully adapt ITM for effective IT strategy leadership for a globally competitive economic system. The research balances deontological and teleological philosophical theories, embracing an advanced mixed research methodology and embedding limited quantitative methods in a predominantly qualitative study. These theories underline systemic and deliberate practice aimed at optimising similarly credible research findings as well as provide a realistic perspective. Consequently, analysis employs a systematic approach based on four contextual themes, viz. administrative, investment management, management and technology practices and a closing perspective, in deliberate efforts to optimise triangulation. The outcome is an adaptive ITM process model facilitating discovery, construction, governance and management of a purposeful sociotechnical system in any given geopolitical context. Thus the adaptive ITM process model can benefit both academics and practitioners in their respective quests to contextualise philosophies and concretise processes sustaining purposeful sociotechnical system design, development and management. In principle, the research introduces a general theory of collaboration theoretically thriving on ITM as the art, philosophy and science of orchestrating strategic management principles to enliven the value of IT in pursuit of an optimum strategic intent in a continuum.
- Full Text:
- Authors: Langa, Mthandeni
- Date: 2016
- Subjects: Information technology - Management , Strategic planning
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/237644 , uj:24352
- Description: M.Com. , Abstract: In this dissertation, it is argued that the lack of consistent information technology (IT) and organisational strategies heightens the proclivity to cancel IT initiatives in a given industry sector. Organisational strategy loosely conveys a compounded perspective pertaining to business and organisational strategies. In theory business, IT and organisational strategies are reasoned to hinge on efficient enterprise IT integration concepts that contextualise conceptual links between business, IT and organisational architectures to best address contextual business and socioeconomic needs. However, an effective socioeconomy demands contextual awareness of strategic management of IT, leadership and management, geopolitical and other factors affecting the evolutionary nature of the IT industry, enterprise architecture, enterprise risk optimisation and principles of governance and management. Business and IT leadership’s contextual awareness is necessitated by the concept of levels of abstraction inherent in the principles of separation of concerns. Hence the strategic use of the concept in ‘opinion’ formulation within the paradigm of a sociotechnical system design, development and management. Thus, optimal business performance demands that business and IT leadership and management develop mechanisms to establish symbiosis between governance and management principles, glued together by an adaptive enterprise-wide standard architecture. There is therefore a contended need to integrate IT, processes and strategies. This demands that business and IT professionals possess an interdisciplinary and a multidisciplinary set of competencies. The perceived set of competencies supposedly help professionals to effectively navigate the interdisciplinary and multidisciplinary nature of the concept of information technology management (ITM). Thus the resulting entangled sociotechnical system constituents, responsible for the overall perspective of the ITM concept, are constructs representing the challenge imposed by the journey to purposefully adapt ITM for effective IT strategy leadership for a globally competitive economic system. The research balances deontological and teleological philosophical theories, embracing an advanced mixed research methodology and embedding limited quantitative methods in a predominantly qualitative study. These theories underline systemic and deliberate practice aimed at optimising similarly credible research findings as well as provide a realistic perspective. Consequently, analysis employs a systematic approach based on four contextual themes, viz. administrative, investment management, management and technology practices and a closing perspective, in deliberate efforts to optimise triangulation. The outcome is an adaptive ITM process model facilitating discovery, construction, governance and management of a purposeful sociotechnical system in any given geopolitical context. Thus the adaptive ITM process model can benefit both academics and practitioners in their respective quests to contextualise philosophies and concretise processes sustaining purposeful sociotechnical system design, development and management. In principle, the research introduces a general theory of collaboration theoretically thriving on ITM as the art, philosophy and science of orchestrating strategic management principles to enliven the value of IT in pursuit of an optimum strategic intent in a continuum.
- Full Text: