'n Inligtingsoudit om die strategiese inligtinghulpbronne van 'n versekeringsmaatskappy te identifiseer
- Authors: De Vaal, Inarie
- Date: 2014-11-19
- Subjects: Information resources management , Insurance companies
- Type: Thesis
- Identifier: uj:12908 , http://hdl.handle.net/10210/12797
- Description: M.Bibl. , Information is increasingly recognised and managed as a resource. In any organisation it contribute directly to the performance of all functions. The purpose of this study was to use Burk and Horton's methodology to conduct an information audit to an assurance enterprise to identify the company's strategic information. This was to prove the importance of information as a corporate resource for competitive advantage. A literature study was undertaken as well as an overview of the method and results of an information audit. The information audit was only done for the library and the law administration department. The literature study gave the necessary overview of the information audit method, but the empirical investigation provided the value of the information. Information was collected on three different forms. The first was the inventory which was divided in three sections: sources, services and systems. The second form was the file surrogate card, which contained all the information of the law files. The third form was a questionnaire to establish the information needs of the users as well as the availability of the information they need to fulfil their tasks. The information flow was also monitored in the company. Although the "lnfoMap" -method of Burk and Horton was used, it was discovered that this method had several shortcomings regarding the practical application, such as the calculation of the monetary value of the information. After an analysis of the research results it is evident from the shortcomings and needs that have come to light regarding the management, objectives, use, value and cost of information assets that it is necessary to formulates an information policy and that the conclusion can be drawn that the information audit provides meaningful data that can serve as the starting point for developing a formal information management plan for this insurance company.
- Full Text:
A multi-dimensional model for information security management
- Authors: Eloff, Maria Margaretha
- Date: 2011-12-06
- Subjects: Information resources management , Data protection , Computer security , Database management security measures
- Type: Thesis
- Identifier: uj:1794 , http://hdl.handle.net/10210/4158
- Description: D.Phil. , Any organisation is dependent on its information technology resources. The challenges posed by new developments such as the World Wide Web and e-business, require new approaches to address the management and protection of IT resources. Various documents exist containing recommendations for the best practice to follow for information security management. BS7799 is such a code of practice for information security management. The most important problem to be addressed in this thesis is the need for new approaches and perspectives on information security (IS) management in an organisation to take cognisance of changing requirements in the realm of information technology. In this thesis various models and tools are developed that can assist management in understanding, adapting and using internationally accepted codes of practice for information security management to the best benefit of their organisations. The thesis consists of three parts. Chapter 1 and Chapter 2 constitute Part 1: Introduction and Background. In Chapter 1 the problem statement, objectives and deliverables are given. Further the chapter contains definitions of important terminology used in the thesis as well as an overview of the research. Chapter 2 defines various terms associated with information security management in an attempt to eliminate existing confusion. The terms are mapped onto a hierarchical framework in order to illustrate the relationship between the different terms. In Part 2: IS Management Perspectives and Models, consisting of chapters 3, 4, 5 and 6, new approaches to information security management is discussed. In Chapter 3 different perspectives on using a code of practice, such as BS7799 for IS management, is presented. The different perspectives are based on the unique characteristics of the organisation such as its size and functional purpose. These different perspectives also enable organisations to focus on the controls for specific resources or security services such as integrity or confidentiality. In Chapter 4 these different perspectives ofbusiness type/size, the security services and the resources are integrated into a multi-dimensional model and mapped onto BS7799. Using the multi-dimensional model will enable management to answer questions such as: "Which BS7799 controls must a small retail organisation interested in preserving the confidentiality of their networks implement?" In Chapter 5 the SecComp model is proposed to assist in determining how well an organisation has implemented the BS7799 controls recommended for their needs. In Chapter 6 the underlying implemented IT infrastructure, i.e. the software, hardware and network products are also incorporated into determining if the information assets of organisations are sufficiently protected. This chapter combines technology aspects with management aspects to provide a consolidated approach towards the evaluation of IS. The thesis culminates in Part 3: Conclusion, which comprises one chapter only. In this last chapter, Chapter 7, the research undertaken thus far is summarised and the pros and cons of the proposed modelling approach is weighed up. The thesis is concluded with a reflection on possible areas for further research.
- Full Text:
A role-based framework for information systems project success
- Authors: Seeletsa, Gabriel Rakatane
- Date: 2017
- Subjects: Information resources management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/262069 , uj:27649
- Description: M.Com. (Business Management) , Abstract: Information systems projects are becoming more and more synonymous with failure. Despite this, the capital investment by financial services companies in South Africa in these projects is increasing. A number of studies, both academic and corporate, have been undertaken to address the root causes of failures in information systems projects in South Africa across sectors. Despite these attempts, the problem persists. For information systems projects, project success varies from organisation to organisation and even from project to project. What is common in these projects is that they are undertaken by project teams. The composition of the project team is essential to the outcome of these projects. For the project to succeed, the project team as a whole has to possess certain competencies that will collectively improve the chances of project success. This study addresses the problem of the high failure rate of information systems projects in financial services companies in South Africa by looking at the people who are responsible for implementing such projects. This is done by identifying the competencies that are required in each role-player who takes part in these projects in order to improve the success rates of these projects. The approach in this study is holistic in nature, as it addresses the needs of the project team and not the needs of a particular role-player alone. To pursue the aforementioned, a survey was conducted among information systems professionals within the financial services industry in South Africa. A structured questionnaire method was used to collect data for this purpose. Overall, the respondents’ responses where role agnostics and biasness were not detected depended on the current role of the respondent. For project managers, respondents agreed that, for a project to have a higher chance of success, a project manager must be able, among other things, to lead people and to manage stakeholders. For business analysts, the respondents stated that, for business analysts to have a positive impact on project success, they need to, among other things, be able to elicit requirements and to communicate clearly and concisely. For software developers, the respondents concurred that a successful software developer must display, among other competencies, creative and futuristic thinking skills, and also show concern for quality. For software testers, respondents agreed that people performing in this role must, among other things, be thorough and accurate in their work. The study is significant and contributes to both research and practice. The core competencies identified in this study will contribute to existing literature. Also, the framework proposed in this study will be beneficial to organisations and the project community to assist them with the identification of talent, recruitment of that talent, as well as the development and retention of that talent in project roles.
- Full Text:
Developing a scaleable information architecture for an enterprise wide consolidated information management platform
- Authors: Van der Walt, Pieter Willem
- Date: 2009-01-15T13:10:59Z
- Subjects: Information organization , Management information systems , Information technology , Information audits , Information resources management
- Type: Thesis
- Identifier: uj:14794 , http://hdl.handle.net/10210/1870
- Description: D.Litt. et Phil. , This research addresses the concept of “information architecture” as a way of visualising and describing the various information assets and interaction of these assets within the organisation. The research further provides definitions of information and contextualises the information audit and information model as key tool for the information manager in establishing the information architecture. The establishment of the information architecture is illustrated through a case study within a large conglomeration of companies requiring a scaleable information architecture in order to address its information requirements. Through a process of interviews the information requirements of key decisions makers are established. These requirements are translated into an information architecture that forms the basis of support in delivering future information requirements for the company. The results of this research have been successfully implemented and now form the foundation of all future information management projects within this particular case study.
- Full Text:
Enhancing the effectiveness of a knowledge management toolkit in a professional services firm
- Authors: Chetty, Lameshnee
- Date: 2017
- Subjects: Information resources management , Corporate culture , Knowledge management
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/246168 , uj:25513
- Description: M.Phil. (Information Management) , Abstract: This study seeks to discover the efficiency of the current knowledge management toolkit for client facing professionals in a professional services firm in South Africa (The PSF). The efficiency of the toolkit determines the overall value of the knowledge management programme in the organisation. The objective of the study conducted during 2016 as evaluation research was threefold. Firstly, to determine how the current knowledge management toolkit was providing solutions to client facing employees. Secondly, to identify what the gaps were in the current knowledge management toolkit. Thirdly, to determine what needed to be implemented to improve the efficiency of the knowledge management toolkit. A pragmatism philosophy was used for this study because the research takes into account various perspectives to interpret the data. The sample on whom this research was conducted was 30 participants who possess the following criteria: employees who work in client account teams, employees who work on strategic and target clients, and employees who ensure client sustainability for existing clients. Semi structured interviews were used to collect data to help determine which knowledge management tools worked well, which tools were not working well, and what can be included or improved on. This research gives an overview of how the knowledge management toolkit was being used in The PSF and how it can be improved on in order to enhance client engagements and provide a competitive advantage. Evaluation of the toolkit overall depicts that the experience tool, one of eight tools in The PSF’s KM toolkit, was the tool that added the most value to the organisation. The results of this research give clear indication of areas of improvement which should be considered. Most significantly, the collaboration tool was rated the least valuable to the organisation; however, it does have the potential to increase its value by implementing the necessary recommendations. The study enabled the organisation to strategically position the knowledge management toolkit towards adding value for client engagements.
- Full Text:
Information management in financial institutions in Botswana
- Authors: Lefenya, Maruapula Tartar
- Date: 2009-01-12T07:27:43Z
- Subjects: Information resources management , Financial institutions
- Type: Thesis
- Identifier: uj:14786 , http://hdl.handle.net/10210/1863
- Description: M. Inf. , Enterprises are becoming more dependent on information than ever before and, in this new millennium, the survival and success of these enterprises will highly depend on the ability to manage information as a resource for competitive advantage. This study is concerned with establishing the extent to which information management is practiced in financial institutions in Botswana. The main problem under investigation is the importance of information management within an enterprise and to ascertain how information can ensure competitive advantage in an enterprise. In the first four chapters, a literature survey is done to get a better understanding of what information management is and how information management can transform business and how information management can be used as a source of sustainable competitive advantage. The second part of the study is the empirical survey where qualitative research was conducted on financial institutions in Botswana, including commercial banks and insurance companies. The aim of the research was to determine the status of information management in these institutions as well as to investigate what people generally understand the concept information management- to mean. It was further investigated if at all information management was an issue in the enterprise culture of Botswana and if the concerned institutions regard information management as a source for competitive advantage. Structured interviews were conducted with top management in ten business institutions. The data obtained from the interviews was analysed and interpreted according to the grounded theory. The findings of the research revealed that information management, as a formalised concept, is fairly new to most business enterprise managers, and that there is no common understanding of the concept. It is however evident that most business managers accept the fact that information management is a necessary condition for ensuring the sustainability of their business enterprises. Most of them acknowledged that information is very critical for the survival of the business and for staying ahead of others. It is recommended that enterprises should adopt a holistic approach towards information management. Business enterprises should employ people with proper information management skills and trained personnel in this area.
- Full Text:
Information management in the South African life insurance industry
- Authors: Strydom, J.D.E.
- Date: 2014-02-10
- Subjects: Information resources management , Insurance companies - Data processing , Information policy
- Type: Thesis
- Identifier: uj:3717 , http://hdl.handle.net/10210/9098
- Description: M.A. (Information Science) , As organisations exist in the constantly overwhelming information age, more emphasis is put on information as resource and the economic value it has in the organisation. The South African life insurance industry is no different from other organisations and deals with a vast number ofinformation that flows through these organisations daily. In this study, the role of information, the management of information and the existence and implementation of an information policy are examined. The appointment of an information manager to manage information is also examined. The study was done to determine the level of importance and value of information in this type of industry and whether the South African insurance industry has identified information as a valuable resource in the organisation. Information as resource and the management thereof as competitive advantage is studied. The research methods applied were to carry out a literature study on information and its role as resource in an organisation, the roles and responsibilities of an information manager and the advantage and implementation of an information policy in the organisation. A questionnaire was compiled and sent to all the major South African life insurance companies to determine the above aspects and the current status in this industry.
- Full Text:
Information overload in the South African banking industry
- Authors: Burger, Elsa
- Date: 2008-05-14T10:48:05Z
- Subjects: Information resources management , Information technology , Electronic mail systems , Business communication , Banks and banking information resources
- Type: Thesis
- Identifier: uj:7230 , http://hdl.handle.net/10210/387
- Description: At present, the average employee is being bombarded with an ever-increasing number of messages information on his/her company, its products and services, as well as information on its strategy all flooding in from a myriad of sources, including internal vehicles such as e-mail, the intranet, management memoranda, internal publications, as well as the external media, such as the Internet, the local newspaper, television news and national business and industry magazines. The term “information overload” is usually understood to present a state of affairs where an individual’s efficiency in using information in his/her work is hampered by a surplus amount of relevant and potentially useful information available to him/her. The principal aim of this study, therefore, is to establish the extent and impact of information overload on the knowledge worker in the banking industry, with special reference to the part that e-mail technology plays in the creation of such overload. Broadcasting, the telephone and the Internet have revolutionised the way in which workers communicate around the globe. Electronic-messaging systems such as e-mail have become the medium of choice in many organisations, and hold significant and valuable business data, information and knowledge. These systems have had a profound impact on the way in which personal and business communications are effected in the office. With e-mail having acquired mission-critical status, a number of concomitant circumstances and consequences have arisen that present organisations, such as banks, with a variety of challenges, among which • the impact on employees’ productivity, owing to the time spent on e-mailing activities • employees’ attitudes towards e-mail • compliance with corporate policies, such as those policies governing electronic communication and computer use • surveillance and monitoring of e-mail • the quest for finding formal archiving solutions. , Prof. C.W. Rensleigh
- Full Text:
Information security in health-care systems: a new approach to IT risk management
- Authors: Smith, Elmé
- Date: 2012-08-16
- Subjects: Information technology - Security measures , Information resources management , Computer security , Health facilities management
- Type: Thesis
- Identifier: uj:9451 , http://hdl.handle.net/10210/5884
- Description: Ph.D. , The present study originated from a realisation about the unique nature of the medical domain and about the limitations of existing risk-management methodologies with respect to incorporating the special demands and salient features of the said domain. A further incentive for the study was the long-felt need for proper Information Technology (IT) risk management for medical domains, especially in the light of the fact that IT is playing an ever-greater part in the rendering of health-care services. This part, however, introduces new information-security challenges every day, especially as far as securing sensitive medical information and ensuring patients' privacy are concerned. The study is, therefore, principally aimed at making a contribution to improving IT risk management in the medical domain and, for this reason, culminates in an IT risk-management model specifically developed for and propounded in the medical domain. While developing this model, special care was taken not only to take into consideration the special demands of the said domain when assessing IT risks but also that it would be suited to the concepts, terminology and standards used in and applied to this domain every day. The most important objectives of the study can be summarised as follows: A thorough investigation into modern trends in information security in the medical domain will soon uncover the key role IT is playing in this domain. Regrettably, however, this very trend also triggers a steep increase in IT riskincidence figures, which, in this domain, could often constitute the difference between life and death. The clamant need for effective risk-management methods to enhance the information security of medical institutions is, therefore, self-evident. After having explored the dynamic nature of the medical domain, the requirements were identified for a risk-management model aimed at effectively vi managing the IT risks to be incurred in a typical medical institution. Next, a critical evaluation of current risk-assessment techniques revealed that a fresh approach to IT risk management in medical domains is urgently necessary. An IT risk-management model, entitled "RiMaHCoF" (that is, "Risk Management in Health Care — using Cognitive Fuzzy techniques"), was developed and propounded specifically for the medical domain hereafter. The proposed model enhances IT risk management in the said domain in the sense that it proceeds on the assumption that the patient and his/her medical information constitute the primary assets of the medical institution.
- Full Text:
Information systems project failure : a managerial approach
- Authors: De Beer, André
- Date: 2011-11-24
- Subjects: Management information systems , Information resources management , Computer system failures , System failures (Engineering) , Project management
- Type: Thesis
- Identifier: uj:1734 , http://hdl.handle.net/10210/4083
- Description: M.Ing. , Failure is a part of every day life. Information systems project failures are reported regularly in the media. The growth of the information technology industry in its entirety has been very dramatic over the last decade. Large information systems projects have always posed as a challenge for development teams and organizations. The nature of these challenges have increased with the growth of information systems projects over the last decade. With the critical role that information systems have in organizations, it is critical that information systems are delivered on time within budget and according to the requirements. Unfortunately many of the information systems projects that have been started, are cancelled, not on time or over budget. It is the purpose of this dissertation to discuss some of the managerial causes of why information systems projects fail, and also to address issues that could prevent the failure of information systems projects.
- Full Text:
Inligtingbestuur in die onderwys
- Authors: Coetzer, Johan
- Date: 2009-01-08T13:02:37Z
- Subjects: Information resources management
- Type: Thesis
- Identifier: uj:14750 , http://hdl.handle.net/10210/1830
- Description: M.A. , Organizations become increasingly dependant on information. We live in an era called the information age, where there is an overwhelming amount of information and information resources available. Internal and external information is vital for the survival and success of the organization. Information is not static. It flows from one point to another and in the process value is added to the information. Sharing of information is crucial for managing an organization. Information management is therefore an important factor to optimize usage of information. In order to supply the right person with the right information in the right format, information systems should be replenished by human ability. This system is designed to support the employee in his work and to lead management in their decision making. Resources are managed according to certain rules. Information can be managed by means of an information policy or -strategy. Because the information strategy is more detailed than the information policy, this study considers the advantages and development of an information strategy for an enterprise. The above-mentioned will be applied to education as it is today. In this respect it is vital to keep in mind that education is involved in the education and forming of learners. Information and standardization is of the utmost importance to the professional educators involved in this process. For the educators, parents, administrative staff and learners to make decisions, the information must reach them in time. In the second half of this citation, an empirical study was conducted to determine the status of the information flow in the education department. Knowledge of the following were tested: information management, the current practice of information flow, the participants, and the response on required information. Appointments with selected participants were made by telephone and information were gathered by questionnaire. The information was then analyzed and interpreted according to the principles of the grounded theory. In spite of the fact that information management is an unmistakable part of an enterprise, there are no standing principles for the dissemination of information within the education department. There is an urgent need for the management of information in order to better the information flow in the education department. It is suggested that the enterprise should implement an information management plan as soon as possible, and attend to the information flow within the education department. Information must be supplied to the persons involved in the desired format and on the required time, for the education department to be informed.
- Full Text:
Professional skills and knowledge requirements of an information systems auditor
- Authors: Modisane, Cameron
- Date: 2015-09-28
- Subjects: Information resources management , Information services industry , Professional employees - Job descriptions , Information technology - Auditing
- Type: Thesis
- Identifier: uj:14173 , http://hdl.handle.net/10210/14616
- Description: M.Com. (Computer Auditing) , Competence in information technology (IT) is crucial for the professional accountants and most importantly, for information systems (IS) auditors currently practising in the execution of IS audits. The increasing dependence of businesses on computerised information systems gives rise to the need for auditors who possess IT knowledge and skills. This study reports the results of a study that investigates the level of IT knowledge and skills required for an IS auditor in the specific context of audit work in South Africa. Results of this study are based on a literature analysis and on data collected from different IS auditor practitioners. The aim of this study is to: (i) examine the IT knowledge and key areas of expertise required from an IS auditor; (ii) determine the educational qualifications required of an IS auditor; and (iii) evaluate the soft skills required from an IS auditor. This research involves a two-stage empirical study. Firstly, the study carried out a literature survey of IT knowledge and skills. Secondly, structured interviews were conducted with a sample of IS audit practitioners. The findings from this study make three main contributions to the field of IS auditing practice and auditing education. Firstly, the study will help in contributing to a theoretical enhancement of the current level of knowledge in the limited existing literature on IS auditors and the type of knowledge and skills that is required from the professionals to perform their duties effectively and add value to the organisation. Secondly, findings from this study are significant to the standards setters regulating the audit profession, academia designing university courses, and audit practitioners evaluating their own IT knowledge. An important contribution of this study is that the findings would initiate discussion, debate and action that would lead to positive changes in the South African IS auditing profession to ensure that IS auditors are on par with the latest technologies around the world.
- Full Text:
The application of artificial intelligence within information security.
- Authors: De Ru, Willem Gerhardus
- Date: 2012-08-17
- Subjects: Artificial intelligence , Computer security , Fuzzy logic , Information resources management , Electronic data processing departments - Security measures
- Type: Thesis
- Identifier: uj:2641 , http://hdl.handle.net/10210/6087
- Description: D.Phil. , Computer-based information systems will probably always have to contend with security issues. Much research have already gone into the field of information security. These research results have yielded some very sophisticated and effective security mechanisms and procedures. However, due to the ever increasing sophistication of criminals, combined with the ever changing and evolving information technology environment, some limitations still exist within the field of information security. Recent years have seen the proliferation of products embracing so-called artificial intelligence technologies. These products are in fields as diverse as engineering, business and medicine. The successes achieved in these fields pose the question whether artificial intelligence has a role to play within the field of information security. This thesis discusses limitations within information security and proposes ways in which artificial intelligence can be effectively applied to address these limitations. Specifically, the fields of authentication and risk analysis are identified as research fields where artificial intelligence has much to offer. These fields are explored in the context of their limitations and ways in which artificial intelligence can be applied to address these limitations. This thesis identifies two mainstream approaches in the attainment of artificial intelligence. These mainstream approaches are referred to as the "traditional" approach and the "non-traditional" approach. The traditional approach is based on symbolic processing, as opposed to the non-traditional approach, which is based on an abstraction of human reasoning. A representative technology from each of these mainstream approaches is selected to research their applicability within information security. Actual working prototypes of artificial intelligence techniques were developed to substantiate the results obtained in this research.
- Full Text:
The role of information management in environmental scanning and competitive intelligence - an integrated process model
- Authors: Langton, Anina-Marie
- Date: 2009-01-12T07:23:42Z
- Subjects: Information resources management , Business intelligence
- Type: Thesis
- Identifier: uj:14781 , http://hdl.handle.net/10210/1859
- Description: M.A. , Managers have an important and prominent role in an organisation. As decision-makers they hold the authority and responsibility to act on the available information. As leaders, they set examples and promote a culture of information sharing and collaboration. As strategists, they ensure that information policies are well aligned with the organisation's mission. One of the greatest challenges facing an organisation is to understand how the external environment is changing, what the changes mean, and how the organisation can best respond to the new provisos. The process of learning about the external environment is environmental scanning, i.e. the art of gathering and interpreting information about the environment enabling the organisation to have the knowledge to develop effective courses of action. The goal of information management is thus to harness information resources and information capabilities to enable the organisation to learn and adapt in an ever-changing environment. Key information processes will be assessed with reference to special problems of managing each process. At the same time the opportunity for change would be highlighted by combining an understanding of information use behaviours with a more flexible, user centred design of information services and systems. Competitive intelligence on the other hand is the systematic process of gathering and analysing information about the activities of competitors and general business trends to further the organisation’s goals. All definitions point toward creating knowledge from openly available information by use of a systematic process involving planning, collection, analysis, communication and management which result in decision-maker action. While competitive intelligence incorporates knowledge management processes of collecting and storing knowledge, competitive intelligence definitions discuss the actual analysis of the gathered information. Key factors for success of information management in organisations reinforce the need for the integration of business strategy and information. The key factors are the relationships with customers and suppliers; flatter management structures and better use of resources; training and quality and environmental issues. Each of these factors rests on information, its use, creation, storage and dissemination. A process approach to information management supports the integration of business strategy and information. The calls for integration come from at least three different communities: information management, information systems and management. Successful companies are those that adapt to and shape their environments. They do so by using and creating information in a process of continuous improvement and innovation. Key factors for success in organisations reinforce the need for integration of business strategy and information. Managers in firms see their success as dependent on their organisation's ability to accommodate and manage change and to respond to changes in their environments. The study concludes with a case study of Pyromet Technologies showing that it is possible to have an integrated strategic information management model incorporating all three variables successfully.
- Full Text:
The role of management in effective knowledge and skills transfer
- Authors: Buys, Neil Armstrong
- Date: 2013-05-01
- Subjects: Transfer of learning , Employees - Training of , Business planning , Strategic planning , Information resources management
- Type: Thesis
- Identifier: uj:7503 , http://hdl.handle.net/10210/8360
- Description: Ph.D. (Leadership Performance and Change) , Organisations worldwide have made substantial investments in the training of their employees even though it is generally understood that only a small amount of learning is usually transferred to the work environment. The knowledge of the extent of employer investments in training compared to the benefits that accrue from this training for the organisation underlies the continuous debate concerning the return on investment and the effectiveness of the transfer of learning. Learning Transfer is defined as the application of knowledge, skills and attitudes learned from training and the subsequent maintenance of it over a period of time. This paucity of learning transfer, in spite of the substantial investment in training by employers, must be considered against the reality of organisations continuously being confronted by demands emanating from developments such as globalisation. Equally, technological developments necessitate change in the nature of work and consequently in the knowledge and skills required by employees to perform the work, as well as for organisations to remain globally competitive. The aim of this study is to determine whether a causal relationship exists between management support for learning and the effectiveness of learning transfer. In pursuance of finding causes for the lack of learning transfer, the study has the further objective of determining whether management support could be elevated above other differentiators, such as motivation of the trainee, training design and the workplace or organisational climate factors. The study is premised on the perception that management exercises a great deal of influence over their employees and that they determine organisational outcomes because of their decision-making authority. This gave rise to the presumption that management plays a leading role in ensuring that effective learning transfer is achieved and that the nature and extent of management‟s influence determines whether effective and efficient learning transfer is realised.
- Full Text:
User perspectives on document management efficiency at Eskom
- Authors: Mabitsela, Mamatshetshe
- Date: 2014-05-05
- Subjects: Information resources management , Data mining , Total quality management
- Type: Thesis
- Identifier: uj:10933 , http://hdl.handle.net/10210/10506
- Description: M.Phil. (Information Management) , An efficient document management system is one that considers the user’s needs for information and the ability of the system to provide valuable information that matches certain characteristics. When users utilise a document management system (DMS) they require a system that they perceive will make their work easier. The efficient and effective use of a DMS depends on how receptive the users are to technology and their intention in using the system. The documents in the document management system are corporate knowledge and should therefore be stored in a central repository such as the DMS, where the company’s corporate memory cannot be lost. The DMS has all the capabilities to keep documents safe where the documents can be accessed again. To measure the technology acceptance of end users, research has identified the technology acceptance model (TAM) as the ideal method. TAM is tailored to elaborate on computer usage, perceived ease of use, attitudes toward using and usage behaviour. The research stream on technology acceptance and use has become one of the most prolific and is claimed to be the most mature research in the modern information system field. The problem identified was to analyse the user’s behavioural intent towards effectively utilising the Eskom in-house document management system. The purpose was to investigate the use of the document system that is currently in place at Eskom and determine user perspectives. Employees working in Eskom cannot afford to neglect using the document management system on a regular basis. Important documents relevant for everyday work are stored in the system, and all employees are granted access to these documents. Given these considerations, users’ perceptions of the in-house document system cannot be taken for granted, and these issues were researched. The findings from the TAM variables showed that perceptions of users towards the DMS were divided, while half of the users were satisfied with the information, system, usefulness and ease of using the system the other half was not satisfied. A division in opinion emerged whether the system should be replaced or rather improved. Benefits of both options were weighed and the study suggested that the system be replaced.
- Full Text: