Browsing by Author "Pekane, Ayanda"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- ItemOpen AccessThe dynamic processes of the adoption and use of cloud computing by small, medium enterprises in South Africa(2025) Pekane, Ayanda; Ngwenyama, OjelankiSmall and Medium Enterprises are vital contributors to economic development in middle-income countries like South Africa. SMEs adopt and use various information and communication technologies, such as cloud computing. This is to compete in the information age characterised by the rapidly changing environment due to ICTs. Cloud computing is a platform where organisations can access a pool of ICT resources through the Internet. Research of CC focusing on the SME sector is generally limited, particularly in middle-income countries. The factors driving the evolution and advancement of the adoption of CC by SMEs in SA have not been adequately articulated within the existing literature. There is a gap in understanding the dynamic processes involved in SMEs' adoption and use of CC in SA. As a result, this research aimed to investigate these dynamic processes, focusing on three aspects. Firstly, the challenges of SMEs' adoption and use of CC. Secondly, the organisational learning processes that lead to the adoption and use of CC. Lastly, the organisational changes experienced by SMEs when adopting and using CC. This research aims to advance the understanding of the African landscape, providing a potential resource for other countries in similar situations to access and utilise this knowledge. A multi-method strategy (induction, abduction and retroduction) was adopted, with three research strategies used to interrogate the phenomenon. Participatory observations and ethnographic interviews were applied research methods. Findings indicated that there may be a limited view of the challenges of adopting and using CC by SMEs in middle-income countries like SA. The challenges not found in the literature encompassed substandard CC provision and financial constraints. Some challenges included insufficient knowledge and skills and a lack of support. The findings associated with OL indicated that SMEs employed OL mechanisms, such as investigative and inquiring activities, training, collaborative learning, and alliances, for the exploration and exploitation learning processes. SMEs faced resource allocation challenges of concurrently managing exploration and exploitation activities in learning. The findings associated with OC revealed that SMEs experienced distinct adoption phases, encompassing pre-adoption, mid-adoption, and post-adoption phases. The transition from pre-adoption to mid-adoption corresponded with OC in communication channels, business processes, human resource management, and a shift in the learning culture and employee mindset. The transition from mid-adoption to post-adoption corresponded with OC in organisational structure and culture.
- ItemOpen AccessThe effects of stakeholder perceptions on the outcomes of the computer crime and cybersecurity bill: a case of Lesotho(2025) Mohale, Khotso Clement; Chigona, Wallace; Pekane, AyandaProblem Statement: Cybersecurity legislation formulation is an agenda item for many governments due to data privacy, cyberbullying, financial fraud, and other cybercrimes. This initiative must account for the stakeholders' understanding of cybersecurity to be effective. Without the stakeholders' understanding of cybersecurity, cybersecurity control initiatives such as legislation and policies may not be able to effect the required behaviour changes. Very little is known about stakeholders' perception of cybersecurity and their impact on cybersecurity controls. Purpose of the research: This study aims to determine how stakeholders' perceptions about cybersecurity affect the outcomes of the Computer Crime and Cybersecurity Bill. Design/methodology: The study used qualitative methods and was based on the case study; purposive snowballing was used to identify 17 participants for the study. The data was gathered through semi-structured interviews and document analysis of the Bill and the SADC Model Law Documents. The study used an inductive approach, and thematic analysis was used to analyse the data to achieve the research objectives. Findings: The findings indicated that stakeholders' perceptions had minimal effect on the outcomes of the Computer Crime and Cybersecurity Bill. The Bill was drafted from the SADC Model Law on cybersecurity, and the outcome of the Bill seems to have been primarily shaped by the model law. It was also determined that there was minimal contextualisation and customisation done on the Bill. Contributions of the study: The study contributes to the gap in research in terms of investigating the effect of stakeholder perceptions on the development of legislation. In addition, the study contributes new knowledge by providing insights into the source of cybersecurity stakeholders' perceptions. The knowledge may be used to support future studies in humanistic cybersecurity control initiatives. The study may inform stakeholder engagements to assist in accommodating stakeholders' perceptions and inclusion of local expectations in cybersecurity control initiatives. The findings in the study may also guide countries that are in the process of harmonising and transposing cybersecurity legislation to improve their stakeholder expectations in the process.