The evolving role of information technology in internal auditing
- Authors: Ravjee, Harshal Keshav
- Date: 2015-09-28
- Subjects: Auditing, Internal , Information technology
- Type: Thesis
- Identifier: uj:14198 , http://hdl.handle.net/10210/14641
- Description: M.Com. (Computer Auditing) , Modern organizations are increasingly dependent on information technology (IT) for various reasons: to enhance their operational efficiency, reduce costs or even attain a competitive advantage. The role of information technology in the organization continues to evolve and this has an impact for the internal audit functions that serve these organizations. The study investigated whether the King III report, ISACA standards and IIA standards assist the internal audit function in addressing the impact of information technology on the organization and, as a result, the internal audit function itself. This was performed by way of a comprehensive literature study on the internal audit function and the selected standards and corporate governance framework, the role of information technology in both the organization and the internal audit function, as well as an empirical study detailing a comparative analysis of the King III report, ISACA standards and IIA standards, utilizing key success factors. The study identified an alignment of the key principles and elements identified in the King III report, ISACA standards and IIA standards. There was direct support for ITrelated reviews in the King III report, ISACA Standards and IIA Standards. The comparative analysis performed between the King III report and IIA standards, as well as the ISACA standards and the IIA standards resulted in the formulation of key internal audit success factors. These key success factors compared favourably to those identified in the literature review. The study indicated that the King III report, ISACA Standards and IIA Standards assisted the internal audit function by addressing IT related risks, controls and governance elements.
- Full Text:
- Authors: Ravjee, Harshal Keshav
- Date: 2015-09-28
- Subjects: Auditing, Internal , Information technology
- Type: Thesis
- Identifier: uj:14198 , http://hdl.handle.net/10210/14641
- Description: M.Com. (Computer Auditing) , Modern organizations are increasingly dependent on information technology (IT) for various reasons: to enhance their operational efficiency, reduce costs or even attain a competitive advantage. The role of information technology in the organization continues to evolve and this has an impact for the internal audit functions that serve these organizations. The study investigated whether the King III report, ISACA standards and IIA standards assist the internal audit function in addressing the impact of information technology on the organization and, as a result, the internal audit function itself. This was performed by way of a comprehensive literature study on the internal audit function and the selected standards and corporate governance framework, the role of information technology in both the organization and the internal audit function, as well as an empirical study detailing a comparative analysis of the King III report, ISACA standards and IIA standards, utilizing key success factors. The study identified an alignment of the key principles and elements identified in the King III report, ISACA standards and IIA standards. There was direct support for ITrelated reviews in the King III report, ISACA Standards and IIA Standards. The comparative analysis performed between the King III report and IIA standards, as well as the ISACA standards and the IIA standards resulted in the formulation of key internal audit success factors. These key success factors compared favourably to those identified in the literature review. The study indicated that the King III report, ISACA Standards and IIA Standards assisted the internal audit function by addressing IT related risks, controls and governance elements.
- Full Text:
The alignment of information technology (IT) with business strategies in small and medium-size enterprises
- Makhathini, Bongumusa Emmanuel
- Authors: Makhathini, Bongumusa Emmanuel
- Date: 2014-09-03
- Subjects: Small business , Information technology
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/382731 , uj:12209 , http://hdl.handle.net/10210/11978
- Description: M.Com. (Business Management) , In the current economy, leveraging information technology (IT) is of vital importance to gain a sustainable competitive advantage. To accomplish this, companies must ensure the alignment of IT with business strategy. The fundamental goal of alignment should be for IT capabilities to support, enable, and, where appropriate, lead business strategy. Such alignment will maximize the effective use and value of IT in a strategic context. The alignment of IT and business strategy is not easily achieved and has always presented IT and business executives with numerous problems. One of many challenges facing small businesses is that IT strategy appears to take a parallel course to business strategy, maintaining a common direction with business strategy but at a distance. The objective of this research is to identify the impact of this separation of strategy, and understand how to enable enhanced alignment of IT and business strategy. The research scope focuses on the alignment of IT and business strategy in small and medium enterprises (SMEs). The Strategic Alignment Model will be used to analyse IT and business strategy alignment. The value that IT contributes to the organisation will be analysed in terms of three dimensions: systems, users and the wider business. The research will seek to establish whether a relationship exists between strategic alignment and the value of IT to the organisation. Data has been collected through structured interviews conducted with management executives from various SMEs. A concise introduction with each participant ensured a common understanding of key terms and concepts. Questionnaires were also mailed to willing participants where personal interviews were not possible. The findings of this study are expected to assist the alignment of IT and business strategy in SMEs in South Africa resulting in greater realisation of IT value and benefits
- Full Text:
- Authors: Makhathini, Bongumusa Emmanuel
- Date: 2014-09-03
- Subjects: Small business , Information technology
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/382731 , uj:12209 , http://hdl.handle.net/10210/11978
- Description: M.Com. (Business Management) , In the current economy, leveraging information technology (IT) is of vital importance to gain a sustainable competitive advantage. To accomplish this, companies must ensure the alignment of IT with business strategy. The fundamental goal of alignment should be for IT capabilities to support, enable, and, where appropriate, lead business strategy. Such alignment will maximize the effective use and value of IT in a strategic context. The alignment of IT and business strategy is not easily achieved and has always presented IT and business executives with numerous problems. One of many challenges facing small businesses is that IT strategy appears to take a parallel course to business strategy, maintaining a common direction with business strategy but at a distance. The objective of this research is to identify the impact of this separation of strategy, and understand how to enable enhanced alignment of IT and business strategy. The research scope focuses on the alignment of IT and business strategy in small and medium enterprises (SMEs). The Strategic Alignment Model will be used to analyse IT and business strategy alignment. The value that IT contributes to the organisation will be analysed in terms of three dimensions: systems, users and the wider business. The research will seek to establish whether a relationship exists between strategic alignment and the value of IT to the organisation. Data has been collected through structured interviews conducted with management executives from various SMEs. A concise introduction with each participant ensured a common understanding of key terms and concepts. Questionnaires were also mailed to willing participants where personal interviews were not possible. The findings of this study are expected to assist the alignment of IT and business strategy in SMEs in South Africa resulting in greater realisation of IT value and benefits
- Full Text:
The cooperatives model as an approach to SMME development in South Africa with specific reference to the information, communication and technology (ICT) sector
- Authors: Mabuza, David Charles
- Date: 2009-05-07T07:22:47Z
- Subjects: Small business , Information technology , Small business research in South Africa
- Type: Thesis
- Identifier: uj:8360 , http://hdl.handle.net/10210/2501
- Description: M.A. , Small enterprise development is considered a priority in most developing countries and, South Africa’s not an exception. The rationale for prioritising SMMEs is premised on their potential ability to contribute to the alleviation of the socio-economic challenges facing most developing countries such as unemployment, poverty and low levels of economic development. For South Africa, SMME development is seen as an appropriate strategy that could assist government in its endeavours of bridging the gap that exists between the two economies (first and second economy). To date, the government has utilised various business models to facilitate the entry and development of small enterprises in the mainstream economy. These models include amongst others a close corporation, cooperative and private company. Whilst all three models have been effectively applied across all sectors of the economy such as agriculture, retail services, manufacturing and others, the cooperatives approach/model has not been successfully exploited for the development of small enterprises within the Information Communication Technology (ICT) sector. Using international case studies, this study has been able to demonstrate the critical role that could be played by the cooperative model in facilitating an accelerated development of viable small enterprises within the Information and Communication Technology (ICT) sector in South Africa. Internationally, cooperatives have played a pivotal role in their contribution to economic development in both developed and developing countries. The model has the potential to promote economic growth at the community and regional level, building on the spirit of cooperation that is already prevalent in rural areas. In the ICT sector, the cooperatives approach has been applied as a model for the development of sustainable ICT small enterprises. In actual fact, the model has been instrumental in enhancing small enterprise development in countries such as Argentina, Poland, USA and Bolivia, just to mention a few. It therefore becomes critical for South Africa to consider lessons from these countries, so as to take advantage of the opportunities offered by the cooperative model. However, government needs to put in place appropriate ICT sector specific support structures that would assist people willing to start cooperative enterprises within the ICT sector. In the United States, government introduced a sector-specific bill to facilitate the establishment of the Rural Telephone Administration. The bill made it possible for long-term loans to be made to telephone cooperatives at low interest rates, thus accelerating the development and procurement of rural telephone systems. In Poland, government established a sector-specific Trust Fund referred to as “Balazs Social Trust Fund” solely to support the development of ICT cooperatives in rural areas. Thus, for South Africa to accelerate its pace of development it might need to adopt and customise this model. To ensure continuous monitoring and measurement of the impact of these interventions, government needs to put in place appropriate measurement tools.
- Full Text:
- Authors: Mabuza, David Charles
- Date: 2009-05-07T07:22:47Z
- Subjects: Small business , Information technology , Small business research in South Africa
- Type: Thesis
- Identifier: uj:8360 , http://hdl.handle.net/10210/2501
- Description: M.A. , Small enterprise development is considered a priority in most developing countries and, South Africa’s not an exception. The rationale for prioritising SMMEs is premised on their potential ability to contribute to the alleviation of the socio-economic challenges facing most developing countries such as unemployment, poverty and low levels of economic development. For South Africa, SMME development is seen as an appropriate strategy that could assist government in its endeavours of bridging the gap that exists between the two economies (first and second economy). To date, the government has utilised various business models to facilitate the entry and development of small enterprises in the mainstream economy. These models include amongst others a close corporation, cooperative and private company. Whilst all three models have been effectively applied across all sectors of the economy such as agriculture, retail services, manufacturing and others, the cooperatives approach/model has not been successfully exploited for the development of small enterprises within the Information Communication Technology (ICT) sector. Using international case studies, this study has been able to demonstrate the critical role that could be played by the cooperative model in facilitating an accelerated development of viable small enterprises within the Information and Communication Technology (ICT) sector in South Africa. Internationally, cooperatives have played a pivotal role in their contribution to economic development in both developed and developing countries. The model has the potential to promote economic growth at the community and regional level, building on the spirit of cooperation that is already prevalent in rural areas. In the ICT sector, the cooperatives approach has been applied as a model for the development of sustainable ICT small enterprises. In actual fact, the model has been instrumental in enhancing small enterprise development in countries such as Argentina, Poland, USA and Bolivia, just to mention a few. It therefore becomes critical for South Africa to consider lessons from these countries, so as to take advantage of the opportunities offered by the cooperative model. However, government needs to put in place appropriate ICT sector specific support structures that would assist people willing to start cooperative enterprises within the ICT sector. In the United States, government introduced a sector-specific bill to facilitate the establishment of the Rural Telephone Administration. The bill made it possible for long-term loans to be made to telephone cooperatives at low interest rates, thus accelerating the development and procurement of rural telephone systems. In Poland, government established a sector-specific Trust Fund referred to as “Balazs Social Trust Fund” solely to support the development of ICT cooperatives in rural areas. Thus, for South Africa to accelerate its pace of development it might need to adopt and customise this model. To ensure continuous monitoring and measurement of the impact of these interventions, government needs to put in place appropriate measurement tools.
- Full Text:
'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie
- Authors: Nel, Yvette
- Date: 2014-07-28
- Subjects: Computer networks - Security measures , Information technology
- Type: Thesis
- Identifier: uj:11844 , http://hdl.handle.net/10210/11576
- Description: M.Com. (Informatics) , The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The greater the dependence of the organization upon information technology, the greater the risk the organization is exposed to in case of an information systems interruption. Computer disasters, such as fires, floods, storms, sabotage and human error, constitute a security threat which could prejudice the survival of an organization. Disaster recovery planning is a realistic and imperative activity for each organization whether large or small. In the light of the potential economic and legal implications o fa disaster, it is no longer acceptable not to be prepared for such an occurrence today.A well designed and tested disaster recovery plan, as part of the total information security strategy of the organization, is therefore not only essential in the terms of the recovery of business functions, but for the SURVIVAL of the organization. In viewpoint above, it can be expected that disaster counterrevolutionary be standard practice for all organizations. However that is not the case. The literature study undertook, as well as exposure in practice, indicate clearly that disaster recovery planning enjoys low priority in most organizations. The majority existentialists are superficial, unstructured and insufficient and will not be successful when real disaster strikes.:The most important single cause for the failure of an organization ~ disaster recovery plan, will be that too much emphasis is being placed on the technical aspects rather than on the management or organizational aspects. The solutions an integrated approach of strategies and the multiple technologies which are available today. These strategies and technologies should be combined to meet the specific needs of the individual organization. The purpose of this dissertation was firstly to identify the most critical problems related to disaster recovery planning and secondly to provide a methodology for the development and implementation of a disaster recovery plan which addresses these problems. This methodology constitutes an enhancement on an existing information security methodology in order to establish a total information security strategy for a large organization with disaster recovery as an essential aspect of this strategy. The final disaster recovery planning methodology as proposed in this dissertation, was developed as a result of an extensive literature study undertook as well as involvement during the development of a disaster recovery system by the company which initiated this study.
- Full Text:
- Authors: Nel, Yvette
- Date: 2014-07-28
- Subjects: Computer networks - Security measures , Information technology
- Type: Thesis
- Identifier: uj:11844 , http://hdl.handle.net/10210/11576
- Description: M.Com. (Informatics) , The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The greater the dependence of the organization upon information technology, the greater the risk the organization is exposed to in case of an information systems interruption. Computer disasters, such as fires, floods, storms, sabotage and human error, constitute a security threat which could prejudice the survival of an organization. Disaster recovery planning is a realistic and imperative activity for each organization whether large or small. In the light of the potential economic and legal implications o fa disaster, it is no longer acceptable not to be prepared for such an occurrence today.A well designed and tested disaster recovery plan, as part of the total information security strategy of the organization, is therefore not only essential in the terms of the recovery of business functions, but for the SURVIVAL of the organization. In viewpoint above, it can be expected that disaster counterrevolutionary be standard practice for all organizations. However that is not the case. The literature study undertook, as well as exposure in practice, indicate clearly that disaster recovery planning enjoys low priority in most organizations. The majority existentialists are superficial, unstructured and insufficient and will not be successful when real disaster strikes.:The most important single cause for the failure of an organization ~ disaster recovery plan, will be that too much emphasis is being placed on the technical aspects rather than on the management or organizational aspects. The solutions an integrated approach of strategies and the multiple technologies which are available today. These strategies and technologies should be combined to meet the specific needs of the individual organization. The purpose of this dissertation was firstly to identify the most critical problems related to disaster recovery planning and secondly to provide a methodology for the development and implementation of a disaster recovery plan which addresses these problems. This methodology constitutes an enhancement on an existing information security methodology in order to establish a total information security strategy for a large organization with disaster recovery as an essential aspect of this strategy. The final disaster recovery planning methodology as proposed in this dissertation, was developed as a result of an extensive literature study undertook as well as involvement during the development of a disaster recovery system by the company which initiated this study.
- Full Text:
An engineering management framework for information technology projects in South Africa
- Authors: Malan, Andre
- Date: 2008-06-19T10:01:48Z
- Subjects: Engineering management , Information technology , Project management
- Type: Thesis
- Identifier: uj:2974 , http://hdl.handle.net/10210/639
- Description: Globally, the art and the science of project management (PM) have contributed in no small measure to the advances in the delivery of Information Technology (IT) based solutions. In South Africa, it has been shown that IT projects are currently, generally performed in a basic, but rapidly maturing, project management environment. In order for the organization (or project environment) to mature, certain processes must first be institutionalised. These processes are identifiable by inspection of the standards that relate to PM in general (and to IT PM in particular) and by excluding the activities that relate to specific technologies and products. The remaining processes should therefore be applied to most (if not all) IT projects in SA most (if not all) of the time. These processes were identified and used to iteratively create a Project Management Framework that assists its target market in the following ways: • Simplify and facilitate project managers' access to a common set of PM processes and tools; • Promote the usage of best practices for PM for all projects, both simple and complex; • Increase the level of assured competence project managers bring to PM endeavours; • Establish a commonality of process and standardization of terminology within PM; and • Provide a common method of project progress tracking across the enterprise. The baseline version of this Framework is presented as a web tool, based on a body of research consisting of (1) the PMBOK® Guide processes, (2) some CMMISM process areas and (3) other authoritative, non-conflicting resources. The PMBOK® Guide is tailored for a sector, time and place, resulting in a unique approach to project management. This approach aims to benefit a community and open a new focus area for research within the profession. The target market for this product are those enterprises that are seeing the need for the benefits outlined above or who realise that the first step towards process improvement is a focus on project management. These range from organizations now commencing on the project management path to those who consider “management by projects” to be a strategic option for the organizational design of the company. The case study sites where the product has been implemented include banking / retail operation, a large mining company and a financial services consultancy. , Prof. L. Pretorius Prof. J.H.C. Pretorius
- Full Text:
- Authors: Malan, Andre
- Date: 2008-06-19T10:01:48Z
- Subjects: Engineering management , Information technology , Project management
- Type: Thesis
- Identifier: uj:2974 , http://hdl.handle.net/10210/639
- Description: Globally, the art and the science of project management (PM) have contributed in no small measure to the advances in the delivery of Information Technology (IT) based solutions. In South Africa, it has been shown that IT projects are currently, generally performed in a basic, but rapidly maturing, project management environment. In order for the organization (or project environment) to mature, certain processes must first be institutionalised. These processes are identifiable by inspection of the standards that relate to PM in general (and to IT PM in particular) and by excluding the activities that relate to specific technologies and products. The remaining processes should therefore be applied to most (if not all) IT projects in SA most (if not all) of the time. These processes were identified and used to iteratively create a Project Management Framework that assists its target market in the following ways: • Simplify and facilitate project managers' access to a common set of PM processes and tools; • Promote the usage of best practices for PM for all projects, both simple and complex; • Increase the level of assured competence project managers bring to PM endeavours; • Establish a commonality of process and standardization of terminology within PM; and • Provide a common method of project progress tracking across the enterprise. The baseline version of this Framework is presented as a web tool, based on a body of research consisting of (1) the PMBOK® Guide processes, (2) some CMMISM process areas and (3) other authoritative, non-conflicting resources. The PMBOK® Guide is tailored for a sector, time and place, resulting in a unique approach to project management. This approach aims to benefit a community and open a new focus area for research within the profession. The target market for this product are those enterprises that are seeing the need for the benefits outlined above or who realise that the first step towards process improvement is a focus on project management. These range from organizations now commencing on the project management path to those who consider “management by projects” to be a strategic option for the organizational design of the company. The case study sites where the product has been implemented include banking / retail operation, a large mining company and a financial services consultancy. , Prof. L. Pretorius Prof. J.H.C. Pretorius
- Full Text:
Investigating the information technology factors that contribute to supply chain management
- Authors: Thomas, Deon
- Date: 2011-10-11T08:41:20Z
- Subjects: Information technology , Supply chain management , Business logistics
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/373260 , uj:7250 , http://hdl.handle.net/10210/3903
- Description: M.Sc. , Supply chains members are disperser across multiple geographical locations and the competitive effects of globalisation has provoked the agile capacity of contemporary supply chains. This makes it more difficult for supply chain organisation to meet consumer demands, especially if supply chain processes are not adequately streamlined. This confronted supply chain managers with the daunting task to make informed decisions regarding critical business drivers within their organisations. Incorrect decisions can lead to counter-productive actions. Supply chain members both upstream and downstream often make decisions based on their immediate environment and resources available, thereby not considering other factor within the supply chain holistically. This perspective has change and supply chain managers need to make decision based on the overall information and resources available within the entire supply chain network. The need to evaluate the appropriate supply chain performance measures is critical, as it directly affects the performance of the entire supply chain network. The focus of this thesis revolves around the linear composition of supply chain technology, integration, collaboration and visibility to maximise supply chain agility. The objective of this thesis is therefore to present a model that highlights the roadmap to achieving supply chain visibility followed by supply chain agility. This will allow supply chain members to make informed decisions around key drivers within the supply chain. The intention of the model is to provide a guideline approach toward achieving supply chain agility through a process of welldefined analysis in areas such as supply chain technology, integration, collaboration and visibility. The method used to develop the model in this thesis is build on the scientific principle of adding smaller pieces of the different supply chain management theories to corroborate the context and value of the model. These supply chain management theories combined provides valuable guidance for the roadmap towards achieving supply chain agility. The point of departure is a simple five-step model of which its validity is legitimised through a case study research, conducted on two supply chain partners. The findings from this case study have contextualised the model into a definite treasure map towards achieving success in the face of globalisation.
- Full Text:
- Authors: Thomas, Deon
- Date: 2011-10-11T08:41:20Z
- Subjects: Information technology , Supply chain management , Business logistics
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/373260 , uj:7250 , http://hdl.handle.net/10210/3903
- Description: M.Sc. , Supply chains members are disperser across multiple geographical locations and the competitive effects of globalisation has provoked the agile capacity of contemporary supply chains. This makes it more difficult for supply chain organisation to meet consumer demands, especially if supply chain processes are not adequately streamlined. This confronted supply chain managers with the daunting task to make informed decisions regarding critical business drivers within their organisations. Incorrect decisions can lead to counter-productive actions. Supply chain members both upstream and downstream often make decisions based on their immediate environment and resources available, thereby not considering other factor within the supply chain holistically. This perspective has change and supply chain managers need to make decision based on the overall information and resources available within the entire supply chain network. The need to evaluate the appropriate supply chain performance measures is critical, as it directly affects the performance of the entire supply chain network. The focus of this thesis revolves around the linear composition of supply chain technology, integration, collaboration and visibility to maximise supply chain agility. The objective of this thesis is therefore to present a model that highlights the roadmap to achieving supply chain visibility followed by supply chain agility. This will allow supply chain members to make informed decisions around key drivers within the supply chain. The intention of the model is to provide a guideline approach toward achieving supply chain agility through a process of welldefined analysis in areas such as supply chain technology, integration, collaboration and visibility. The method used to develop the model in this thesis is build on the scientific principle of adding smaller pieces of the different supply chain management theories to corroborate the context and value of the model. These supply chain management theories combined provides valuable guidance for the roadmap towards achieving supply chain agility. The point of departure is a simple five-step model of which its validity is legitimised through a case study research, conducted on two supply chain partners. The findings from this case study have contextualised the model into a definite treasure map towards achieving success in the face of globalisation.
- Full Text:
Specific selective outsourcing services in the information technology (IT) industry in South Africa
- Authors: Mapetla, Palesa
- Date: 2009-03-31T09:51:14Z
- Subjects: Contracting out , Information technology
- Type: Thesis
- Identifier: uj:8288 , http://hdl.handle.net/10210/2398
- Description: M.B.A. , In the current decade, "whole of IT" outsourcing appears to be losing ground, and other options are being considered and sought, such as selective outsourcing. Every product, service, or technology has a life cycle, and although the outsourcing industry is at its maturity level, at the same time it is also going through various growth stages and still evolving with best practices. Wholesale or comprehensive outsourcing clearly seems to be on the decline. Highlights of this analysis are as follows: The whole of IT" outsourcing can be seen as a contract service agreement in which an organisation hands over the majority of IT responsibilities to an external company. These contracts are long-term agreements designed to give higher control and transparency on costs, generally with a fixed price arrangement. In the selective outsourcing model, organisations may choose to outsource part of their IT. For example, the IT infrastructure could be broken down into separate agreements for the IT network, desktop, applications, and help desk. Depending upon the spread and competencies of internal resources, the organisation may choose to outsource one or all of the components. Outsourcing has become one of today’s most powerful, organization shaping management tools and also more so in South Africa. Chapter Two covers the fact that companies experience growth based on specialization, expertise and excellence. It is growth based on focusing on those areas that most directly contribute to a company’s success. Outsourcing has become the new frontier for the modern business. When a decision is made to outsource, the company needs to decide which of the activities or services currently done in-house can be defined as being non-core to the business. It is very important that the management of these non-core functions is not outsourced. “The decision to outsource the IT function is primarily based on the need to get rid of an operational problem. IT can become a very expensive cost centre with all the difficulties associated with managing a technology intensive infrastructure” says Rose (1999:24). Outsourcing provides the opportunity to redesign the IT function, and the potential to access highly specialized skills to extend capability. The purpose of this research is to address the following problem statement: What percentage of the budget in the South African IT market by sector is spent on the specific mentioned selective outsourcing services? The author looks at this problem statement and uses available literature to do an in depth study to reach an understanding of the researched subject. In Chapter three, an appropriate research approach that is inductive has been followed. The telephone interview was chosen for data collection as the most suitable and cost effective method. A questionnaire was designed with undisguised questions to ensure consistency and relevance of the responses. The question construction that followed took into consideration question content, question wording, response structure, and question sequence. Finally, pre-testing of the measurement tool was done to ensure validity and reliability, thereby ensuring that a foundation was laid for Chapter Four in which presentation and analysis of the results are given. Chapter four presents the analyses and interprets the results of the study as supplied by respondents through the questionnaire. The results are presented in tables showing percentage figures and numbers for individual response categories, totals and averages to present a clear picture. Finally there is the analysis and interpretation of each section as presented in the tables. The researcher applies the literature discussed in Chapter Two to support and justify the use of the questions asked, and the application thereof to the concepts of the outsourcing and the specified selective outsourcing services business in South Africa. The research was conducted to address the problem and subproblems discussed in Chapter One. In conclusion in response to these problems, the investigated selective IT services which are mentioned in detail in chapter one model has emerged as an attractive alternative to the single-vendor approach. Essentially, a selective approach involves choosing best-of-breed vendors to administer various business services or business functions, leading to either a total or limited solution. However, although selective outsourcing may indeed address some longstanding outsourcing challenges, it also presents some new management issues.
- Full Text:
- Authors: Mapetla, Palesa
- Date: 2009-03-31T09:51:14Z
- Subjects: Contracting out , Information technology
- Type: Thesis
- Identifier: uj:8288 , http://hdl.handle.net/10210/2398
- Description: M.B.A. , In the current decade, "whole of IT" outsourcing appears to be losing ground, and other options are being considered and sought, such as selective outsourcing. Every product, service, or technology has a life cycle, and although the outsourcing industry is at its maturity level, at the same time it is also going through various growth stages and still evolving with best practices. Wholesale or comprehensive outsourcing clearly seems to be on the decline. Highlights of this analysis are as follows: The whole of IT" outsourcing can be seen as a contract service agreement in which an organisation hands over the majority of IT responsibilities to an external company. These contracts are long-term agreements designed to give higher control and transparency on costs, generally with a fixed price arrangement. In the selective outsourcing model, organisations may choose to outsource part of their IT. For example, the IT infrastructure could be broken down into separate agreements for the IT network, desktop, applications, and help desk. Depending upon the spread and competencies of internal resources, the organisation may choose to outsource one or all of the components. Outsourcing has become one of today’s most powerful, organization shaping management tools and also more so in South Africa. Chapter Two covers the fact that companies experience growth based on specialization, expertise and excellence. It is growth based on focusing on those areas that most directly contribute to a company’s success. Outsourcing has become the new frontier for the modern business. When a decision is made to outsource, the company needs to decide which of the activities or services currently done in-house can be defined as being non-core to the business. It is very important that the management of these non-core functions is not outsourced. “The decision to outsource the IT function is primarily based on the need to get rid of an operational problem. IT can become a very expensive cost centre with all the difficulties associated with managing a technology intensive infrastructure” says Rose (1999:24). Outsourcing provides the opportunity to redesign the IT function, and the potential to access highly specialized skills to extend capability. The purpose of this research is to address the following problem statement: What percentage of the budget in the South African IT market by sector is spent on the specific mentioned selective outsourcing services? The author looks at this problem statement and uses available literature to do an in depth study to reach an understanding of the researched subject. In Chapter three, an appropriate research approach that is inductive has been followed. The telephone interview was chosen for data collection as the most suitable and cost effective method. A questionnaire was designed with undisguised questions to ensure consistency and relevance of the responses. The question construction that followed took into consideration question content, question wording, response structure, and question sequence. Finally, pre-testing of the measurement tool was done to ensure validity and reliability, thereby ensuring that a foundation was laid for Chapter Four in which presentation and analysis of the results are given. Chapter four presents the analyses and interprets the results of the study as supplied by respondents through the questionnaire. The results are presented in tables showing percentage figures and numbers for individual response categories, totals and averages to present a clear picture. Finally there is the analysis and interpretation of each section as presented in the tables. The researcher applies the literature discussed in Chapter Two to support and justify the use of the questions asked, and the application thereof to the concepts of the outsourcing and the specified selective outsourcing services business in South Africa. The research was conducted to address the problem and subproblems discussed in Chapter One. In conclusion in response to these problems, the investigated selective IT services which are mentioned in detail in chapter one model has emerged as an attractive alternative to the single-vendor approach. Essentially, a selective approach involves choosing best-of-breed vendors to administer various business services or business functions, leading to either a total or limited solution. However, although selective outsourcing may indeed address some longstanding outsourcing challenges, it also presents some new management issues.
- Full Text:
The engagement of educators with computers during the uptake of Information and Communication Technology (ICT).
- Tlhoaele, Malefyane Jacobeth
- Authors: Tlhoaele, Malefyane Jacobeth
- Date: 2009-02-11T08:54:28Z
- Subjects: In-service training of teachers , Computer literacy , Information technology , Ga-Rankuwa (South Africa)
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/376142 , uj:8133 , http://hdl.handle.net/10210/2108
- Description: M.Ed. , Die navorsingsdoel van die studie is om vas te stel hoe Intell® Teach to the Future die betrokkenheid van opvoeders met Informasie en Kommunikasie Tegnologië (IKT) beïnvloed. Opvoeders in Ga-Rankuwa het deelgeneem in die navorsing. ʼn Aantal privaatondernemings, soos Intel, het programme ontwerp ten doel om opvoeders met die integrering van IKT te ondersteun, maar onvoldoende gedokumenteerde bewyse van die invloed van privaat initiatiewe op die betrokkenheid van opvoeders met IKT bestaan. Skole in Ga-Rankuwa gebruik die IKT integreringsopleidingsprogramme van verskeie organisasies, dus is dit belangrik om die invloed van hierdie programme op die betrokkenheid van opvoeders met rekenaars te evalueer. Onderswyersopleiding in IKT integrering word beskou as die belangrikste en kritiese suksesfaktor om die tekort aan gekwalifiseerde opvoeders in IKT aan te spreek (Dawes, 1999:256). Volgens Orange en Hobbs (2000:86) om skole en opvoeders te betrek by IKT integrering, die beskikbaarheid van harde-en sagteware word as noodsaaklik beskou alhoewel die blote teenwoordiigheid van rekenaars in skole is onvoldoende om die kwaliteit van die onderwys te verander. Verdere pogings om opvoeders te betrek met IKT integrering in onderwys en leer so wel as ondersteuning is benodig. Verkeie lande gebruik verskillende strategiee van onderswyersopleiding in hierdie verband. Die navorsingmetodes is ‘n kombinasie van etnografie en ‘n gevallestudie. Waarneming, fokusgroeponderhoude en analise van dokumente is gebruik om data te versamel. Data analise het gelei tot vyf kategorieë. Die bevindinge toon aan dat Intel®, tot ‘n grote mate, die betrokkenheid van opvoeders wel beїnvloed het.
- Full Text:
- Authors: Tlhoaele, Malefyane Jacobeth
- Date: 2009-02-11T08:54:28Z
- Subjects: In-service training of teachers , Computer literacy , Information technology , Ga-Rankuwa (South Africa)
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/376142 , uj:8133 , http://hdl.handle.net/10210/2108
- Description: M.Ed. , Die navorsingsdoel van die studie is om vas te stel hoe Intell® Teach to the Future die betrokkenheid van opvoeders met Informasie en Kommunikasie Tegnologië (IKT) beïnvloed. Opvoeders in Ga-Rankuwa het deelgeneem in die navorsing. ʼn Aantal privaatondernemings, soos Intel, het programme ontwerp ten doel om opvoeders met die integrering van IKT te ondersteun, maar onvoldoende gedokumenteerde bewyse van die invloed van privaat initiatiewe op die betrokkenheid van opvoeders met IKT bestaan. Skole in Ga-Rankuwa gebruik die IKT integreringsopleidingsprogramme van verskeie organisasies, dus is dit belangrik om die invloed van hierdie programme op die betrokkenheid van opvoeders met rekenaars te evalueer. Onderswyersopleiding in IKT integrering word beskou as die belangrikste en kritiese suksesfaktor om die tekort aan gekwalifiseerde opvoeders in IKT aan te spreek (Dawes, 1999:256). Volgens Orange en Hobbs (2000:86) om skole en opvoeders te betrek by IKT integrering, die beskikbaarheid van harde-en sagteware word as noodsaaklik beskou alhoewel die blote teenwoordiigheid van rekenaars in skole is onvoldoende om die kwaliteit van die onderwys te verander. Verdere pogings om opvoeders te betrek met IKT integrering in onderwys en leer so wel as ondersteuning is benodig. Verkeie lande gebruik verskillende strategiee van onderswyersopleiding in hierdie verband. Die navorsingmetodes is ‘n kombinasie van etnografie en ‘n gevallestudie. Waarneming, fokusgroeponderhoude en analise van dokumente is gebruik om data te versamel. Data analise het gelei tot vyf kategorieë. Die bevindinge toon aan dat Intel®, tot ‘n grote mate, die betrokkenheid van opvoeders wel beїnvloed het.
- Full Text:
A predictive model for information technology project success
- Authors: Joseph, Nazeer
- Date: 2014-05-05
- Subjects: Information technology , Project management , Organizational effectiveness , Creative ability in business
- Type: Thesis
- Identifier: uj:10916 , http://hdl.handle.net/10210/10490
- Description: M.Com. (Information Technology Management) , Information and communication technology (ICT) project success is considered the Holy Grail within many organisations. Over the past decade organisations have begun to realise the increasing importance and the potential of exploiting ICT to gain competitive advantage in their particular realm. Organisations have consequently pushed for the implementation of robust ICT solutions not only to facilitate and augment crucial decision-making processes, but to improve overall organisational efficiency and effectiveness as well. These ICT solutions are deployed via ICT projects. However, extensive research has revealed that ICT projects are continuing to fail at a disturbing rate nationally as well as internationally. ICT projects therefore have an infamous reputation within organisations and the project management domain. This research focused on determining what drives ICT project success by systematically investigating how ICT project success is perceived and measured as well as the factors which influence it. The quantitative research paradigm was implemented through the use of a survey in the form of a structured questionnaire. Although this research was cross-sectional in nature, it employed an element of longitudinal analysis as the results were scrutinised and compared with previous research conducted within the same research area. ICT project team members were randomly sampled to acquire an objective view of ICT project success. Moreover, this research revolved around the philosophy that if the significance of each influencing factor is understood, it should be possible to predict whether an ICT project will succeed or fail. A predictive modelling approach was adopted. This predictive model presented within this dissertation was constructed using structural equation modelling (SEM). The predictive model indicated that ICT project success is predicted by means of stakeholder management, communication and methodology. The model also indicated that these three factors are interrelated and are dependent on one another. It was established that overall project success is dependent on project management success and project product success. This research employed a technique which is rarely used within the project management or ICT project management domain, viz. SEM. Two key recommendations emerged from this research. Firstly, this research suggests that it may be time to re-evaluate how ICT projects are measured as well as the influencing factors, as traditional approaches are yet to accommodate ICT projects in particular. Secondly, this research suggests that researchers should start to explore the underlying constructs of communication as this could assist in addressing a fundamental flaw not only in ICT project management, but project management in general.
- Full Text:
- Authors: Joseph, Nazeer
- Date: 2014-05-05
- Subjects: Information technology , Project management , Organizational effectiveness , Creative ability in business
- Type: Thesis
- Identifier: uj:10916 , http://hdl.handle.net/10210/10490
- Description: M.Com. (Information Technology Management) , Information and communication technology (ICT) project success is considered the Holy Grail within many organisations. Over the past decade organisations have begun to realise the increasing importance and the potential of exploiting ICT to gain competitive advantage in their particular realm. Organisations have consequently pushed for the implementation of robust ICT solutions not only to facilitate and augment crucial decision-making processes, but to improve overall organisational efficiency and effectiveness as well. These ICT solutions are deployed via ICT projects. However, extensive research has revealed that ICT projects are continuing to fail at a disturbing rate nationally as well as internationally. ICT projects therefore have an infamous reputation within organisations and the project management domain. This research focused on determining what drives ICT project success by systematically investigating how ICT project success is perceived and measured as well as the factors which influence it. The quantitative research paradigm was implemented through the use of a survey in the form of a structured questionnaire. Although this research was cross-sectional in nature, it employed an element of longitudinal analysis as the results were scrutinised and compared with previous research conducted within the same research area. ICT project team members were randomly sampled to acquire an objective view of ICT project success. Moreover, this research revolved around the philosophy that if the significance of each influencing factor is understood, it should be possible to predict whether an ICT project will succeed or fail. A predictive modelling approach was adopted. This predictive model presented within this dissertation was constructed using structural equation modelling (SEM). The predictive model indicated that ICT project success is predicted by means of stakeholder management, communication and methodology. The model also indicated that these three factors are interrelated and are dependent on one another. It was established that overall project success is dependent on project management success and project product success. This research employed a technique which is rarely used within the project management or ICT project management domain, viz. SEM. Two key recommendations emerged from this research. Firstly, this research suggests that it may be time to re-evaluate how ICT projects are measured as well as the influencing factors, as traditional approaches are yet to accommodate ICT projects in particular. Secondly, this research suggests that researchers should start to explore the underlying constructs of communication as this could assist in addressing a fundamental flaw not only in ICT project management, but project management in general.
- Full Text:
Promoting project reviews as a best practice in multinational organisations
- Authors: Maluleke, Mmatseleng
- Date: 2011-09-15T08:02:32Z
- Subjects: Information technology , Project management , Multinational organisations , International business enterprises
- Type: Thesis
- Identifier: uj:7214 , http://hdl.handle.net/10210/3848
- Description: M.Tech. , Many organisations rely on Information Technology (IT) projects to react to competitive pressure and innovation. IT projects are divers and they may include installing off-the-shelf hardware to developing software to basic technologies that provide information to support the operations, management, decisions-making functions within the organisation. In the past years, there had been an increasing number of Multinational Organisations (MNOs) working on IT projects together to create mergers and grow business in foreign countries. While IT projects are being undertaken, Multinational Project Teams are faced with challenges and among their challenges project reviews is one of them. Project reviews are an essential process of learning new things and capturing what had been learned in the current phase/project in order for future phases/projects to benefit. Moreover it is a stage where project teams assess if they had met their key deliverables and project performance. A related study was conducted on project reviews and the results revealed that 4 out of 5 organisations did not conduct post-project reviews. However, if they did conduct project reviews, there were no guidelines on how to do it. The aim of the study was to ascertain a set of guidelines that are used by MNOs to conduct project reviews and share lessons learned and experiences gathered during and after an IT projects for future usage. The significance of this study was to highlight the importance of guidelines for conducting project reviews in order for project teams to learn from the project. The findings can be utilised in building guidelines that MNOs can use to conduct project reviews and to integrate lessons learned back into the organisation. The scope of the research was limited to an MNO with headquarters in the Netherlands and subsidiaries in China and South Africa. The study was carried out using qualitative research approach through interviews, observation and gathering of documentation. Using Atlas.ti which is a ii CAQDAS, data was analysed to compare and contrast similarities by using categories. The categories constructed offered the integrative interpretation of what was learned. From the individual and focus group interviews 5 main categories were elicited: project review meetings, intervals of conducting project reviews, lessons learned, knowledge sharing, and information extracted from project reviews. Based on the results it was evident that the MNO in question requires a set of guidelines on how to conduct project reviews. Moreover, there was no formal mechanism used to integrate lessons learned back into the organisation. A Generic Model for when project reviews should be conducted was developed using various models and guidelines that are used by other organisations and this model could be utilised by MNOs. For each project phase as illustrated on the Generic Model, there are project review guidelines on what to measure during the phase review. This research contributes to the growing literature on the organisational processes and mechanisms for project reviews and lessons learned.
- Full Text:
- Authors: Maluleke, Mmatseleng
- Date: 2011-09-15T08:02:32Z
- Subjects: Information technology , Project management , Multinational organisations , International business enterprises
- Type: Thesis
- Identifier: uj:7214 , http://hdl.handle.net/10210/3848
- Description: M.Tech. , Many organisations rely on Information Technology (IT) projects to react to competitive pressure and innovation. IT projects are divers and they may include installing off-the-shelf hardware to developing software to basic technologies that provide information to support the operations, management, decisions-making functions within the organisation. In the past years, there had been an increasing number of Multinational Organisations (MNOs) working on IT projects together to create mergers and grow business in foreign countries. While IT projects are being undertaken, Multinational Project Teams are faced with challenges and among their challenges project reviews is one of them. Project reviews are an essential process of learning new things and capturing what had been learned in the current phase/project in order for future phases/projects to benefit. Moreover it is a stage where project teams assess if they had met their key deliverables and project performance. A related study was conducted on project reviews and the results revealed that 4 out of 5 organisations did not conduct post-project reviews. However, if they did conduct project reviews, there were no guidelines on how to do it. The aim of the study was to ascertain a set of guidelines that are used by MNOs to conduct project reviews and share lessons learned and experiences gathered during and after an IT projects for future usage. The significance of this study was to highlight the importance of guidelines for conducting project reviews in order for project teams to learn from the project. The findings can be utilised in building guidelines that MNOs can use to conduct project reviews and to integrate lessons learned back into the organisation. The scope of the research was limited to an MNO with headquarters in the Netherlands and subsidiaries in China and South Africa. The study was carried out using qualitative research approach through interviews, observation and gathering of documentation. Using Atlas.ti which is a ii CAQDAS, data was analysed to compare and contrast similarities by using categories. The categories constructed offered the integrative interpretation of what was learned. From the individual and focus group interviews 5 main categories were elicited: project review meetings, intervals of conducting project reviews, lessons learned, knowledge sharing, and information extracted from project reviews. Based on the results it was evident that the MNO in question requires a set of guidelines on how to conduct project reviews. Moreover, there was no formal mechanism used to integrate lessons learned back into the organisation. A Generic Model for when project reviews should be conducted was developed using various models and guidelines that are used by other organisations and this model could be utilised by MNOs. For each project phase as illustrated on the Generic Model, there are project review guidelines on what to measure during the phase review. This research contributes to the growing literature on the organisational processes and mechanisms for project reviews and lessons learned.
- Full Text:
The reasons for and prevention of IT project failure.
- Authors: Nuss, Jacques Erich
- Date: 2012-08-16
- Subjects: Project management , Information technology , Business failures
- Type: Thesis
- Identifier: uj:2554 , http://hdl.handle.net/10210/6007
- Description: M.A. , The rate of change in the business arena is continuously increasing and companies are constantly seeking innovative products, services and knowledge-enabled processes to enable them to compete effectively against each other. IT plays an important role as an enabler of these processes. The problem is that the implementations of IT projects, commissioned to support and enable the business functions, often fail. The high rate of failing IT projects is a real and relevant concern of the business environment. Companies are wasting a significant portion of their resources on failed IT projects. More than often, IT projects fail to realize their intended purpose of reducing operating costs, increasing worker productivity, increasing cycle times and eventually increasing companies' market share. Management of these companies continues to complain about costly IT expenditure returning only a portion of the expected return on investment. The phenomenon of IT project failure has been in existence for many years and has in more recent years become a relevant topic calling for investigation and further study. Accordingly, this document is the culmination of the results of a study of the reasons why IT projects fail and offers possible measures to be taken to counter the failure of IT projects. The most significant and relevant reasons for IT project failure are listed in this document. These reasons span from the internal project environment through to the external project environment. Aligning these reasons with the environment of any anticiPated IT project will establish a base from which a successful IT project could be initiated. It is hoped that this document will serve as valuable input to the decision makers in the IT and business arenas that need to be made aware of the reasons for IT project failure in order for them to better manage their IT projects.
- Full Text:
- Authors: Nuss, Jacques Erich
- Date: 2012-08-16
- Subjects: Project management , Information technology , Business failures
- Type: Thesis
- Identifier: uj:2554 , http://hdl.handle.net/10210/6007
- Description: M.A. , The rate of change in the business arena is continuously increasing and companies are constantly seeking innovative products, services and knowledge-enabled processes to enable them to compete effectively against each other. IT plays an important role as an enabler of these processes. The problem is that the implementations of IT projects, commissioned to support and enable the business functions, often fail. The high rate of failing IT projects is a real and relevant concern of the business environment. Companies are wasting a significant portion of their resources on failed IT projects. More than often, IT projects fail to realize their intended purpose of reducing operating costs, increasing worker productivity, increasing cycle times and eventually increasing companies' market share. Management of these companies continues to complain about costly IT expenditure returning only a portion of the expected return on investment. The phenomenon of IT project failure has been in existence for many years and has in more recent years become a relevant topic calling for investigation and further study. Accordingly, this document is the culmination of the results of a study of the reasons why IT projects fail and offers possible measures to be taken to counter the failure of IT projects. The most significant and relevant reasons for IT project failure are listed in this document. These reasons span from the internal project environment through to the external project environment. Aligning these reasons with the environment of any anticiPated IT project will establish a base from which a successful IT project could be initiated. It is hoped that this document will serve as valuable input to the decision makers in the IT and business arenas that need to be made aware of the reasons for IT project failure in order for them to better manage their IT projects.
- Full Text:
A strategy for knowledge management
- Rademan, Johan Andries Muller
- Authors: Rademan, Johan Andries Muller
- Date: 2012-01-24
- Subjects: Knowledge management , Information technology
- Type: Thesis
- Identifier: uj:1932 , http://hdl.handle.net/10210/4292
- Description: M.Comm.
- Full Text:
- Authors: Rademan, Johan Andries Muller
- Date: 2012-01-24
- Subjects: Knowledge management , Information technology
- Type: Thesis
- Identifier: uj:1932 , http://hdl.handle.net/10210/4292
- Description: M.Comm.
- Full Text:
The computer auditor's involvement in IT strategic planning
- Authors: Brown, Ronald Arden
- Date: 2014-08-19
- Subjects: Information technology , Strategic planning
- Type: Thesis
- Identifier: uj:12097 , http://hdl.handle.net/10210/11842
- Description: M.Com. (Computer auditing) , 1. Overview of Topic This dissertation deals with the question of the computer auditor's involvement in IT (Information Technology) strategic planning. Increasingly, organizations have come to value IT for the competitive or strategic advantage that it can provide in the modern marketplace. IT has thus moved from being an administrative function to being of strategic importance to an organization. The IT strategic plan expresses an organization's beliefs and goals relating to the use of information technology and the use of IT for strategic purposes. The IT strategic plan should ideally support the organizational goals and the principles identified in the organizational strategic plan. 2. Research Problem and Methodology The purpose of this research project is to identify whether a computer auditor should be involved in IT strategy planning. It is contended that the involvement would normally be that of auditing an IT strategy, but could also extend to providing input into the development of such a strategy. This dissertation suggests that the IT strategy is a risk area in the organization and as such should be examined by the computer auditor. In addition, the concept of IT strategy being a key control system within the organization is introduced. A survey of literature is used to justify the above. Based on points gleaned from the literature survey, a suggested guideline for auditing an IT strategy is proposed. 3. Results of the Research Although a comprehensive survey of literature was performed. no indication was found that this topic had been dealt with in the past. The literature survey. however, proved to be of value in defining IT strategy and identifying it's risk areas. In addition, some of the literature did imply that there was scope for the involvement of the computer auditor in IT strategy planning. The literature survey also indicated that the topic of IT strategy was of importance to South African companies. Based on the literature survey it was concluded that, because IT strategy represented a risk area to the organization, the computer auditor should be involved in the audit thereof. The following guidelines were drawn up: one to assist in identifying when an IT strategy should be audited, one to identify control objectives relating to IT strategy and a corresponding audit guideline for each control objective. 4. Conclusion The literature surveyed indicated that there was a definite need for the computer auditor to become involved in the audit of IT strategy. The guideline presented for the audit of an IT strategy should prove to be useful to the computer auditor in identifying when and how an IT strategy should be audited. Investigating the actual involvement of the computer auditor in IT strategic planning was identified as an area for possible future research.
- Full Text:
- Authors: Brown, Ronald Arden
- Date: 2014-08-19
- Subjects: Information technology , Strategic planning
- Type: Thesis
- Identifier: uj:12097 , http://hdl.handle.net/10210/11842
- Description: M.Com. (Computer auditing) , 1. Overview of Topic This dissertation deals with the question of the computer auditor's involvement in IT (Information Technology) strategic planning. Increasingly, organizations have come to value IT for the competitive or strategic advantage that it can provide in the modern marketplace. IT has thus moved from being an administrative function to being of strategic importance to an organization. The IT strategic plan expresses an organization's beliefs and goals relating to the use of information technology and the use of IT for strategic purposes. The IT strategic plan should ideally support the organizational goals and the principles identified in the organizational strategic plan. 2. Research Problem and Methodology The purpose of this research project is to identify whether a computer auditor should be involved in IT strategy planning. It is contended that the involvement would normally be that of auditing an IT strategy, but could also extend to providing input into the development of such a strategy. This dissertation suggests that the IT strategy is a risk area in the organization and as such should be examined by the computer auditor. In addition, the concept of IT strategy being a key control system within the organization is introduced. A survey of literature is used to justify the above. Based on points gleaned from the literature survey, a suggested guideline for auditing an IT strategy is proposed. 3. Results of the Research Although a comprehensive survey of literature was performed. no indication was found that this topic had been dealt with in the past. The literature survey. however, proved to be of value in defining IT strategy and identifying it's risk areas. In addition, some of the literature did imply that there was scope for the involvement of the computer auditor in IT strategy planning. The literature survey also indicated that the topic of IT strategy was of importance to South African companies. Based on the literature survey it was concluded that, because IT strategy represented a risk area to the organization, the computer auditor should be involved in the audit thereof. The following guidelines were drawn up: one to assist in identifying when an IT strategy should be audited, one to identify control objectives relating to IT strategy and a corresponding audit guideline for each control objective. 4. Conclusion The literature surveyed indicated that there was a definite need for the computer auditor to become involved in the audit of IT strategy. The guideline presented for the audit of an IT strategy should prove to be useful to the computer auditor in identifying when and how an IT strategy should be audited. Investigating the actual involvement of the computer auditor in IT strategic planning was identified as an area for possible future research.
- Full Text:
Bring your own device and information technology service delivery : a higher education institution case study
- Authors: Sliep, Chelma
- Date: 2015-03-18
- Subjects: Educational technology , World Wide Web , Information technology
- Type: Thesis
- Identifier: uj:13455 , http://hdl.handle.net/10210/13491
- Description: M.Com. (Business Management ) , Please refer to full text to view abstract
- Full Text:
- Authors: Sliep, Chelma
- Date: 2015-03-18
- Subjects: Educational technology , World Wide Web , Information technology
- Type: Thesis
- Identifier: uj:13455 , http://hdl.handle.net/10210/13491
- Description: M.Com. (Business Management ) , Please refer to full text to view abstract
- Full Text:
The alignment of information technology (IT) with business strategies in small and medium-size enterprises
- Makhathini, Bongumusa Emmanuel
- Authors: Makhathini, Bongumusa Emmanuel
- Date: 2011-09-15T07:58:04Z
- Subjects: Information technology , Business strategy , Small business
- Type: Thesis
- Identifier: uj:7213 , http://hdl.handle.net/10210/3847
- Description: M.Comm. , In the current economy, leveraging information technology (“IT”) is of vital importance to gain a sustainable competitive advantage. To accomplish this, companies must ensure the alignment of IT with business strategy. The fundamental goal of alignment should be for IT capabilities to support, enable, and, where appropriate, lead business strategy. Such alignment will maximize the effective use and value of IT in a strategic context. The alignment of IT and business strategy is not easily achieved and has always presented IT and business executives with numerous problems. One of many challenges facing small businesses is that IT strategy appears to take a parallel course to business strategy, maintaining a common direction with business strategy but at a distance. The objective of this research is to identify the impact of this separation of strategy, and understand how to enable enhanced alignment of IT and business strategy. The research scope focuses on the alignment of IT and business strategy in small and medium enterprises (SMEs). The Strategic Alignment Model will be used to analyse IT and business strategy alignment. The value that IT contributes to the organisation will be analysed in terms of three dimensions: systems, users and the wider business. The research will seek to establish whether a relationship exists between strategic alignment and the value of IT to the organisation. Data has been collected through structured interviews conducted with management executives from various SMEs. A concise introduction with each participant ensured a common understanding of key terms and concepts. Questionnaires were also mailed to willing participants where personal interviews were not possible. The findings of this study are expected to assist the alignment of IT and business strategy in SMEs in South Africa resulting in greater realisation of IT value and benefits.
- Full Text:
- Authors: Makhathini, Bongumusa Emmanuel
- Date: 2011-09-15T07:58:04Z
- Subjects: Information technology , Business strategy , Small business
- Type: Thesis
- Identifier: uj:7213 , http://hdl.handle.net/10210/3847
- Description: M.Comm. , In the current economy, leveraging information technology (“IT”) is of vital importance to gain a sustainable competitive advantage. To accomplish this, companies must ensure the alignment of IT with business strategy. The fundamental goal of alignment should be for IT capabilities to support, enable, and, where appropriate, lead business strategy. Such alignment will maximize the effective use and value of IT in a strategic context. The alignment of IT and business strategy is not easily achieved and has always presented IT and business executives with numerous problems. One of many challenges facing small businesses is that IT strategy appears to take a parallel course to business strategy, maintaining a common direction with business strategy but at a distance. The objective of this research is to identify the impact of this separation of strategy, and understand how to enable enhanced alignment of IT and business strategy. The research scope focuses on the alignment of IT and business strategy in small and medium enterprises (SMEs). The Strategic Alignment Model will be used to analyse IT and business strategy alignment. The value that IT contributes to the organisation will be analysed in terms of three dimensions: systems, users and the wider business. The research will seek to establish whether a relationship exists between strategic alignment and the value of IT to the organisation. Data has been collected through structured interviews conducted with management executives from various SMEs. A concise introduction with each participant ensured a common understanding of key terms and concepts. Questionnaires were also mailed to willing participants where personal interviews were not possible. The findings of this study are expected to assist the alignment of IT and business strategy in SMEs in South Africa resulting in greater realisation of IT value and benefits.
- Full Text:
Die ontwikkeling van 'n kategoriseringsmeganisme vir beheermaatreëls in die veld van rekenaarsekerheid en die koppeling daarvan met standaarde vir beheermaatreëls
- Authors: Bosch, Christiaan Johannes
- Date: 2014-11-20
- Subjects: Computer security , Information technology
- Type: Thesis
- Identifier: uj:13094 , http://hdl.handle.net/10210/12972
- Description: M.Sc. (Informatics) , Please refer to full text to view abstract
- Full Text:
- Authors: Bosch, Christiaan Johannes
- Date: 2014-11-20
- Subjects: Computer security , Information technology
- Type: Thesis
- Identifier: uj:13094 , http://hdl.handle.net/10210/12972
- Description: M.Sc. (Informatics) , Please refer to full text to view abstract
- Full Text:
Constructing a leadership model: derived from a South African business leader's life-story
- Authors: Beyleveld, Arnold
- Date: 2010-02-23T10:28:35Z
- Subjects: Leadership , Information technology , Information technology management , Organizational change management
- Type: Thesis
- Identifier: uj:6635 , http://hdl.handle.net/10210/3036
- Description: D.Phil. , The aim of the study was to explore and understand the emerging leadership challenges in order to further enhance the development of leadership and management in the information technology industry in South Africa. A combined casing and life-story approach in this modernist qualitative research study was employed. Selective sampling, as described by Plummer (1983; 2001) as part of his critical humanistic approach, was employed to select the CEO, Mr X, from a particular South African information technology company. Data were obtained mainly from solicited sources, but also some that were unsolicited. This resulted in a life story containing rich descriptive data obtained at first hand from Mr X’s professional career and associated areas of his life. The life -story of this storyteller was organised manually as well as with the aid of ATLAS-Ti 5.0, a computer-based software package suitable for this type of study. The leadership landscape model of Veldsman (2004), a local expert in the area of leadership, together with key theoretical concepts found in the literature, were used to construct an enhanced leadership model. Appropriate qualitative guidelines were used to ensure a study that attends to both academic rigour and aesthetics. The resultant constructed leadership model offers important, if not unique, insights and findings regarding the leadership environment, individual psychosocial dynamics, competencies and capabilities, as well as leadership roles, modes, styles and processes that contribute to personal leadership effectiveness. The thesis illuminates and offers recommendations for a number of methodological and theoretical implications regarding local and global leadership studies, as well as for practice and policy regarding leadership and managerial development.
- Full Text:
- Authors: Beyleveld, Arnold
- Date: 2010-02-23T10:28:35Z
- Subjects: Leadership , Information technology , Information technology management , Organizational change management
- Type: Thesis
- Identifier: uj:6635 , http://hdl.handle.net/10210/3036
- Description: D.Phil. , The aim of the study was to explore and understand the emerging leadership challenges in order to further enhance the development of leadership and management in the information technology industry in South Africa. A combined casing and life-story approach in this modernist qualitative research study was employed. Selective sampling, as described by Plummer (1983; 2001) as part of his critical humanistic approach, was employed to select the CEO, Mr X, from a particular South African information technology company. Data were obtained mainly from solicited sources, but also some that were unsolicited. This resulted in a life story containing rich descriptive data obtained at first hand from Mr X’s professional career and associated areas of his life. The life -story of this storyteller was organised manually as well as with the aid of ATLAS-Ti 5.0, a computer-based software package suitable for this type of study. The leadership landscape model of Veldsman (2004), a local expert in the area of leadership, together with key theoretical concepts found in the literature, were used to construct an enhanced leadership model. Appropriate qualitative guidelines were used to ensure a study that attends to both academic rigour and aesthetics. The resultant constructed leadership model offers important, if not unique, insights and findings regarding the leadership environment, individual psychosocial dynamics, competencies and capabilities, as well as leadership roles, modes, styles and processes that contribute to personal leadership effectiveness. The thesis illuminates and offers recommendations for a number of methodological and theoretical implications regarding local and global leadership studies, as well as for practice and policy regarding leadership and managerial development.
- Full Text:
A holistic framework for successful sponsoring IT projects from an IT governance persepective
- Authors: Letchtman, Elazar
- Date: 2008-04-23T10:39:40Z
- Subjects: Information technology , South Africa , ICT governance , Information communications technology
- Type: Thesis
- Identifier: uj:8588 , http://hdl.handle.net/10210/284
- Description: Over the past decade, research conducted for the benefit of IT project management has pointed to numerous factors that contribute to organisational project success. Support from executives and top management is often cited as an imperative factor, whilst having clear business objectives for conducting projects follows closely behind. The linchpin between the executive leadership team and project managers is the project sponsor, who is in a position to directly contribute to the two aforementioned project success factors. The precise responsibilities of the sponsor, however, remain relatively poorly defined. As a result, it is important to focus on this very important role and provide those who are in this position with a set of activities that would facilitate greater project success. Further to this, the corporate governance scandals of the past few years and the consequent publication of relevant acts of legislation and governance standards has forced top management to become more interested in the conduct of their organisation’s portfolio of projects. This research study therefore addresses both the formal and informal aspects of the role of the project sponsor and has provided guidance to organisations and professional associations in defining the role and responsibilities of the project sponsor within a corporate governance framework. The first goal was therefore to establish a holistic corporate governance framework that encompasses the roles of IT and project management in the organisation. By doing so, executives are given a road map that aligns all IT projects with organisational strategy and a means to facilitate greater internal control over all IT project-related activities. This was developed by identifying the relevance and implications that recent corporate scandals around the world have had on IT and project management in general. This then led to combining COBIT (which is an IT governance Abstract ii framework) and a new project governance framework (known as the PG framework) to form a corporate governance framework. This is followed by the development of a generic project sponsorship competency framework that provides organisations with a benchmark that assesses whether an individual is appropriately suited for the role of sponsoring an IT project. Both frameworks provide a means to facilitate better strategic alignment and internal control of all IT project-related activities, and thus contribute to the improvement of IT project management capability within the organisation. , Labuschagne, L., Prof.
- Full Text:
- Authors: Letchtman, Elazar
- Date: 2008-04-23T10:39:40Z
- Subjects: Information technology , South Africa , ICT governance , Information communications technology
- Type: Thesis
- Identifier: uj:8588 , http://hdl.handle.net/10210/284
- Description: Over the past decade, research conducted for the benefit of IT project management has pointed to numerous factors that contribute to organisational project success. Support from executives and top management is often cited as an imperative factor, whilst having clear business objectives for conducting projects follows closely behind. The linchpin between the executive leadership team and project managers is the project sponsor, who is in a position to directly contribute to the two aforementioned project success factors. The precise responsibilities of the sponsor, however, remain relatively poorly defined. As a result, it is important to focus on this very important role and provide those who are in this position with a set of activities that would facilitate greater project success. Further to this, the corporate governance scandals of the past few years and the consequent publication of relevant acts of legislation and governance standards has forced top management to become more interested in the conduct of their organisation’s portfolio of projects. This research study therefore addresses both the formal and informal aspects of the role of the project sponsor and has provided guidance to organisations and professional associations in defining the role and responsibilities of the project sponsor within a corporate governance framework. The first goal was therefore to establish a holistic corporate governance framework that encompasses the roles of IT and project management in the organisation. By doing so, executives are given a road map that aligns all IT projects with organisational strategy and a means to facilitate greater internal control over all IT project-related activities. This was developed by identifying the relevance and implications that recent corporate scandals around the world have had on IT and project management in general. This then led to combining COBIT (which is an IT governance Abstract ii framework) and a new project governance framework (known as the PG framework) to form a corporate governance framework. This is followed by the development of a generic project sponsorship competency framework that provides organisations with a benchmark that assesses whether an individual is appropriately suited for the role of sponsoring an IT project. Both frameworks provide a means to facilitate better strategic alignment and internal control of all IT project-related activities, and thus contribute to the improvement of IT project management capability within the organisation. , Labuschagne, L., Prof.
- Full Text:
Information overload in the South African banking industry
- Authors: Burger, Elsa
- Date: 2008-05-14T10:48:05Z
- Subjects: Information resources management , Information technology , Electronic mail systems , Business communication , Banks and banking information resources
- Type: Thesis
- Identifier: uj:7230 , http://hdl.handle.net/10210/387
- Description: At present, the average employee is being bombarded with an ever-increasing number of messages information on his/her company, its products and services, as well as information on its strategy all flooding in from a myriad of sources, including internal vehicles such as e-mail, the intranet, management memoranda, internal publications, as well as the external media, such as the Internet, the local newspaper, television news and national business and industry magazines. The term “information overload” is usually understood to present a state of affairs where an individual’s efficiency in using information in his/her work is hampered by a surplus amount of relevant and potentially useful information available to him/her. The principal aim of this study, therefore, is to establish the extent and impact of information overload on the knowledge worker in the banking industry, with special reference to the part that e-mail technology plays in the creation of such overload. Broadcasting, the telephone and the Internet have revolutionised the way in which workers communicate around the globe. Electronic-messaging systems such as e-mail have become the medium of choice in many organisations, and hold significant and valuable business data, information and knowledge. These systems have had a profound impact on the way in which personal and business communications are effected in the office. With e-mail having acquired mission-critical status, a number of concomitant circumstances and consequences have arisen that present organisations, such as banks, with a variety of challenges, among which • the impact on employees’ productivity, owing to the time spent on e-mailing activities • employees’ attitudes towards e-mail • compliance with corporate policies, such as those policies governing electronic communication and computer use • surveillance and monitoring of e-mail • the quest for finding formal archiving solutions. , Prof. C.W. Rensleigh
- Full Text:
- Authors: Burger, Elsa
- Date: 2008-05-14T10:48:05Z
- Subjects: Information resources management , Information technology , Electronic mail systems , Business communication , Banks and banking information resources
- Type: Thesis
- Identifier: uj:7230 , http://hdl.handle.net/10210/387
- Description: At present, the average employee is being bombarded with an ever-increasing number of messages information on his/her company, its products and services, as well as information on its strategy all flooding in from a myriad of sources, including internal vehicles such as e-mail, the intranet, management memoranda, internal publications, as well as the external media, such as the Internet, the local newspaper, television news and national business and industry magazines. The term “information overload” is usually understood to present a state of affairs where an individual’s efficiency in using information in his/her work is hampered by a surplus amount of relevant and potentially useful information available to him/her. The principal aim of this study, therefore, is to establish the extent and impact of information overload on the knowledge worker in the banking industry, with special reference to the part that e-mail technology plays in the creation of such overload. Broadcasting, the telephone and the Internet have revolutionised the way in which workers communicate around the globe. Electronic-messaging systems such as e-mail have become the medium of choice in many organisations, and hold significant and valuable business data, information and knowledge. These systems have had a profound impact on the way in which personal and business communications are effected in the office. With e-mail having acquired mission-critical status, a number of concomitant circumstances and consequences have arisen that present organisations, such as banks, with a variety of challenges, among which • the impact on employees’ productivity, owing to the time spent on e-mailing activities • employees’ attitudes towards e-mail • compliance with corporate policies, such as those policies governing electronic communication and computer use • surveillance and monitoring of e-mail • the quest for finding formal archiving solutions. , Prof. C.W. Rensleigh
- Full Text:
The efficiency of capital investment decisions pertaining to information technology: a multi-institutional approach
- Authors: Gama, Mduduzi Edward
- Date: 2011-06-22T10:50:19Z
- Subjects: Capital investments , Information technology
- Type: Thesis
- Identifier: uj:7123 , http://hdl.handle.net/10210/3716
- Description: D.Phil. , IT plays a vital role in most institutions, and decision-makers have to be concerned about ensuring that capital investment decisions pertaining to IT investments are efficient. This is even more crucial in the prevailing tough economic conditions. The intention of the study was to test the perceptions of IT decision-makers on the efficiency of capital investment decisions pertaining to IT within their various institutions. The management dilemma in this study was described as the inability by decision-makers to tell whether or not the IT investment would deliver the desired results. In order to resolve the management dilemma, a list of management questions was raised, for example: Which factors had an impact on the efficiency of capital investment decisions pertaining to IT? How did decision-makers quantify the financial and non-financial costs attributable to IT investments? How did decision-makers quantify the financial and non-financial benefits attributable to IT investments? The primary objective of the research was to conduct a literature review on the identified research constructs and through scientific empirical research construct evidence in support (or otherwise) of the hypotheses that are put forward. The secondary objectives of the research were: Identifying the factors that impact on the efficiency of capital investment decisions pertaining to IT; Determining the levels of satisfaction by various stakeholders with regard to the value that IT investments add to their institutions; Determining whether or not institutions were able to identify and quantify the financial and non-financial costs attributable to IT investments; Determining whether or not institutions were able to identify and quantify the financial and non-financial benefits attributable to IT investments; iv Determining whether or not IT investments created a competitive edge over other institutions; Determining the applicability of risk management tools on IT investments within various institutions; and Determining the extent to which current financial tools were utilised in evaluating capital investment decisions pertaining to IT.
- Full Text:
- Authors: Gama, Mduduzi Edward
- Date: 2011-06-22T10:50:19Z
- Subjects: Capital investments , Information technology
- Type: Thesis
- Identifier: uj:7123 , http://hdl.handle.net/10210/3716
- Description: D.Phil. , IT plays a vital role in most institutions, and decision-makers have to be concerned about ensuring that capital investment decisions pertaining to IT investments are efficient. This is even more crucial in the prevailing tough economic conditions. The intention of the study was to test the perceptions of IT decision-makers on the efficiency of capital investment decisions pertaining to IT within their various institutions. The management dilemma in this study was described as the inability by decision-makers to tell whether or not the IT investment would deliver the desired results. In order to resolve the management dilemma, a list of management questions was raised, for example: Which factors had an impact on the efficiency of capital investment decisions pertaining to IT? How did decision-makers quantify the financial and non-financial costs attributable to IT investments? How did decision-makers quantify the financial and non-financial benefits attributable to IT investments? The primary objective of the research was to conduct a literature review on the identified research constructs and through scientific empirical research construct evidence in support (or otherwise) of the hypotheses that are put forward. The secondary objectives of the research were: Identifying the factors that impact on the efficiency of capital investment decisions pertaining to IT; Determining the levels of satisfaction by various stakeholders with regard to the value that IT investments add to their institutions; Determining whether or not institutions were able to identify and quantify the financial and non-financial costs attributable to IT investments; Determining whether or not institutions were able to identify and quantify the financial and non-financial benefits attributable to IT investments; iv Determining whether or not IT investments created a competitive edge over other institutions; Determining the applicability of risk management tools on IT investments within various institutions; and Determining the extent to which current financial tools were utilised in evaluating capital investment decisions pertaining to IT.
- Full Text: