A conceptual framework for information technology project management auditing
- Authors: Muka, Jean-Paul Mbuyamba
- Date: 2012-11-06
- Subjects: Information technology management , Project management , Electronic data procesing - Auditing , Information audits
- Type: Thesis
- Identifier: uj:7356 , http://hdl.handle.net/10210/8112
- Description: M.Tech. , In this age of ever-increasing competition, organisations are facing unprecedented pressure to meet the combined obligations of showing returns to shareholders, and staying ahead of the competition. To meet these obligations, organisations have become increasingly dependent on technology, as an enabler. This dependency suggests that technology projects have become strategically more important than ever for organisations; yet the success of technology projects remains questionable. Furthermore, organisations do not have simple mechanisms to allow them to quickly and accurately trace the causes of IT project management failures. One of the causes of project management failures is the inability and/or unwillingness of project managers to adhere to project management best practices adopted by their organisations. This research proposes a simple and repeatable model to help organisations determine whether they are indeed following the project management best practices which they purport to follow. The research methods consisted firstly of a wide review of relevant literature on auditing, project management, and IT governance. Secondly, empirical data was collected and analysed. Thirdly, modelling was used to develop a conceptual model for auditing IT project management. The empirical study is based on a semi-structured interview, involving ten project managers in charge of IT projects. The findings from this research confirm that project managers do not adhere to project management best practices which they purport to follow. Consequently, this dissertation concludes that IT project managers must adhere to best practices adopted by their organisations, regardless of how impractical or inconvenient that may seem; the proposed model for auditing IT project management helps them achieve just that.
- Full Text:
- Authors: Muka, Jean-Paul Mbuyamba
- Date: 2012-11-06
- Subjects: Information technology management , Project management , Electronic data procesing - Auditing , Information audits
- Type: Thesis
- Identifier: uj:7356 , http://hdl.handle.net/10210/8112
- Description: M.Tech. , In this age of ever-increasing competition, organisations are facing unprecedented pressure to meet the combined obligations of showing returns to shareholders, and staying ahead of the competition. To meet these obligations, organisations have become increasingly dependent on technology, as an enabler. This dependency suggests that technology projects have become strategically more important than ever for organisations; yet the success of technology projects remains questionable. Furthermore, organisations do not have simple mechanisms to allow them to quickly and accurately trace the causes of IT project management failures. One of the causes of project management failures is the inability and/or unwillingness of project managers to adhere to project management best practices adopted by their organisations. This research proposes a simple and repeatable model to help organisations determine whether they are indeed following the project management best practices which they purport to follow. The research methods consisted firstly of a wide review of relevant literature on auditing, project management, and IT governance. Secondly, empirical data was collected and analysed. Thirdly, modelling was used to develop a conceptual model for auditing IT project management. The empirical study is based on a semi-structured interview, involving ten project managers in charge of IT projects. The findings from this research confirm that project managers do not adhere to project management best practices which they purport to follow. Consequently, this dissertation concludes that IT project managers must adhere to best practices adopted by their organisations, regardless of how impractical or inconvenient that may seem; the proposed model for auditing IT project management helps them achieve just that.
- Full Text:
Conceptualising the effectiveness of the black economic empowerment scorecard as a tool for addressing information technology governance challenges
- Authors: Mohapi, Mateka
- Date: 2012-06-07
- Subjects: Information technology management , Black Economic Empowerment (Program : South Africa) , BEE scorecards , Employee empowerment , Information technology governance , Information technology skills
- Type: Thesis
- Identifier: uj:8653 , http://hdl.handle.net/10210/5009
- Description: M.Tech. , There is currently a lot of research work being done to gain insight into the value proposition for IT governance frameworks and different other variables that have significant bearing on successful implementation of IT governance in South African organizations. There has however been no adequate research conducted on how Black Economic Empowerment (BEE) policy and more specifically the four significant elements of the BEE scorecard (ownership, preferential procurement, skills development and management and control) affect IT governance within South African Enterprises. The study explores BEE policy as a means of redressing past inequalities and then presents BEE challenges that influence IT governance implementation. A broad outline of the research and a conceptual framework that will assist in monitoring the effectiveness of these four elements of the BEE scorecard towards IT governance implementation are presented. The study aims at giving an improved understanding and insights about the strength of the relationship between these two variables (BEE scorecard and IT governance), both of which have a bearing on the success of businesses operating in South Africa as a third variable. Kaplan and Norton„s balanced scorecard is used to measure business success (organization performance). The adopted method of data gathering was quantitative research with extensive use of questionnaires that targeted IT professionals and practitioners closely affiliated with BEE initiatives. The findings show a weak association between BEE and successful IT governance implementation. The results also reveal IT governance maturity has advanced to well-managed level 4.The human capital and diversity in the IT workforce lag behind in progress as a result of inadequate adherence to BEE metrics. There was a strong relationship between organization performance and BEE metrics, and a very weak link between IT governance and organization performance. It is envisaged that the resulting framework arising out of this work will form a foundation for other scholars and practitioners in the IT governance field to expand on gained knowledge, espousing the creation of a compressive IT framework that does not only focus on management tools and frameworks for IT governance efficiency but embraces the social dimensions of IT governance that may inhibit or enable IT governance effectiveness.
