The evolving role of information technology in internal auditing
- Authors: Ravjee, Harshal Keshav
- Date: 2015-09-28
- Subjects: Auditing, Internal , Information technology
- Type: Thesis
- Identifier: uj:14198 , http://hdl.handle.net/10210/14641
- Description: M.Com. (Computer Auditing) , Modern organizations are increasingly dependent on information technology (IT) for various reasons: to enhance their operational efficiency, reduce costs or even attain a competitive advantage. The role of information technology in the organization continues to evolve and this has an impact for the internal audit functions that serve these organizations. The study investigated whether the King III report, ISACA standards and IIA standards assist the internal audit function in addressing the impact of information technology on the organization and, as a result, the internal audit function itself. This was performed by way of a comprehensive literature study on the internal audit function and the selected standards and corporate governance framework, the role of information technology in both the organization and the internal audit function, as well as an empirical study detailing a comparative analysis of the King III report, ISACA standards and IIA standards, utilizing key success factors. The study identified an alignment of the key principles and elements identified in the King III report, ISACA standards and IIA standards. There was direct support for ITrelated reviews in the King III report, ISACA Standards and IIA Standards. The comparative analysis performed between the King III report and IIA standards, as well as the ISACA standards and the IIA standards resulted in the formulation of key internal audit success factors. These key success factors compared favourably to those identified in the literature review. The study indicated that the King III report, ISACA Standards and IIA Standards assisted the internal audit function by addressing IT related risks, controls and governance elements.
- Full Text:
- Authors: Ravjee, Harshal Keshav
- Date: 2015-09-28
- Subjects: Auditing, Internal , Information technology
- Type: Thesis
- Identifier: uj:14198 , http://hdl.handle.net/10210/14641
- Description: M.Com. (Computer Auditing) , Modern organizations are increasingly dependent on information technology (IT) for various reasons: to enhance their operational efficiency, reduce costs or even attain a competitive advantage. The role of information technology in the organization continues to evolve and this has an impact for the internal audit functions that serve these organizations. The study investigated whether the King III report, ISACA standards and IIA standards assist the internal audit function in addressing the impact of information technology on the organization and, as a result, the internal audit function itself. This was performed by way of a comprehensive literature study on the internal audit function and the selected standards and corporate governance framework, the role of information technology in both the organization and the internal audit function, as well as an empirical study detailing a comparative analysis of the King III report, ISACA standards and IIA standards, utilizing key success factors. The study identified an alignment of the key principles and elements identified in the King III report, ISACA standards and IIA standards. There was direct support for ITrelated reviews in the King III report, ISACA Standards and IIA Standards. The comparative analysis performed between the King III report and IIA standards, as well as the ISACA standards and the IIA standards resulted in the formulation of key internal audit success factors. These key success factors compared favourably to those identified in the literature review. The study indicated that the King III report, ISACA Standards and IIA Standards assisted the internal audit function by addressing IT related risks, controls and governance elements.
- Full Text:
The alignment of information technology (IT) with business strategies in small and medium-size enterprises
- Makhathini, Bongumusa Emmanuel
- Authors: Makhathini, Bongumusa Emmanuel
- Date: 2014-09-03
- Subjects: Small business , Information technology
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/382731 , uj:12209 , http://hdl.handle.net/10210/11978
- Description: M.Com. (Business Management) , In the current economy, leveraging information technology (IT) is of vital importance to gain a sustainable competitive advantage. To accomplish this, companies must ensure the alignment of IT with business strategy. The fundamental goal of alignment should be for IT capabilities to support, enable, and, where appropriate, lead business strategy. Such alignment will maximize the effective use and value of IT in a strategic context. The alignment of IT and business strategy is not easily achieved and has always presented IT and business executives with numerous problems. One of many challenges facing small businesses is that IT strategy appears to take a parallel course to business strategy, maintaining a common direction with business strategy but at a distance. The objective of this research is to identify the impact of this separation of strategy, and understand how to enable enhanced alignment of IT and business strategy. The research scope focuses on the alignment of IT and business strategy in small and medium enterprises (SMEs). The Strategic Alignment Model will be used to analyse IT and business strategy alignment. The value that IT contributes to the organisation will be analysed in terms of three dimensions: systems, users and the wider business. The research will seek to establish whether a relationship exists between strategic alignment and the value of IT to the organisation. Data has been collected through structured interviews conducted with management executives from various SMEs. A concise introduction with each participant ensured a common understanding of key terms and concepts. Questionnaires were also mailed to willing participants where personal interviews were not possible. The findings of this study are expected to assist the alignment of IT and business strategy in SMEs in South Africa resulting in greater realisation of IT value and benefits
- Full Text:
- Authors: Makhathini, Bongumusa Emmanuel
- Date: 2014-09-03
- Subjects: Small business , Information technology
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/382731 , uj:12209 , http://hdl.handle.net/10210/11978
- Description: M.Com. (Business Management) , In the current economy, leveraging information technology (IT) is of vital importance to gain a sustainable competitive advantage. To accomplish this, companies must ensure the alignment of IT with business strategy. The fundamental goal of alignment should be for IT capabilities to support, enable, and, where appropriate, lead business strategy. Such alignment will maximize the effective use and value of IT in a strategic context. The alignment of IT and business strategy is not easily achieved and has always presented IT and business executives with numerous problems. One of many challenges facing small businesses is that IT strategy appears to take a parallel course to business strategy, maintaining a common direction with business strategy but at a distance. The objective of this research is to identify the impact of this separation of strategy, and understand how to enable enhanced alignment of IT and business strategy. The research scope focuses on the alignment of IT and business strategy in small and medium enterprises (SMEs). The Strategic Alignment Model will be used to analyse IT and business strategy alignment. The value that IT contributes to the organisation will be analysed in terms of three dimensions: systems, users and the wider business. The research will seek to establish whether a relationship exists between strategic alignment and the value of IT to the organisation. Data has been collected through structured interviews conducted with management executives from various SMEs. A concise introduction with each participant ensured a common understanding of key terms and concepts. Questionnaires were also mailed to willing participants where personal interviews were not possible. The findings of this study are expected to assist the alignment of IT and business strategy in SMEs in South Africa resulting in greater realisation of IT value and benefits
- Full Text:
A conceptual framework to enhance performance in virtual information technology project teams
- Authors: Dube, Shopee M.
- Date: 2016
- Subjects: Information technology , Communication and technology , Virtual work teams , International business enterprises
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://ujcontent.uj.ac.za8080/10210/382429 , http://hdl.handle.net/10210/124856 , uj:20967
- Description: Abstract: The globalisation of business and markets is growing rapidly and information and communication technologies (ICT) are developing at a very fast pace. This has resulted in the emergence and formation of virtual project teams, also referred to as global project teams. Virtual project teams have increased global competitiveness as well as investments in several types of projects in manufacturing, telecommunications, information technology, engineering, financial services and construction, and are used as a means of enhancing team performance. From this globalisation of business and markets, virtual project teams are now operating within the boundaries of the operational requirements of the team members. This allows for flexibility of working from anywhere without restrictions imposed by geographical boundaries, differences in time zones and heavily relying on communication technologies. The aim of this study was to develop a conceptual framework to improve the performance of virtual project teams, which information technology (IT) project managers can use to better understand how teams can be managed. The quantitative research methodology was employed in this study to collect data using an online questionnaire and the data was analysed using statistical methods. This research methodology allowed the researcher to explore this phenomenon in greater depth. The purposive sampling method (non-probability) was adopted for this study. The key findings of this research are that the following factors improve the performance of virtual IT project teams in South Africa: communication, good leadership, trust, social interaction, team cooperation and commitment. The research further reveals that there is a strong correlation between these factors; hence the factors identified were all essential for the development of the conceptual framework. , Ph.D. (Informatics)
- Full Text:
- Authors: Dube, Shopee M.
- Date: 2016
- Subjects: Information technology , Communication and technology , Virtual work teams , International business enterprises
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://ujcontent.uj.ac.za8080/10210/382429 , http://hdl.handle.net/10210/124856 , uj:20967
- Description: Abstract: The globalisation of business and markets is growing rapidly and information and communication technologies (ICT) are developing at a very fast pace. This has resulted in the emergence and formation of virtual project teams, also referred to as global project teams. Virtual project teams have increased global competitiveness as well as investments in several types of projects in manufacturing, telecommunications, information technology, engineering, financial services and construction, and are used as a means of enhancing team performance. From this globalisation of business and markets, virtual project teams are now operating within the boundaries of the operational requirements of the team members. This allows for flexibility of working from anywhere without restrictions imposed by geographical boundaries, differences in time zones and heavily relying on communication technologies. The aim of this study was to develop a conceptual framework to improve the performance of virtual project teams, which information technology (IT) project managers can use to better understand how teams can be managed. The quantitative research methodology was employed in this study to collect data using an online questionnaire and the data was analysed using statistical methods. This research methodology allowed the researcher to explore this phenomenon in greater depth. The purposive sampling method (non-probability) was adopted for this study. The key findings of this research are that the following factors improve the performance of virtual IT project teams in South Africa: communication, good leadership, trust, social interaction, team cooperation and commitment. The research further reveals that there is a strong correlation between these factors; hence the factors identified were all essential for the development of the conceptual framework. , Ph.D. (Informatics)
- Full Text:
The cooperatives model as an approach to SMME development in South Africa with specific reference to the information, communication and technology (ICT) sector
- Authors: Mabuza, David Charles
- Date: 2009-05-07T07:22:47Z
- Subjects: Small business , Information technology , Small business research in South Africa
- Type: Thesis
- Identifier: uj:8360 , http://hdl.handle.net/10210/2501
- Description: M.A. , Small enterprise development is considered a priority in most developing countries and, South Africa’s not an exception. The rationale for prioritising SMMEs is premised on their potential ability to contribute to the alleviation of the socio-economic challenges facing most developing countries such as unemployment, poverty and low levels of economic development. For South Africa, SMME development is seen as an appropriate strategy that could assist government in its endeavours of bridging the gap that exists between the two economies (first and second economy). To date, the government has utilised various business models to facilitate the entry and development of small enterprises in the mainstream economy. These models include amongst others a close corporation, cooperative and private company. Whilst all three models have been effectively applied across all sectors of the economy such as agriculture, retail services, manufacturing and others, the cooperatives approach/model has not been successfully exploited for the development of small enterprises within the Information Communication Technology (ICT) sector. Using international case studies, this study has been able to demonstrate the critical role that could be played by the cooperative model in facilitating an accelerated development of viable small enterprises within the Information and Communication Technology (ICT) sector in South Africa. Internationally, cooperatives have played a pivotal role in their contribution to economic development in both developed and developing countries. The model has the potential to promote economic growth at the community and regional level, building on the spirit of cooperation that is already prevalent in rural areas. In the ICT sector, the cooperatives approach has been applied as a model for the development of sustainable ICT small enterprises. In actual fact, the model has been instrumental in enhancing small enterprise development in countries such as Argentina, Poland, USA and Bolivia, just to mention a few. It therefore becomes critical for South Africa to consider lessons from these countries, so as to take advantage of the opportunities offered by the cooperative model. However, government needs to put in place appropriate ICT sector specific support structures that would assist people willing to start cooperative enterprises within the ICT sector. In the United States, government introduced a sector-specific bill to facilitate the establishment of the Rural Telephone Administration. The bill made it possible for long-term loans to be made to telephone cooperatives at low interest rates, thus accelerating the development and procurement of rural telephone systems. In Poland, government established a sector-specific Trust Fund referred to as “Balazs Social Trust Fund” solely to support the development of ICT cooperatives in rural areas. Thus, for South Africa to accelerate its pace of development it might need to adopt and customise this model. To ensure continuous monitoring and measurement of the impact of these interventions, government needs to put in place appropriate measurement tools.
- Full Text:
- Authors: Mabuza, David Charles
- Date: 2009-05-07T07:22:47Z
- Subjects: Small business , Information technology , Small business research in South Africa
- Type: Thesis
- Identifier: uj:8360 , http://hdl.handle.net/10210/2501
- Description: M.A. , Small enterprise development is considered a priority in most developing countries and, South Africa’s not an exception. The rationale for prioritising SMMEs is premised on their potential ability to contribute to the alleviation of the socio-economic challenges facing most developing countries such as unemployment, poverty and low levels of economic development. For South Africa, SMME development is seen as an appropriate strategy that could assist government in its endeavours of bridging the gap that exists between the two economies (first and second economy). To date, the government has utilised various business models to facilitate the entry and development of small enterprises in the mainstream economy. These models include amongst others a close corporation, cooperative and private company. Whilst all three models have been effectively applied across all sectors of the economy such as agriculture, retail services, manufacturing and others, the cooperatives approach/model has not been successfully exploited for the development of small enterprises within the Information Communication Technology (ICT) sector. Using international case studies, this study has been able to demonstrate the critical role that could be played by the cooperative model in facilitating an accelerated development of viable small enterprises within the Information and Communication Technology (ICT) sector in South Africa. Internationally, cooperatives have played a pivotal role in their contribution to economic development in both developed and developing countries. The model has the potential to promote economic growth at the community and regional level, building on the spirit of cooperation that is already prevalent in rural areas. In the ICT sector, the cooperatives approach has been applied as a model for the development of sustainable ICT small enterprises. In actual fact, the model has been instrumental in enhancing small enterprise development in countries such as Argentina, Poland, USA and Bolivia, just to mention a few. It therefore becomes critical for South Africa to consider lessons from these countries, so as to take advantage of the opportunities offered by the cooperative model. However, government needs to put in place appropriate ICT sector specific support structures that would assist people willing to start cooperative enterprises within the ICT sector. In the United States, government introduced a sector-specific bill to facilitate the establishment of the Rural Telephone Administration. The bill made it possible for long-term loans to be made to telephone cooperatives at low interest rates, thus accelerating the development and procurement of rural telephone systems. In Poland, government established a sector-specific Trust Fund referred to as “Balazs Social Trust Fund” solely to support the development of ICT cooperatives in rural areas. Thus, for South Africa to accelerate its pace of development it might need to adopt and customise this model. To ensure continuous monitoring and measurement of the impact of these interventions, government needs to put in place appropriate measurement tools.
- Full Text:
The role of information technology in the risk management of businesses in South Africa
- Authors: Schutte, B. , Marx, B.
- Date: 2018
- Subjects: Information technology , Risk management , Risk management of IT
- Language: English
- Type: Article
- Identifier: http://hdl.handle.net/10210/289677 , uj:31434 , Citation: Schutte, B. & Marx, B. 2018. The role of information technology in the risk management of businesses in South Africa.
- Description: Abstract: Information Technology is a dynamic and constantly evolving field which has dramatically changed the way in which businesses operate. Organisations now have to ensure that information technology is incorporated into their risk management processes and the strategies to mitigate those risks. This study investigated the role of information technology in risk management processes, focusing on the type of information technology risks and threats that affect organisations. An empirical study of the integrated reports of the top 40 companies listed on the Johannesburg Securities Exchange was conducted to investigate the information technology risk management disclosure practices. The study was completed in 2016, before the King IV Code of Corporate Governance for South Africa became effective and accordingly, focused only on the King III principles of information technology governance and risk management. The study found that companies are mitigating information technology risks and have included information technology into their risk management processes. The results also revealed that awareness of information technology risk may be industry-driven, as companies operating in information technology environments were more likely to be exposed to information technology risk.
- Full Text:
- Authors: Schutte, B. , Marx, B.
- Date: 2018
- Subjects: Information technology , Risk management , Risk management of IT
- Language: English
- Type: Article
- Identifier: http://hdl.handle.net/10210/289677 , uj:31434 , Citation: Schutte, B. & Marx, B. 2018. The role of information technology in the risk management of businesses in South Africa.
- Description: Abstract: Information Technology is a dynamic and constantly evolving field which has dramatically changed the way in which businesses operate. Organisations now have to ensure that information technology is incorporated into their risk management processes and the strategies to mitigate those risks. This study investigated the role of information technology in risk management processes, focusing on the type of information technology risks and threats that affect organisations. An empirical study of the integrated reports of the top 40 companies listed on the Johannesburg Securities Exchange was conducted to investigate the information technology risk management disclosure practices. The study was completed in 2016, before the King IV Code of Corporate Governance for South Africa became effective and accordingly, focused only on the King III principles of information technology governance and risk management. The study found that companies are mitigating information technology risks and have included information technology into their risk management processes. The results also revealed that awareness of information technology risk may be industry-driven, as companies operating in information technology environments were more likely to be exposed to information technology risk.
- Full Text:
'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie
- Authors: Nel, Yvette
- Date: 2014-07-28
- Subjects: Computer networks - Security measures , Information technology
- Type: Thesis
- Identifier: uj:11844 , http://hdl.handle.net/10210/11576
- Description: M.Com. (Informatics) , The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The greater the dependence of the organization upon information technology, the greater the risk the organization is exposed to in case of an information systems interruption. Computer disasters, such as fires, floods, storms, sabotage and human error, constitute a security threat which could prejudice the survival of an organization. Disaster recovery planning is a realistic and imperative activity for each organization whether large or small. In the light of the potential economic and legal implications o fa disaster, it is no longer acceptable not to be prepared for such an occurrence today.A well designed and tested disaster recovery plan, as part of the total information security strategy of the organization, is therefore not only essential in the terms of the recovery of business functions, but for the SURVIVAL of the organization. In viewpoint above, it can be expected that disaster counterrevolutionary be standard practice for all organizations. However that is not the case. The literature study undertook, as well as exposure in practice, indicate clearly that disaster recovery planning enjoys low priority in most organizations. The majority existentialists are superficial, unstructured and insufficient and will not be successful when real disaster strikes.:The most important single cause for the failure of an organization ~ disaster recovery plan, will be that too much emphasis is being placed on the technical aspects rather than on the management or organizational aspects. The solutions an integrated approach of strategies and the multiple technologies which are available today. These strategies and technologies should be combined to meet the specific needs of the individual organization. The purpose of this dissertation was firstly to identify the most critical problems related to disaster recovery planning and secondly to provide a methodology for the development and implementation of a disaster recovery plan which addresses these problems. This methodology constitutes an enhancement on an existing information security methodology in order to establish a total information security strategy for a large organization with disaster recovery as an essential aspect of this strategy. The final disaster recovery planning methodology as proposed in this dissertation, was developed as a result of an extensive literature study undertook as well as involvement during the development of a disaster recovery system by the company which initiated this study.
- Full Text:
- Authors: Nel, Yvette
- Date: 2014-07-28
- Subjects: Computer networks - Security measures , Information technology
- Type: Thesis
- Identifier: uj:11844 , http://hdl.handle.net/10210/11576
- Description: M.Com. (Informatics) , The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The greater the dependence of the organization upon information technology, the greater the risk the organization is exposed to in case of an information systems interruption. Computer disasters, such as fires, floods, storms, sabotage and human error, constitute a security threat which could prejudice the survival of an organization. Disaster recovery planning is a realistic and imperative activity for each organization whether large or small. In the light of the potential economic and legal implications o fa disaster, it is no longer acceptable not to be prepared for such an occurrence today.A well designed and tested disaster recovery plan, as part of the total information security strategy of the organization, is therefore not only essential in the terms of the recovery of business functions, but for the SURVIVAL of the organization. In viewpoint above, it can be expected that disaster counterrevolutionary be standard practice for all organizations. However that is not the case. The literature study undertook, as well as exposure in practice, indicate clearly that disaster recovery planning enjoys low priority in most organizations. The majority existentialists are superficial, unstructured and insufficient and will not be successful when real disaster strikes.:The most important single cause for the failure of an organization ~ disaster recovery plan, will be that too much emphasis is being placed on the technical aspects rather than on the management or organizational aspects. The solutions an integrated approach of strategies and the multiple technologies which are available today. These strategies and technologies should be combined to meet the specific needs of the individual organization. The purpose of this dissertation was firstly to identify the most critical problems related to disaster recovery planning and secondly to provide a methodology for the development and implementation of a disaster recovery plan which addresses these problems. This methodology constitutes an enhancement on an existing information security methodology in order to establish a total information security strategy for a large organization with disaster recovery as an essential aspect of this strategy. The final disaster recovery planning methodology as proposed in this dissertation, was developed as a result of an extensive literature study undertook as well as involvement during the development of a disaster recovery system by the company which initiated this study.
- Full Text:
The impact of information communication and technology in rural development : a case of Moletjie, Limpopo Province
- Aigbavboa, Clinton O., Thwala, Wellington Didibhuku
- Authors: Aigbavboa, Clinton O. , Thwala, Wellington Didibhuku
- Date: 2014
- Subjects: Business entrepreneurship , Business innovation , Rural development , Information technology
- Type: Article
- Identifier: uj:4820 , http://hdl.handle.net/10210/12261
- Description: Refer to full-paper
- Full Text: false
- Authors: Aigbavboa, Clinton O. , Thwala, Wellington Didibhuku
- Date: 2014
- Subjects: Business entrepreneurship , Business innovation , Rural development , Information technology
- Type: Article
- Identifier: uj:4820 , http://hdl.handle.net/10210/12261
- Description: Refer to full-paper
- Full Text: false
Evaluating the career status of IT professionals
- Authors: Dhanpat, N.
- Date: 2015-06-08
- Subjects: Information technology , Information technology - Management , Information technologists
- Type: Article
- Identifier: uj:6185 , http://hdl.handle.net/10210/14071
- Description: Please refer to full text to view abstract
- Full Text: false
- Authors: Dhanpat, N.
- Date: 2015-06-08
- Subjects: Information technology , Information technology - Management , Information technologists
- Type: Article
- Identifier: uj:6185 , http://hdl.handle.net/10210/14071
- Description: Please refer to full text to view abstract
- Full Text: false
An engineering management framework for information technology projects in South Africa
- Authors: Malan, Andre
- Date: 2008-06-19T10:01:48Z
- Subjects: Engineering management , Information technology , Project management
- Type: Thesis
- Identifier: uj:2974 , http://hdl.handle.net/10210/639
- Description: Globally, the art and the science of project management (PM) have contributed in no small measure to the advances in the delivery of Information Technology (IT) based solutions. In South Africa, it has been shown that IT projects are currently, generally performed in a basic, but rapidly maturing, project management environment. In order for the organization (or project environment) to mature, certain processes must first be institutionalised. These processes are identifiable by inspection of the standards that relate to PM in general (and to IT PM in particular) and by excluding the activities that relate to specific technologies and products. The remaining processes should therefore be applied to most (if not all) IT projects in SA most (if not all) of the time. These processes were identified and used to iteratively create a Project Management Framework that assists its target market in the following ways: • Simplify and facilitate project managers' access to a common set of PM processes and tools; • Promote the usage of best practices for PM for all projects, both simple and complex; • Increase the level of assured competence project managers bring to PM endeavours; • Establish a commonality of process and standardization of terminology within PM; and • Provide a common method of project progress tracking across the enterprise. The baseline version of this Framework is presented as a web tool, based on a body of research consisting of (1) the PMBOK® Guide processes, (2) some CMMISM process areas and (3) other authoritative, non-conflicting resources. The PMBOK® Guide is tailored for a sector, time and place, resulting in a unique approach to project management. This approach aims to benefit a community and open a new focus area for research within the profession. The target market for this product are those enterprises that are seeing the need for the benefits outlined above or who realise that the first step towards process improvement is a focus on project management. These range from organizations now commencing on the project management path to those who consider “management by projects” to be a strategic option for the organizational design of the company. The case study sites where the product has been implemented include banking / retail operation, a large mining company and a financial services consultancy. , Prof. L. Pretorius Prof. J.H.C. Pretorius
- Full Text:
- Authors: Malan, Andre
- Date: 2008-06-19T10:01:48Z
- Subjects: Engineering management , Information technology , Project management
- Type: Thesis
- Identifier: uj:2974 , http://hdl.handle.net/10210/639
- Description: Globally, the art and the science of project management (PM) have contributed in no small measure to the advances in the delivery of Information Technology (IT) based solutions. In South Africa, it has been shown that IT projects are currently, generally performed in a basic, but rapidly maturing, project management environment. In order for the organization (or project environment) to mature, certain processes must first be institutionalised. These processes are identifiable by inspection of the standards that relate to PM in general (and to IT PM in particular) and by excluding the activities that relate to specific technologies and products. The remaining processes should therefore be applied to most (if not all) IT projects in SA most (if not all) of the time. These processes were identified and used to iteratively create a Project Management Framework that assists its target market in the following ways: • Simplify and facilitate project managers' access to a common set of PM processes and tools; • Promote the usage of best practices for PM for all projects, both simple and complex; • Increase the level of assured competence project managers bring to PM endeavours; • Establish a commonality of process and standardization of terminology within PM; and • Provide a common method of project progress tracking across the enterprise. The baseline version of this Framework is presented as a web tool, based on a body of research consisting of (1) the PMBOK® Guide processes, (2) some CMMISM process areas and (3) other authoritative, non-conflicting resources. The PMBOK® Guide is tailored for a sector, time and place, resulting in a unique approach to project management. This approach aims to benefit a community and open a new focus area for research within the profession. The target market for this product are those enterprises that are seeing the need for the benefits outlined above or who realise that the first step towards process improvement is a focus on project management. These range from organizations now commencing on the project management path to those who consider “management by projects” to be a strategic option for the organizational design of the company. The case study sites where the product has been implemented include banking / retail operation, a large mining company and a financial services consultancy. , Prof. L. Pretorius Prof. J.H.C. Pretorius
- Full Text:
Investigating the information technology factors that contribute to supply chain management
- Authors: Thomas, Deon
- Date: 2011-10-11T08:41:20Z
- Subjects: Information technology , Supply chain management , Business logistics
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/373260 , uj:7250 , http://hdl.handle.net/10210/3903
- Description: M.Sc. , Supply chains members are disperser across multiple geographical locations and the competitive effects of globalisation has provoked the agile capacity of contemporary supply chains. This makes it more difficult for supply chain organisation to meet consumer demands, especially if supply chain processes are not adequately streamlined. This confronted supply chain managers with the daunting task to make informed decisions regarding critical business drivers within their organisations. Incorrect decisions can lead to counter-productive actions. Supply chain members both upstream and downstream often make decisions based on their immediate environment and resources available, thereby not considering other factor within the supply chain holistically. This perspective has change and supply chain managers need to make decision based on the overall information and resources available within the entire supply chain network. The need to evaluate the appropriate supply chain performance measures is critical, as it directly affects the performance of the entire supply chain network. The focus of this thesis revolves around the linear composition of supply chain technology, integration, collaboration and visibility to maximise supply chain agility. The objective of this thesis is therefore to present a model that highlights the roadmap to achieving supply chain visibility followed by supply chain agility. This will allow supply chain members to make informed decisions around key drivers within the supply chain. The intention of the model is to provide a guideline approach toward achieving supply chain agility through a process of welldefined analysis in areas such as supply chain technology, integration, collaboration and visibility. The method used to develop the model in this thesis is build on the scientific principle of adding smaller pieces of the different supply chain management theories to corroborate the context and value of the model. These supply chain management theories combined provides valuable guidance for the roadmap towards achieving supply chain agility. The point of departure is a simple five-step model of which its validity is legitimised through a case study research, conducted on two supply chain partners. The findings from this case study have contextualised the model into a definite treasure map towards achieving success in the face of globalisation.
- Full Text:
- Authors: Thomas, Deon
- Date: 2011-10-11T08:41:20Z
- Subjects: Information technology , Supply chain management , Business logistics
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/373260 , uj:7250 , http://hdl.handle.net/10210/3903
- Description: M.Sc. , Supply chains members are disperser across multiple geographical locations and the competitive effects of globalisation has provoked the agile capacity of contemporary supply chains. This makes it more difficult for supply chain organisation to meet consumer demands, especially if supply chain processes are not adequately streamlined. This confronted supply chain managers with the daunting task to make informed decisions regarding critical business drivers within their organisations. Incorrect decisions can lead to counter-productive actions. Supply chain members both upstream and downstream often make decisions based on their immediate environment and resources available, thereby not considering other factor within the supply chain holistically. This perspective has change and supply chain managers need to make decision based on the overall information and resources available within the entire supply chain network. The need to evaluate the appropriate supply chain performance measures is critical, as it directly affects the performance of the entire supply chain network. The focus of this thesis revolves around the linear composition of supply chain technology, integration, collaboration and visibility to maximise supply chain agility. The objective of this thesis is therefore to present a model that highlights the roadmap to achieving supply chain visibility followed by supply chain agility. This will allow supply chain members to make informed decisions around key drivers within the supply chain. The intention of the model is to provide a guideline approach toward achieving supply chain agility through a process of welldefined analysis in areas such as supply chain technology, integration, collaboration and visibility. The method used to develop the model in this thesis is build on the scientific principle of adding smaller pieces of the different supply chain management theories to corroborate the context and value of the model. These supply chain management theories combined provides valuable guidance for the roadmap towards achieving supply chain agility. The point of departure is a simple five-step model of which its validity is legitimised through a case study research, conducted on two supply chain partners. The findings from this case study have contextualised the model into a definite treasure map towards achieving success in the face of globalisation.
- Full Text:
Specific selective outsourcing services in the information technology (IT) industry in South Africa
- Authors: Mapetla, Palesa
- Date: 2009-03-31T09:51:14Z
- Subjects: Contracting out , Information technology
- Type: Thesis
- Identifier: uj:8288 , http://hdl.handle.net/10210/2398
- Description: M.B.A. , In the current decade, "whole of IT" outsourcing appears to be losing ground, and other options are being considered and sought, such as selective outsourcing. Every product, service, or technology has a life cycle, and although the outsourcing industry is at its maturity level, at the same time it is also going through various growth stages and still evolving with best practices. Wholesale or comprehensive outsourcing clearly seems to be on the decline. Highlights of this analysis are as follows: The whole of IT" outsourcing can be seen as a contract service agreement in which an organisation hands over the majority of IT responsibilities to an external company. These contracts are long-term agreements designed to give higher control and transparency on costs, generally with a fixed price arrangement. In the selective outsourcing model, organisations may choose to outsource part of their IT. For example, the IT infrastructure could be broken down into separate agreements for the IT network, desktop, applications, and help desk. Depending upon the spread and competencies of internal resources, the organisation may choose to outsource one or all of the components. Outsourcing has become one of today’s most powerful, organization shaping management tools and also more so in South Africa. Chapter Two covers the fact that companies experience growth based on specialization, expertise and excellence. It is growth based on focusing on those areas that most directly contribute to a company’s success. Outsourcing has become the new frontier for the modern business. When a decision is made to outsource, the company needs to decide which of the activities or services currently done in-house can be defined as being non-core to the business. It is very important that the management of these non-core functions is not outsourced. “The decision to outsource the IT function is primarily based on the need to get rid of an operational problem. IT can become a very expensive cost centre with all the difficulties associated with managing a technology intensive infrastructure” says Rose (1999:24). Outsourcing provides the opportunity to redesign the IT function, and the potential to access highly specialized skills to extend capability. The purpose of this research is to address the following problem statement: What percentage of the budget in the South African IT market by sector is spent on the specific mentioned selective outsourcing services? The author looks at this problem statement and uses available literature to do an in depth study to reach an understanding of the researched subject. In Chapter three, an appropriate research approach that is inductive has been followed. The telephone interview was chosen for data collection as the most suitable and cost effective method. A questionnaire was designed with undisguised questions to ensure consistency and relevance of the responses. The question construction that followed took into consideration question content, question wording, response structure, and question sequence. Finally, pre-testing of the measurement tool was done to ensure validity and reliability, thereby ensuring that a foundation was laid for Chapter Four in which presentation and analysis of the results are given. Chapter four presents the analyses and interprets the results of the study as supplied by respondents through the questionnaire. The results are presented in tables showing percentage figures and numbers for individual response categories, totals and averages to present a clear picture. Finally there is the analysis and interpretation of each section as presented in the tables. The researcher applies the literature discussed in Chapter Two to support and justify the use of the questions asked, and the application thereof to the concepts of the outsourcing and the specified selective outsourcing services business in South Africa. The research was conducted to address the problem and subproblems discussed in Chapter One. In conclusion in response to these problems, the investigated selective IT services which are mentioned in detail in chapter one model has emerged as an attractive alternative to the single-vendor approach. Essentially, a selective approach involves choosing best-of-breed vendors to administer various business services or business functions, leading to either a total or limited solution. However, although selective outsourcing may indeed address some longstanding outsourcing challenges, it also presents some new management issues.
- Full Text:
- Authors: Mapetla, Palesa
- Date: 2009-03-31T09:51:14Z
- Subjects: Contracting out , Information technology
- Type: Thesis
- Identifier: uj:8288 , http://hdl.handle.net/10210/2398
- Description: M.B.A. , In the current decade, "whole of IT" outsourcing appears to be losing ground, and other options are being considered and sought, such as selective outsourcing. Every product, service, or technology has a life cycle, and although the outsourcing industry is at its maturity level, at the same time it is also going through various growth stages and still evolving with best practices. Wholesale or comprehensive outsourcing clearly seems to be on the decline. Highlights of this analysis are as follows: The whole of IT" outsourcing can be seen as a contract service agreement in which an organisation hands over the majority of IT responsibilities to an external company. These contracts are long-term agreements designed to give higher control and transparency on costs, generally with a fixed price arrangement. In the selective outsourcing model, organisations may choose to outsource part of their IT. For example, the IT infrastructure could be broken down into separate agreements for the IT network, desktop, applications, and help desk. Depending upon the spread and competencies of internal resources, the organisation may choose to outsource one or all of the components. Outsourcing has become one of today’s most powerful, organization shaping management tools and also more so in South Africa. Chapter Two covers the fact that companies experience growth based on specialization, expertise and excellence. It is growth based on focusing on those areas that most directly contribute to a company’s success. Outsourcing has become the new frontier for the modern business. When a decision is made to outsource, the company needs to decide which of the activities or services currently done in-house can be defined as being non-core to the business. It is very important that the management of these non-core functions is not outsourced. “The decision to outsource the IT function is primarily based on the need to get rid of an operational problem. IT can become a very expensive cost centre with all the difficulties associated with managing a technology intensive infrastructure” says Rose (1999:24). Outsourcing provides the opportunity to redesign the IT function, and the potential to access highly specialized skills to extend capability. The purpose of this research is to address the following problem statement: What percentage of the budget in the South African IT market by sector is spent on the specific mentioned selective outsourcing services? The author looks at this problem statement and uses available literature to do an in depth study to reach an understanding of the researched subject. In Chapter three, an appropriate research approach that is inductive has been followed. The telephone interview was chosen for data collection as the most suitable and cost effective method. A questionnaire was designed with undisguised questions to ensure consistency and relevance of the responses. The question construction that followed took into consideration question content, question wording, response structure, and question sequence. Finally, pre-testing of the measurement tool was done to ensure validity and reliability, thereby ensuring that a foundation was laid for Chapter Four in which presentation and analysis of the results are given. Chapter four presents the analyses and interprets the results of the study as supplied by respondents through the questionnaire. The results are presented in tables showing percentage figures and numbers for individual response categories, totals and averages to present a clear picture. Finally there is the analysis and interpretation of each section as presented in the tables. The researcher applies the literature discussed in Chapter Two to support and justify the use of the questions asked, and the application thereof to the concepts of the outsourcing and the specified selective outsourcing services business in South Africa. The research was conducted to address the problem and subproblems discussed in Chapter One. In conclusion in response to these problems, the investigated selective IT services which are mentioned in detail in chapter one model has emerged as an attractive alternative to the single-vendor approach. Essentially, a selective approach involves choosing best-of-breed vendors to administer various business services or business functions, leading to either a total or limited solution. However, although selective outsourcing may indeed address some longstanding outsourcing challenges, it also presents some new management issues.
- Full Text:
The engagement of educators with computers during the uptake of Information and Communication Technology (ICT).
- Tlhoaele, Malefyane Jacobeth
- Authors: Tlhoaele, Malefyane Jacobeth
- Date: 2009-02-11T08:54:28Z
- Subjects: In-service training of teachers , Computer literacy , Information technology , Ga-Rankuwa (South Africa)
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/376142 , uj:8133 , http://hdl.handle.net/10210/2108
- Description: M.Ed. , Die navorsingsdoel van die studie is om vas te stel hoe Intell® Teach to the Future die betrokkenheid van opvoeders met Informasie en Kommunikasie Tegnologië (IKT) beïnvloed. Opvoeders in Ga-Rankuwa het deelgeneem in die navorsing. ʼn Aantal privaatondernemings, soos Intel, het programme ontwerp ten doel om opvoeders met die integrering van IKT te ondersteun, maar onvoldoende gedokumenteerde bewyse van die invloed van privaat initiatiewe op die betrokkenheid van opvoeders met IKT bestaan. Skole in Ga-Rankuwa gebruik die IKT integreringsopleidingsprogramme van verskeie organisasies, dus is dit belangrik om die invloed van hierdie programme op die betrokkenheid van opvoeders met rekenaars te evalueer. Onderswyersopleiding in IKT integrering word beskou as die belangrikste en kritiese suksesfaktor om die tekort aan gekwalifiseerde opvoeders in IKT aan te spreek (Dawes, 1999:256). Volgens Orange en Hobbs (2000:86) om skole en opvoeders te betrek by IKT integrering, die beskikbaarheid van harde-en sagteware word as noodsaaklik beskou alhoewel die blote teenwoordiigheid van rekenaars in skole is onvoldoende om die kwaliteit van die onderwys te verander. Verdere pogings om opvoeders te betrek met IKT integrering in onderwys en leer so wel as ondersteuning is benodig. Verkeie lande gebruik verskillende strategiee van onderswyersopleiding in hierdie verband. Die navorsingmetodes is ‘n kombinasie van etnografie en ‘n gevallestudie. Waarneming, fokusgroeponderhoude en analise van dokumente is gebruik om data te versamel. Data analise het gelei tot vyf kategorieë. Die bevindinge toon aan dat Intel®, tot ‘n grote mate, die betrokkenheid van opvoeders wel beїnvloed het.
- Full Text:
- Authors: Tlhoaele, Malefyane Jacobeth
- Date: 2009-02-11T08:54:28Z
- Subjects: In-service training of teachers , Computer literacy , Information technology , Ga-Rankuwa (South Africa)
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/376142 , uj:8133 , http://hdl.handle.net/10210/2108
- Description: M.Ed. , Die navorsingsdoel van die studie is om vas te stel hoe Intell® Teach to the Future die betrokkenheid van opvoeders met Informasie en Kommunikasie Tegnologië (IKT) beïnvloed. Opvoeders in Ga-Rankuwa het deelgeneem in die navorsing. ʼn Aantal privaatondernemings, soos Intel, het programme ontwerp ten doel om opvoeders met die integrering van IKT te ondersteun, maar onvoldoende gedokumenteerde bewyse van die invloed van privaat initiatiewe op die betrokkenheid van opvoeders met IKT bestaan. Skole in Ga-Rankuwa gebruik die IKT integreringsopleidingsprogramme van verskeie organisasies, dus is dit belangrik om die invloed van hierdie programme op die betrokkenheid van opvoeders met rekenaars te evalueer. Onderswyersopleiding in IKT integrering word beskou as die belangrikste en kritiese suksesfaktor om die tekort aan gekwalifiseerde opvoeders in IKT aan te spreek (Dawes, 1999:256). Volgens Orange en Hobbs (2000:86) om skole en opvoeders te betrek by IKT integrering, die beskikbaarheid van harde-en sagteware word as noodsaaklik beskou alhoewel die blote teenwoordiigheid van rekenaars in skole is onvoldoende om die kwaliteit van die onderwys te verander. Verdere pogings om opvoeders te betrek met IKT integrering in onderwys en leer so wel as ondersteuning is benodig. Verkeie lande gebruik verskillende strategiee van onderswyersopleiding in hierdie verband. Die navorsingmetodes is ‘n kombinasie van etnografie en ‘n gevallestudie. Waarneming, fokusgroeponderhoude en analise van dokumente is gebruik om data te versamel. Data analise het gelei tot vyf kategorieë. Die bevindinge toon aan dat Intel®, tot ‘n grote mate, die betrokkenheid van opvoeders wel beїnvloed het.
- Full Text:
?4U (Question for you): implementing a SMS reference service at the University of the Free State
- Authors: Lombard, H.
- Date: 2010-05-18
- Subjects: Library reference services , University of the Free State , Academic libraries , Information technology , Electronic posters
- Type: Presentation
- Identifier: uj:1569 , http://hdl.handle.net/10210/3302
- Description: Since its inception in 1960 the Internet was exalted as the technology that would revolutionise communication access. However, widespread use in Africa was hampered by the lack of quality telecommunication infrastructure. In just two decades, the cell phone has become the fastest-selling, most loved consumer product. Nobody envisioned how popular text messaging, also referred to as short messaging service (SMS) would become. Research shows that 76% of all subscribers or 3.1 billion subscribers use the SMS actively. The abundance of cell phone users is also noticeable in today’s academic library. While some universities has responded to the widespread use of cell phones by delivering educational content and administration of tests via the cell phone, libraries have begun to reach out and serve students’ information needs through the use of the SMS. The University of the Free State Library and Information Services initiated a SMS reference service in 2009. This paper briefly describes the widespread use of text messaging and text messaging technology. The system and services implemented at the UFS LIS is described, as well as the lessons learnt. The paper will end with a short review of cell phone use in libraries and how it could be used to enhance library operations.
- Full Text:
- Authors: Lombard, H.
- Date: 2010-05-18
- Subjects: Library reference services , University of the Free State , Academic libraries , Information technology , Electronic posters
- Type: Presentation
- Identifier: uj:1569 , http://hdl.handle.net/10210/3302
- Description: Since its inception in 1960 the Internet was exalted as the technology that would revolutionise communication access. However, widespread use in Africa was hampered by the lack of quality telecommunication infrastructure. In just two decades, the cell phone has become the fastest-selling, most loved consumer product. Nobody envisioned how popular text messaging, also referred to as short messaging service (SMS) would become. Research shows that 76% of all subscribers or 3.1 billion subscribers use the SMS actively. The abundance of cell phone users is also noticeable in today’s academic library. While some universities has responded to the widespread use of cell phones by delivering educational content and administration of tests via the cell phone, libraries have begun to reach out and serve students’ information needs through the use of the SMS. The University of the Free State Library and Information Services initiated a SMS reference service in 2009. This paper briefly describes the widespread use of text messaging and text messaging technology. The system and services implemented at the UFS LIS is described, as well as the lessons learnt. The paper will end with a short review of cell phone use in libraries and how it could be used to enhance library operations.
- Full Text:
A predictive model for information technology project success
- Authors: Joseph, Nazeer
- Date: 2014-05-05
- Subjects: Information technology , Project management , Organizational effectiveness , Creative ability in business
- Type: Thesis
- Identifier: uj:10916 , http://hdl.handle.net/10210/10490
- Description: M.Com. (Information Technology Management) , Information and communication technology (ICT) project success is considered the Holy Grail within many organisations. Over the past decade organisations have begun to realise the increasing importance and the potential of exploiting ICT to gain competitive advantage in their particular realm. Organisations have consequently pushed for the implementation of robust ICT solutions not only to facilitate and augment crucial decision-making processes, but to improve overall organisational efficiency and effectiveness as well. These ICT solutions are deployed via ICT projects. However, extensive research has revealed that ICT projects are continuing to fail at a disturbing rate nationally as well as internationally. ICT projects therefore have an infamous reputation within organisations and the project management domain. This research focused on determining what drives ICT project success by systematically investigating how ICT project success is perceived and measured as well as the factors which influence it. The quantitative research paradigm was implemented through the use of a survey in the form of a structured questionnaire. Although this research was cross-sectional in nature, it employed an element of longitudinal analysis as the results were scrutinised and compared with previous research conducted within the same research area. ICT project team members were randomly sampled to acquire an objective view of ICT project success. Moreover, this research revolved around the philosophy that if the significance of each influencing factor is understood, it should be possible to predict whether an ICT project will succeed or fail. A predictive modelling approach was adopted. This predictive model presented within this dissertation was constructed using structural equation modelling (SEM). The predictive model indicated that ICT project success is predicted by means of stakeholder management, communication and methodology. The model also indicated that these three factors are interrelated and are dependent on one another. It was established that overall project success is dependent on project management success and project product success. This research employed a technique which is rarely used within the project management or ICT project management domain, viz. SEM. Two key recommendations emerged from this research. Firstly, this research suggests that it may be time to re-evaluate how ICT projects are measured as well as the influencing factors, as traditional approaches are yet to accommodate ICT projects in particular. Secondly, this research suggests that researchers should start to explore the underlying constructs of communication as this could assist in addressing a fundamental flaw not only in ICT project management, but project management in general.
- Full Text:
- Authors: Joseph, Nazeer
- Date: 2014-05-05
- Subjects: Information technology , Project management , Organizational effectiveness , Creative ability in business
- Type: Thesis
- Identifier: uj:10916 , http://hdl.handle.net/10210/10490
- Description: M.Com. (Information Technology Management) , Information and communication technology (ICT) project success is considered the Holy Grail within many organisations. Over the past decade organisations have begun to realise the increasing importance and the potential of exploiting ICT to gain competitive advantage in their particular realm. Organisations have consequently pushed for the implementation of robust ICT solutions not only to facilitate and augment crucial decision-making processes, but to improve overall organisational efficiency and effectiveness as well. These ICT solutions are deployed via ICT projects. However, extensive research has revealed that ICT projects are continuing to fail at a disturbing rate nationally as well as internationally. ICT projects therefore have an infamous reputation within organisations and the project management domain. This research focused on determining what drives ICT project success by systematically investigating how ICT project success is perceived and measured as well as the factors which influence it. The quantitative research paradigm was implemented through the use of a survey in the form of a structured questionnaire. Although this research was cross-sectional in nature, it employed an element of longitudinal analysis as the results were scrutinised and compared with previous research conducted within the same research area. ICT project team members were randomly sampled to acquire an objective view of ICT project success. Moreover, this research revolved around the philosophy that if the significance of each influencing factor is understood, it should be possible to predict whether an ICT project will succeed or fail. A predictive modelling approach was adopted. This predictive model presented within this dissertation was constructed using structural equation modelling (SEM). The predictive model indicated that ICT project success is predicted by means of stakeholder management, communication and methodology. The model also indicated that these three factors are interrelated and are dependent on one another. It was established that overall project success is dependent on project management success and project product success. This research employed a technique which is rarely used within the project management or ICT project management domain, viz. SEM. Two key recommendations emerged from this research. Firstly, this research suggests that it may be time to re-evaluate how ICT projects are measured as well as the influencing factors, as traditional approaches are yet to accommodate ICT projects in particular. Secondly, this research suggests that researchers should start to explore the underlying constructs of communication as this could assist in addressing a fundamental flaw not only in ICT project management, but project management in general.
- Full Text:
Promoting project reviews as a best practice in multinational organisations
- Authors: Maluleke, Mmatseleng
- Date: 2011-09-15T08:02:32Z
- Subjects: Information technology , Project management , Multinational organisations , International business enterprises
- Type: Thesis
- Identifier: uj:7214 , http://hdl.handle.net/10210/3848
- Description: M.Tech. , Many organisations rely on Information Technology (IT) projects to react to competitive pressure and innovation. IT projects are divers and they may include installing off-the-shelf hardware to developing software to basic technologies that provide information to support the operations, management, decisions-making functions within the organisation. In the past years, there had been an increasing number of Multinational Organisations (MNOs) working on IT projects together to create mergers and grow business in foreign countries. While IT projects are being undertaken, Multinational Project Teams are faced with challenges and among their challenges project reviews is one of them. Project reviews are an essential process of learning new things and capturing what had been learned in the current phase/project in order for future phases/projects to benefit. Moreover it is a stage where project teams assess if they had met their key deliverables and project performance. A related study was conducted on project reviews and the results revealed that 4 out of 5 organisations did not conduct post-project reviews. However, if they did conduct project reviews, there were no guidelines on how to do it. The aim of the study was to ascertain a set of guidelines that are used by MNOs to conduct project reviews and share lessons learned and experiences gathered during and after an IT projects for future usage. The significance of this study was to highlight the importance of guidelines for conducting project reviews in order for project teams to learn from the project. The findings can be utilised in building guidelines that MNOs can use to conduct project reviews and to integrate lessons learned back into the organisation. The scope of the research was limited to an MNO with headquarters in the Netherlands and subsidiaries in China and South Africa. The study was carried out using qualitative research approach through interviews, observation and gathering of documentation. Using Atlas.ti which is a ii CAQDAS, data was analysed to compare and contrast similarities by using categories. The categories constructed offered the integrative interpretation of what was learned. From the individual and focus group interviews 5 main categories were elicited: project review meetings, intervals of conducting project reviews, lessons learned, knowledge sharing, and information extracted from project reviews. Based on the results it was evident that the MNO in question requires a set of guidelines on how to conduct project reviews. Moreover, there was no formal mechanism used to integrate lessons learned back into the organisation. A Generic Model for when project reviews should be conducted was developed using various models and guidelines that are used by other organisations and this model could be utilised by MNOs. For each project phase as illustrated on the Generic Model, there are project review guidelines on what to measure during the phase review. This research contributes to the growing literature on the organisational processes and mechanisms for project reviews and lessons learned.
- Full Text:
- Authors: Maluleke, Mmatseleng
- Date: 2011-09-15T08:02:32Z
- Subjects: Information technology , Project management , Multinational organisations , International business enterprises
- Type: Thesis
- Identifier: uj:7214 , http://hdl.handle.net/10210/3848
- Description: M.Tech. , Many organisations rely on Information Technology (IT) projects to react to competitive pressure and innovation. IT projects are divers and they may include installing off-the-shelf hardware to developing software to basic technologies that provide information to support the operations, management, decisions-making functions within the organisation. In the past years, there had been an increasing number of Multinational Organisations (MNOs) working on IT projects together to create mergers and grow business in foreign countries. While IT projects are being undertaken, Multinational Project Teams are faced with challenges and among their challenges project reviews is one of them. Project reviews are an essential process of learning new things and capturing what had been learned in the current phase/project in order for future phases/projects to benefit. Moreover it is a stage where project teams assess if they had met their key deliverables and project performance. A related study was conducted on project reviews and the results revealed that 4 out of 5 organisations did not conduct post-project reviews. However, if they did conduct project reviews, there were no guidelines on how to do it. The aim of the study was to ascertain a set of guidelines that are used by MNOs to conduct project reviews and share lessons learned and experiences gathered during and after an IT projects for future usage. The significance of this study was to highlight the importance of guidelines for conducting project reviews in order for project teams to learn from the project. The findings can be utilised in building guidelines that MNOs can use to conduct project reviews and to integrate lessons learned back into the organisation. The scope of the research was limited to an MNO with headquarters in the Netherlands and subsidiaries in China and South Africa. The study was carried out using qualitative research approach through interviews, observation and gathering of documentation. Using Atlas.ti which is a ii CAQDAS, data was analysed to compare and contrast similarities by using categories. The categories constructed offered the integrative interpretation of what was learned. From the individual and focus group interviews 5 main categories were elicited: project review meetings, intervals of conducting project reviews, lessons learned, knowledge sharing, and information extracted from project reviews. Based on the results it was evident that the MNO in question requires a set of guidelines on how to conduct project reviews. Moreover, there was no formal mechanism used to integrate lessons learned back into the organisation. A Generic Model for when project reviews should be conducted was developed using various models and guidelines that are used by other organisations and this model could be utilised by MNOs. For each project phase as illustrated on the Generic Model, there are project review guidelines on what to measure during the phase review. This research contributes to the growing literature on the organisational processes and mechanisms for project reviews and lessons learned.
- Full Text:
The reasons for and prevention of IT project failure.
- Authors: Nuss, Jacques Erich
- Date: 2012-08-16
- Subjects: Project management , Information technology , Business failures
- Type: Thesis
- Identifier: uj:2554 , http://hdl.handle.net/10210/6007
- Description: M.A. , The rate of change in the business arena is continuously increasing and companies are constantly seeking innovative products, services and knowledge-enabled processes to enable them to compete effectively against each other. IT plays an important role as an enabler of these processes. The problem is that the implementations of IT projects, commissioned to support and enable the business functions, often fail. The high rate of failing IT projects is a real and relevant concern of the business environment. Companies are wasting a significant portion of their resources on failed IT projects. More than often, IT projects fail to realize their intended purpose of reducing operating costs, increasing worker productivity, increasing cycle times and eventually increasing companies' market share. Management of these companies continues to complain about costly IT expenditure returning only a portion of the expected return on investment. The phenomenon of IT project failure has been in existence for many years and has in more recent years become a relevant topic calling for investigation and further study. Accordingly, this document is the culmination of the results of a study of the reasons why IT projects fail and offers possible measures to be taken to counter the failure of IT projects. The most significant and relevant reasons for IT project failure are listed in this document. These reasons span from the internal project environment through to the external project environment. Aligning these reasons with the environment of any anticiPated IT project will establish a base from which a successful IT project could be initiated. It is hoped that this document will serve as valuable input to the decision makers in the IT and business arenas that need to be made aware of the reasons for IT project failure in order for them to better manage their IT projects.
- Full Text:
- Authors: Nuss, Jacques Erich
- Date: 2012-08-16
- Subjects: Project management , Information technology , Business failures
- Type: Thesis
- Identifier: uj:2554 , http://hdl.handle.net/10210/6007
- Description: M.A. , The rate of change in the business arena is continuously increasing and companies are constantly seeking innovative products, services and knowledge-enabled processes to enable them to compete effectively against each other. IT plays an important role as an enabler of these processes. The problem is that the implementations of IT projects, commissioned to support and enable the business functions, often fail. The high rate of failing IT projects is a real and relevant concern of the business environment. Companies are wasting a significant portion of their resources on failed IT projects. More than often, IT projects fail to realize their intended purpose of reducing operating costs, increasing worker productivity, increasing cycle times and eventually increasing companies' market share. Management of these companies continues to complain about costly IT expenditure returning only a portion of the expected return on investment. The phenomenon of IT project failure has been in existence for many years and has in more recent years become a relevant topic calling for investigation and further study. Accordingly, this document is the culmination of the results of a study of the reasons why IT projects fail and offers possible measures to be taken to counter the failure of IT projects. The most significant and relevant reasons for IT project failure are listed in this document. These reasons span from the internal project environment through to the external project environment. Aligning these reasons with the environment of any anticiPated IT project will establish a base from which a successful IT project could be initiated. It is hoped that this document will serve as valuable input to the decision makers in the IT and business arenas that need to be made aware of the reasons for IT project failure in order for them to better manage their IT projects.
- Full Text:
A strategy for knowledge management
- Rademan, Johan Andries Muller
- Authors: Rademan, Johan Andries Muller
- Date: 2012-01-24
- Subjects: Knowledge management , Information technology
- Type: Thesis
- Identifier: uj:1932 , http://hdl.handle.net/10210/4292
- Description: M.Comm.
- Full Text:
- Authors: Rademan, Johan Andries Muller
- Date: 2012-01-24
- Subjects: Knowledge management , Information technology
- Type: Thesis
- Identifier: uj:1932 , http://hdl.handle.net/10210/4292
- Description: M.Comm.
- Full Text:
The future is now : new roles and relationships for academic libraries
- University of Johannesburg Library and Information Centre
- Authors: University of Johannesburg Library and Information Centre
- Date: 2010-05-17
- Subjects: Academic libraries , Information technology , Academic publishing , Internet access , e-Learning , Conference proceedings
- Type: Other
- Identifier: uj:1585 , http://hdl.handle.net/10210/3318
- Description: Welcome to this very exciting conference focusing on the changing roles and relationships of academic libraries which goes hand in hand with the rapid development of information technology. Last year, when we started planning for the conference we came to the conclusion that the title ‘The Future is Now’ expresses our experience of being overtaken by technology, in a unique and innovative way. However, when we did a Google search on the phrase we found that it was a widely used phrase which gives expression to the global village’s experience that developments which we thought lie in the future are overtaking us as a result of the rapid development of Internet and mobile technologies. Despite its lack of originality, we decided to stick to the title, because there was no better way of saying what we wanted to say. I repeated the Google search about a year later, when I was busy writing this welcome note to you, and this time carefully noted the number of hits: 128 000 000. Most significantly I found two websites relating to the impact of information technology on the world of libraries within the first 20 hits. One was the website of an eponymous ALA conference on libraries and museums in the virtual word held on 5 and 6 March 2010 (http://www.opal-online.org/finindex.htm). The conference dealt with the use of Second Life in libraries and museums. The other was an article on the launch of Elsevier’s ‘Article of the Future‘ project (http://www.cell.com) on 7 January 2010. Both these hits underlined the impact of technology on our world and the need to consider the way forward as a result of it. George Will said that ‘the future has a way of arriving unannounced’. It is the sincere hope of the Conference Organising Committee that this conference will help prevent the future of taking us unawares. We believe that your presence here will inspire and motivate you to explore the new technologies and harness it to sustain and improve on academic libraries’ proud tradition and history of moving with the times. - Dr Anette van Vuren, Conference Chair.
- Full Text:
- Authors: University of Johannesburg Library and Information Centre
- Date: 2010-05-17
- Subjects: Academic libraries , Information technology , Academic publishing , Internet access , e-Learning , Conference proceedings
- Type: Other
- Identifier: uj:1585 , http://hdl.handle.net/10210/3318
- Description: Welcome to this very exciting conference focusing on the changing roles and relationships of academic libraries which goes hand in hand with the rapid development of information technology. Last year, when we started planning for the conference we came to the conclusion that the title ‘The Future is Now’ expresses our experience of being overtaken by technology, in a unique and innovative way. However, when we did a Google search on the phrase we found that it was a widely used phrase which gives expression to the global village’s experience that developments which we thought lie in the future are overtaking us as a result of the rapid development of Internet and mobile technologies. Despite its lack of originality, we decided to stick to the title, because there was no better way of saying what we wanted to say. I repeated the Google search about a year later, when I was busy writing this welcome note to you, and this time carefully noted the number of hits: 128 000 000. Most significantly I found two websites relating to the impact of information technology on the world of libraries within the first 20 hits. One was the website of an eponymous ALA conference on libraries and museums in the virtual word held on 5 and 6 March 2010 (http://www.opal-online.org/finindex.htm). The conference dealt with the use of Second Life in libraries and museums. The other was an article on the launch of Elsevier’s ‘Article of the Future‘ project (http://www.cell.com) on 7 January 2010. Both these hits underlined the impact of technology on our world and the need to consider the way forward as a result of it. George Will said that ‘the future has a way of arriving unannounced’. It is the sincere hope of the Conference Organising Committee that this conference will help prevent the future of taking us unawares. We believe that your presence here will inspire and motivate you to explore the new technologies and harness it to sustain and improve on academic libraries’ proud tradition and history of moving with the times. - Dr Anette van Vuren, Conference Chair.
