Browsing by Subject "Information Systems"
Now showing 1 - 20 of 213
Results Per Page
Sort Options
- ItemOpen AccessA Habermasian-based critical discourse analysis of the ICT strategies of the Centre for e-Innovation, Provincial Government of the Western Cape(2008) Vosloo, Steve; Chigona, WallaceThere is much political discourse concerning the role of information and communication technologies (ICTs) in supporting the achievement of development goals. Given the increasing prevalence and importance of ICTs in society, the Centre for e-Innovation (Cel), Provincial Government of the Western Cape, South Africa, has prepared five strategic documents outlining how to utilise ICTs for development and create an information society in the province. Amidst the discourse about ICT for development there is, however, a recurrent theme of technological determinism, which is shown to be a cause of the high failure rate of ICT for development projects. Based on the approach of Cukier, Middleton & Bauer (2003) and Cukier, Bauer and Middleton (2004) to operationalising Habermas' validity claims to assess communicative rationality, I conducted a critical discourse analysis (CDA) of the five Cel strategic documents to determine whether or not these are distorted, e.g. through claims of technological determinism. The study found a large number of distortions in the discourse. Suggestions are provided for how to create less distorted strategies, which more closely resemble Habermas' ideal speech situation.
- ItemOpen AccessA method for implementing an information security awareness campaign within an organisation(2019) Scrimgeour, Juan-Marc; Ophoff, JacobusResearch has shown that educating end-users on information security awareness plays an essential part in securing any environment. While best practice standards provide a set of minimum information security awareness controls that should be implemented, little guidance exists on how to implement these controls to ensure the effectiveness of the training. This research set out to define and evaluate a method for implementing an Information Security Awareness Campaign within an organisation based on existing research and standards while assisting the organisation in improving their information security awareness campaign through the creation of artifacts and measurement techniques. A design science research approach guided the research to evaluate changes in the information security awareness campaign implementation method through several research cycles. The method was implemented within an organisation and evaluated based on the impact, effectiveness and results of each step as well as the feedback from participants. The research found both positive and negative results throughout the method. Specific steps within the method proved to be lengthy, time-consuming and confusing to participants. Although many improvements can yet be made, the method was suitable as it achieved the required objective within the organisation. The research outcome provided a risk-based method with a visual representation that demonstrated the lack of awareness of specific information security awareness topics to the organisation. The results of the study not only provided value to the organisation but provided a tried and tested method for implementing an Information Security Awareness Campaign within other organisations.
- ItemOpen AccessA sequential explanatory mixed methods investigation of e-government outcomes evaluation practice in developing countries: South Africa as context(2022) Boamah-Abu, Charles; Kyobe, MichaelE-government has become de rigueur in public service delivery. Attendant to the growing adoption is the need to establish the extent to which investments are yielding desired outcomes and how the services can be improved. E-government evaluation is, therefore, an important research problem— more so in developing countries, where resources are scarce, and the opportunity cost is higher. This, notwithstanding, there is a paucity of research. This research explored the “lay of the land”, to describe e-government outcomes evaluation practice in developing countries. South Africa was selected as context; the sample consisted of public sector employees. Practice theory was adopted to frame e-government evaluation as what people do. A two-phased sequential explanatory mixed methods strategy, supported by post-positivism, was employed. This allowed examination of the different aspects of practice— the tangible (e.g., activities) and the intangibles (e.g., affective issues). In the quantitative phase, questionnaire data from 106 public employees (i.e., managers and non-managers from IT, Evaluation, and Other backgrounds) was analysed with factor and cluster analyses techniques to identify the important elements which described e-government outcomes evaluation practice and the patterns of performance. This was followed by a qualitative phase in which interview transcripts of 12 participants drawn from the sample of the preceding phase, four from each background (i.e., two from management and nonmanagement respectively), were analysed with content analysis to help understand the results of the quantitative phase. The findings show an inadequate organizational capacity to evaluate e-government outcomes and use the results. The primary purpose of evaluation is compliance, and organizational outcomes are mostly measured. While there may be some degree of use (e.g., learning, i.e., conceptual) recommendations may not be implemented. Furthermore, there were significant differences among participants; evaluation and IT managers with the requisite expertise were likely to have a positive perception of e-government outcomes evaluation practice. This research adds value to e-government outcomes evaluation research and practice in developing countries, and also to the methodological development of practice theory in Information Systems (IS). Consistent with research on practice, recommendations are drawn to help e-government evaluation stakeholders improve future practice and, thereby, ameliorate the high e-government failure rate. The findings shed light on current practice, e.g., what is done well and challenges, and add to the otherwise sparse body of knowledge in the domain under investigation. A deterrent to the adoption of practice theory is the paucity of theoretical and conceptual frameworks. This research illustrates how Schatzki's theory can be applied to investigate an IS problem and helps remedy the dearth of empirical research on practice. Furthermore, it contributes to the current effort to develop mixed methods in IS— and practice research in general. The agenda for future research can help advance the, hitherto, under researched domain of e-government evaluation in developing countries.
- ItemOpen AccessAccessibility of E-government Services for Persons with Disabilities in Developing Countries- The Case of Ghana(2020) Agangiba, Millicent Akotam; Kabanda, Salah; Brown, IrwinSeveral benefits have been attributed to E-government, including the potential to promote independence and belongingness for persons with disabilities (PWD) by enhancing participatory and inclusive governance. Hitherto, government services that required several and long journeys followed by long queues waiting for service at government offices can now be accessed online irrespective of the geographical location via E-government services. As a result, developing countries like Ghana continue to commit resources to the implementation of E-government to harness the associated benefits. Accessibility has been acknowledged, by both practitioners and those in academia, as a key consideration to prevent disparities among citizens which may put PWD at risk of exclusion. However, providing solutions to accessibility challenges for PWD has consistently proven difficult in most E-government implementation projects in developing countries. Therefore, this study investigates the accessibility of Egovernment services for PWD in Ghana with the aim of identifying how key E-government stakeholders perceive accessibility and the contextual drivers that lead to the exclusion of PWD in the development of E-government services. Also, this study seeks to understand if and how these stakeholders and contextual drivers reinforce the exclusionary process. The study employed an interpretive, inductive approach, with sensitising concepts from Egovernment accessibility literature, and the social exclusion framework. Multiple data collection methods were used, namely; observations as a preliminary step to obtaining a better understanding of how the visually impaired use ICTs; interviews as the primary data collection technique from 37 participants; and document analysis. The study involved 3 groups of participants: the visually impaired, E-government web developers and government officers. Data analysis was carried out in two phases- firstly thematic analysis was used to report on perceptions of government officers and developers on accessibility and the experiences of PWD. Contextual drivers impeding accessibility and affecting accessibility experience of PWD were also derived from the thematic analysis. Secondly, E-government and disability policy documents mentioned in interview discussions were analysed using content analysis. The findings of the content analysis were used to validate, clarify and to conduct post-interview checking. The findings show that government officers and developers play a key role in the development of E-government services. Whilst Government officers and developers were identified as powerful agents whose practices determined the accessibility of services that were developed; PWD were side-lined and not involved in the E-government development project. Also, perceptions of government officers and developers on accessibility vary from those of PWD. While government officers and developers believe that with little assistance from third parties PWD can access E-government services, PWD perceive accessibility should offer them the independence to retrieve government information and engage in electronic transactions of their choice. Evidently, accessibility perceptions of E-government implementers differ from that of PWD. Further, the findings show that exclusion of PWD from E-government services is as a result of the intertwining of several contextual drivers, including political, socio-cultural, technological and personal. Political, socio-cultural and technological drivers influence the perceptions and practices of government officers and developers and determine their responses to the accessibility needs of PWD. Personal drivers limit the capabilities of PWD to access Egovernment services and impact on their accessibility experiences. Contextual drivers independently facilitate the exclusion of PWD; however, their interactions with government officers and developers shape their perceptions and constitute crucial exclusionary forces. These exclusionary forces when fed into the development of E-government services reinforce the exclusion of PWD. Given that personal drivers limit the capabilities of PWD, their inabilities to act as change agents reinforce their exclusion. Moreover, power differentials among stakeholders play a vital role in the exclusionary process. The study contributes to better understanding of influences on the E-government development process, how services become inaccessible and the accessibility challenges PWD face. Practically, the study has several implications on the development and implementation of E-government services in developing countries like Ghana. For example, the findings are useful to inform the political leadership on policies and structures to put in place to enhance the accessibility of Egovernment services for PWD.
- ItemOpen AccessAdapting and responding to ICTs - a study of two municipalities in rural South Africa(2016) Jacobs, Carl; Rivett, UlrikeThe post - apartheid restructuring of South Africa's water sector has left the responsibility of planning, access and provision of water with local government. Local municipalities, which lack the " financial and human resources to deliver on their constitutional and legal mandate and on citizen expectations" (Department of Co - operative Governance and Traditional Affairs [CoGTA] , 2009) , constitute 71% of South Africa's local government . This means that a large proportion of South Africa's local government does not possess sufficient capacity to fulfil their legal responsibilities. Information and Communication Technologies (ICTs) and the potential for improved capacity they provide is not a new concept, especially to the fields of education, health and governance. For instance, South Africa's Local Government Association (SALGA) developed a guide and roadmap f or successful ICT governance in local municipalities. They recognised the importance of aligning governance and ICTs to improve the role of local municipalities , and while many examples of ICTs successfully improving capacity do exist , there are also many other examples where they failed to do so Literature identifies the reasons for failure and suggests ways to address them so that ICTs have the maximum possible impact on improving capacity , however , many ICTs still fail, especially in developing contexts. This is because most studies in the field of ICTs focus on the impact they have on capacity and not vice versa. Not many studies research the impact that existing capacities have on ICTs, and especially not when the ICTs have already been designed to overcome those challenges usually associated with failure in developing contexts. In view of this, the purpose of this study was to assess what impact rural local municipalities ' existing conditions and capacities have on the implementation and use of ICT s and hence the change in capacity ICTs seek to bring about in the first instance . Additionally, the study assessed whether ICTs bring about any measurable change in low - capacity environments. Two local municipalities in rural Eastern Cape of South Africa , which were looking to improve their capacities to resolve issues of water and sanitation service delivery and maintain customer relations , were identified as the study sites. An ICT system, which sought to address and improve upon the challenges associated with each municipality's customer relations and management of complaints, was co - designed and implemented using best practices, so as to overcome the challenges usually associated with ICT failure in developing contexts. Using the Adaptive Capacity Wheel (Gupta, Termeer, Klostermann, Meijerink, Van den Brink, Jong, Nooteboom, & Bergsma, 2010) , a comprehensive comparative analysis between the pre - and post - ICT implementation capacities of each municipality was undertaken ( both to resolve issues of water and sanitation service delivery , maintain customer relations , and to adapt and respond to the change the ICT system sought to bring about ) . The results showed that the existing conditions and capacities of each municipality did impact the implementation and use of the ICT system. Despite the ICT system being co - designed with the municipalities and their communities to best suit their current conditions, financial and human resource challenges still resulted in each municipality adapting the use of the system to their particular environment. While the adaptations in use benefitted the municipalities, by improving their complaints management and resolution, it negated any benefits the system offered citizens and, as a result, impacted customer relations negatively. The results also showed that ICTs do result in measurable change in low - capacity environments. They are not always the changes expected or designed for, but can, from certain perspectives, end up being the most important. Overall, it is hoped that this study contributes to the discourse of ICT4D implementations in low - capacity environments in relation to the assumption that ICTs inevitably improve capacity. It also highlights the importance of an ongoing debate to rethink the various definitions of ICT for development
- ItemOpen AccessAlignment of human competencies with mobile technology and business strategy in women-led SMEs(2014) Ajumobi , O Deborah; Kyobe, MichaelStudies show that women entrepreneurs are constrained and faced with challenges that inhibit the growth and performance of their businesses. Such challenges include race and gender differences, inadequate education, family responsibilities, lack of access to capital and other socio-cultural factors. However, with their human competencies, mobile technology and the appropriate business strategy, women-led small and medium-sized Enterprises (SMEs) can steer their businesses to better performance. While the need for SMEs to align these three elements (human competencies, mobile technology and business strategy) has been suggested, there is limited knowledge on how SMEs can achieve this; no studies, to the author’s knowledge, have examined this in women-led SMEs. This study therefore sought to fill this gap by investigating how women-led SMEs can best align these three elements to enhance their business performance. In light of this, extensive literature review and theoretical work on the phenomenon was conducted. Given the existence of the interplay between these three elements (human competencies, mobile technology and business strategy), the study adopted the perspective of alignment as Gestalts as the most appropriate method in determining the best way women-led SMEs may align these three aspects.
- ItemOpen AccessAnalysing the use of fintech for cross-border remittance as a livelihood strategy - A case of Nigeria(2023) Dudu-Eniola, Onaririnogho; Tsibolane, PitsoDespite the dominance of traditional financial institutions in the cross-border money-transfer market, emerging financial technology solutions (FinTech) have transformed how individuals conduct cross-border payments to sustain their livelihoods in the global South. While much has been explored about FinTech adoption, the nexus between FinTech as a livelihood strategy and livelihood outcomes remains under explored. This study examined the use of FinTech for cross- border remittance as a livelihood strategy in Nigeria through the lens of the Sustainable Livelihoods (SLA) framework. The United Nations Sustainable Development Goal (SDG) 10c aspires to reduce the transaction costs of migrant remittances to less than 3%, considering the influence that remittances have on the growth of socioeconomic systems and high transfer costs. This study explores how this can be achieved using FinTech applications for cross-border remittance. The study involved 26 participants (N=26), which included both senders and receivers of cross-border remittances of Nigerian origin living within and outside the country. A qualitative analysis of data collected through semi-structured interviews shows that participants typically indicate receiving/sending remittances which were used to meet housing, clothing, feeding and healthcare needs. Additionally, participants state that the COVID-19 pandemic positively impacted the adoption of FinTech for remittance purposes. There were also challenges encountered in the use of FinTech application by participants who identified country restrictions from international remittance, differences in currency exchange rate, and lack of government policies as major challenges they faced. The outcomes of this study will aid in the development of more innovative FinTech technologies for easy cross-border remittances and remittance receivers' livelihoods. The study suggests that the government should put in place policies to ensure uniform currency exchange rates, and the stakeholders must ensure a more seamless user experience of FinTech applications for cross-border remittance. The findings of this research are invaluable in assisting FinTech startups to enhance their FinTech cross-border remittance performance. Because it is an exploratory study, it will greatly contribute to the literature on the topic and will aid FinTech companies in internalizing their strategies for financial inclusion in both the formal and informal sectors. The study suggests that the government should put in place policies to ensure uniform currency exchange rates, and the stakeholders must ensure a more seamless user experience of FinTech applications for cross-border remittance.
- ItemOpen AccessAn analysis of business intelligence for improved public service delivery(2015) Hartley, Mogamat Kaashief; Seymour, LisaThe public sector can be described with different types of public policies and by the services the organisations deliver to citizens. Public sector organisations are implementing e-government projects as mechanisms to enhance public service delivery. However, public sector e-government projects in developing countries are highlighted as challenging. Awards of achievement for implementing e-government projects have been noted in the South African public sector. Business Intelligence (BI) for improved public service delivery has been identified as a key tool to improve decision-making processes. Implementing BI in organisations has been revealed as complex. The study of organisational factors that influence the initiative for successful BI implementation is suggested. For this reason, the research sets out to explore the implementation of BI in the public sector in South Africa. The research was conducted through two case studies. Data was collected by conducting semi-structured interviews and document collection with organisations that are implementing BI. A qualitative thematic analysis method was used to construct the major themes that emerged from the data. The research objectives were addressed by constructing three frameworks; to describe what organisational factors influence the BI initiative, the factors that influence the use of BI, and a framework describing the process of implementing BI in the public sector. The Design-Reality gap model was applied to identify risk in the BI projects. The study revealed that BI can be used as an enabler of change and improvement in public sector activities. Consolidating structures, systems and processes was identified as a precursor to implementing BI. However, the level of skills to use BI tools was highlighted as key factor in hindering BI use.
- ItemOpen AccessAnalysis of designed and emergent consequences of mobile banking usage by SME’s in Kenya using ethnographic decision tree modeling(2014) Mwangi, James Boniface; Brown, IrwinEvaluating the impact of Information and Communications Technologies for Development (ICT4D) has been a challenge both in terms of theoretical and methodological approaches. It has been pointed out in extant literature that ICT4D impact studies are few compared to those that investigate determinants of adoption. Knowledge of this scarcity and the theoretical and methodological limitations led to the conception of this study. This study set out to investigate the decision criteria evaluated by Kenyan micro, small and medium enterprises (MSMEs) when making the initial mobile banking adoption and usage decisions with a view to unearth the designed and emergent consequences. Ethnographic decision tree modelling (EDTM) which is a cognitive research methodology was feasibly employed to obtain the adoption and usage decision criteria from which quantifiable and non-quantifiable consequences were then inferred. Structuration theory was used as a theoretical lens to view the complex context in which mobile banking is embedded and adopted by MSMEs. The analysis of the empirical data obtained from the MSMEs led to the construction and testing of three decision models from which the study’s theory was developed. The derived theory demonstrates the existence of structurational interactions among decision criteria, antecedents of technology adoption, behavioural intention to adopt, and the designed and emergent consequences of actual usage. The study further reveals that contrary to popular belief and argument that adoption of mobile banking technology lowers financial services cost, Kenyan MSMEs adopt the technology not because of its affordability but because of other factors such as perceived usefulness, accessibility, safe custody of daily income, limited organizational capabilities, perceived ease of use, social capital and trust structures. The derived explanatory-predictive theory provides findings that may have significant implications for fiscal and monetary policymakers, development experts and mobile banking technology designers.
- ItemOpen AccessAn analysis of factors affecting the adoption of business-to-consumer e-commerce by SMEs in developing countries: case study Zimbabwe(2012) Mashanda, Precious R; Cloete, EricMost researchers indicate that electronic-commerce (e-commerce) offers viable solutions for businesses trying to meet the challenges of a changing environment. However, the few available studies concerned with Small and Medium Enterprises (SMEs) in developing countries show evidence of delays, and failure to adopt e-commerce solutions in those countries. In the past, little research has been done to identify the reasons for this. This study seeks to explore the factors that influence a decision to adopt Business-to-Consumer (B2C) e-commerce by SMEs in developing countries, using Zimbabwe as a case study.
- ItemOpen AccessAn analysis of the educational needs of end user and information systems personnel as perceived by each other(1994) Du Plessis, Raoul; Smith, DerekOne of the basic needs of both information systems practitioners and academics is in determining what skills and knowledge staff need in order to be able to perform adequately in their jobs (Nelson : 1991). This study was concerned with the information technology and information systems learning needs of two distinct classes of personnel; end users and information systems personnel. More specifically, it examines the perceptions that each group has of the other's particular deficiencies. It also compares the importance that each group accords to skill or knowledge in particular items for their counterparts, and how these expectations match their counterparts' own perceptions of item importance. The study was thus concerned with cross-perceptions; the perceptions that each group has of the other. This study examined these perceptions by means of the analytical survey method. The research instrument used was an adapted version of an instrument previously validated and used by Nelson (1991). The research instrument was completed by 168 employees within ten different organizations. The findings suggest that within six different areas of knowledge and skill both end user and IS personnel perceived their counterparts to be most deficient in the area of general IS knowledge; particularly in knowledge of the fit between IS and the organization, the potential uses of IS/IT within the organization, and in the use of IS for competitive advantage. In addition, both groups of personnel perceived their counterparts to be particularly deficient ii') their ability to communicate effectively. The deficiency in general IS knowledge was aggravated by the finding that both groups expect their counterparts to carry more of the responsibility for knowledge in general IS matters than their counterparts appear willing to assume. The implication of this mismatch of expectations is that it must first be resolved by clarifying the respective roles and responsibilities of both end user and IS personnel before the deficiencies themselves can be dealt with.
- ItemOpen AccessAn analysis of the relationship between analyst-user cognitive style differences and user resistance to information systems(1989) Mullany, Michael John; Lay, Peter M QThis study investigated the relationships between user resistance to new information systems and other factors, the chief of which was the differences in cognitive problem-solving styles between systems developers (analysts) and users. In addition, associations were tested between user resistance and the following: system accuracy, system reliability, the analyst's attitude, the analyst-user relationship, analyst-user dissonance, the user's age and the user's length of service with his current employer. All data was collected at confidential interviews with the key users and key analysts of 34 post-implementation systems service were recorded at these interviews. Ages and lengths of User resistance was determined from the number of complaints made by users regarding the systems and their manner of implementation. Cognitive style was measured using the Kirton Adaption-innovation Inventory (KAI). All other parameters were measured as responses to suitably phrased questions, quantified using seven-point scales. A significant positive association between user resistance and analyst-user cognitive style difference was found. A model was then developed which enables the estimation of user resistance prior to system development with the aid of the KAI. Significant negative associations were found to exist between user resistance and system accuracy, and user resistance and system reliability. No relationships between user resistance and either user age or user length of service were found.
- ItemOpen AccessAntecdents and conequences of consumer internet of things security self efficiency(2023) Behardien, Raeesa; Brown, IrwinThe Internet of Things (IoT) is defined as the next great era of communication and comes with the promise of massive transformations to society and the way the internet works. The growth and demand of IoT devices has led to the increased production of unsecure connected devices that have managed to enter the physical world with many distinct applications. Consumer IoT devices are increasingly available and adopted in all its various forms. Consumer IoT devices can connect to any environment using an internet connection, so it becomes important to secure them against vulnerabilities and security threats. Users of Consumer IoT may be aware of and understand the information security threats they face; however, their self-efficacy affects their ability to protect themselves. The consumers self-efficacy represents the ability to carry out responsive behaviours and the belief that the applied responsive behaviour will have the desired impact. It has been determined to affect their ability to secure Consumer IoT devices and their ability to appropriately respond to the various threats. This research study contributes to the information security area of knowledge by means of a quantitative study with 230 South African respondents. Here, the focus is on the antecedents and consequences of consumer IoT security self-efficacy while evaluating the constructs: IoT Security Behavioural Practices, Behavioural Intention, IoT Security Technology Practices, IoT Security Self-Efficacy, IoT Device Knowledge, IoT Device Experience, IoT Security Breach Incidents, and Consumer IoT General Controllability. The findings from this study show that the consumer IoT device knowledge and consumer IoT general controllability of the user are the antecedents of consumer IoT security self-efficacy. The consequences of consumer IoT security self-efficacy are IoT security technology practices, behavioural intention and IoT security behavioural practices. Similarly, the findings show that there is a positive relationship between the consumers behavioural intention and the IoT security behavioural practices that they carry out.
- ItemOpen AccessAntecedents to the effectiveness of game-based learning environments for the Net generation: A game task fit and flow perspective(2017) Mosiane, Segomotso; Brown, IrwinPurpose: There is a general consensus that games are effective as learning tools. There is however, a lack of knowledge regarding what makes games effective as a learning tool. The purpose of this study is therefore to answer the question: what are the antecedents of an effective game-based learning environment for the Net generation? The Net generation comprises individuals who prefer to learn using games as a tool. Aim: The aim of this dissertation is to develop a conceptual framework that reflects the antecedents of an effective game-based learning environment for the Net generation. The conceptual framework combines the IS Success Model, and the Task-Technology Fit and Flow theory. Method: The study used a quantitative method. Data was collected using an online instrument. The study used 125 participants from mainly the United Kingdom, United States and South Africa. The model was validated using confirmatory factor analysis and tested using multiple regression analysis. Key Findings: The identified antecedents of effectiveness are Game-Task Fit and Flow, where Flow consists of Clear Goals, Feedback and Concentration. Additionally, the Use factor in the model is replaced by Perceived Usefulness. The Conceptual Framework can be used as an evaluation tool for effective game-based learning environments for the Net generation.
- ItemOpen AccessAssessing knowledge-transfer in sanitation projects to promote sustainable VIP latrine provision(2016) Ngobeni, Lulama Ntombana; Rivett, UlrikeThe aim of this study was to assess how knowledge transfer through community engagement and public participation can be used to support the sustainability of VIP latrines, and hence address the negative perceptions that people have of the VIP latrine. In South Africa, the basic minimum acceptable level of sanitation is a lined Ventilated Improved Pit (VIP) latrine. Some sanitation projects utilising VIP latrines have, however, been unsuccessful as a result of the poor construction and design practices, and insufficient buy-in from latrine users. Successful VIP latrine sanitation projects have shown to use effective knowledge transfer through community engagement. The study comprises of a review of literature on community engagement, public participation, sustainable sanitation, VIP latrines and the transfer of knowledge in sanitation projects. The fieldwork study was a comparative assessment of two VIP sanitation projects implemented in the Bushbuckridge Local Municipality: a project coordinated by an NGO appointed by the Department of Human Settlements as part of the Rural Household Infrastructure Programme; and another where the project was run by a project management firm appointed by the local municipality which used funding from the municipal infrastructure grant. For the NGO co-ordinated project, a community engagement approach was adopted, whilst the Project Management Firm co-ordinated project used a public participation approach. The projects were implemented in two villages both situated 10km North East of the town of Bushbuckridge. The comparative assessment was two-fold: an assessment of the sustainability of the VIP latrines, using the Integrated Assessment of Sustainable Development which was developed by Krajnc and Glavic (2004), and a Critical Systems Heuristics (CSH-developed by Ulrich in 1983) (Reynolds, 2007) analysis of the public participation and community engagement methods used in both projects.
- ItemOpen AccessAssessing the quality of airline websites and its impact on user satisfaction and continuance intention(2008) Nazeer, Mohammad Nabeel; Stander, AdrieThe growth of the Internet since the mid-1990s has created a variety of new business opportunities for many industries. The airline industry, one of the world's largest industries, responded to this growth by developing websites both to inform customers about their service offerings and to allow them to conduct e-commerce transactions. With the increasing number of airline companies using the Internet medium as a means of generating revenue, competition is always intense in the airline industry. In order to gain an advantage over their competitors, there is a need for airline companies to offer high quality websites that satisfy online users and entice them to continue using these websites in the future. Numerous studies have investigated the concept of website quality and used various research instruments to assess user-perceived website quality. However, very few of these studies have looked at the airline industry in particular. Furthermore, most of the research instruments used in these studies do not provide a comprehensive set of website quality attributes to assess an airline website. This research aims to investigate the quality of airline websites and its impact on user satisfaction and continuance intention. The literature surrounding these key concepts is reviewed and evaluated, and gaps therein are identified. A conceptual research model that incorporates a very comprehensive set of website quality attributes is then formulated. The model is based on an existing theoretical framework from literature, but is complemented with two additional variables, namely User Satisfaction and Continuance Intention. The study followed a quantitative research approach. A paper-based questionnaire, based on a strongly validated research instrument from literature, namely the WebQual, was administered to a large sample of students at a research university. Different statistical analyses were conducted on the data collected to empirically test the comprehensive conceptual model and validate it within the context of the airline industry. Results of the study indicated that the ease of use, usefulness, response time and entertainment components of an airline website have a significant direct influence on user satisfaction. It was further established that only the entertainment components of an airline website significantly influence an online user's intention to continue using the airline website. To gain a better understanding of trends that emerged within the data collected, a cross-region comparison of website quality was conducted. Results showed that there were significant differences between airline websites from four regions of the world in terms of trust. This is attributed to the ongoing concerns that online users have in terms of conducting monetary transactions on the Internet. A further comparison of website quality between the five most rated airline websites in the study revealed that there were significant differences between them in terms of their relative advantage, visual appeal, response time and intuitiveness. The significance of these results to both the academic arena and practitioners within the airline industry are discussed and avenues for further research suggested.
- ItemOpen AccessThe association of matriculation English scores with the performance of Information Systems majors at the University of Cape Town(2003) Nash, Jane; Hart, MThis study examines the role of language proficiency in the performance of university students within the specialised field of IS, with particular focus on second language speakers. Quantitative analysis is used to investigate the association between academic performance and matriculation results (particularly English), as well as a number of demographic factors, based on a cohort of 241 undergraduate students following an IS major curriculum at the University of Cape Town over a four year period.
- ItemOpen AccessAttitudes Toward And Experiences of Digital Labour by Current and Potential Crowdworkers: A South African Perspective(2020) Chidoori, Cuthbert; Van Belle, Jean-PaulDigital labour is the creation of new products and services through mainly various digital media forms in exchange for a form of remuneration. Digital labour addresses some of their critical issues in South Africa, such as high unemployment, low income and others. Digital labour initiatives, particularly crowdsourcing and others are thought to provide essential benefits such as flexible working times and skills development. However, digital labour can also bring about drawbacks such as the exploitation of workers and low remuneration. The main purpose of this research is to investigate the attitudes toward and experiences of digital labour in South Africa, with a primary focus on crowdworkers in South Africa. A framework built from certain concepts described in the literature review would be used to guide the research. The main research questions would be concerned investigating how the attitudes and experiences affect the intention to participate, the initial and the continued participation in digital labour. The research data were obtained by conducting an online survey amongst 70 participants who would either be potential or current crowdworkers. The research data were analysed using a mixed methods approach, with quantitative and qualitative analysis techniques being used. From the research data collected, some notable findings that unearthed critical digital labour insights included the relationship between the attitude of personal information security and the initial participation in digital labour. This relationship was found to be considerably significant. Also, the relationship between the barrier of internet access cost and the actual participation in digital labour was not significant which was unexpected in a developing country context. The experiential expectations around a living wage and sharing of knowledge notably had the strongest relationship with the continued participation in digital labour of all the experience aspects. However some survey respondents, according to the qualitative responses, noted that the digital labour wages earned were very little compared to the abundant amount of work they would have to produce and therefore felt they were being exploited in their digital jobs. Other aspects such as client networking opportunities, digital skills and work opportunities had a considerable impact on digital labour experiences for digital workers in South Africa. Some major limitations that impacted the research included limited funding to meet the survey respondents' remuneration demands and difficulty in contacting respondents on crowdsourcing sites. The research yields a valuable contribution to the research community by identifying key theories that affect participation in digital labour. Also, by examining the workers' experiences and motivations, the research could provide critical insights for policymakers, platform owners and crowdworkers to utilise for making business decisions. Considerations for future research could be further explored around this research such as exploring the impact of social security for workers in digital labour to ensure fair work conditions and analysing aspects of digital labour more specifically for impoverished and rural communities.
- ItemOpen AccessThe attractiveness of the Western Cape for offshore outsourcing contact centres(2006) Derakhshani, Saba; Hart, MikeThis study examines the attractiveness of the Western Cape for offshore outsourcing contact centres and suggests a series of normative business practices contact centres can adopt to achieve superior organistional efficiency and performance. A literature review defines the concept of a contact centre and discusses the various functions these operations perform. Contact centre technology is also reviewed as well as the personnel management and service quality components of these operations, such as first call resolution and the effectiveness of service encounters. The phenomenon of offshore outsourcing contact centres is discussed by reviewing its risks and benefits. Offshore outsourcing is primarily done to reduce costs, as well as for other factors, such as increased flexibility, efficiency and scalability. However, it is risky due to issues as cultural misalignment and managerial difficulities. A brief overview of the South African contact centre industry reveals that South Africa is home to approximately 525 contact centres including 105 operations situated in the Western Cape. It is estimated that 30% of these operations are outsourcers, of which over 55% service offshore markets.
- ItemOpen AccessBarriers and Enablers to Vocational IT Education: Responding to South Africa's ICT Skills Crisis(2018) Ryklief, Yusuf; Chigona, WallaceAdvancement in digital technologies has directed the attention of developing countries toward ICT’s to aid socio-economic advancement. These technological solutions cannot be implemented as an island, and its effective use requires proportionate advancement in local ICT skills levels to ensure effective operation and sustainability. Increasingly demands for skilled ICT workforce globally is placing pressure on institutions to be more responsive, and to produce ICT graduates with a skillset that is more relevant and closer aligned to the needs of industries. In South Africa the ICT skills landscape remains an object of conflicting reports. Depending on who the question is posed to, the paradoxical views describe the country as either facing a critical shortfall of skilled ICT professionals, or that droves of qualified ICT professionals cannot find suitable employment. These contradictory notions suggest a possible mismatch between the current skills of ICT professionals, the supply of appropriately skilled ICT graduates by education institutions and industry demands for appropriately skilled ICT workforce. Attempts to reform the country’s skills landscape has resulted in numerous policy pronouncements and skills development strategies by the public and private sectors with limited success. This focus of this study was to evaluate the National Certificate Vocational Information Technology (NCV IT) strategy, an ICT skills development mandate issued to South African Technical and Vocational Education and Training (TVET) Colleges in response to the country’s ICT skills shortage. Using the Design-Reality Gap Model, the study evaluated the intended design objectives and current reality of NCV IT to gauge its status ten years post inception. While the South African government boasts increasing access to the programme, little focus is given to the handful of graduates who successfully complete the programme and even less who find meaningful employment. The study further operationalised the Design Reality Gap Model to demonstrate its applicability and value in the evaluation of Vocational Education and Training (VET) programmes. Primary data informing the study was from focus group discussions and semi-structured interviews with key NCV IT stakeholders. Secondary data supporting the study was collected by reviewing key documents relating to NCV IT. The findings reveal significant gaps exist between the programme’s intended design and current reality, indicative of the key challenges hindering the effective delivery of its ICT skills promise. It further positions the NCV IT programme as a post-apartheid dumping ground for financially disadvantaged and academically underperforming individuals hoping to achieve self-sufficiency. What was envisaged to be an enabler for the country’s ICT skills development has instead become a black hole for public funding yielding no return on investment. Recommendations were suggested along particular structural dimensions to improve the NCV IT programme, and the development of a more effective vocational ICT skills development strategy.