- Full Text:
- Authors: Mohapi, Mateka
- Date: 2012-06-07
- Subjects: Information technology management , Black Economic Empowerment (Program : South Africa) , BEE scorecards , Employee empowerment , Information technology governance , Information technology skills
- Type: Thesis
- Identifier: uj:8653 , http://hdl.handle.net/10210/5009
- Description: M.Tech. , There is currently a lot of research work being done to gain insight into the value proposition for IT governance frameworks and different other variables that have significant bearing on successful implementation of IT governance in South African organizations. There has however been no adequate research conducted on how Black Economic Empowerment (BEE) policy and more specifically the four significant elements of the BEE scorecard (ownership, preferential procurement, skills development and management and control) affect IT governance within South African Enterprises. The study explores BEE policy as a means of redressing past inequalities and then presents BEE challenges that influence IT governance implementation. A broad outline of the research and a conceptual framework that will assist in monitoring the effectiveness of these four elements of the BEE scorecard towards IT governance implementation are presented. The study aims at giving an improved understanding and insights about the strength of the relationship between these two variables (BEE scorecard and IT governance), both of which have a bearing on the success of businesses operating in South Africa as a third variable. Kaplan and Norton„s balanced scorecard is used to measure business success (organization performance). The adopted method of data gathering was quantitative research with extensive use of questionnaires that targeted IT professionals and practitioners closely affiliated with BEE initiatives. The findings show a weak association between BEE and successful IT governance implementation. The results also reveal IT governance maturity has advanced to well-managed level 4.The human capital and diversity in the IT workforce lag behind in progress as a result of inadequate adherence to BEE metrics. There was a strong relationship between organization performance and BEE metrics, and a very weak link between IT governance and organization performance. It is envisaged that the resulting framework arising out of this work will form a foundation for other scholars and practitioners in the IT governance field to expand on gained knowledge, espousing the creation of a compressive IT framework that does not only focus on management tools and frameworks for IT governance efficiency but embraces the social dimensions of IT governance that may inhibit or enable IT governance effectiveness.
- Full Text:
Service oriented architecture governance tools within information security
- Authors: Mokgosi, Letlhogonolo
- Date: 2012-06-07
- Subjects: Service oriented architecture (Computer science) , Information security , Computer security , Information technology management , Management information systems , Computer networks - Security measures , Computer network architectures , Software architecture , Computer architecture
- Type: Thesis
- Identifier: uj:8655 , http://hdl.handle.net/10210/5010
- Description: M.Tech. , Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. Organisations adopt Service Oriented Architecture with the aim of automating and integrating business processes. However, it has information security vulnerabilities that should be considered. For example, applications exchange information across the Internet, where it can be tampered with. Information security is therefore one of the crucial qualities that need to be satisfied within information systems. This dissertation addresses the issue of information security within Service Oriented Architecture applications. Some organisations rely on Service Oriented Architecture governance tools when securing information in their Service Oriented Architecture environment. However, they may purchase them without investigating whether they include information security. The aim of this dissertation is to analyse whether these tools include information security. Each tool is benchmarked against the five information security services, defined by the ISO 7498/2 document and including identification and authentication, authorisation, confidentiality, integrity and non-repudiation. The dissertation concludes with a table summarising the results. This dissertation offers decision-makers information that can assist them in analysing whether Service Oriented Architecture governance tools includes information security. It also assists organisations to be aware of security vulnerabilities within Service Oriented Architecture applications, and the consequences that may arise if information security measures are ignored.
- Full Text:
- Authors: Mokgosi, Letlhogonolo
- Date: 2012-06-07
- Subjects: Service oriented architecture (Computer science) , Information security , Computer security , Information technology management , Management information systems , Computer networks - Security measures , Computer network architectures , Software architecture , Computer architecture
- Type: Thesis
- Identifier: uj:8655 , http://hdl.handle.net/10210/5010
- Description: M.Tech. , Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. Organisations adopt Service Oriented Architecture with the aim of automating and integrating business processes. However, it has information security vulnerabilities that should be considered. For example, applications exchange information across the Internet, where it can be tampered with. Information security is therefore one of the crucial qualities that need to be satisfied within information systems. This dissertation addresses the issue of information security within Service Oriented Architecture applications. Some organisations rely on Service Oriented Architecture governance tools when securing information in their Service Oriented Architecture environment. However, they may purchase them without investigating whether they include information security. The aim of this dissertation is to analyse whether these tools include information security. Each tool is benchmarked against the five information security services, defined by the ISO 7498/2 document and including identification and authentication, authorisation, confidentiality, integrity and non-repudiation. The dissertation concludes with a table summarising the results. This dissertation offers decision-makers information that can assist them in analysing whether Service Oriented Architecture governance tools includes information security. It also assists organisations to be aware of security vulnerabilities within Service Oriented Architecture applications, and the consequences that may arise if information security measures are ignored.
