Browsing by Author "Ophoff, Jacques"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
- ItemOpen AccessA model for teaching green information systems in higher education(2018) Mcgibbon, Carolyn; Ophoff, JacquesThe purpose of this study was to respond to a call to the Information Systems (IS) discipline to provide solutions to address global challenges such as the seventh Millennium Development Goal of ensuring an interconnectedness of society and the environment. Many academic disciplines have recognised that sustainability is one of the most significant challenges of our time and thus needs to be included in curricula; IS, as a discipline, needed to fill this gap. A longitudinal six-year study was undertaken at the University of Cape Town (UCT) Department of IS to introduce the concept of “Green” IS into a project management course with students required to measure an aspect of the campus carbon footprint. Drawing on Design Science Research, the author used kernel theories of Butler’s Model of Green IS and the Scharmer’s Theory U to inform the design. The goal of the curriculum intervention was to design a model with outputs of key Green IS technical and social competences. The intention was also to create an impact with a reduced Carbon Footprint at UCT, despite the current absence of regulatory pressure. A total of 183 students were involved in the study over a period of six semesters where the theories of Green IS were presented as the underlying frameworks for their course. Key principles were drawn from international best practice, including how to address “wicked” sustainability problems and adopting a focus on developing sustainability solutions. Formative evaluations were conducted at the end of each cycle of the design development. Archival evidence, as well as student reflective essays, was employed, and content analysis and coding of the empirical data were conducted using a data analysis software tool. Experts were invited to summatively evaluate the model in practice, and their questionnaires were also coded in Atlas-ti and tested for co-occurrences. The contributions are provided on two levels. A contribution is made on a theoretical platform by the design of “The Green U’’, a model that evolved iteratively and has its roots in the kernel theories of both Green IS and change management. On a practical level, the research offers guidance to IS educators on how to integrate sustainability into their courses. Via enabling The Green U to be exapted into other emerging IS themes, this research project thus provides the opportunity for a seam of rich possibilities for further quantitative and qualitative research.
- ItemOpen AccessBusiness priorities driving BYOD and the resulting consequences: a South African case study(2016) Miller, Steve Gavin; Ophoff, JacquesThe consumerisation of information technology (IT) introduced the bring your own device (BYOD) phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organisational systems in order to perform their work tasks. Such devices include smart phones, tablets and laptop computers. BYOD provide s opportunities for both the organisation and employees, but the adoption of BYO D also introduces risks to the organisation. Mobility and management of BYOD and CYOD (choose your own device) has consistently been a top concern for business management and Chief Information Officers (CIO's) globally. In the current, challenging economic environment organisations need to use all their resources, including technology, effectively. Organisations that develop an effective BYOD program can use this to assist in achieving their organisational objectives. This study uses a case study approach to investigate how business priorities drive the adoption of BYOD and how BYOD benefits and risks are realised by the organisation. Primary empirical data was collected using semi-structured interviews with employees from a large financial services organisation. Policy documents from the organisation was analysed as secondary data. Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practises. The themes were combined into a conceptual model, showing the decision process in adopting a BYOD program. This research contributes to the body of knowledge in this area, focusing on the South African context. The conceptual model can serve as an example for organisations currently making BYOD adoption decisions or organisations that are not achieving the full benefits of their BYOD program. The conceptual model reveals that organisations can use BYOD to achieve benefits including having a mobile workforce which results in an increase in productivity. However, mobility introduces risk to the organisation where information security risks is the top concern. This study recommends using a combination of technical and human controls to manage the risks. The technical controls include the use of an enterprise mobility management system and password controls. The human controls include the creation of effective BYOD and information security policies that the employees understand and follow. Providing employees with information security awareness and training is essential.
- ItemOpen AccessFactors influencing the use of privacy settings in location-based social networks(2017) Oladimeji, Henry; Ophoff, JacquesThe growth of location-based social networks (LBSN) such as Facebook and Twitter has been rapid in recent years. In LBSNs, users provide location information on public profiles that potentially can be used in harmful ways. LBSNs have privacy settings that allow users to control the privacy level of their profiles, thus limiting access to location information by other users; but for various reasons users seldom make use of them. Using the protection motivation theory (PMT) as a theoretical lens, this dissertation examines whether users can be encouraged to use LBSN privacy settings through fear appeals. Fear appeals have been used in various studies to arouse fear in users, in order to motivate them to comply to an adaptive behaviour through the threat of impending danger. However, within the context of social networking, it is not yet clear how fear-inducing arguments will ultimately influence the use of privacy settings by users. The purpose of this study is to investigate the influence of fear appeals on user compliance, with recommendations to enact the use of privacy settings toward the alleviation of privacy threats. Using a survey methodology, 248 social-network users completed an instrument measuring the variables conceptualized by PMT. Partial Least Squares Structural Equation Modelling (PLS-SEM) was used to test the validity and reliability, and to analyze the data. Analysis of the responses show that PMT provides an explanation for the intention to use privacy settings by social-network users. Risk susceptibility, response efficacy, self-efficacy and response cost were found to have a positive impact on the intention to use privacy settings, while sharing benefits and maladaptive behaviours were found to have a negative impact on the intention to use privacy settings. However, risk severity and fear were not found to be significant predictors of the intention to use privacy settings. This study contributes to existing research on PMT in a sense that fear appeal should focus more on coping appraisal, rather than on threat appraisal which is consistent with the results of most studies on protection motivation.
- ItemOpen AccessThe Impact of an Augmented Reality Application on Learning Motivation of Students(2019-02-03) Khan, Tasneem; Johnston, Kevin; Ophoff, JacquesThe research on augmented reality applications in education is still in an early stage, and there is a lack of research on the effects and implications of augmented reality in the field of education. The purpose of this research was to measure and understand the impact of an augmented reality mobile application on the learning motivation of undergraduate health science students at the University of Cape Town. We extend previous research that looked specifically at the impact of augmented reality technology on student learning motivation. The intrinsic motivation theory was used to explain motivation in the context of learning. The attention, relevance, confidence, and satisfaction (ARCS) model guided the understanding of the impact of augmented reality on student motivation, and the Instructional Materials Motivation Survey was used to design the research instrument. The research examined the differences in student learning motivation before and after using the augmented reality mobile application. A total of 78 participants used the augmented reality mobile application and completed the preusage and postusage questionnaires. The results showed that using an augmented reality mobile application increased the learning motivation of students. The attention, satisfaction, and confidence factors of motivation were increased, and these results were found to be significant. Although the relevance factor showed a decrease it proved to be insignificant.
- ItemOpen AccessInvestigating the factors that influence digital forensic readiness in a South African organisation(2014) Mankantshu, Mninawe Albert; Ophoff, JacquesComputer crimes affect the bottom line of organisations across the globe. The ability of criminals to exploit organisational systems and avoid prosecution is a concern for most organisations. This is due to the increased use of information and communication technology (ICT) by individuals and organisations. The rapid growth of ICT has affected our communication and information exchange. These advances have not only influenced the way we conduct our daily activities, but has also led to new opportunities, risks and challenges for technical and legal structures. Unfortunately, some individuals and groups have decided to use these ICT advances in order to engage in criminal activities, such as cybercrime. The increase of cyber-related crimes puts a lot of pressure on law enforcement agencies and organisations across the globe to produce credible digital forensic evidence.
- ItemOpen AccessInvestigating the Relationship between Learning Styles and Delivery Methods in Information Security Awareness Programs(2021) Ntwali, Blaise; Ophoff, JacquesInformation security threats are continually growing as new technologies emerge. Literature confirms that the human factor is an important issue, as cyber threats and exploitation of vulnerabilities continue to proliferate due to human error. There are significant risks associated with this, such as the organisation's reputational damage and associated costs, to name a few. Information Security Awareness (ISA) programs have proven to be one of the best methods to reduce human linked security vulnerabilities and misbehaviour, which also reduces risks. The purpose of this research is twofold. First, it is to identify and explain the value of aligning ISA programs with user-preferred learning styles and delivery methods. Second, to indicate how aligning ISA programs with preferred learning styles and delivery methods influences security posture. Using the Knowledge, Attitude, and Behaviour (KAB) model as a theoretical lens, the study depicts how information security posture can be improved through the betterment of security knowledge, attitude, and behaviour. Additionally, the aligned learning styles and delivery methods' construct was added to the KAB model to investigate the research questions. The Human Aspect of Information Systems Questionnaire (HAIS-Q) was used to measure ISA levels of organisational employees in South Africa. The chosen parts of these HAIS-Q focused on password management, email and internet use. The ISA scores are essential for this research as they indicate the current ISA levels. This result can be used to improve information security posture. The Visual, Aural, Read/Write, and Kinaesthetic (VARK) inventory model was used to better understand the provided and preferred learning styles. Additionally, ISA programs focused on text-based, video-based, and game-based delivery methods commonly used and applied in prior academic research. Using a survey methodology, the study recruited 322 South African organisational employees to complete an online questionnaire. The questionnaire contained a subset of HAIS-Q, the VARK inventory model, delivery methods, and demographic questions. Bivariate Pearson correlation tests in conjunction with the ISA scores indicated that userpreferred learning styles achieve greater ISA. The results also showed that video-based delivery methods are the most preferred but does not yield the highest ISA scores. The highest ISA scores are achieved from a mixture of delivery methods. The study proposes user aligned learning styles and preferred delivery methods to positively influence the knowledge, attitude, and behaviour leading to improved cybersecurity resilience. As a result, this leads to self-reported and risk-averse behaviour, as end-users' self-efficacy has improved.
- ItemOpen AccessA model of essential factors for e-government crowdsourcing initiatives(2015) Cupido, Kevin; Ophoff, JacquesCrowdsourcing using web technologies accesses the potential of a large network of people who respond to an 'open call'. Successful commercial implementations of crowdsourcing have succeeded in mobilising a large number of participants and leveraging these 'crowds' as a source of ideas, and for problem solving (Geiger et al., 2011, Howe, 2006). While governments perceive citizens as being apathetic when it comes to political participation, the citizen perspective is that their participation is "spectator politics where ordinary people have mostly become endorcees of pre-designed planning programmes" (Williams, 2006, p. 197). Part of the reason for the lack of participation could be due to the increasing complexity of governing and the absence of alternative, more inclusive methods of participation. Brabham (2009) has advocated for the use of crowdsourcing in the public sector as a possible means of increasing public participation, and for governments to access citizens as a source of ideas and solutions. However within e-Government there is a lack of knowledge regarding the implementation of crowdsourcing platforms (Koch & Brunswicker, 2011). The main research questions addressed in this study is: Which crowdsourcing factors are applicable and appropriate for government crowdsourcing implementations, so that citizens would be motivated to participate in such initiatives? As crowdsourcing lacks a theoretical and conceptual foundation (Pedersen et al., 2013, Geiger et al., 2011) a conceptual model for government crowdsourcing implementations is developed and tested. The model uses Self-Determination Theory (SDT) to examine citizen motivation and the influence of incentives or rewards on participation. The model also addresses system factors such as task clarity and types, management, and feedback. The model also includes effort, performance expectancy, as well as behavioural intention from Unified Theory of Acceptance and Use of Technology (UTAUT).