Browsing by Author "Kyobe, Michael"
Now showing 1 - 20 of 44
Results Per Page
Sort Options
- ItemOpen AccessA proposed framework that enhances the quality of cyber security audits(2022) Matsikidze, Hezel; Kyobe, MichaelThe need to protect information systems or assets remains crucial today. Innovations in technology have led to rapid developments and as technology continues to advance, so is the need to protect information systems. Amongst numerous effects of cyber-attacks on organizations, huge financial losses which in turn affect the economy have since been reported. Cyber security audits need to be strengthened to tighten the protection of information systems. The importance of cybersecurity audits is widely endorsed in literature. Nonetheless, frameworks used to audit cybersecurity are viewed as‘sometimes' weak links to cybersecurity due to their drawbacks in auditing cyber security. A review of literature indicated that cyber-attacks are more rampant in the African continent with the financial sector being the most targeted. Literature also highlighted that the use of relevant frameworks for auditing cyber security improves the quality and effectiveness of audits thereby enhancing cyber security. Studies in information systems have mostly looked at the adoption of frameworks, types of cyber threats and tools needed to audit. Nonetheless, it is important to note that few scholars have examined the applicability and effectiveness of the existing frameworks in auditing cyber security. Furthermore, previous studies emphasize on enhancing cyber security without a particular focus on auditing cyber security including assessing the role of the auditor during the process. As a result, this study looked at cyber security from an auditing perspective with a particular focus on the strengths and weaknesses of the current frameworks that are being used to audit cyber security including. The study also looked at the factors that enhance the effectiveness of cyber security audits. The study draws from different theories, literature and from the strengths and drawbacks of existing frameworks to create an explanatory model. To statistically test and evaluate the model, a quantitative research approach was employed to collect, analyze, and interpret data from South Africa. Data was collected using a questionnaire which was distributed to IT auditors and cyber security professionals from the Information Systems Audit and Control Association (ISACA) South African chapter members. The National Institute of Standards and Technology (NIST) cyber security framework was found to be the widely adopted framework followed by the International Organization for Standardization (ISO) standards, with the Control Objectives for Information Technologies (COBIT) being the least employed framework. The COBIT framework was found to be more aligned to Information Technology governance rather than cyber security. Furthermore, results of this study indicate that effectiveness of cyber security audits is dependent upon competencies of auditors including their ethics and integrity. Results further indicate that frameworks used for auditing are effective to some extent if properly implemented. A proper alignment of an auditor's competencies which include ethics and integrity, and an adoption of a relevant framework will result in effective cyber security audits that reduce the risks of cyber-attacks. Concerning the contribution to practice, results from this study can help organizations to determine and review focus areas of cyber security auditing that they need to emphasize and develop on. Furthermore, the developed model can be used by auditors to develop an audit plan and conduct audits that are effective in identifying, protecting, detecting, preventing, and recovering information systems or assets. The methodological, theoretical, and practical contributions are further discussed in this thesis along with limitations, recommendations, and areas for future research.
- ItemOpen AccessA sequential explanatory mixed methods investigation of e-government outcomes evaluation practice in developing countries: South Africa as context(2022) Boamah-Abu, Charles; Kyobe, MichaelE-government has become de rigueur in public service delivery. Attendant to the growing adoption is the need to establish the extent to which investments are yielding desired outcomes and how the services can be improved. E-government evaluation is, therefore, an important research problem— more so in developing countries, where resources are scarce, and the opportunity cost is higher. This, notwithstanding, there is a paucity of research. This research explored the “lay of the land”, to describe e-government outcomes evaluation practice in developing countries. South Africa was selected as context; the sample consisted of public sector employees. Practice theory was adopted to frame e-government evaluation as what people do. A two-phased sequential explanatory mixed methods strategy, supported by post-positivism, was employed. This allowed examination of the different aspects of practice— the tangible (e.g., activities) and the intangibles (e.g., affective issues). In the quantitative phase, questionnaire data from 106 public employees (i.e., managers and non-managers from IT, Evaluation, and Other backgrounds) was analysed with factor and cluster analyses techniques to identify the important elements which described e-government outcomes evaluation practice and the patterns of performance. This was followed by a qualitative phase in which interview transcripts of 12 participants drawn from the sample of the preceding phase, four from each background (i.e., two from management and nonmanagement respectively), were analysed with content analysis to help understand the results of the quantitative phase. The findings show an inadequate organizational capacity to evaluate e-government outcomes and use the results. The primary purpose of evaluation is compliance, and organizational outcomes are mostly measured. While there may be some degree of use (e.g., learning, i.e., conceptual) recommendations may not be implemented. Furthermore, there were significant differences among participants; evaluation and IT managers with the requisite expertise were likely to have a positive perception of e-government outcomes evaluation practice. This research adds value to e-government outcomes evaluation research and practice in developing countries, and also to the methodological development of practice theory in Information Systems (IS). Consistent with research on practice, recommendations are drawn to help e-government evaluation stakeholders improve future practice and, thereby, ameliorate the high e-government failure rate. The findings shed light on current practice, e.g., what is done well and challenges, and add to the otherwise sparse body of knowledge in the domain under investigation. A deterrent to the adoption of practice theory is the paucity of theoretical and conceptual frameworks. This research illustrates how Schatzki's theory can be applied to investigate an IS problem and helps remedy the dearth of empirical research on practice. Furthermore, it contributes to the current effort to develop mixed methods in IS— and practice research in general. The agenda for future research can help advance the, hitherto, under researched domain of e-government evaluation in developing countries.
- ItemOpen AccessA social-technical harm-based taxonomy of online hate in South Africa(2023) Omidosu, Joseph; Kyobe, MichaelDigital and social media provide online users with virtually unlimited interaction and instant communication to freely express their thoughts and opinions. Online users can communicate at no cost, write about anything, and quickly reach millions with expressions that can harm others. Attempts have been made to compare the impact of online hate with non-hate crimes, and it was argued that online hate could potentially be more harmful. It is becoming impossible to hear of a crime in our society without being linked to cyberspace. Reactive approaches through technological automation and users manually flagging incidents have been applied to remove online hate but possessitslimitations as online hate persists. Online hate continues to evolve and extend beyond what a silo approach can address. The study proposes a socialtechnical harm-based taxonomy by examining the problem definition of online hate in South Africa, identifying issues that influence online hate in South Africa and classifying harm from online hate targeted at online user characteristics, thereby addressing the research question, what harm results from the online user experience of online hate in South Africa? An umbrella Realism philosophical perspective and mixed method were adopted to collect and analyse the research data from a survey and Twitter big data. This approach was suitable as it posits that reality is independent of human perceptions and differences in perception exist. South Africa was adopted as a focal point due to limited data on online hate and evidence available to inform policy-making processes, decisions, and effective interventions by Government, civil society, or private organisations. Additionally, gaps exist in understanding the harm of online hate in countries like South Africa. The research contributes to the theory by developing a social-technical harmbased taxonomy to classify online hate. With limited knowledge of harm and online hate from an African country, the research provides empirical findings from South Africa. Adopting a mixed research methodology brings to the forefront the benefits of capturing data from multiple perspectives to assess online hate. The study contributes to practice by giving multi-perspective knowledge through exploring social, legal and technological insights. Understanding of harm from online hate was achieved, which is relevant for proactive awareness of harm from online hate, and Law enforcement and administrators can classify harm from online hate. With the knowledge of potential problems that trigger online hate, Government, Law enforcement, and administrators can provide more support during this period. The findings from South Africa show that individual characteristics such as age, albinism, birth, colour, culture, disability, ethnic or social origin, gender/gender identity, HIV status, language, nationality, migrant or refugee status, occupation/trade, political affiliation or conviction, race, religion, and sexual orientation can be targeted for online hate. Problems like social, political, racial and health-related issues were found to influence online hate in South Africa. Online users witness online hate and do not report the incidences because of a lack of knowledge of what to do, a lack of trust in reporting agencies, fear of the implication of reporting, and contextual awareness of the situation. The finding further provided evidence that online hate can have various negative consequences, including Social, Political, Financial, Reputational, Physical, and Psychological Harm. The study will help the government, statutory agencies, civic organizations, policymakers, and digital and social media administrators take proactive-preventive measures to combat the increasing menace of online hate.
- ItemOpen AccessAlignment of human competencies with mobile technology and business strategy in women-led SMEs(2014) Ajumobi , O Deborah; Kyobe, MichaelStudies show that women entrepreneurs are constrained and faced with challenges that inhibit the growth and performance of their businesses. Such challenges include race and gender differences, inadequate education, family responsibilities, lack of access to capital and other socio-cultural factors. However, with their human competencies, mobile technology and the appropriate business strategy, women-led small and medium-sized Enterprises (SMEs) can steer their businesses to better performance. While the need for SMEs to align these three elements (human competencies, mobile technology and business strategy) has been suggested, there is limited knowledge on how SMEs can achieve this; no studies, to the author’s knowledge, have examined this in women-led SMEs. This study therefore sought to fill this gap by investigating how women-led SMEs can best align these three elements to enhance their business performance. In light of this, extensive literature review and theoretical work on the phenomenon was conducted. Given the existence of the interplay between these three elements (human competencies, mobile technology and business strategy), the study adopted the perspective of alignment as Gestalts as the most appropriate method in determining the best way women-led SMEs may align these three aspects.
- ItemOpen AccessBitcoin adoption in South Africa, an end user perspective(2021) Kimani, Njinu; Kyobe, MichaelThe development of electronic money and virtual currencies has led to the growing presence of bitcoin and other blockchain based, decentralized cryptocurrencies). The most popular of these cryptocurrencies being Bitcoin, a globally traded cryptocurrency, evidence of which is prevalent in South Africa with the formation of Bitcoin exchanges such as Luno in 2012. The advancement of Bitcoin in South Africa presents a number of opportunities for a number of role players in the financial, technology, retail and service sectors. However successful, wide spread adoption may also be hampered by various actors such as governments, financial institutions, merchants and the behaviour of end users. The usage of Bitcoin in developing countries for especially for international remittances and transfers has shown significant benefits such as lower transaction fees. The already prevalent use of mobile money in developing countries may aid Bitcoin's adoption. Mobile banking functions such as sending international remittances could easily be replaced by using a Bitcoin wallet, which offers much lower transaction costs than traditional banking services, especially when doing low value. It is believed that Bitcoin adoption and internet banking share parallels in that both involve the adoption of an innovating technology and both are susceptible to the effects of social phenomena and personal bias. This study investigates the adoption of Bitcoin in South Africa, a developing African country, from an end user's perspective. Importance will be placed on identifying and assessing challenges that may inhibit the widespread adoption of Bitcoin amongst end users, as well as drivers that may promote Bitcoin's adoption in South Africa. A significant finding is that end users' adoption decisions towards Bitcoin were mainly driven by the users propensity to hoard bitcoin in order to make financial gains. In addition, result demonstrability was also shown to be a key driver influencing the end users adoption decision. A modified version of the innovation diffusion theory is suggested in the discussion based on the findings of this study.
- ItemOpen AccessCloud Computing Benefit Realisation in a South African Public Sector: A postadoption study(2022) Breda, Leigh N; Kyobe, MichaelBackground: Cloud Computing is a globally evolving trend that is changing the landscape of Information Technology as we know it. The perceived benefits of Cloud adoption are spurring IT leaders to move to Cloud Computing to maintain the competitive edge, regardless of some of the challenges associated with Cloud adoption. Currently, the predominant reason for organisations to adopt Cloud Computing is the reduction of costs. However, some organisations report that they are not receiving the perceived benefits as expected pre-adoption. Despite this known fact that cost reduction is not guaranteed, organisations are expected to increase their IT spending in the future on Cloud Computing. As organisations are reporting that they are not receiving a tangible and easily measurable benefit such as cost reduction, it is imperative for organisations to measure and confirm that intangible benefits which are difficult to quantify are being received. This measured approach is essential to aid organisations in understanding the actualised benefits of Cloud Computing. Objective: Current literature predominantly focuses on the adoption of Cloud Computing with the private sector as its consumers. Minimal research has been explored with Cloud Computing postadoption, explicitly focusing on the South African public sector context. Little is known about these organisations and if they have actualised the perceived benefits from its adoption phase. Further to this, understand how these organisations have measured the degree in which they have benefited from the adoption. The purpose of this research is to contribute to knowledge regarding organisations in the public sector and what factors influence the actualisation of perceived adoption benefits postimplementation. Method: The researcher adopted a constructivism ontological stance, interpretivist epistemology, and an inductive approach to conduct this research. Qualitative data was collected in the form of 20 semistructured interviews conducted over a period of 12 months. These interviews were conducted in an organisation in the public sector that has implemented Cloud solutions already, and can provide a retrospective view of its adoption. Thematic analysis was utilised to sort the responses into categories and themes. These themes were further filtered by using a research model based on the TOE framework as the lens to structure the data. Findings: This research revealed a discrepancy in the perceived benefits of pre-adoption and the received actualised benefits of post-adoption across the organisation. This is primarily due to the lack of IT management predefining metrics to determine the degree that the adoption has benefited the organisation. Secondly, depending on the type of Cloud service and user role, benefits can vary, thus having one part of the organisation very satisfied and another area dissatisfied. Lastly, the pre-adoption factor for adoption is not necessarily a factor that influences the continued use of Cloud Computing. External factors such as the COVID-19 pandemic have shifted perceptions and organisational requirements due to the increased pressure to deliver services and work remotely. This increase in dependency on Cloud Computing altered the main factor of cost reduction, so significantly that if the Cloud would cost more, the organisation would continue its use due to the additional benefits that Cloud Computing provides.
- ItemOpen AccessDeterminants of user continuance intention towards mobile money services : the case of M-pesa in Kenya(2015) Osah, Olam-Oniso; Kyobe, MichaelThe turn of the millennium witnessed the uptake and proliferation of mobile technology in developing regions. This occurrence has provided a medium for mobile telecommunication vendors within the region to create and offer services that are now accessible across socio-economic classes. A notable case of a widely adopted mobile technology-enabled service in the developing world is a mobile money service in Kenya called M-pesa. Since its inception, M-pesa has witnessed a mass adoption which has generally been attributed to prior lack of access by majority of individuals' in the country to affordable regulated financial services. M-pesa's presence has now been anticipated to afford a larger population the initial opportunity to harness economic benefits such as: increase money circulation, increase employment opportunities, facilitate social capital accumulation, facilitate savings, and promote financial autonomy, amongst others. Also, M-pesa based transactions in Kenya are reported to exceed those of western union globally. Whilst M-pesa presently vaunts large user adoption numbers, it is the first of its kind in the region to amass such achievement. Further, historically: products and services of similar nature to M-pesa have been unsustainable. A case of M-pesa's demise would have dire implication for the Kenyan economy and 30% of the households in the country that rely on it for remittances. To understand this phenomenon, extant studies have examined the drivers of adoption of this service but have slacked in subsequent investigations to understand user continuance with the service. As such, the information systems literature cautions that initial adoption of technology, although crucial, does not guarantee sustained use. Therefore it is imperative to investigate drivers of continuance. In general, extant research has not focused on investigations of user continuance intention in Africa. In response, this thesis presents an African based study on the determinants of user continuance intention towards M-pesa. Specifically, the purpose of this study was to i) identify and discuss factors from the literature that are most likely to influence user continuance intention towards M-pesa, (ii) develop a research model that is grounded in theory, (iii) test the model within the sample context to identify the antecedents and determinants of user continuance intention towards M-pesa in Kenya. A broad, critical review of the relevant literature provided basis for hypothesized relationships between the identified factors. A formal survey of users of M-pesa in Kenya comprised the phase of data collection and resulted in a usable data set of (n=434). The data collected from the respondents within Kenya was relied upon to test the hypotheses. The survey instrument used to measure the study's constructs was developed via a process of literature review, expert pre-testing, pilot testing, and statistical validation. Partial Least Square and Artificial Neural Network analyses were used to examine the study's measurement and structural model comprising variables of : behavioural beliefs (post-usage usefulness, confirmation, satisfaction), control-beliefs (utilization and flow), object-based beliefs (perceived task-technology fit, system quality, information quality, and service quality), and attitudinal belief (trust). Collectively, the afore-listed ten independent variables and one dependent variable (continuance intention) comprised the study's model. Four of the independent variables (utilization, satisfaction, flow, and trust) were hypothesized to directly determine continuance intention. Of these four, all emerged as determinants of continuance intention. However, trust emerged as the strongest determinant, subsequently, utilization, flow, and satisfaction respectively. The result was unexpected, as satisfaction (a behavioural belief) has been presented in the extant literature as the dominant determinant of continuance intention but does not hold a consistent predictive strength in a developing world. Its predictive power was diluted by trust, utilization, and flow amongst the Kenyan sample. The study's model revealed an R² of 0.334. The analyses demonstrated that user continuance intention is determined by factors across object, control, attitudinal, and behavioural beliefs. The unexpected finding of the rankings of predictive strength of the factors turns a new leaf and introduces areas of further inquiry in future studies. The study concludes with realized contributions to theory and important guidelines for current and future technology-enabled service vendors in developing regions.
- ItemOpen AccessE-learning in universities in Uganda: predictors of successful adoption(2019) Namirembe, Esther; Kyobe, MichaelAdoption of e-learning technology has been carried out by numerous universities in the developing countries with the aim of advancing the knowledge society and economic development. However, the adoption of e-learning technology in the said universities is fraught with challenges leading to low level use for instructional purposes. The study aims at: (i) identifying the predictors of successful adoption of e-learning, (ii) investigating causes of failures of past e-learning information systems initiatives, and (iii) developing a predictive framework for the advancement of e-learning programmes for universities in Uganda. In order to determine possible predictors of successful adoption, the researcher adopted the configurational (Gestalts) approach. The hypotheses were tested in a survey that involved 73 lecturers and 184 students from Uganda’s Makerere University and Gulu University. The respondents’ opinions are obtained using questionnaires and interviews and analysed using descriptive, clustering and deductive thematic analyses techniques. The research identified four analytical clusters from the target group of the lecturers, while the target group of the students are described by six analytical clusters. Results from cluster 1 among lecturers indicate that successful adoption is dependent on being familiar with the objectives of the university’s e-learning policies, finding time to experiment with ICT, availability of financial support and commitment of university management. However, it should be noted that while the study was conducted within two Universities, the majority of the lecturer respondents were from Makerere University. Therefore, while organisational characteristics contribute to the adoption of e-learning among lecturers, their influence is more pronounced in the established university, that is, Makerere. Both lecturers and students adopt e-learning facilities at later stages of their studies or career which raises great concern. The majority of the lecturers in the lead cluster were male and PhD holders while most of the students in the lead cluster were male and in their second year of study. Lecturers in Cluster 1 are adopters because of the knowledge and long-time experience with e-learning facilities compared to their counterparts in Clusters 2 and 3. Students in Cluster 4 were adopters because they had more knowledge and skills in the use of ICTs than their counterparts in the other clusters. Cluster 3 and 6 among lecturers and students respectively were least adopters of e-learning mainly because they were unfamiliar with the university e-learning policy. The main causes of failure of past e-learning information systems initiatives were lack of structured approach to e-learning and inadequate empowerment. From the cluster findings, a predictive framework for the advancement of e-learning programmes in universities in Uganda was developed. It was recommended that: adoption of e-learning technology should be encouraged during the early school years of the students and earlier career years of the academic if universities are to be competitive.
- ItemOpen AccessEvaluating the value of e-business in small and medium-sized enterprises: a model and analysis in Southern Africa(2019) Tsumake, Meduduetso; Kyobe, MichaelThe implementation of electronic business (e-business) in organisations has led to a major improvement in business performance in both developed and developing countries. This improvement as well as market forces have put pressure on Small and Medium-sized Enterprises (SMEs) to adopt e-business. However, the e-business models adopted by SMEs are often abstruse and poorly represented, which leads to time consumption and miscommunication between the stakeholders involved, the business operations and Information Technology (IT) functions. These unclear e-business models make it difficult to evaluate its value. This research examines the elements necessary for this e-business value creation and draws from different disciplines and theories to create a comprehensive model for e-business evaluation in Southern African SMEs. Most studies done on e-business in Southern Africa have been found to be on challenges of technology, a lack of resources such as financial and user capabilities and challenges in business processes. Some gaps in the e-business literature have been found to exist on issues of alignment of business mission and strategy, entrepreneurial drive and management capabilities. The study adopted Gerbner’s theory of communication exchange for the data collection strategy and process, which posits that by studying the events of the communication exchange, one can infer about the state of the systems engaged in the exchange and their relationships. Consequently quantitative website content analysis of 100 Southern African SMEs was conducted to determine their e-business value. The results revealed that an SME that comprises of a properly aligned business mission and strategy, business processes that are enabled by e-business, an entrepreneurship orientation, management capabilities and employees as well as technology integration will achieve ebusiness value. This was seen by a positive influence of 68% on e-business value from these elements. Conversely 32% of this influence is from external elements, and future studies could explore more elements that influence e-business value. Also, a small employee size was found to not be a hindrance of e-business value. Lastly, overall infrastructural e-readiness is the same in Botswana and South Africa, which refutes claims that e-readiness is higher in South Africa than the rest of the Southern African countries. However, SMEs in Botswana lag behind when it comes to technological aspects such as technology equipment, successfully integrating their systems within the businesses; and their IT in their entire businesses and networks, forming technology interdependencies of processes with external businesses, and using online means to transfer information to clients/customers. The developed model (EBVE model) could help (1) stakeholders investigate, communicate and make appropriate decisions and (2) aid SMEs to successfully integrate e-business in their business processes and practices.
- ItemOpen AccessExamining factors affecting blockchain adoption for process improvement in the financial services industry(2022) Luthuli, Sandisa Zizipho; Kyobe, MichaelThe focus on blockchain, thus far, has been mainly on its technicalities and less on the institutional complexities that impede its successful implementation in originations. Industries like supply chain for instance, present many issues of inefficiencies, fraud and processes which may be non-technological but still pose serious adoption challenges. Certain industries, including the financial services, banking, and supply chain, do not properly understand blockchain as a technology due to its immaturity. Furthermore, the purpose concerning the application of blockchain technology for business process improvement remains unclear. There is still opportunity within the research field to determine the visible gaps in the literature regarding the impact of using blockchain technology. A review of the literature used for this study found that using blockchain technology has promising capabilities that may improve business processes within organizations. While research on blockchain in the financial services industry is in its infancy, there are no comprehensive frameworks to guide blockchain adoption and implementation. The examinations of the different theories led to the development of an integrative framework that would help examine key factors that affect blockchain technology adoption for process improvement in the financial services industry. This was done following careful synthesis of the Social, Technological, Environmental, Economic and Political (STEEP) and the Process, Institutional, Market and Technology (PIMT) frameworks. The study adopted a quantitative method using a quantitative survey tool to test the key factors identified by the conceptual model developed. Data was collected through an online survey within IT departments of two financial services companies, with the target audience comprising of IT professionals resulting in 72 respondents having participated. This study followed an exploratory approach where existing literature was examined to understand what, how and why the identified key factors affect the adoption of blockchain technology. Furthermore, deductive reasoning was adopted as existing theoretical frameworks were identified to test the existing theory around the adoption of blockchain technology. The philosophical stances taken in this study follow that of positivism and objectivism. Through factor analysis path, the research revealed that the combined effect of Institutional factors have a perfect positive correlation with blockchain technology adoption with the most influential factor being money laundering. Although found to be insignificant, the most influential factors on environmental factors are the ability for blockchain technology to cater for sensitive personal information, confidentiality in blockchain technology, and privacy concerns. The results, however, lack tangible evidence to show that organizations deal with sensitive personal information which blockchain technology cannot cater for. This is a barrier to blockchain technology's full adoption in the financial services sector. As a consequence of these factors on the adoption of blockchain technology, financial services sector companies have adopted blockchain technology initiatives. To that end, empirical evidence from the research shows that regulatory uncertainty prevents financial services companies from adopting blockchain technology.
- ItemOpen AccessExamining the evolution of bully-victim behaviour in South African high school students(2017) Namane, Kedibone Charlotte; Kyobe, MichaelBully-victims have not been studied extensively in the South African context and studies regarding cyber bullying are not keeping up with this widespread of ICTs. There is a large scale of research that focuses on bullying and victimisation, but not much on bully-victims in general which makes it difficult to identify this group of individuals for better intervention measures. The term bully-victims refers to those individuals that are bullies but also experience bullying as well. An obstacle in the development of interventions suitable for this phenomenon is the inability of researchers, teachers as well as learners to differentiate between the different forms of bullying. Failure to understand the distinctions in the forms of bullying may result in a domino effect of not understanding individuals' behavioural differences as well as bullies' risk profiles. Therefore, it would be very important to try and get an understanding of this behaviour and the possible causes which will help in developing tools that can assist in preventing the cycle of mobile bullying, and mobile bully-victimisation as well as raise awareness on the issue. This study will therefore target the category of mobile bully-victims, this class has not been studied extensively but recent developments show that it has extreme consequences for young people. This study identified different factors that impact on bully-victim behaviour and the evolution thereof. Following literature review, the researcher developed a conceptual framework illustrating the evolution of mobile bully-victim behaviour. The framework proposed that there are relationships between previous traditional bullying experience and (1) the school environment, (2) self-control/self-esteem, (3) age/grade, (4) retaliation and (5) technology which result in the evolution of mobile bully-victim behaviour. The conceptual framework was tested using a questionnaire which was distributed to grade 8 and 9 learners in four schools in the Mpumalanga province where 817 responses were obtained. A Frequency distribution test was run on factors of mobile bullying that are significantly associated with factors of mobile victimisation and it was found that a total of 121 learners scored high on both these factors thus making them mobile bully-victims. It was also found through the execution of a Spearman rank order correlation that learners that currently use their mobile phones to bully others are those that were victims of previous traditional bullying. The results revealed, for example, that learners tend to threaten, spread rumours, share content online and create groups solely for the purpose of excluding others because they have been bullied in the past. Studies explain that this reaction is as a result of impulsivity, a characteristic of low self-esteem or lack of self-control, after experiencing bullying. Structural Equation modelling was run to analyse how bully-victim behaviour evolves and how the bully-victim pathways are formed. The results revealed that schools located in rural or less advantaged communities engage in bullying activities more than those in urban or suburban communities. It was also found that only 14% of learners were aware or knew of exiting anti-bullying policies in their schools and 40% indicated that they know of other mobile bullying reporting mechanisms, with most of these learners being from urban and suburban schools. Studies found that this may be due to the high social capital provided by well off communities which provide a safer environment. The findings also proved that learners are more involved in mobile bullying activities at a younger age, this contradicting previous studies which found that mobile bullying is more prevalent as children mature. Also, younger learners lack self-control/self-esteem due to previous traditional bullying experience whereas for older learners it is due to mobile bullying experience. This is despite the fact that studies show that self-control improves with age.
- ItemOpen AccessExamining the extent to which mobile bully-victim behaviour is a consequence of social integration or aggressive behaviour(2018) Jokazi, Nombulelo; Kyobe, MichaelThe absence of a framework or policy to address bullying in South Africa compels the country to rely on pieces of legislation that are closely related to anti-bullying laws such as the Child Justice Act 75 of 2008 and Protection from Harassment Act 71 of 2011. Over-reliance on pieces of legislation creates challenges for victims of these bullying crimes because most of the relational aggression exerted towards victims goes unpunished. Some of the adolescents take the law into their own hands, thus, exacerbate and increases the complexity of bullying crimes. Due to advancements in Information and Communications Technology, bully-victim behaviour does not only take place in physical environments such as schools, but it takes place anywhere, anytime (24/7) on Mobile Social Networks. In 2011, a cyberbullying study by the Centre of Justice and Crime Prevention reported that 69.7% of the youth in South Africa falls in the category of bully-victims. This is alarming given that few studies focus on the role of bullyvictims in South Africa. The exact cause for mobile bully-victim behaviour is unclear, and previous studies have highlighted it is between aggressive behaviour and social integration. Therefore, this study examined aggressive behaviour and social integration to determine which of these two factors contribute the most to mobile bully-victim behaviour. Additionally, mobile social network features that enable this behaviour were investigated. The factors that lead to aggressive behaviour and social integration, resulting in mobile bully-victims, were identified through a literature review. Paper-based surveys were issued to Johannesburg high school adolescents. Johannesburg was mainly selected based on finding by previous studies, which highlighted that most of the online bullying and victimisation happens amongst adolescents in Johannesburg. After data was collected, the results were analysed using Statistica version 13.5. The analysis revealed that, indeed, both aggressive behaviour and social integration cause mobile bully-victim behaviour, however, social integration contributed more than aggressive behaviour. The findings also revealed that WhatsApp and Instagram were the most utilized social networks by mobile bullyvictims. There were no differences between males and females when it comes to mobile bullyvictim behaviour. The causes of mobile bully-victim behaviour that have been identified in this study can be used as a starting point to develop legislation/framework aimed at combating mobile bully-victim behaviour. Given that mobile bully-victims are more suicidal and suffer from depression, psychologists and therapists can use the knowledge obtained from this study to develop psychological treatments specifically for mobile bully-victims.
- ItemOpen AccessExamining the role of mobile phones in minimising knowledge transfer impediments in students' projec teams(2009) Shongwe, Mzwandile Muzi; Kyobe, MichaelKnowledge transfer is the most important process in knowledge management. In order for knowledge to be used, it has to be transferred from one knowledge source to the other. Knowledge transfer is not a smooth process. There are a lot of impediments that prevent the transfer of knowledge. Four knowledge transfer impediments were identified: nature of knowledge, social ties, time and motivation. These four were selected because literature shows that they affect project teams in academic and non-academic organisations. However the development of mobile phones and mobile technologies is promising to address this issue. Students use mobile phones to communicate with each other thus sharing knowledge. This research investigated the role that mobile phones play in minimising knowledge transfer impediments in students' project teams. A quantitative approach was used to collect data from participants to test hypothesis drawn from literature. A total of 176 responses were obtained from three groups of students doing projects. The study provides several interesting findings. The study found that, mobile phones minimise three of the four knowledge transfer impediments identified. These are motivation, social ties and time impediments. It was discovered that, a mobile phone motivates team members to share knowledge during a project. Team members with strong social ties use their mobile phones more often to share knowledge on their project. It takes less time to acquire knowledge from previous team members when a mobile phone is used. A mobile phone does not help project teams to transfer tacit knowledge. The study did not find any evidence that suggest that gender and race play role in knowledge transfer using a mobile phone. It was found that project teams from different departments transfer different forms of explicit know ledge. The study also discovered that students do not only use their mobile phones to transfer knowledge, but also use their mobile phones to create knowledge. The study reveals that mobile phones promise to bring a new era of mobile learning. Higher education institutions should cease this opportunity and introduce new interactive ways of learning. Students on the other hand should use mobile phones more often for knowledge creation and transfer to improve their academic work.
- ItemOpen AccessExploring ICT-supported Formal Women Business Networks (eFWBNs) the case of Kenya and South Africa(2018) Ajumobi, Deborah O; Kyobe, MichaelThe primary purpose of this study was to examine and understand the nature of Information and communication technology (ICT) supported formal women business networks (eFWBNs) and their contribution to the development of women entrepreneurs. For over a decade, studies on women’s entrepreneurship, particularly those in sub-Saharan Africa, have reiterated the importance of, and need for, women’s involvement in formal women business networks (FWBNs). In this study, FWBNs are defined as networks that have women entrepreneurs as key actors and are often affiliated with consultants, business practitioners, and government. FWBNs provide benefits and access to useful resources that are not easily accessible to women entrepreneurs due to several constraints. FWBNs have been found to be slow to leverage ICTs to facilitate and enhance their activities even in the era of globalisation. While FWBNs exist in sub-Saharan Africa, there is a dearth of research on their characteristics, structure and operation. Particularly within the information systems field, there is paucity of recearch around the integration and use of ICTs in WBNs. Thus, there is limited guidance on what makes a FWBN achieve its objectives and how these networks may leverage technology to enhance and facilitate their operations and activities. For these reasons, this study sought to shed light on the nature of eFWBNs and their use of ICTs. To achieve this objective, multidisciplinary theories were reviewed and an integrative theoretical framework developed. This revealed that an eFWBN is a configuration of distinct but inter-related elements – actors, relationships, resources, governance, external support and ICTs – which interplay to provide contributions and benefits to women entrepreneurs. This thesis proposed that the stronger the coherence among the core elements of the eFWBN, and the operating and support mechanisms, the greater will be their contribution and benefits. This proposition was tested in an empirical study involving three network cases in Kenya and South Africa, using mixed methods. The qualitative data was analysed using thematic analysis, and converted to quantitative data using the quantitisation technique. The quantitised data and the data collected using quantitative methods were combined to test the model using cluster analysis. The cluster analysis resulted in three clusters representing the three eFWBNs cases in this study. The findings revealed that the Kenyan networks had achieved coherence amongst the elements of the network and as such attained good outcomes. However, the South African network did not report good outcomes, suggesting they had not attained coherence amongst the element in the network. The findings also provided results contrary to the observations in literature about the use of ICTs in eFWBNs. In this study, not only ICTs were highly leveraged at the network-level and were an integral part to the strategy, the existence and operation of the network. This research makes significant contribution to knowledge by providing insight and understanding into an under-researched area (eFWBNs). The key theoretical contribution of this study is the integrative theoretical framework that overcomes the limitations of earlier theories used to study networks. It integrates various theories into a framework that identifies and explains more comprehensively the various aspects and operations of eFWBNs. It also advances the configurational theory as an effective approach to measuring complex relationships. This study also makes significant methodological contributions. There is currently a dearth of knowledge on how to fully integrate both qualitative and quantitative data in mixed methods research. Thus, by adopting the quantitisation technique, this study provides knowledge on how to convert qualitative data to quantitative data to achieve synthesis of both methods in a single study. Also, the adoption of realism as a philosophical stance helped to overcome the challenges of mixing methods and paradigms in one research project. The findings of this study also have practical implications. The findings showed that at the membership level, women entrepreneurs need to apply more agency in establishing relationships and translate the acquired resources within the network into benefits for their businesses. At the network-level, the evidence revealed that leaders of eFWBNs need to ensure they balance the needs of their members in order to carry the members along and preventing them from feeling excluded. The findings also asserted the importance of developmental, private and public organisations to eFWBNs. Lastly, government and practitioners can draw from the understanding provided of eFWBNs, to create and establish policies that can aid women entrepreneurs’ successes and growth. The theoretical, practical and methodological contributions are further discussed in this thesis. The study concludes with a discussion on the limitations of the study and recommendations for future research.
- ItemOpen AccessFactors Affecting Automation of Cyber Forensics Investigation(2023) Hayes, Dean; Kyobe, MichaelOver the past three decades, technology has evolved in a global context changing human interaction through digitization. While there are positive attributes to technological advancement, there are considerable negative elements as well. Cybercrime and digital crime have risen drastically propelling sophisticated digital forensic technology, aimed at fighting cybercrime. However, with automation in digitized Fourth Industrial Revolution, it leaves room to consider the challenges of this on cyber forensic specialists. The purpose of this study was two folded. Firstly, it aimed to identify factors that affect the automation in the cyber forensics investigation. Secondly, it aimed to determine the most important factors in affecting the automation of cyber forensics investigation performance. The research aimed to shed perspective on automation within the lens of cyber forensics, to provide new insights and efficiency regarding cyber forensics processes. It used a positivism research philosophy and quantitative research design. Eleven factors that affect the automation of cyber forensics investigation were identified from literature. Furthermore, eleven hypotheses were generated and were tested using a correlation matrix. Additionally, multiple regression analysis was also used to determine the most important factors that affect the automation of cyber forensics investigation performance. In view of this, the R2 and R2 change were used to determine to what extent the factors influenced the variance in the automation of cyber forensics investigation performance. In this regard, accessibility to data and dependency on Cloud Service Providers (CSPs) were indicated to be the most important factors that had a significant impact on the automation of cyber forensics investigation performance. It was revealed that accessibility to data influence 37.8% of the variation found in the automation of cyber forensics investigation whilst dependency on CSPs was found to influence 17.5% of the variation found in the automation of cyber forensics investigation. On the other hand, the rest of the nine factors each had a combined influence of 1.7% on the variation found in the automation of cyber forensics investigation performance. In light of this, accessibility to data and dependency on CSPs were found to be the most important factors that positively affected the automation of cyber forensics investigation performance. v
- ItemOpen AccessFactors influencing cyberbullying among young adults: Instagram case study(2022) Oladimeji, Anthonia; Kyobe, MichaelCyberbullying is one of the major problems of social networking sites, which has been known to have prolonged adverse psychological effects on social network users. Cyberbullying has been discussed a lot in the literature, but little research has been done on cyberbullying and its related factors. This study seeks to examine the factors influencing cyberbullying on Instagram among young adults. Instagram was chosen as a case study for the thesis because research shows that Instagram is the most preferred social networking site among the age cohort (18–30), who are popularly referred to as young adults. An extensive review of the literature was carried out, and six constructs (Instagram Usage, Vulnerability, Peer Pressure, Anonymity, and Instagram Features) were used to examine the influence of cyberbullying among young adults on Instagram. This study draws from the theory of routine activity theory (RAT), which is grounded on the postulation that criminal acts can be easily committed by any individual who has the opportunity. The researcher reviewed the process and deployed a methodological and concept-centric approach to create a comprehensive conceptual model that included key factors. This dissertation is different from most cyberbullying research in the sense that it reviews cyberbullying behaviours from the context in which they occur rather than the intent or motivation of the perpetrator. The model allowed a holistic examination of factors that influenced cyberbullying behaviours on Instagram. Using a survey methodology, over 201 Instagram users who are also students at the University of Cape Town completed an instrument measuring factor influencing cyberbullying. The researcher deployed Smart PLS, a statistical package for the social sciences, to test for reliability, validity and to analyse the entire dataset. The study critically examined the factors that influence cyberbullying among young adults. The results of this dissertation indicated that peer pressure and online vulnerability have a strong significance in cyberbullying behaviours. Surprisingly, Instagram usage had a weak correlation with cyberbullying behaviours. This study contributes significantly to the exciting research on cyberbullying as it helps identify the factors that contribute to cyberbullying behaviours. From this research, cyberbullying interventions or solutions can be accurately developed.
- ItemOpen AccessFactors influencing the success of an E-participation project in South Africa(2015) Bennett, Dine; Kyobe, MichaelDissatisfaction with service delivery is an enormous challenge for the current government of South Africa, as protests about service delivery are frequent and often violent and disruptive. E-participation could provide a means for dissatisfied citizens to voice their grievances, but it has not been duly exploited in South Africa. The purpose of this research is to contribute to knowledge of e-participation in developing countries , and specifically to identify the factors that influence the success of service delivery e-participation initiatives. A case study was conducted of an e- participation project - Project Lungisa - and qualitative data, in the form of interviews, documents and field notes, was collected and analysed in order to identify these influencing factors. As predicted in the literature review, citizens’ trust in government, stakeholder management, ICT infrastructure and project leadership were factors that influenced Lungisa’s success. Political consensus and inclusion did not influence success, and as a result two of the study ’s propositions could not be confirmed. Unanticipated factors that emerged as influential include local government support, independence from government and political parties, the use of mobile phone technology, marketing and advertising and community integration. A revised conceptual model is presented in the conclusion of this study, which could be tested in future research. Recommendations for practitioners are also given based on the nine influencing factors, and it is hoped that these will be of value to implementers of future e-participation projects.
- ItemOpen AccessFactors influencing university female students' response to cyberbullying and effects on academic performance(2022) Mataga, Vimbayi Theresa; Kyobe, MichaelCyberbullying is a form of bullying that is rapidly on the increase. Cyberbullying continues to affect students today. Although studies on cyberbullying and school pupils have been done, a few studies mainly focus on how it affects the category of female students as well as their academic achievements. In previous studies, there have been limited theory to support and explain the severity of this phenomenon towards the female gender as several studies record a higher number in female victims than male victims. Therefore, this research further investigates the aspects of cyberbullying and female victimization. This study focuses on cyberbullying in a South African university. This research also highlights some factors that lead to female victimization. With the use of literature on cyberbullying and victimization, the researcher formulated a model to guide this research. This model was formulated on the assumption that a cyber-victim's academic performance may be determined by how they would have been greatly affected by being bullied. However, the extent to which a victim is affected by cyberbullying was determined by three factors, that is their age, gender and self-control. The factors mentioned were identified through a literature review. The proposed model was tested using a survey involving 262 female university students from the University of Cape Town in South Africa. The collected data was captured on excel and analyzed through the use of Statistica. The findings also revealed that the learners were frequent users of social media and digital devices which could have been the leading cause of them being vulnerable to cyberbullying. Analysis also showed that self-control had a significant influence on how affected learners responded to cyberbullying, whilst age had no significant influence on how learners responded to being bullied. How individuals responded to being bullied had an influence on their academic performance as those who responded negatively to cyberbullying produced poor academic results as compared to those who were not negatively affected. Given that, learning institute authorities can use knowledge obtained in this study to intervene where possible.
- ItemOpen AccessFactors that Influence Mobile Bully-victim Behaviour on Mobile Social Networks: The Case of Facebook(2019) Ndyave, Zizipho; Kyobe, MichaelMobile bullying on social networks is a growing problem in South African public high schools. It is described as a fairly new form of cyber bullying which is conducted using a mobile phone through communication channels such as text messages, emails, Instant messaging and other chat rooms such as social networks. Excessive usage of mobile phones in schools has elevated the delinquency of bullying in school grounds and challenged how school policies are executed when it comes to mobile bullying. While mobile technology is more widely use than conventional methods to commit antisocial behaviours today, our understanding of mobile bullying is still limited in the South African context. Although studies on bullying in general have been conducted, there has been limited focus on one type called bully-victims. Bully-victims are adolescents that swing between being a bully and a victim and are difficult to identify. The present study aims to bridge the gap by examining the factors that influence the behaviour of mobile bully-victims on Facebook in South African public secondary schools. Children who are greatly exposed to violence and victimisation at an early age tend to struggle when they become adults and experience emotional trauma, perform poorly in their academics and at times commit suicide. Cyberbullying has similar negative impacts whereby the intention is to frequently harm another person using virtual platforms. Research shows that there is rapid growth in suicidal cases which is one of the leading causes of death among adolescents in South Africa. While suicide has not been associated with bully-victims in South Africa, international studies link adolescent suicidal tendencies with bully-victim behaviour. Facebook has been chosen because it is the most popular and commonly use social network by adolescents. Extensive literature on the potential causes of mobile bully-victim behaviour has been reviewed and a conceptual model (Mobile Bully-victim Model) of the influencing factors identified. This model aims at assisting schools understand the nature of mobile bully-victims, potential causes of bully-victim behaviour and guide the development of appropriate interventions for this form of aggression. A total number of 457 school learners participated on the quantitative survey both from Gauteng and Western Cape provinces. The study population is based on learners from Western Cape and Gauteng public schools because there are more school violence cases occurring in communities where there is a high crime rate. These two provinces fall under four provinces including Limpopo and Free State that are leading in high crime rate in South Africa. Due to unavailability to participate from other provinces, only Western Cape and Gauteng public schools were available and willing to participate in the study. 319 of those learners were found to be mobile bully-victims. The degree to which mobile bully-victim behaviour occur was examined in relation to Anonymity, Collective behaviour, Power, Facebook usage and Emojis and Facebook features. After various tests including spearman correlation, T-tests, and regression analysis were run, the results confirmed that adolescents who have anonymous profiles that follow collective behaviour of public pages, possess power and who are frequent Facebook users are likely to be mobile bully-victims and they demonstrate bully-victim behaviour on Facebook. However, Emoji and features showed an inverse relationship with bully-victim behaviour on Facebook. Therefore, the study confirms that these factors do indeed influence mobile bully-victim behaviour on Facebook except for Emoji and Facebook features.
- ItemOpen AccessIdentifying female mobile bully-victim characteristics in selected high schools in South Africa: towards an anti-bullying mobile application(2020) Adeyeye, Oshin Oluyomi; Kyobe, MichaelWithin the majority of learners' years in high school, bullying is one common experience that pervades those years of transitioning to adulthood. The bullying phenomenon has been studied over a few decades and we have basically come to understand that bullying is any situation where a perpetrator, over a period, continually behaves aggressively towards another individual who cannot defend themselves; here an imbalance of power is accentuated. This has been studied in recent years with the increasing reports of fatalities among high school learners who have resorted to suicide and self-harm as a solution. In the current digital age, the extent of bullying is faster and reaches further, and as such, more dynamics seem to be involved in the mix. The role of technology in improving the way we live and do things has also extended to the way crimes and injustice are being meted out in society. Youths and adolescents, particularly high school learners have been noted to have a phenomenal adoption of technology. They are also noted to increasingly acquire the most updated mobile technology devices and are therefore a fit sample for examining mobile bullying. In addition, more studies are finding out distinct classifications such as bully, victim and bully-victims, with the bully-victim studies just beginning to gain attention. As with the more familiar traditional bullying, fundamental psychological, social and economic factors largely predict the exhibiting of bully-victim characteristics. Some studies have found that the consequences are, however, more severe within the group but not without some inconsistencies in findings; hence the need to investigate and begin to proffer the right interventions or solutions. This current study set out to investigate characteristics of female mobile bully-victim behaviours amidst claims that they are a minority and so no special attention need be given to them. A pilot study, conducted by this researcher, examining the bully-victim subgroup from previous cyberbullying research studies (Kabiawu & Kyobe, 2016), found the group exists and is fast gaining more popularity in research. Further examination of literature found the discourse around age factor in prevalence, with gender variances, interventions, and country differences, among others. Many of the past studies on gender variance enquiries were conflicting, interventions were largely not technology-oriented, and studies were mostly from outside the continent of Africa. This stirred up the interest in studying female mobile bully-victims in South African high school students and the exploration of a general (i.e. non-gender-specific) technical intervention. The study followed a pragmatic philosophy and mixed method in collecting and analyzing the data. The study was carried out in Cape Town, South Africa; eight schools agreed to participate in the survey, and 2632 responses were collected from a range of schools (consisting both public and independent schools). Of these, 911 were females and 199 bully-victims, placing the group in a minority position. This maintained the keen interest in understanding the issues that face them rather than overlooking the subgroup as some studies would argue. Additionally, the study vii entailed the development of an IT artefact in the form of a mobile application, called “The BullsEye!” through a Design Science process. The aim of the artefact was to proffer a technical intervention and observe the usefulness of the artefact in dealing with general bullying as well as for addressing, mitigating and providing support for bullying. The study collected information quantitatively to explore the differences in age, school grade, type of school, family type, ethnicity and perceptions of interventions from students. This process was also used to recruit interested students in designing the mobile app intervention to address the secondary aspect of the research. The study predicted that at different ages and school grades, female mobile bullyvictim behaviours would be different. It also proposed that these behaviours exhibited by bully-victims would differ when the school type, ethnicity and family from which students come, are compared. When interventions by teachers, family and friends were compared, the study predicted that the female bully-victim behaviours exhibited would not be same, depending on the perception of the level of intervention the students received. These hypotheses were tested empirically using quantitative methods to check the analysis of the variance of the mean scores of the collected data. The results of the analysis of variance showed findings that resulted in some partial and some strong acceptance of the hypotheses. As expected, there were age and grade differences observed among the behaviours of the female bully-victims surveyed. The younger in age and grade these students were, the more of the behaviours were found to be exhibited by them. Students from conventional families with two parents were expected to exhibit fewer female bully-victim characteristics, but this was not necessarily the finding in the study and inconsistent with most previous studies. The prediction on ethnicity was also partially accepted due to mixed indications according to findings. Establishing the respondents' ethnicity showed a group of students who did not wish to reveal their ethnicity but were rife in bully-victim behaviour via phone calls, email and SMS's. This raised a question of whether their societal status affected their behaviour. The type of school was also found not to accurately predict female bully-victim behaviours in this study as expected or in accordance to majority of existing literature. There was, however, evidence of a distinct social media mechanism of bullying/victimization peculiar to an Independent school in relation to other schools. The prediction on interventions, while being partially supported, provided a useful insight into strengthening the need to appreciate and continually invest in the quality of interventions provided to address mobile bullying. Generally, the findings revealed that female mobile bully victims had significantly higher experience of being victims (i.e. had been bullied) than those who were not. This may be due to failings in the provision for reporting issues or the way reports are being handled, which is another useful insight into interventions. The artefact designed as an intervention in this study also showed high acceptance of the app. This can be attributed to the fact that the design process followed a methodology that is grounded in practice and in the body of knowledge. This was embellished by emerging methodologies of involving the intended users, though schoolchildren, in the evolution of the artefact design. The implication of these findings is that there may be current frameworks addressing female mobile bully-victim behaviour at school and family levels; however, focus of interventions should be on teaching the right culture with regards to mobile phone use. This gives credence to the second objective of this study, which was to design a digital intervention. The artefact was designed to empower victims and bystanders, the purpose of which seemed to have been achieved with a high rate of approval for the app. The knowledge gained from this phase, despite the limitations, points that visual appeal is important when designing for high school students. It also showed that students are interested in learning in an environment free of adult presence or supervision. However, many more strategies and principles can be applied to intervene from different perspectives to create a more wholistic solution. This knowledge is useful for future works that seek to include their input in design process. The understanding of these characteristic mechanisms is important in proffering relevant interventions as the distinct female bully-victim group is newly gaining attention. This is useful in theory development, especially feminist theories on violence as well as where and how to target interventions. This impacts practice in terms of knowledge of how female mobile bully-victims operate and how one can begin to empower them to protect themselves and reflect on their online and mobile phone behaviour. Therefore, for Information Systems practice, this study provides a worthwhile contribution, especially in answering questions such as, what information systems and interventions should be developed and how to maximize such systems for their intended learning purposes. From the lessons learned in this study, the research also contributes by proposing considerations for future and further research.
- «
- 1 (current)
- 2
- 3
- »