- Full Text:
A framework for the strategic deployment of business intelligence systems
- Authors: Waterson, Elton
- Date: 2012-06-05
- Subjects: Business intelligence management , Information technology management , Business - Decision making , Management information systems
- Type: Thesis
- Identifier: uj:2445 , http://hdl.handle.net/10210/4903
- Description: M.Tech. , Business Intelligence (BI) is a method used to improve on business decision-making, using collections of software applications and tools to view historical, current and predictive operations of a business. However, a company‟s BI solution will not be successful if it is not implemented in a comprehensive and strategic manner. There are three key issues that prevent organisations from benefiting from BI systems. These issues include the lack of pervasiveness of BI systems, managing a variety of non-related systems that do not work well together and using traditional methods that have not evolved to meet organisational needs (Koehler, 2008). BI vendors misinform many business users that BI tools are usable by all users in an organisation, and end up been too complex for the average user to use. The first mistake an organisation makes when assessing a BI system is neglecting to include business users on selecting the best option, although they will be the main users of the solution (Quinn, 2007). Many Information Technology (IT) departments ask for BI systems based on the assumption that once it is built, that users will automatically see the benefits. BI applications require a clear and intimate understanding of the business itself and it is only by working on business and IT issues in tandem that the real value of BI is realised (Hostmann, 2007).
- Full Text:
- Authors: Waterson, Elton
- Date: 2012-06-05
- Subjects: Business intelligence management , Information technology management , Business - Decision making , Management information systems
- Type: Thesis
- Identifier: uj:2445 , http://hdl.handle.net/10210/4903
- Description: M.Tech. , Business Intelligence (BI) is a method used to improve on business decision-making, using collections of software applications and tools to view historical, current and predictive operations of a business. However, a company‟s BI solution will not be successful if it is not implemented in a comprehensive and strategic manner. There are three key issues that prevent organisations from benefiting from BI systems. These issues include the lack of pervasiveness of BI systems, managing a variety of non-related systems that do not work well together and using traditional methods that have not evolved to meet organisational needs (Koehler, 2008). BI vendors misinform many business users that BI tools are usable by all users in an organisation, and end up been too complex for the average user to use. The first mistake an organisation makes when assessing a BI system is neglecting to include business users on selecting the best option, although they will be the main users of the solution (Quinn, 2007). Many Information Technology (IT) departments ask for BI systems based on the assumption that once it is built, that users will automatically see the benefits. BI applications require a clear and intimate understanding of the business itself and it is only by working on business and IT issues in tandem that the real value of BI is realised (Hostmann, 2007).
- Full Text:
Knowledge-sharing through communities of practice at institutions of higher education
- Authors: Buckley, Sheryl Beverley
- Date: 2012-06-05
- Subjects: Communities of practice , Information technology management , Education technology , Knowledge sharing , College teaching
- Type: Thesis
- Identifier: uj:2437 , http://hdl.handle.net/10210/4896
- Description: D. Litt. et Phil. , As the world moved from an industrial society to a knowledge society where people tend to work smarter and not harder, knowledge (implicit and explicit) became the main asset of a modern organisation. Human assets took precedence over financial assets. However, the rate at which the knowledge bank was increased owing to the progress in information technology was so fast that it became humanly impossible for one or two people to possess all knowledge. The notion of “knowledge is power” changed to one of “knowledge sharing is power”. While explicit knowledge can be quantified, saved and reused, tacit knowledge can only be shared voluntarily. This sharing of knowledge has given rise to communities of practice (CoPs). This study investigates the phenomenon of CoPs in an academic higher education (HE) institution such as a university. The aim was to establish criteria that could be used to identify the existence of such communities and their contribution to the institution, why CoPs are formed or not and how the formation of a CoP can enrich the knowledge bank of the institution. Once these objectives were achieved, it was hoped that it would be possible to create or encourage existing CoPs and ultimately ways to manage them.
- Full Text:
- Authors: Buckley, Sheryl Beverley
- Date: 2012-06-05
- Subjects: Communities of practice , Information technology management , Education technology , Knowledge sharing , College teaching
- Type: Thesis
- Identifier: uj:2437 , http://hdl.handle.net/10210/4896
- Description: D. Litt. et Phil. , As the world moved from an industrial society to a knowledge society where people tend to work smarter and not harder, knowledge (implicit and explicit) became the main asset of a modern organisation. Human assets took precedence over financial assets. However, the rate at which the knowledge bank was increased owing to the progress in information technology was so fast that it became humanly impossible for one or two people to possess all knowledge. The notion of “knowledge is power” changed to one of “knowledge sharing is power”. While explicit knowledge can be quantified, saved and reused, tacit knowledge can only be shared voluntarily. This sharing of knowledge has given rise to communities of practice (CoPs). This study investigates the phenomenon of CoPs in an academic higher education (HE) institution such as a university. The aim was to establish criteria that could be used to identify the existence of such communities and their contribution to the institution, why CoPs are formed or not and how the formation of a CoP can enrich the knowledge bank of the institution. Once these objectives were achieved, it was hoped that it would be possible to create or encourage existing CoPs and ultimately ways to manage them.
- Full Text:
The implications of project risk management maturity on information technology success
- Authors: Omphile, Wazha
- Date: 2012-06-05
- Subjects: Project management , Risk management , Information technology management
- Type: Thesis
- Identifier: uj:2436 , http://hdl.handle.net/10210/4895
- Description: M.Tech. , The question whether risk management contributes to project success is considered relevant considering the long history and high rates of failure in Information Technology (IT) projects. Much work and research has been done to investigate the relationship between risk management and project success but very few studies provide empirical evidence to substantiate the claims made on the relationship between these two concepts. Poor risk management has been associated with project failure while the question whether good risk management results in project success still cannot be unequivocally answered. The goal of this study is therefore to investigate the implications of project risk management maturity on project success in the South African telecommunications industry. To achieve the goal of this research a literature review was carried out to unearth the research questions relevant to this study. A survey questionnaire was compiled and sent out to IT project managers in the telecommunications industry in Gauteng, South Africa. The questionnaire gathered quantitative data from a purposive sample large enough to produce the results needed for this research. The questionnaire evaluated the risk management maturity of organisations in the telecommunications industry. It also determined definitions of project success that are prevalent in the industry and ranked factors that influence project outcomes. Furthermore, the questionnaire set out to establish current IT project success and failure rates in the telecommunications industry. This data was then analysed and conclusions drawn about risk management maturity and project success. Recommendations to the telecommunications industry were made based on the findings of the data analysis. The purpose of a literature study in this research was to provide clarity and focus for the research problem. It also broadened the researcher’s knowledge about the specific research area, thus allowing the researcher to become acquainted with the available body of knowledge regarding why and how risk management is associated with project success or failure. The quantitative research approach was used as it is on the basis of quantitative data that a correlation between risk management maturity and project success can be determined. A survey questionnaire was used as it provided anonymity, confidentiality and ease of administration. The findings of the research indicate that risk management maturity in the telecommunications industry is low. Organisations that claim higher levels of risk management maturity also have higher rates of IT project success. However this correlation is not significant when the responses are considered out of the organisational context. This is an indication that the organisational environment plays a role in determining project outcomes. The delivery of business benefits and customer satisfaction are more important than the traditional view of measuring project success by time, budget and scope/quality. Furthermore, communication within the project team and between team members and the customer has been found to be necessary for the delivery of successful IT projects. The improvement of risk management practices increases the chances of project success. Organisational effort in improving risk management practices does yield positive project outcomes. This research highlights areas for further investigation in the study of the relationship between risk management and project success.
- Full Text:
- Authors: Omphile, Wazha
- Date: 2012-06-05
- Subjects: Project management , Risk management , Information technology management
- Type: Thesis
- Identifier: uj:2436 , http://hdl.handle.net/10210/4895
- Description: M.Tech. , The question whether risk management contributes to project success is considered relevant considering the long history and high rates of failure in Information Technology (IT) projects. Much work and research has been done to investigate the relationship between risk management and project success but very few studies provide empirical evidence to substantiate the claims made on the relationship between these two concepts. Poor risk management has been associated with project failure while the question whether good risk management results in project success still cannot be unequivocally answered. The goal of this study is therefore to investigate the implications of project risk management maturity on project success in the South African telecommunications industry. To achieve the goal of this research a literature review was carried out to unearth the research questions relevant to this study. A survey questionnaire was compiled and sent out to IT project managers in the telecommunications industry in Gauteng, South Africa. The questionnaire gathered quantitative data from a purposive sample large enough to produce the results needed for this research. The questionnaire evaluated the risk management maturity of organisations in the telecommunications industry. It also determined definitions of project success that are prevalent in the industry and ranked factors that influence project outcomes. Furthermore, the questionnaire set out to establish current IT project success and failure rates in the telecommunications industry. This data was then analysed and conclusions drawn about risk management maturity and project success. Recommendations to the telecommunications industry were made based on the findings of the data analysis. The purpose of a literature study in this research was to provide clarity and focus for the research problem. It also broadened the researcher’s knowledge about the specific research area, thus allowing the researcher to become acquainted with the available body of knowledge regarding why and how risk management is associated with project success or failure. The quantitative research approach was used as it is on the basis of quantitative data that a correlation between risk management maturity and project success can be determined. A survey questionnaire was used as it provided anonymity, confidentiality and ease of administration. The findings of the research indicate that risk management maturity in the telecommunications industry is low. Organisations that claim higher levels of risk management maturity also have higher rates of IT project success. However this correlation is not significant when the responses are considered out of the organisational context. This is an indication that the organisational environment plays a role in determining project outcomes. The delivery of business benefits and customer satisfaction are more important than the traditional view of measuring project success by time, budget and scope/quality. Furthermore, communication within the project team and between team members and the customer has been found to be necessary for the delivery of successful IT projects. The improvement of risk management practices increases the chances of project success. Organisational effort in improving risk management practices does yield positive project outcomes. This research highlights areas for further investigation in the study of the relationship between risk management and project success.
- Full Text:
Constructing a leadership model: derived from a South African business leader's life-story
- Authors: Beyleveld, Arnold
- Date: 2010-02-23T10:28:35Z
- Subjects: Leadership , Information technology , Information technology management , Organizational change management
- Type: Thesis
- Identifier: uj:6635 , http://hdl.handle.net/10210/3036
- Description: D.Phil. , The aim of the study was to explore and understand the emerging leadership challenges in order to further enhance the development of leadership and management in the information technology industry in South Africa. A combined casing and life-story approach in this modernist qualitative research study was employed. Selective sampling, as described by Plummer (1983; 2001) as part of his critical humanistic approach, was employed to select the CEO, Mr X, from a particular South African information technology company. Data were obtained mainly from solicited sources, but also some that were unsolicited. This resulted in a life story containing rich descriptive data obtained at first hand from Mr X’s professional career and associated areas of his life. The life -story of this storyteller was organised manually as well as with the aid of ATLAS-Ti 5.0, a computer-based software package suitable for this type of study. The leadership landscape model of Veldsman (2004), a local expert in the area of leadership, together with key theoretical concepts found in the literature, were used to construct an enhanced leadership model. Appropriate qualitative guidelines were used to ensure a study that attends to both academic rigour and aesthetics. The resultant constructed leadership model offers important, if not unique, insights and findings regarding the leadership environment, individual psychosocial dynamics, competencies and capabilities, as well as leadership roles, modes, styles and processes that contribute to personal leadership effectiveness. The thesis illuminates and offers recommendations for a number of methodological and theoretical implications regarding local and global leadership studies, as well as for practice and policy regarding leadership and managerial development.
- Full Text:
- Authors: Beyleveld, Arnold
- Date: 2010-02-23T10:28:35Z
- Subjects: Leadership , Information technology , Information technology management , Organizational change management
- Type: Thesis
- Identifier: uj:6635 , http://hdl.handle.net/10210/3036
- Description: D.Phil. , The aim of the study was to explore and understand the emerging leadership challenges in order to further enhance the development of leadership and management in the information technology industry in South Africa. A combined casing and life-story approach in this modernist qualitative research study was employed. Selective sampling, as described by Plummer (1983; 2001) as part of his critical humanistic approach, was employed to select the CEO, Mr X, from a particular South African information technology company. Data were obtained mainly from solicited sources, but also some that were unsolicited. This resulted in a life story containing rich descriptive data obtained at first hand from Mr X’s professional career and associated areas of his life. The life -story of this storyteller was organised manually as well as with the aid of ATLAS-Ti 5.0, a computer-based software package suitable for this type of study. The leadership landscape model of Veldsman (2004), a local expert in the area of leadership, together with key theoretical concepts found in the literature, were used to construct an enhanced leadership model. Appropriate qualitative guidelines were used to ensure a study that attends to both academic rigour and aesthetics. The resultant constructed leadership model offers important, if not unique, insights and findings regarding the leadership environment, individual psychosocial dynamics, competencies and capabilities, as well as leadership roles, modes, styles and processes that contribute to personal leadership effectiveness. The thesis illuminates and offers recommendations for a number of methodological and theoretical implications regarding local and global leadership studies, as well as for practice and policy regarding leadership and managerial development.
- Full Text:
The influence of an ERP system on the value chain process of multinational enterprises (MNEs)
- Authors: Bosombo, Folo-Ralph
- Date: 2009-03-20T09:57:50Z
- Subjects: Business enterprises , Computer networks , Information technology management
- Type: Thesis
- Identifier: uj:8218 , http://hdl.handle.net/10210/2286
- Description: M.A. , The study set out to assess the influence of enterprise resource planning (ERP) system software on the value chain process of multinational enterprises (MNEs). This was achieved through the literature review that addressed the relation between the value chain approach as a strategic tool and ERP system theory. The ERP system is positioned as a total solution for the MNE, and it contains the best business practices that are derived from the various generic business functions of the value chain architecture and configuration. A set of research hypotheses was developed, which were tested in accordance with the research methodology and the design issues for the qualitative study. The different chapters evolved along with a case study of an ERP system, namely Axapta software. For the quantitative study, preliminary interviews were conducted to select the MNEs that use SAP software. Thereafter a self-administered survey was applied relating to the strategy and the value chain integration through the ERP system to the MNE's ERP system users. The research results in the qualitative study show that for ERP software to integrate the MNE's functional activities and processes in the value chain system globally and effectively, it has to position itself as a value chain system with e-business mechanisms. In addition it has to suit the global ERP characteristics as an information interchange, sharing and service. It has to be a flexible and comprehensive, modular, open, integrated and multifunctional system, with an option to customisation in selecting modules that best suit the MNE's management to craft its business's activities. The above was proved through the analyses of Axapta software attributes by means of a technical strategic planning tool, namely the value chain approaches, and the strategic supply chain factors for ERP software evaluation. Axapta software met the requirements of a general and global ERP system model and it is indeed a value chain system. The following statement can be cited as the most important findings of the qualitative study: For the MNE to derive value from ERP system integration and utilisation, the strategic information technology (IT) plan has to be formulated and followed in order to measure the beneficial cost and efficiency of implementing the ERP system, and to assess the suitability of ERP software during the selection process in accordance with the MNE's objectives that will facilitate the success of ERP implementation usage. ERP software adopted for the MNE has to include the international architecture and configuration types that align with the MNE’s strategy and Internet application. This must include all the necessary value chain functional modules relating to the ERP system as an integrating tool that will influence the MNE to align its strategy to gain ii competitive advantage. Consequently, such an ERP system will allow the MNE to strengthen and integrate all its applications and activities in the value chain system. As a result the different organisational suppliers and partners must be linked with the MNE's value chain system to enhance the operational sites' users to operate efficiently, more reliably and in co-ordination with the MNE. The necessary information and data must be available across the entire organisation's system from the trading partners to the customers so that they can be satisfied on with the necessary urgency. In the statistical analysis conducted from the self-administered survey, the major finding is the positive view of the employers and employees of the customisation of ERP, i.e. SAP software, which helps MNEs to craft the software according to their objectives and with the use of a strategic IT plan. In conclusion the study highlighted the inseparability of ERP system theory from the value chain approaches. Therefore, the study came to position ERP system theoretically as an evaluative tool and technically as a value chain system that becomes an evaluative tool for ERP software activities assessment. Moreover the study pointed out the importance of the use of a strategic IT plan within the MNE. However, the main contribution and value of this study is obviously to assist any MNE in the process of migrating business systems. The methodical approach facilitates the selection and the evaluation of ERP software requirements within an organisation, which can meet its growth targets and objectives. Thus, the strategic supply chain factors for ERP software evaluation and the application of the value chain approaches discussed in this study will contribute to the acquisition of fit and compatible ERP software. The choice of the right ERP software will definitely allow MNEs to derive the benefits of the ERP system across its entire value chain sites (nationally and internationally). It can be concluded from this study that any organisation wanting to invest in ERP system implementation must apply the methodical approach formulated in this study by the researcher. It is recommended that the assessment of an ERP system's modular and functional activities, together with the organisation's value chain activities, be given priority before the acquisition and adoption of the ERP system.
- Full Text:
- Authors: Bosombo, Folo-Ralph
- Date: 2009-03-20T09:57:50Z
- Subjects: Business enterprises , Computer networks , Information technology management
- Type: Thesis
- Identifier: uj:8218 , http://hdl.handle.net/10210/2286
- Description: M.A. , The study set out to assess the influence of enterprise resource planning (ERP) system software on the value chain process of multinational enterprises (MNEs). This was achieved through the literature review that addressed the relation between the value chain approach as a strategic tool and ERP system theory. The ERP system is positioned as a total solution for the MNE, and it contains the best business practices that are derived from the various generic business functions of the value chain architecture and configuration. A set of research hypotheses was developed, which were tested in accordance with the research methodology and the design issues for the qualitative study. The different chapters evolved along with a case study of an ERP system, namely Axapta software. For the quantitative study, preliminary interviews were conducted to select the MNEs that use SAP software. Thereafter a self-administered survey was applied relating to the strategy and the value chain integration through the ERP system to the MNE's ERP system users. The research results in the qualitative study show that for ERP software to integrate the MNE's functional activities and processes in the value chain system globally and effectively, it has to position itself as a value chain system with e-business mechanisms. In addition it has to suit the global ERP characteristics as an information interchange, sharing and service. It has to be a flexible and comprehensive, modular, open, integrated and multifunctional system, with an option to customisation in selecting modules that best suit the MNE's management to craft its business's activities. The above was proved through the analyses of Axapta software attributes by means of a technical strategic planning tool, namely the value chain approaches, and the strategic supply chain factors for ERP software evaluation. Axapta software met the requirements of a general and global ERP system model and it is indeed a value chain system. The following statement can be cited as the most important findings of the qualitative study: For the MNE to derive value from ERP system integration and utilisation, the strategic information technology (IT) plan has to be formulated and followed in order to measure the beneficial cost and efficiency of implementing the ERP system, and to assess the suitability of ERP software during the selection process in accordance with the MNE's objectives that will facilitate the success of ERP implementation usage. ERP software adopted for the MNE has to include the international architecture and configuration types that align with the MNE’s strategy and Internet application. This must include all the necessary value chain functional modules relating to the ERP system as an integrating tool that will influence the MNE to align its strategy to gain ii competitive advantage. Consequently, such an ERP system will allow the MNE to strengthen and integrate all its applications and activities in the value chain system. As a result the different organisational suppliers and partners must be linked with the MNE's value chain system to enhance the operational sites' users to operate efficiently, more reliably and in co-ordination with the MNE. The necessary information and data must be available across the entire organisation's system from the trading partners to the customers so that they can be satisfied on with the necessary urgency. In the statistical analysis conducted from the self-administered survey, the major finding is the positive view of the employers and employees of the customisation of ERP, i.e. SAP software, which helps MNEs to craft the software according to their objectives and with the use of a strategic IT plan. In conclusion the study highlighted the inseparability of ERP system theory from the value chain approaches. Therefore, the study came to position ERP system theoretically as an evaluative tool and technically as a value chain system that becomes an evaluative tool for ERP software activities assessment. Moreover the study pointed out the importance of the use of a strategic IT plan within the MNE. However, the main contribution and value of this study is obviously to assist any MNE in the process of migrating business systems. The methodical approach facilitates the selection and the evaluation of ERP software requirements within an organisation, which can meet its growth targets and objectives. Thus, the strategic supply chain factors for ERP software evaluation and the application of the value chain approaches discussed in this study will contribute to the acquisition of fit and compatible ERP software. The choice of the right ERP software will definitely allow MNEs to derive the benefits of the ERP system across its entire value chain sites (nationally and internationally). It can be concluded from this study that any organisation wanting to invest in ERP system implementation must apply the methodical approach formulated in this study by the researcher. It is recommended that the assessment of an ERP system's modular and functional activities, together with the organisation's value chain activities, be given priority before the acquisition and adoption of the ERP system.
- Full Text:
Legal implications of information security governance
- Authors: Etsebeth, Verine
- Date: 2009-01-08T13:04:36Z
- Subjects: Computer security , Data protection , Liability (Law) , Information technology management , Computer network security , Business enterprises
- Type: Thesis
- Identifier: uj:14757 , http://hdl.handle.net/10210/1837
- Description: LL.M. , Organisations are being placed under increased pressure by means of new laws, regulations and standards, to ensure that adequate information security exists within the organisation. The King II report introduced corporate South Africa to the concept of information security in 2002. In the same year the Electronic Communications and Transactions Act 25 of 2002 addressed certain technical information security issues such as digital signatures, authentication, and cryptography. Therefor, South Africa is increasingly focussing its attention on information security. This trend is in line with the approach taken by the rest of the international community, who are giving serious consideration to information security and the governance thereof. As organisations are waking up to the benefits offered by the digital world, information security governance is emerging as a business issue pivotal within the e-commerce environment. Most organisations make use of electronic communications systems such as e-mail, faxes, and the world-wide-web when performing their day-to-day business activities. However, all electronic transactions and communications inevitably involve information being used in one form or another. It may therefor be observed that information permeates every aspect of the business world. Consequently, the need exists to have information security governance in place to ensure that information security prevails. However, questions relating to: which organisation must deploy information security governance, why the organisation should concern itself with this discipline, how the organisation should go about implementing information security governance, and what consequences will ensue if the organisation fails to comply with this discipline, are in dispute. Uncertainty surrounding the answers to these questions contribute to the reluctance and skepticism with which this discipline is approached. This dissertation evolves around the legal implications of information security governance by establishing who is responsible for ensuring compliance with this discipline, illustrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline, ultimately providing the reader with certainty and clarity regarding the above mentioned questions, while simultaneously enabling the reader to gain a better understanding and appreciation for the discipline information security governance. The discussion hereafter provides those who should be concerned with information security governance with practical, pragmatic advice and recommendations on: (i) The legal obligation to apply information security; (ii) Liability for failed information security; (iii) Guidelines on how to implement information security; and (iv) A due diligence assessment model against which those responsible for the governance and management of the organisation may benchmark their information security efforts.
- Full Text:
- Authors: Etsebeth, Verine
- Date: 2009-01-08T13:04:36Z
- Subjects: Computer security , Data protection , Liability (Law) , Information technology management , Computer network security , Business enterprises
- Type: Thesis
- Identifier: uj:14757 , http://hdl.handle.net/10210/1837
- Description: LL.M. , Organisations are being placed under increased pressure by means of new laws, regulations and standards, to ensure that adequate information security exists within the organisation. The King II report introduced corporate South Africa to the concept of information security in 2002. In the same year the Electronic Communications and Transactions Act 25 of 2002 addressed certain technical information security issues such as digital signatures, authentication, and cryptography. Therefor, South Africa is increasingly focussing its attention on information security. This trend is in line with the approach taken by the rest of the international community, who are giving serious consideration to information security and the governance thereof. As organisations are waking up to the benefits offered by the digital world, information security governance is emerging as a business issue pivotal within the e-commerce environment. Most organisations make use of electronic communications systems such as e-mail, faxes, and the world-wide-web when performing their day-to-day business activities. However, all electronic transactions and communications inevitably involve information being used in one form or another. It may therefor be observed that information permeates every aspect of the business world. Consequently, the need exists to have information security governance in place to ensure that information security prevails. However, questions relating to: which organisation must deploy information security governance, why the organisation should concern itself with this discipline, how the organisation should go about implementing information security governance, and what consequences will ensue if the organisation fails to comply with this discipline, are in dispute. Uncertainty surrounding the answers to these questions contribute to the reluctance and skepticism with which this discipline is approached. This dissertation evolves around the legal implications of information security governance by establishing who is responsible for ensuring compliance with this discipline, illustrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline, ultimately providing the reader with certainty and clarity regarding the above mentioned questions, while simultaneously enabling the reader to gain a better understanding and appreciation for the discipline information security governance. The discussion hereafter provides those who should be concerned with information security governance with practical, pragmatic advice and recommendations on: (i) The legal obligation to apply information security; (ii) Liability for failed information security; (iii) Guidelines on how to implement information security; and (iv) A due diligence assessment model against which those responsible for the governance and management of the organisation may benchmark their information security efforts.
- Full Text:
The reduction of information overload in hypermedia environments
- Authors: Sesemane, Moeketsi Jonas
- Date: 2008-08-04T13:44:20Z
- Subjects: Computer-assisted instruction , Interactive multimedia , Information technology management , North West (South Africa)
- Type: Thesis
- Identifier: uj:7532 , http://hdl.handle.net/10210/838
- Description: Computers are increasingly used worldwide in teaching and learning. The education system in South Africa also calls for the use of technology in teaching and learning as one of the critical cross-field outcomes of outcomes based education (OBE). In order to achieve this goal, the hypermedia-based learning environment, including Web-based learning, needs to be explored, especially since not many studies locally have focused on this topic. Although many schools already provide education in Information Technology, not all learners are adept at navigating the Web. This study focused on information overload and disorientation on the Web. The purpose of the study was to explore Web-based learning and to develop strategies to enable learners to overcome impeding factors while constructing and representing knowledge in a hypermedia-based learning environment. This, being a new approach to and method of learning interaction that employs hypermediabased learning strategies, encapsulates the integration of technology in education at secondary school level. The literature study was based on the design experiment method, which embraced a qualitative research approach, both descriptive and explorative, and was found to be appropriate for the purposes of this study. The data gathering methods relevant to establishing how e-literacy can assist in reducing information overload in a hypermedia environment were individual interviews, focus group interviews, observation and open-ended questions. The participants were grade 10 learners from a secondary school in the North West Province and their Information Technology teacher. A conceptual framework of the learning programme was created in order to integrate the guiding principles for the design process. The framework outlines how the design process was carried out based on teaching and learning theories, and using a constructivist approach in an attempt to reduce information overload and disorientation while using ICT tools. xvi The content of the learning programme focused on the Cricket World Cup 2003, in the learning area of Life Orientation. Learners were to learn navigation strategies for effective and meaningful learning on the Web, with the help of guided interactive tasks in order to avoid information overload and learner disorientation in hyperspace. The effectiveness of the strategies was also evaluated. The learners’ experiences and feelings about, and perspectives on participating in the hypermedia-based learning programme were investigated. The results indicated that the learning programme – aimed at providing learners with adequate knowledge and skills for navigating in the Web – promoted motivation and enabled learners to successfully construct and represent knowledge in the hypermedia-learning environment. It enhanced not only experiential and independent learning, but also individual, collaborative and cognitive situated learning. The principles of constructivism and OBE facilitated teaching and learning as the guiding factor in both educator and learner instances. However, it became clear that a lack of skills and awareness in using ICT tools to construct meaningful knowledge, as well as being inexperienced in the constructivist approach, could easily give rise to information overload and disorientation. It was concluded that the onus is on educators, instructional designers and developers of learning programmes to equip themselves with the necessary eliteracy skills in order to guide and prepare learners increasingly in the field of Information Technology in education. This is essential, because there is a great need for e-literacy in open distance learning, and as a prerequisite for tertiary education and lifelong learning in South Africa. , Prof. D. van der Westhuizen Prof. M.H. Trϋmpelmann
- Full Text:
- Authors: Sesemane, Moeketsi Jonas
- Date: 2008-08-04T13:44:20Z
- Subjects: Computer-assisted instruction , Interactive multimedia , Information technology management , North West (South Africa)
- Type: Thesis
- Identifier: uj:7532 , http://hdl.handle.net/10210/838
- Description: Computers are increasingly used worldwide in teaching and learning. The education system in South Africa also calls for the use of technology in teaching and learning as one of the critical cross-field outcomes of outcomes based education (OBE). In order to achieve this goal, the hypermedia-based learning environment, including Web-based learning, needs to be explored, especially since not many studies locally have focused on this topic. Although many schools already provide education in Information Technology, not all learners are adept at navigating the Web. This study focused on information overload and disorientation on the Web. The purpose of the study was to explore Web-based learning and to develop strategies to enable learners to overcome impeding factors while constructing and representing knowledge in a hypermedia-based learning environment. This, being a new approach to and method of learning interaction that employs hypermediabased learning strategies, encapsulates the integration of technology in education at secondary school level. The literature study was based on the design experiment method, which embraced a qualitative research approach, both descriptive and explorative, and was found to be appropriate for the purposes of this study. The data gathering methods relevant to establishing how e-literacy can assist in reducing information overload in a hypermedia environment were individual interviews, focus group interviews, observation and open-ended questions. The participants were grade 10 learners from a secondary school in the North West Province and their Information Technology teacher. A conceptual framework of the learning programme was created in order to integrate the guiding principles for the design process. The framework outlines how the design process was carried out based on teaching and learning theories, and using a constructivist approach in an attempt to reduce information overload and disorientation while using ICT tools. xvi The content of the learning programme focused on the Cricket World Cup 2003, in the learning area of Life Orientation. Learners were to learn navigation strategies for effective and meaningful learning on the Web, with the help of guided interactive tasks in order to avoid information overload and learner disorientation in hyperspace. The effectiveness of the strategies was also evaluated. The learners’ experiences and feelings about, and perspectives on participating in the hypermedia-based learning programme were investigated. The results indicated that the learning programme – aimed at providing learners with adequate knowledge and skills for navigating in the Web – promoted motivation and enabled learners to successfully construct and represent knowledge in the hypermedia-learning environment. It enhanced not only experiential and independent learning, but also individual, collaborative and cognitive situated learning. The principles of constructivism and OBE facilitated teaching and learning as the guiding factor in both educator and learner instances. However, it became clear that a lack of skills and awareness in using ICT tools to construct meaningful knowledge, as well as being inexperienced in the constructivist approach, could easily give rise to information overload and disorientation. It was concluded that the onus is on educators, instructional designers and developers of learning programmes to equip themselves with the necessary eliteracy skills in order to guide and prepare learners increasingly in the field of Information Technology in education. This is essential, because there is a great need for e-literacy in open distance learning, and as a prerequisite for tertiary education and lifelong learning in South Africa. , Prof. D. van der Westhuizen Prof. M.H. Trϋmpelmann
- Full Text:
- «
- ‹
- 1
- ›
- »