- Full Text:
The computer auditor's involvement in IT strategic planning
- Authors: Brown, Ronald Arden
- Date: 2014-08-19
- Subjects: Information technology , Strategic planning
- Type: Thesis
- Identifier: uj:12097 , http://hdl.handle.net/10210/11842
- Description: M.Com. (Computer auditing) , 1. Overview of Topic This dissertation deals with the question of the computer auditor's involvement in IT (Information Technology) strategic planning. Increasingly, organizations have come to value IT for the competitive or strategic advantage that it can provide in the modern marketplace. IT has thus moved from being an administrative function to being of strategic importance to an organization. The IT strategic plan expresses an organization's beliefs and goals relating to the use of information technology and the use of IT for strategic purposes. The IT strategic plan should ideally support the organizational goals and the principles identified in the organizational strategic plan. 2. Research Problem and Methodology The purpose of this research project is to identify whether a computer auditor should be involved in IT strategy planning. It is contended that the involvement would normally be that of auditing an IT strategy, but could also extend to providing input into the development of such a strategy. This dissertation suggests that the IT strategy is a risk area in the organization and as such should be examined by the computer auditor. In addition, the concept of IT strategy being a key control system within the organization is introduced. A survey of literature is used to justify the above. Based on points gleaned from the literature survey, a suggested guideline for auditing an IT strategy is proposed. 3. Results of the Research Although a comprehensive survey of literature was performed. no indication was found that this topic had been dealt with in the past. The literature survey. however, proved to be of value in defining IT strategy and identifying it's risk areas. In addition, some of the literature did imply that there was scope for the involvement of the computer auditor in IT strategy planning. The literature survey also indicated that the topic of IT strategy was of importance to South African companies. Based on the literature survey it was concluded that, because IT strategy represented a risk area to the organization, the computer auditor should be involved in the audit thereof. The following guidelines were drawn up: one to assist in identifying when an IT strategy should be audited, one to identify control objectives relating to IT strategy and a corresponding audit guideline for each control objective. 4. Conclusion The literature surveyed indicated that there was a definite need for the computer auditor to become involved in the audit of IT strategy. The guideline presented for the audit of an IT strategy should prove to be useful to the computer auditor in identifying when and how an IT strategy should be audited. Investigating the actual involvement of the computer auditor in IT strategic planning was identified as an area for possible future research.
- Full Text:
- Authors: Brown, Ronald Arden
- Date: 2014-08-19
- Subjects: Information technology , Strategic planning
- Type: Thesis
- Identifier: uj:12097 , http://hdl.handle.net/10210/11842
- Description: M.Com. (Computer auditing) , 1. Overview of Topic This dissertation deals with the question of the computer auditor's involvement in IT (Information Technology) strategic planning. Increasingly, organizations have come to value IT for the competitive or strategic advantage that it can provide in the modern marketplace. IT has thus moved from being an administrative function to being of strategic importance to an organization. The IT strategic plan expresses an organization's beliefs and goals relating to the use of information technology and the use of IT for strategic purposes. The IT strategic plan should ideally support the organizational goals and the principles identified in the organizational strategic plan. 2. Research Problem and Methodology The purpose of this research project is to identify whether a computer auditor should be involved in IT strategy planning. It is contended that the involvement would normally be that of auditing an IT strategy, but could also extend to providing input into the development of such a strategy. This dissertation suggests that the IT strategy is a risk area in the organization and as such should be examined by the computer auditor. In addition, the concept of IT strategy being a key control system within the organization is introduced. A survey of literature is used to justify the above. Based on points gleaned from the literature survey, a suggested guideline for auditing an IT strategy is proposed. 3. Results of the Research Although a comprehensive survey of literature was performed. no indication was found that this topic had been dealt with in the past. The literature survey. however, proved to be of value in defining IT strategy and identifying it's risk areas. In addition, some of the literature did imply that there was scope for the involvement of the computer auditor in IT strategy planning. The literature survey also indicated that the topic of IT strategy was of importance to South African companies. Based on the literature survey it was concluded that, because IT strategy represented a risk area to the organization, the computer auditor should be involved in the audit thereof. The following guidelines were drawn up: one to assist in identifying when an IT strategy should be audited, one to identify control objectives relating to IT strategy and a corresponding audit guideline for each control objective. 4. Conclusion The literature surveyed indicated that there was a definite need for the computer auditor to become involved in the audit of IT strategy. The guideline presented for the audit of an IT strategy should prove to be useful to the computer auditor in identifying when and how an IT strategy should be audited. Investigating the actual involvement of the computer auditor in IT strategic planning was identified as an area for possible future research.
- Full Text:
A consulting strategy dealing with management constraints of self-service business intelligence
- Authors: Gaorekwe, Sedigilwe Vincent
- Date: 2017
- Subjects: Knowledge management , Information technology , Business intelligence , Self-service (Economics) , Systems integration
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/272659 , uj:29034
- Description: M.Com. (Business Management) , Abstract: For many organisations, as business needs change, the need for better decision support systems increases. Which is why many organisations today embark on a journey of transitioning from traditional way of doing business intelligence to self-service business intelligence (SSBI). As is with many a new technology, SSBI presents different challenges to companies, therefore, to effectively deal with these challenges, it is critical to align IT and business strategies. To get real value out of the investment made on SSBI, companies tend to outsource the implementation and management of the solution to known consulting firms to assist them with effective ways of dealing with challenges posed by the solution. Which is why this study embarked on a journey of developing a practical working framework for a consulting firm named C-firm, which can then be used as a strategy to deal with management constraints of SSBI for its clients. A single case study was conducted between C-Firm and its clients to explore management constraints of SSBI, which include data governance and management, supporting infrastructure, context, and systems integration, and to subsequently develop a practical working framework for implementing and managing SSBI solution. The interactive approach model by Maxwell Loomis (2003), informed this case study research design. The flexibility of the interactive approach model best suited this study because it allowed different components of the study to interact with each other. A conceptual framework, which is one of the components of the interactive approach model, helped the researcher to focus on those factors that could assist in gaining understanding of the management issues associated with SSBI and how C-Firm can assist its clients in dealing with those issues. The research choice for this study was mixed method, mixed-model research. This means quantitative and qualitative data were collected, and researcher used quantitative analysis procedures to report on the findings. Data collection instruments used were semi structured interviews and an online questionnaire with open-ended and close-ended questions. The empirical study involved gathering data from both C-Firm’s employees and its clients. The research participants were nineteen (19) BI developers from C-Firm, and from C-Firm’s clients’ nine (9) BI developers and five (5) BI managers. The key findings of the empirical study in terms of data governance and management, supporting infrastructure, context, and systems integration were then used to develop a...
- Full Text:
- Authors: Gaorekwe, Sedigilwe Vincent
- Date: 2017
- Subjects: Knowledge management , Information technology , Business intelligence , Self-service (Economics) , Systems integration
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/272659 , uj:29034
- Description: M.Com. (Business Management) , Abstract: For many organisations, as business needs change, the need for better decision support systems increases. Which is why many organisations today embark on a journey of transitioning from traditional way of doing business intelligence to self-service business intelligence (SSBI). As is with many a new technology, SSBI presents different challenges to companies, therefore, to effectively deal with these challenges, it is critical to align IT and business strategies. To get real value out of the investment made on SSBI, companies tend to outsource the implementation and management of the solution to known consulting firms to assist them with effective ways of dealing with challenges posed by the solution. Which is why this study embarked on a journey of developing a practical working framework for a consulting firm named C-firm, which can then be used as a strategy to deal with management constraints of SSBI for its clients. A single case study was conducted between C-Firm and its clients to explore management constraints of SSBI, which include data governance and management, supporting infrastructure, context, and systems integration, and to subsequently develop a practical working framework for implementing and managing SSBI solution. The interactive approach model by Maxwell Loomis (2003), informed this case study research design. The flexibility of the interactive approach model best suited this study because it allowed different components of the study to interact with each other. A conceptual framework, which is one of the components of the interactive approach model, helped the researcher to focus on those factors that could assist in gaining understanding of the management issues associated with SSBI and how C-Firm can assist its clients in dealing with those issues. The research choice for this study was mixed method, mixed-model research. This means quantitative and qualitative data were collected, and researcher used quantitative analysis procedures to report on the findings. Data collection instruments used were semi structured interviews and an online questionnaire with open-ended and close-ended questions. The empirical study involved gathering data from both C-Firm’s employees and its clients. The research participants were nineteen (19) BI developers from C-Firm, and from C-Firm’s clients’ nine (9) BI developers and five (5) BI managers. The key findings of the empirical study in terms of data governance and management, supporting infrastructure, context, and systems integration were then used to develop a...
- Full Text: