Dissertations / Theses on the topic 'Business enterprises Computer networks Malaysia'

To see the other types of publications on this topic, follow the link: Business enterprises Computer networks Malaysia.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Business enterprises Computer networks Malaysia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ruyter, Masood. "The measurement of enterprise architecture to add value to small and medium enterprises." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2293.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2012.
South Africa has a complex financial and retail service industry with high reliance on the use of IT systems to ensure effectiveness and maintainability. Decision making and improved outcomes may be done through an IT aligned enterprise architecture (EA) strategy. EA is a capability that contributes to the support and success of an organisations' IT. Organisations are currently using EA to better align IT and the business strategy which provides a comprehensive v.ew of the IT system. Thus, EA is increasing in organisations yet the measurement and value of EA is limited to organisations and enterprise architects. The discussions of the benefits and value of EA has been discussed for several years, however there are still no consensus about how the benefits and value of EA can be measured. The lack and clear understanding of the benefits and value of EA needs to consider different aspects of IT as well as the shareholders when measuring the benefits and value of EA to an organisation.
APA, Harvard, Vancouver, ISO, and other styles
2

Rosenbaum, Gustav Filip Computer Science &amp Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.

Full text
Abstract:
This thesis focuses on efficient provisioning of resilient Virtual Private Network (VPN) services. It first confirms the intuition that network resources can be more efficiently utilized when resilience mechanisms are implemented by a network provider in the physical network than by its VPN customers in their VPNs. Next, a Multiprotocol Label Switching-based programmable VPN architecture is presented that delivers virtual links as resilient quality of service (QoS) connections and virtual sites. Virtual sites allow customers to implement functionality like customized routing and content adaptation ???in the cloud???, as opposed to the current network model where all functionality is implemented at the network edge. To provision a resilient QoS connection, two paths need to be computed from the ingress to the egress nodes, such that both paths meet the given QoS constraints. Two different frameworks have been proposed in the literature to compute resilient QoS connections when the QoS constraints are bandwidth and end-to-end delay. They both use a preprocessing step whereby either all links with less residual capacity than the given bandwidth constraint are pruned, or the given end-to-end delay is converted to an effective bandwidth. The frameworks thus reduce the problem to one with only a single constraint. We argue in this thesis that these frameworks individually lead to poor network utilization and propose a new framework where both constraints are considered simultaneously. Our framework exploits the dependency between endto- end delay, provisioned bandwidth and chosen path through using the provisioned bandwidth as a variable. Here, two link-disjoint paths are computed together with their respective minimum bandwidths such that both the bandwidth and end-to-end delay constraints are satisfied. Given our framework we first propose a new generic algorithm that decomposes the problem into subproblems where known algorithms can be applied. Then we propose two new linear programming (LP) formulations that return the two paths and their respective bandwidths such that they have the minimum combined cost. To make our framework applicable in a production environment, we develop two new algorithms with low run times that achieve even higher network performance than their LP formulation counterpart. These algorithms systematically use an algorithm that computes non-resilient QoS connections. As no algorithm for computing nonresilient QoS connections with sufficiently low run time has been proposed in the current literature we develop two new algorithms and their respective heuristics with a run time comparable to Dijkstra???s shortest-path algorithm. Our simulations show that exploiting the dependency between end-to-end delay, provisioned bandwidth and chosen path can significantly improve the network performance.
APA, Harvard, Vancouver, ISO, and other styles
3

郭偉本 and Wai-pun Kwok. "Business opportunities in internet." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31267208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gubanich, Bradford C. "How are U.S. corporations using Intranets for their company's internal communication?" Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1998. http://www.kutztown.edu/library/services/remote_access.asp.

Full text
Abstract:
Thesis (M.S.)--Kutztown University of Pennsylvania, 1998.
Source: Masters Abstracts International, Volume: 45-06, page: 2700. Typescript. Abstract precedes thesis as preliminary leaves [1-2]. Includes bibliographical references (leaves 75-77).
APA, Harvard, Vancouver, ISO, and other styles
5

Jacoby, Grant A. "A metric model for Intranet portal business requirements." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FJacoby%5FPhD.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.

Full text
Abstract:
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007.
The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
APA, Harvard, Vancouver, ISO, and other styles
7

Lenaburg, Allen Gregg. "Intranet concept for small business." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2710.

Full text
Abstract:
The purpose of this project is to build a working intranet containing core applications that create the framework for a small business intranet. Small businesses may benefit from an intranet because of its ability to effectively streamline the processes for retrieving and distributing information. Intranets are internal networks using TCP/IP protocols, Web server software, and browser client software to share information created in HTML within an organization, and to access company databases.
APA, Harvard, Vancouver, ISO, and other styles
8

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipulate and transmit sensitive customer and financial information. IT, which involves major risks, may threaten the security if corporate information assets. Therefore, IT requires attention at board level to ensure that technology-related information risks are within an organization’s accepted risk appetite. However, IT issues are a neglected topic at board level and this could bring about enronesque disasters. Therefore, there is a need for the Board of Directors to direct and control IT-related risks effectively to reduce the potential for Information Security breaches and bring about a stronger system of internal control. The IT Oversight Committee is a proven means of achieving this, and this study further motivates the necessity for such a committee to solidify an organization’s Information Security posture among other IT-related issues.
APA, Harvard, Vancouver, ISO, and other styles
9

Smeda, Jorina. "Benefits, business considerations and risks of big data." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96684.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: Big data is an emerging technology and its use holds great potential and benefits for organisations. The governance of this technology is something that is still a big concern and as aspect for which guidance to organisations wanting to use this technology is still lacking. In this study an extensive literature review was conducted to identify and define the business imperatives distinctive of an organisation that will benefit from the use of big data. The business imperatives were identified and defined based on the characteristics and benefits of big data. If the characteristics and benefits are clear, the relevant technology will be better understood. Furthermore, the business imperatives provide business managers with guidance to whether their organisation will benefit from the use of this technology or not. The strategic and operational risks related to the use of big data were also identified and they are discussed in this assignment, based on a literature review. The risks specific to big data are highlighted and guidance is given to business managers as to which risks should be addressed when using big data. The risks are then mapped against COBIT 5 (Control Objectives for Information and Related Technology) to highlight the processes most affected when implementing and using big data, providing business managers with guidance when governing this technology.
AFRIKAANSE OPSOMMING: ‘Big data’ is 'n ontwikkelende tegnologie en die gebruik daarvan hou baie groot potensiaal en voordele vir besighede in. Die bestuur van hierdie tegnologie is egter ʼn groot bron van kommer en leiding aan besighede wat hierdie tegnologie wil gebruik ontbreek steeds. Deur middel van 'n uitgebreide literatuuroorsig is die besigheidsimperatiewe kenmerkend van 'n besigheid wat voordeel sal trek uit die gebruik van ‘big data’ geïdentifiseer. Die besigheidsimperatiewe is geïdentifiseer en gedefinieer gebaseer op die eienskappe en voordele van ‘big data’. Indien die eienskappe en voordele behoorlik verstaan word, is 'n beter begrip van die tegnologie moontlik. Daarbenewens bied die besigheidsimperatiewe leiding aan bestuur sodat hulle in staat kan wees om te beoordeel of hulle besigheid voordeel sal trek uit die gebruik van hierdie tegnologie of nie. Die strategiese en operasionele risiko's wat verband hou met die gebruik van ‘big data’ is ook geïdentifiseer en bespreek, gebaseer op 'n literatuuroorsig. Dit beklemtoon die risiko's verbonde aan ‘big data’ en daardeur word leiding verskaf aan besigheidsbestuurders ten opsigte van watter risiko's aangespreek moet word wanneer ‘big data’ gebruik word. Die risiko's is vervolgens gekarteer teen COBIT 5 (‘Control Objectives for Information and Related Technology’) om die prosesse wat die meeste geraak word deur die gebruik van ‘big data’ te beklemtoon, ten einde leiding te gee aan besigheidsbestuurders vir die beheer en kontrole van hierdie tegnologie.
APA, Harvard, Vancouver, ISO, and other styles
10

Fitzgerald, Kyle Andrew. "E-commerce application utilisation by South African SMME’s." Thesis, Cape Peninsula University of Technology, 2005. http://hdl.handle.net/20.500.11838/1772.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2005
The Internet was functioning on Internet protocol (IP) and transmission control protocol (TCP) in the 1970s and soon afterwards electronic mail (email) was invented allowing messages to be sent from one person to another using packet switch services (PSS). However email did not form an information space for information to permanently exist. The World Wide Web (Web) arrived in the late 1980s, riding on top of the Internet providing a global and persistent information space available to everyone. This information space has assisted in small business facing dramatic change, often referred to as the 'e-commerce evolution'. Compared to the industrial revolution with the advent of the railways and electricity the magnitude of ecommerce is no less. Advances in the information technology (or e-comrnerce elements) and the use of Information systems (or applications) are the main drivers behind this e-commerce evolution. Some authors believe all businesses will be equal in the utilisation of e-commerce eroding any competitive advantage the one may have over the other. The 'digital economy' is now available with the explosive popularity of the Internet and the Web as seminal applications of e-commerce. In South Africa the maturity level of e-commerce adoption has increased from skepticism to positivism since the world wide availability of the Internet. Although e-commerce has generated a profusion of articles in South Africa, there has been a lack of research into the effects and benefits of e-commerce utilisation by small business. Various elements of e-commerce are explored highlighting the suitability of use towards a small business. This stUdy will explain the fundamentals that small business owners will need to understand to enable them to knowledgably participate in the global phenomenon of e-commerce. Authors nationally and internationally have explored the applications of e-commerce for example email and electronic data interchange (EDI).
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Gong, and 王宮. "Service-oriented multi-agent system architecture for virtual enterprises: with ontology-based negotiations." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47029110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Toutcha, N'souh Yonkwa. "The impact of cloud computing on the role of an IT department : a case study of a higher education institution in the Western Cape." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2653.

Full text
Abstract:
Thesis (MTech (Business Administration))--Cape Peninsula University of Technology, 2017.
Information and communication technologies are moving fast. Consequently, organisations must be aware of this evolution and adapt to take full advantage of the benefits offered by these technologies. Cloud computing is a new concept of accessing data centers and various computing resources via the internet through any devices and from anywhere. Large organizations, such as Higher Education Institutions (HEI), are gradually adopting cloud computing to reduce their very high budgets. In emerging countries, more and more HEIs are adopting the services offered by cloud computing, more precisely in South Africa in the Western Cape. However, cloud computing affects the way IT services are delivered by traditional HEI IT departments. Thus the objective of this study is to explore the impact of cloud computing on the role of the IT department of HEIs, using a case study. To fulfil this objective, interviews were conducted within the IT department of an HEI, including the IT staff, and it was found that cloud computing affects the role of the IT department by changing the roles and responsibilities of some IT staff, as well as the focus of certain posts in the department. In addition, cloud computing also affects the department's culture. Fortunately, no IT staff have lost their posts. Other results show that training and certification were necessary for the IT to adapt to the changes. Cloud computing adds value to the IT department because it offers a daily 24-hour service as opposed to the traditional IT department.
APA, Harvard, Vancouver, ISO, and other styles
13

Lethbridge, Nick. "An improved model of structural changes resulting from use of e-commerce." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Xiaohuan, and 王晓欢. "Knowledge sharing and utilization of the ontological agent-based virtual enterprises." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46593056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pather, Shaun. "E-commerce information systems (ECIS) success: A South African study." Thesis, Cape Peninsula University of Technology, 2006. http://hdl.handle.net/20.500.11838/1409.

Full text
Abstract:
Thesis (DTech (Information Technology))--Cape Peninsula University of Technology, 2006
As a phenomenon of the 1990s, e-Commerce is relatively new. Its advent offered the promise of new opportunities to businesses and entrepreneurs around the world. The hyperbole associated with the Internet and the Web resulted in a mindset that e-Commerce was an easy road to success. It was believed that this new technology-based approach would revolutionise business in a number of ways, including changing the relationships between thestakeholders and allowing small organisations to play on the global stage. However, the road to business enhancement through e-Commerce has not been easy. Many organisations have not survived their attempts to engage. in e-Commerce and others have radically changed their approach since the e- . Bubble burst. There were many reasons for the failure of these e-Commerce initiatives. They included poor business ideas, no control of expenditure, lack of general business experience and immaturity, as well as little understanding of the crucial importance of managing the technology through which the Internet and the Web delivers e-Commerce opportunities. This thesis explores the intricacies of IS within the Sduth African B2C eCommerce environment and argues that without a coherent understanding of the factors affecting IS success, the implementation of traditional IS evaluation mechanisms may be problematic. A comparative analysis of studies in this field between the pre- and post- e-Commerce eras, ascertained a paucity of theoretical frameworks and a fragmented body of knowledge in the extant literature, with a narrow focus on web-interface issues.
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Wenli. "Control and assurance services for electronic commerce /." Full text (PDF) from UMI/Dissertation Abstracts International, 2000. http://wwwlib.umi.com/cr/utexas/fullcit?p9992934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Leung, Kin-heung Ray, and 梁健鄉. "How to use networking to increase internal efficiency and then increase external effectiveness in an international environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31268110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hughes, Grant Douglas. "A framework for software patch management in a multi-vendor environment." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2478.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.
Software often requires patches to be installed post-implementation for a variety of reasons. Organisations and individuals, however, do not always promptly install these patches as and when they are released. This study investigated the reasons for the delay or hesitation, identified the challenges, and proposed a model that could assist organisations in overcoming the identified challenges. The research investigated the extent to which the integration of software patch management and enterprise data security is an important management responsibility, by reviewing relevant documents and interviewing key role players currently involved in the patch management process. The current challenges and complexities involved in patch management at an enterprise level could place organisations at risk by compromising their enterprise-data security. This research primarily sought to identify the challenges causing the management of software patches to be complex, and further attempted to establish how organisations currently implement patch management. The aim of the study was to explore the complexities of software patch management in order to enhance enterprise data security within organisations. A single case study was used, and data were obtained from primary sources and literature. The study considered both technological and human factors, and found that both factors play an equally important role with regard to the successful implementation of a patch management program within an organisation.
APA, Harvard, Vancouver, ISO, and other styles
19

Gwaka, Leon Tinashe. "Social media risks in large and medium enterprises in the Cape Metropole : the role of internal auditors." Thesis, Cape Peninisula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2086.

Full text
Abstract:
Thesis (MTech (Internal Auditing))--Cape Peninsula University of Technology, 2015.
Social media has undoubtedly emerged as one of the greatest developments in this technology driven generation. Despite its existence from years back, social media popularity has recently surged drastically, with billions of users worldwide reported to be on at least one social media platform. This increase in users of social media has further been necessitated by governmental and private-sector initiatives to boost Internet connectivity to bridge the digital divide globally. Mobile Internet access has also fuelled the use of social media as it allows easy and economical connectivity anytime, anywhere. The availability of hundreds of social media platforms has presented businesses with several opportunities to conduct business activities using social media. The use of social media has been reported to avail businesses with plenty of benefits when this use is strategically aligned to business objectives. On the flipside of the coin, these social media platforms have also emerged as new hunting grounds for fraudsters and other information-technology related criminals. As with any invention, engaging social media for business has its own inherent risks; this further complicates existing information-technology risks and also presents businesses with new risks. Despite blossoming into a global phenomenon, social media has no universally accepted frameworks or approaches (thus no safeguards) when engaging with it, resulting in almost unlimited risk exposures. The uncertainly, i.e. risks surrounding social media platforms, proves problematic in determining the optimum social media platform to use in business. Furthermore, organisations are facing challenges in deciding whether to formally adopt it or totally ignore it, with the latter emerging not to be a viable option. The complex nature of social media has made it difficult for enterprises to place a monetary value and determine a return on investment on these platforms. From a governance perspective, it remains a challenge for most enterprises to identify and appoint individuals responsible for social media management within businesses, although recently social media strategist positions have been surfacing. Due to their nature, the social media trigger matters relating to governance, risk and compliance, which imply that internal auditors therefore are expected to champion the adoption of social media in enterprises. As a relatively new concept, the role that internal auditors should play towards social media appears not to be well defined. Through examination of existing guidelines, an attempt is made to define the role of internal auditors towards social media.
APA, Harvard, Vancouver, ISO, and other styles
20

Fulford, Richard. "Towards a theory of management and evaluation of operational enterprise resource planning applications." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2008. https://ro.ecu.edu.au/theses/171.

Full text
Abstract:
Enterprise resource planning (ERP) applications are the most ubiquitous of business information systems. They impact almost all business functions, bringing control and providing information. Some of these applications have already been operational for 20 years and this longevity has changed the way in which management of information systems is envisaged. Traditionally, information systems had a lifespan of perhaps five to 10 years and their iterative replacements, allowed them to be aligned with a changing business landscape. In contrast, enduring ERP applications, if not altered and changed to meet contemporary business requirements, may stifle and restrict organisations. To be effective they, therefore, require ongoing management and evaluation throughout their operational life. Research concerning the management and evaluation of operational ERP applications is seen in the information systems literature to be sparse, with many specific calls for studies into the phenomenon. Organisations also seem uncertain of the best approach to ensure their applications meet business objectives. This has prompted the research aim of developing a theoretical framework that details the key factors relevant to ongoing management and evaluation of ERP; the framework being designed to assist practitioners in the effective administration of ERP and to provide guidance for further academic research. To address the research aim, a qualitative study was undertaken to explore the management and evaluation of ERP in organisations. A broad literature review of the impacting factors identified the preliminary constructs for the study. An initial pilot case was used to test and support the validity of these constructs with further constructs being identified. The constructs were tested and the framework refined in four additional case studies. The organisations ranged in size from large medium to global corporations. The ERP applications studied consist of Oracle e-business suite, SAP ERP, and Microsoft Dynamics AX. In-depth, semi-structured interviews were conducted with senior management, finance and IT personnel as well as users of the application. Descriptive case analysis was used to portray the phenomenon in each of the organisations. This was followed by explanative cross case analysis that compared and examined the findings for each of the constructs. One of the key findings of the research is that the decisions that are made early in the application 's lifecycle may well impact the application, and its resultant business benefits, for the life of the application. These decisions are often made by organisational stakeholders who have inadequate knowledge of the application and who are insufficiently supported by consultants concerning macro business matters. The antecedents of poor decisions are very difficult, in terms of time, complexity and cost, to recover from and they can ultimately result in ERP abandonment. Organisations that go on to implement a subsequent ERP use the knowledge gained from the original implementation to take a more considered approach that results in much improved business outcomes. The research has found that with respect to the original implementation poor judgement by stakeholders is related to (1) a lack of understanding of the capabilities and encumberments of ERP applications (2) the misnomer of ‘best practice’ that is applied to these applications (3) poor training, in terms of both content and timing, by value added resellers and software authors (4) consultancy that is application module specific (5) a lack of knowledge of organizational business processes (6) a lack of understanding of the holistic information needs of the organisation (7) poor understanding of the long term risks associated with decisions. The major recommendation of this study is that an organisation takes ownership of the application as early as possible by establishing an ERP bureau that has the ongoing involvement of senior management. The personnel comprising the ERP bureau should have business, process and technology skills and should fundamentally understand the business drivers as well as the capabilities of the application. The major contribution of this thesis is a framework that specifies a number of factors that the bureau needs to understand to properly manage an ERP application. These include (1) an understanding of the strategic aim of the application (2) an appreciation of the impacts of business factors such as organisation type, strategy process, financial procedures, and financial status (3) an understanding of contextual environmental considerations such as supply chain influencers (4) an understanding of the consequences of the software authors' charging procedures (5) the value and potential of the ERP maintenance agreement (6) an understanding of the impact of customisations on the ability to upgrade (7) knowledge of horizontal and vertical information requirements (8) a recognition that due to the strategic nature of ERP, business drivers and imperatives tend to provide more crucial benefits indicators than traditional cost/benefit justifications. This thesis has both theoretical and practical significance. The theoretical significance of the research is the unearthing of the key factors that enable and impede the management of operational ERP applications. This unearthing has the potential to help focus future research and to act as a precursor for similar studies. Education programs concerning ERP management may also benefit from considering the various important factors identified. The research is particularly practically relevant as the framework has the potential to shape both organizational policy and practice
APA, Harvard, Vancouver, ISO, and other styles
21

Tekeh, Emmanuel Temban. "The adoption of virtual teams and virtual technology in human resources management : a South African perspective." Thesis, Cape Peninsula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2075.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2015.
This study explores factors contributing to the slow adoption of virtual teams and virtual technology by South African organisations in Cape Town. The study adopted the Technology Organisation and Environment (TOE) framework to examine the influence of technological organisational and environmental contextual factors on organisation’s adoption of virtual teams and virtual technology. Three organisations from different industries in Cape Town were chosen as a case study. Data was collected via qualitative interviews and quantitative questionnaires while content analysis and a statistics package for social sciences were used to analyse and generate results. The results indicated that all three dimensions of the TOE framework significantly either enabled or inhibited organisational adoption of virtual teams and virtual technology. Technological contextual factors such as availability of technology were found to enable adoption while high set-up cost inhibited adoption, and perceived benefit and drawbacks either inhibited or enabled adoption due to the influence of other contextual factors. Organisational contextual factors like available resources and slacks were found to facilitate, whereas organisational competency and formal and informal linking structures impeded adoption. Management commitment, communication process, degree of centralisation, organisation size and technological competency were found to either enable or inhibit technology adoption owing to the influences of other contextual factors. Environmental contextual factors such as competition, government regulation and rapidly growing industries were found to encourage technology adoption. Lack of skilled labour was found to restrain technology adoption while industry characteristics, market structures and technology support infrastructure either enabled or inhibited organisational adoption of virtual teams and virtual technology due to the influence of other contextual factors.
APA, Harvard, Vancouver, ISO, and other styles
22

Kistasamy, Christopher. "The role of service-oriented architecture as an enabler for enterprise architecture." Thesis, Cape Peninsula University of Technology, 2011. http://hdl.handle.net/20.500.11838/2298.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2011.
The adoption of Enterprise Architecture (EA) methodologies within organizations is causing an interest in the methodologies and supporting technologies available. Service Oriented Architecture (SOA) supports EA in many facets. However, there is much suspension with regard to the relationship between EA and SOA within organizations as well as the guidelines that organisations should follow in order for SOA to enable EA. There are potential problems that may arise if this relationship between SOA and EA is not agreed to at the outset of implementing an EA. The purpose of this research is to investigate the guidelines that are needed for SOA to enable EA, in order to provide practical steps that organisations can use to begin aligning SOA and EA, ensuring that these initiatives are driven from a business perspective. A qualitative approach using a case study was used as a methodology for this research. The data collection was conducted using semi-structured interviews, and the guidelines that were derived were validated through a survey that was distributed to industry architecture practitioners. The contribution of this research was a set of guidelines that can be used for SOA to enable EA. Further research areas were highlighted, including investigating the mapping of the guidelines that were derived from this research, into the EA frameworks that exist such as TOGAF and ZACHMAN.
APA, Harvard, Vancouver, ISO, and other styles
23

Motjolopane, Ignitia. "A preliminary study into strategies for determining the level to start e-commerce adoption for success in SMMEs." Thesis, Cape Peninsula University of Technology, 2006. http://hdl.handle.net/20.500.11838/1769.

Full text
Abstract:
THESIS Submitted in fulfilment of the requirements for the degree MAGISTER TECHNOLOGIAE in BUSINESS INFORMATION SYSTEMS in the FACULTY OF BUSINESS INFORMATICS at the CAPE PENINSULA UNIVERSITY OF TECHNOLOGY 2006
E-commerce improves value chain integration, enables customisation and also provides smaller companies opportunity to reach customers worldwide. However e-commerce poses challenges to companies, including how to approach e-commerce to gain competitive advantage. Although a number of studies report on e-commerce adoption, these do not provide clear guidelines to determine how SMMEs should progress or move into e-commerce adoption. The aim of this research study is to examine the various available approaches and propose a model to assist SMMEs to determine how to start e-commerce adoption. Findings from this research study indicate that a small percentage of SMMEs are selling online in the Western Cape and realizing benefits derived from ecommerce adoption. The SMMEs interviewed followed an “adoption ladder” approach to e-commerce adoption, however, some had the perception that with maturity of e-commerce, a “managed strategic” approach would be possible. In conclusion the research study proposes a model to assist SMMEs to progress into e-commerce adoption, illustrating two available approaches.
APA, Harvard, Vancouver, ISO, and other styles
24

Warden, Stuart Charles. "E-commerce adoption by SMMEs : how to optimise the prospects of success." Thesis, Cape Peninsula University of Technology, 2007. http://hdl.handle.net/20.500.11838/1410.

Full text
Abstract:
Thesis (DTech (Information Technology))--Cape Peninsula University of Technology, Cape Town, 2007
The expansion of the Internet and increased use of Web-based technologies over the last decade have led to the development of many new online business applications. The expanded global business world, commonly termed the new economy, has propelled networking to form new relationships. : Traditional relationships between businesses and their customers on the one side, and between businesses and their supply chains on the other side are being challenged. In addition, new distribution channels using the Internet have emerged enabling businesses to reach a much wider audience than using traditional brick-and mortar models. However, commercial entities do query the maturity of the Internet and Web-based technologies at times and are often concerned to what extent this can add value to their businesses. There are unanswered questions such as how important are customer relations, what products or services should ideally be used and what are the security, fraud and trust issues pertaining to e-commerce adoption. Furthermore, some uncertainties have emerged that may have an impact on the success of e-comrnerce initiatives for example, bandwidth limitations, customer loyalty and legal requirements. Over time existing business models have been adapted while new models have emerged for online business.
APA, Harvard, Vancouver, ISO, and other styles
25

Burgess, Stephen Keith 1958. "Business-to-consumer interactions on the Internet : a model for small businesses." Monash University, School of Information Management and Systems, 2001. http://arrow.monash.edu.au/hdl/1959.1/8027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Teesri, Sumuscha. "Implementation business-to-business electronic commerce website using active server pages." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/3023.

Full text
Abstract:
E-commerce is the current approach for doing any type of business online, which uses the superior power of digital information to understand the requirements and preferences of each client and each partner, to adapt products and services for them, and then to distribute the products and services as swiftly as possible.
APA, Harvard, Vancouver, ISO, and other styles
27

Modimodale, Lloyd. "ICT and SMEs competitiveness in South Afirca : how SMEs could use ICT to become competitive in South Africa." Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-08272008-111005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Cripps, Helen. "Collaborative business relationships and the use of ICT: The case of the marine, defence and resources cluster, Western Australia." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/301.

Full text
Abstract:
The research project was developed from an Australian Research Council Grant designed to investigate collaborative commerce and its impact on regional economic development. Through a process of consultation with the industry partner, the South West Group, the research was designed to investigate the drivers and inhibitors of collaborative relationships and the factors that impact on the creation and sustaining of these relationships. The role of Information Communication Technology (ICT) in facilitating and sustaining collaborative relationships and the perceived benefits and drawbacks of collaborative relationships were also investigated. The research sought to identify models of the best adoption of collaborative relationships.
APA, Harvard, Vancouver, ISO, and other styles
29

Chauma, Crecencia Naison. "The application of project management tools and techniques in ICT SME projects in Western Cape." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2546.

Full text
Abstract:
Thesis (MTech (Business Administration))--Cape Peninsula University of Technology, 2017.
Introduction The research looked at the application of project management tools and techniques in ICT SME projects in the Western Cape. Problem Statement Previous literature revealed that small to medium enterprises (SMEs) are vital to developing economies as they provide employment and contribute to overall sustainable economic productivity. Literature further alludes that project management tools and techniques enhance SME’s ability to innovate, grow and compete in industry. However, it is unclear if ICT SMEs in Western Cape are applying project management tools and techniques in their projects. Therefore, this study aimed to investigate whether ICT SMEs in Western Cape applied these tools and techniques in their projects. Aims / Objectives The primary objective of the research was to determine the extent to which ICT SMEs in Western Cape were using project management tools and techniques. The secondary research objectives were: to determine the extent to which ICT SMEs in Western Cape knew about the project management tools and techniques and how to use them; to establish the extent to which the ICT SMEs knew the benefits of using project management tools and techniques; and to determine the extent to which project management tools and techniques were used by SMEs to achieve success. Methodology The research was non experimental. An electronic questionnaire was distributed using Survey Monkey and Mail Chimp to collect responses. Some questionnaires were hand delivered to ICT SMEs based in the Cape Town CBD areas accessible to the researcher. The results presented in the research were based on a survey of ICT SMEs, located in Western Cape. Out of the 341 responses targeted a total of 210 responses were obtained. The results obtained represent 60- 70% of the population interviewed. The sample was chosen using stratified random sampling that classified the respondents according to organisational hierarchy, and the amount per strata was noted. The respondents within each stratum were chosen using simple random sampling thus eliminating bias.
APA, Harvard, Vancouver, ISO, and other styles
30

Tillemans, Stephen. "Development of an instrument for data collection in a multidimensional scaling study of personal Web usage in the South African workplace." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/21646.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2011.
In a relatively very short period the Internet has grown from being virtually unknown to becoming an essential business tool. Together with its many benefits, the Internet has unfortunately brought with it several new organisational challenges. One of these challenges is how to manage personal Web usage (PWU) in the workplace effectively. Although many managers see PWU as a form of workplace deviance, many researchers have pointed out its potential benefits such as learning, time-saving, employee well-being and a source of ideas. To help organisations manage PWU in the workplace more effectively, this research realised the need for a typology of PWU behaviours in the South African workplace. Multidimensional scaling (MDS) was identified as an objective method of creating such a typology. The objective of this research was therefore to develop an instrument to gather data for a multidimensional scaling study of PWU behaviours in the South African workplace. A questionnaire was designed that consists of three distinct sections. The first section contains seven pre-coded demographics questions that correspond with specific demographic variables, proven to have a relationship with PWU. The second section of the questionnaire is designed to gather dissimilarity data for input into an MDS algorithm. To begin with, 25 Web usage behaviours of South Africans were identified using Google Ad Planner. After weighing up various options of comparing the Web usage behaviours, the pairwise comparison method was selected. Ross sequencing was used to reduce positioning and timing effects. To reduce the number of judgements per participant, the 300 required judgments are split six ways, resulting in 50 judgements per participant. The last section of the questionnaire is designed to gather data to assist with interpreting the dimensions of the MDS configuration. Eight benefits and risks of PWU were identified. These are combined into a matrix together with the 25 Web usage behaviours. The data from this section will allow future research to use linear regression to discover the relationship between the Web usage behaviours (the objects), and the benefits and risks of PWU (the variables). It is believed that this design offers a fair compromise between the time and effort required of participants and the quality and integrity of the acquired data.
APA, Harvard, Vancouver, ISO, and other styles
31

Faruqui, Saif Ahmed. "Utility computing: Certification model, costing model, and related architecture development." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2756.

Full text
Abstract:
The purpose of the thesis was to propose one set of solutions to some of the challenges that are delaying the adoption of utility computing on a wider scale. These components enable effective deployment of utility computing, efficient look-up, and comparison of service offerings of different utility computing resource centers connected to the utility computing network.
APA, Harvard, Vancouver, ISO, and other styles
32

Millar, Gary Engineering &amp Information Technology Australian Defence Force Academy UNSW. "The viable governance model (VGM) : a theoretical model of IT governance with a corporate setting." Awarded by:University of New South Wales - Australian Defence Force Academy. Engineering & Information Technology, 2009. http://handle.unsw.edu.au/1959.4/44262.

Full text
Abstract:
Empirical studies into IT governance have considerably advanced our understanding of the mechanisms and practices used by contemporary organisations to govern their current and future use of IT. However, despite the progress made in identifying the various elements employed by contemporary IT governance arrangements, there has been relatively little research into the formulation of a holistic model of IT governance that integrates the growing collection of parts into a coherent whole. To further advance the concept of IT governance, the Viable Governance Model (VGM) is proposed. The VGM is a theoretical model of IT governance within a corporate setting that is based on the laws and principles of cybernetics as embodied in Stafford Beer's Viable System Model (VSM). Cybernetics, the science of control and communication in biological and artificial systems, establishes a firm theoretical foundation upon which to design a system that directs and controls the IT function in a complex enterprise. The VGM is developed using an approach based on design science. Given the theoretical nature of the artefact that is being designed, the development and evaluation activities are primarily conceptual in nature. That is, the development activity involves the design of a theoretical model of IT governance using theoretical concepts and constructs drawn from several reference disciplines including cybernetics, organisation theory, and complexity theory. The conceptual evaluation of the VGM indicates that the model is sufficiently robust to incorporate many of the empirical findings arising from academic and professional research. The resultant model establishes a "blueprint", or set of design principles, that can be used by IS practitioners to design and implement a system of IT governance that is appropriate to their organisational contingencies. Novel aspects of this research include: the integration of corporate and IT governance; the reinterpretation of the role of the enterprise architecture (EA) within a complex enterprise; the exposition of the relationship between the corporate and divisional IT groups; and the resolution of the centralisation versus decentralisation dilemma that confront designers of IT governance arrangements.
APA, Harvard, Vancouver, ISO, and other styles
33

Martinus, Ian. "Can B2G portals be used effectively to stimulate business in SMEs?: A case analysis of the 2Cities Business To Government portal." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/1611.

Full text
Abstract:
Small and Medium Enterprises (SMEs) have many options when purchasing goods or services. These include personal contacts and networks, familiar centralised supply sources and other ad hoc means. One purchasing possibility is to buy from and sell to other businesses within a similar geographic area. The benefits of buying and selling locally may not occur to SMEs. They seek, like other consumers, to get value for money, fast and efficient service, and a reasonable level of quality. Many factors can impinge upon an SME's decision to purchase locally. It can be assumed that, given a reasonable local option, SMEs wish to buy from and sell to other local businesses. It can also be reasonably expected that if government purchasers were willing to purchase within their geographic area, SMEs would be interested in supplying local government as well. This study investigates SMEs in the Wanneroo and Joondalup Regions of Western Australia and considers the factors that may influence their decision to use the 2Cities Business-to-Government (B2G) portal. The study is concerned with gaining an insight into particular phenomena from a participants' perspective (SME) with the researcher as the primary instrument for data collection and analysis. The study requires the researcher to get close to the natural setting of the study and interact with the small business owners. This study triangulated results from three major sources. One source of data was contemporary Wanneroo and Joondalup secondary data gathered from research reports relating to local SME matters. This was combined with the semi-structured interviews of forty SMEs and two focus groups. Participant SMEs were invited to discuss factors affecting their decision to use or not use the 2Cities B2G portal. SMEs have a clear perception of what impedes and assists them in running their business and this comes through strongly. The problem facing the 2Cities portal management board is the extent to which it can influence the SME decision to buy and sell within the local area using the portal. The results form the basis of an improved model for B2G participation.
APA, Harvard, Vancouver, ISO, and other styles
34

Methawut, Elena. "The effect of computer mediated communication to communication patterns." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2644.

Full text
Abstract:
Computer mediated communication (CMC) fundamentally influences the function of communication. It influences the organization's management and administration, but it most affects the dynamics of middle and lower level employees. The most simplistic model is that of an electronic office in which its employees need to know and understand the role of CMC. The purpose of this study is to investigate the performance and satisfaction of co-workers who use CMC to communicate within their organization, and to check employees' performance when using CMC.
APA, Harvard, Vancouver, ISO, and other styles
35

Mayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.

Full text
Abstract:
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.
APA, Harvard, Vancouver, ISO, and other styles
36

Tshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.

Full text
Abstract:
The research shows the critical success factors when implementing information security projects. Many Information security projects in the past have not been successful because these factors were not identified and emphasised effectively. By identifying these factors the research basically presents a model by which information security projects can be executed with guaranteed success. The factors identified during the study cover the following streams: top management commitment as a factor of success; accountability as a factor of success; responsibility as a factor of success; awareness as a factor of success and an information security policy as a factor of success. For the empirical study, a physical questionnaire was administrated to a pool of experts in project management and information security. The study consisted of 60 participants who were verified to have minimum requirements core for questionnaire completion. The questionnaire requested for biological information of the participants and their perceived relations (based on their experience) between project success versus accountability, information security project success versus responsibilities, information security project success versus training & awareness, information security project success versus top management commitment and information security project success versus information security policy. The participants’ responses were structured according to a Likert-type scale. Participants had to indicate the extent to which they agreed with each of the statements in the questionnaire. The responses obtained from the survey were presented and analysed. The researcher observed in this study that information security projects are so specific that critical success factors need to be emphasised from project inception. With the identified critical success factors, the researcher recommends that a project methodology be structured to include these factors so that there is a standard in running information security projects successfully. The researcher also identified that amongst the critical success factors identified, there are some that need to be emphasised more than the others due to their level of importance in such projects.
APA, Harvard, Vancouver, ISO, and other styles
37

Constance, Leroy David William. "Alignment between business and IT strategies : a case study at a transport organisation." Thesis, Cape Peninsula University of Technology, 2011. http://hdl.handle.net/20.500.11838/2297.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2011.
For almost three decades practitioners, academics, consultants, and research organisations have identified 'attaining alignment between IT and business' (Luttman & Kempaiah, 2007), as a pervasive problem. Despite the wide acceptance of the term "strategic alignment", there was no consensus on how to achieve alignment. The research philosophy was of an interpretive study and an inductive research approach was used. The research strategy was by means of a case study, namely PRASA Western Cape, a business unit of Passenger Rail Agency of South Africa (PRASA). The time horizon for this research was cross sectional. For the data collection a semi-structured interview, supported by secondary data from the business plan and annual report, was used. The research problem was "PRASA has dysfunctional and fragmented institutional arrangements, resulting in misalignment between business and IT". The primary research question to address this problem was "How can PRASA manage strategic alignment between business and IT?" The aim of this research was to understand why the misalignment between business and IT strategies exists at PRASA. A further aim was to propose a guideline to manage alignment between business and IT strategies with the intention of overcoming the fragmented and dysfunctional institutional arrangements. To address resolving the research problem three theoretical models were used. The strategic alignment model was used to ascertain the strategic perspective of PRASA as well as to identify the external strategic fit and internal functional integration of an organisation. The second model used was the strategic alignment maturity model. This model was used to identify the alignment maturity of the business/IT strategies. The final model used was the balanced scorecard. Alignment is one of the best practices recommended by the balanced scorecard, and it recommends aligning all to the strategy of the company. The reason for using the balanced scorecard was that the company currently uses this tool to manage performance. The research finding concluded that PRASA had the strategic execution alignment perspective - business strategy dictates the IT strategy. The overall strategic alignment maturity of the organisation was found to be in initial process. The balanced scorecard methodology was known by all, yet few knew what the performance measures for the organisation was for the year. The triangulated conclusion was that strategic alignment between business and IT was a problem at PRASA. The recommendation was that the organisation conducts three surveys firstly to identify its strategic choice, secondly to identify the strategic alignment maturity and lastly to do a balanced scorecard best practice survey.
APA, Harvard, Vancouver, ISO, and other styles
38

Hu, Feng-Ming. "Integrated Apartment Management System." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3004.

Full text
Abstract:
The Integrated Apartment Management System (IAMS) is a web-based system that allows tenants to make appointments with repairmen on line and notify both apartment managers and repairmen of appointments through an email directly from IAMS. IAMS also keeps a database of appointments, repairs, and payments that can be accessed by tenants, repairmen, and apartment managers.
APA, Harvard, Vancouver, ISO, and other styles
39

Obioha, Chinonye Leuna. "User-centred design to engender trust in e-commerce." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2414.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.
Consumer trust is a core element for any e-commerce website. This study aimed to explore attributes of business-to-consumers (B2C) e-commerce websites that can communicate and engender trust from the users’ perspective using user-centred design. E-commerce websites are known to have features such as security certificates and encryption methods to ensure trust, but this requires technical knowhow to understand. The technologies used to develop websites have improved so far, but it has little effect on improving the trust of the users of e-commerce mostly in developing countries (Africa in particular). E-commerce users do not realise that these features have been put in place for the trustworthiness of the websites which contributes to their reluctance to conduct business transactions online, thus reducing their buying intentions. There is a need to design e-commerce websites to communicate/ convey trust from the users’ perspective. The study explored various sources of data to obtain insight and understanding of the research problem—user-centred design (UCD) group activity with users, interviews with developers, and secondary prior literature. Using UCD as the main methodology, an intensive UCD workshop activity with a group of eight e-commerce users was carried out. Furthermore, to obtain the view of experts (developers) on what is currently done to engender trust in B2C e-commerce websites, interviews with four respondents were also carried out. These interviews were intended to reduce any prejudice or bias and to obtain a clearer understanding of the phenomenon being studied. The findings from the study revealed six main attributes to engender trust, namely aesthetics design, security and information privacy, functionality design, trustworthiness based on content, development process, and vendor attributes. Proposed guidelines for each of the attributes were outlined. The findings from the users showed that those who were acquainted with the e-commerce technologies were those whose backgrounds are computer and technology related. Most users focused on aesthetics design, functionality, and security of their privacy and private details. Less emphasis was placed on the technology behind the e-commerce websites. Users use their aesthetic and cognitive value in their judgement for trust. The findings from the research were further validated using the Domestication of Technology Theory (DTT), which resulted in the development of a user-centred e-commerce trust model.
APA, Harvard, Vancouver, ISO, and other styles
40

Basson, Delton Jade. "Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2535.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2017.
The balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.
APA, Harvard, Vancouver, ISO, and other styles
41

Stockdale, Rosemary. "Identification and realisation of the benefits of participating in an electronic marketplace : An interpretive evaluation approach." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1333.

Full text
Abstract:
Electronic marketplaces have proliferated as use of the Internet has become widespread in business. A rapid growth in the number of marketplaces, followed by a period of stringent consolidation, as market makers develop a greater understanding of effective business models, has resulted in a climate of uncertainty and confusion. As with many aspects of e-commerce the drive towards participation is fuelled less by strategy planning than by a fear of lagging behind competitors or losing first mover advantage. In this climate of uncertainty organisations often bypass effective evaluation of the benefits that can be realised from participation in e-marketplaces, thereby exacerbating the process facing them and hampering effective decision-making. Evaluation is perceived as a fraught subject within the Information System field, and particularly within the business community which adheres to tried and trusted, albeit often inappropriate, methods such as financial or technical evaluation. The difficulties involved in effective evaluation of systems are well documented; these will increase as systems become more pervasive throughout organisations and those of their trading partners. Calls for a more holistic approach to evaluation are increasing, based on a developing appreciation of interpretive methods of research within the Information Systems discipline. However, the understanding that the social, political and cultural factors affecting and organisation have an impact on the uses and advantages of systems is by no means universal, and empirical evidence of this view is only slowly emerging. This research examines the benefits that can be realised from participation in an electronic marketplace by taking an interpretive approach to the evaluation. It examines the nature of electronic marketplaces to provide clarity to a confused and dynamic environment. The study then focuses on the development of evaluation studies within the IS discipline to identify how an effective evaluation method for assessing the benefits of e-marketplace participation can be achieved. An empirical examination of an organisation’s participation in an electronic marketplace is used to identify the benefits that are realisable and the issues that impact on them. The case study is conducted through an interpretive lens, using a content, context, process (CCP) approach based on existing IS literature. This enables a crucial understanding of the internal and external environments influencing the organisation and its realisation of potential benefits. To allow for the range of interpretations and reflections required to fully address the complexity of the issues involved in such a case study, a variety of research influences such as dialect hermeneutics, critical realism and case study theory are drawn into the research model. The case study organisation’s motivation for participating in an e-marketplace was primarily cost savings. Over the two years of the study, several more potential benefits were identified, such as supply chain efficiencies, greater market awareness and a widening of the supplier base. However, the organisation’s commitments to its local and regional communities, its need to retain status and some consideration of existing relationships needed to be balanced against the gains that might be realised. In some cases the organisation chose to forgo a potential benefit in favour of socially or politically motivated actions. Cultural factors also influenced their actions, particularly as they moved towards extending participation in the marketplace to gain from a global sourcing strategy. The contribution of this research lies in two areas. Firstly, it was existing evaluation literature to development a framework for the evaluation of benefits in the complex area of electronic marketplaces, thereby extending and informing the call for more inclusive and interpretive evaluation studies. Secondly, the research contributes empirical evidence to support the recognition of benefits to be gained from electronic marketplaces and shows how the realisation of the economic benefits is impacted by the social, political and cultural factors that influence an organisation.
APA, Harvard, Vancouver, ISO, and other styles
42

Goosen, Riana. "The development of an integrated framework in order to implement information technology governance principles at a strategic and operational level for medium-to-large sized South African business." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20279.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2012.
ENGLISH ABSTRACT: In today's technologically advanced business environments, Information Technology (IT) has become the centre of most, if not all businesses' strategic and operational activities. It is for this reason that the King III report has dedicated a chapter to IT governance principles, in effect making the board of directors and senior management responsible for implementing such principles. King III's guidance on these principles is only described in broad terms and lack sufficient detail as how to implement these principles. Though various guidelines, in the form of IT control frameworks, -models and -standards exist, it remains highly theoretical in nature and companies tend to view these control frameworks, -models and -standards on an individual basis, implementing them in an ad hoc manner, resulting in the implementation of an inefficient IT governance system, that does not address the key strategic areas and risks in a business. The purpose of this study is to develop an IT best practices integrated framework which can assist management in implementing an effective IT governance system at both a strategic and operational level. The integrated framework was developed by performing a detailed literature review of a best practice control framework, -model and -standard, including its underlying processes. By combining and aligning the relevant processes of the control framework, -model and -standard to the business' imperatives, a framework was developed to implement IT governance principles at a strategic level. The integrated framework is extended to provide guidance on how to implement good IT controls at an operational level. The control techniques, of the applicable processes identified at a strategic level, are implemented as well as the controls around a company's various access paths, which are affected by a company's business imperatives. These access paths are controlled through the implementation of applicable configuration controls. By making use of the integrated framework which was developed, an effective and efficient IT governance system can be implemented, addressing all applicable IT risks relevant to the key focus areas of a business.
AFRIKAANSE OPSOMMING: In vandag se tegnologies gevorderde besigheids omgewings het Informasie Tegnologie (IT) die middelpunt geraak van die meeste, indien nie elke onderneming se strategiese en operasionele aktiwiteite nie. Dit is vir hierdie rede dat die King III verslag 'n hoofstuk aan die beginsels van IT korporatiewe beheer wy. Dié verslag hou die direkteure en bestuur verantwoordelik vir die implementering van hierdie beginsels. Die King III verslag verskaf egter slegs in breë trekke leiding in verband met die implementering van hierdie beginsels en 'n gebrek aan meer gedetailleerde beskrywings bestaan. Alhoewel verskeie riglyne, in die vorm van IT kontrole raamwerke, -modelle en -standaarde bestaan, bly dit steeds teoreties van aard en is maatskappye geneig om hierdie riglyne op 'n individuele vlak te hanteer en op 'n willekeurige wyse te implementeer. Hierdie proses lei tot die implementering van 'n ondoeltreffende IT korporatiewe beheerstelsel. Die doel van hierdie studie is om 'n geïntegreerde beste praktykraamwerk te ontwikkel wat deur die direkteure en bestuur van 'n onderneming gebruik kan word om op beide 'n strategiese en operasionele vlak 'n doeltreffende IT korporatiewe beheermaatstelsel in plek te stel. 'n Geïntegreerde raamwerk is ontwikkel deur 'n volledige literatuurstudie uit te voer, gebaseer op 'n beste praktyk IT kontrole raamwerk, -model en -standaard en die gepaardgaande prosesse. Deur die toepaslike prosesse van hierdie kontrole raamwerk, -model en -standaard te kombineer en te belyn met 'n besigheid se besigheidsimperatiewe, word IT korporatiewe beheerbeginsels op 'n strategiese vlak in plek gestel. Die geïntegreerde raamwerk sluit riglyne in om goeie IT kontroles op 'n operasionele vlak te implementeer. Die kontrole tegnieke, wat verbind word met die gepaardgaande prosesse wat tydens die strategiese vlak geïdentifiseerd is, word geimplementeer asook die die toepaslike konfigurasie kontroles oor die verskeie toegangspaaie wat beïnvloed word deur 'n besigheids se besigheidsimperatiewe. Deur gebruik te maak van die ontwikkelde geïntegreerde raamwerk kan alle geaffekteerde IT risikos nou aangespreek word en 'n doeltreffende IT korporatiewe beheerstelsel in plek gestel word.
APA, Harvard, Vancouver, ISO, and other styles
43

Ash, Colin. "Exploring The Antecedents Of Successful E-business Implementations Through ERP : A Longitudinal Study of SAP-based Organisations 1999-2003." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1486.

Full text
Abstract:
This research was carried out between 1999 and 2003 on the use of e-business applications in ERP-based organisations. A composite research method based on structured case studies was developed for this study. It combined the application of case methods by Carroll et al. (1998], Klein and Myer (1998), and Eisenhardt (1989). This was used to provide a focused, yet flexible structure, as a dynamic approach to case study interpretive research. The research method used three distinct models at three progressive stages of the study, to provide a multi-faceted view of each case. This composite case-based method was developed to maintain the balance between research rigour and relevance. A pilot case study of nine Australian SAP sites helped ground the theory of the study. This was followed by three stages of study of eleven international cases within a diverse industry context. The method revealed the antecedents of e-business success using the findings from case analyses against three separate research models B2B interaction, e-business change, and virtual organising. A final conceptual framework was developed as new theory of e-business transformation. The theory views e-business transformation as realising the benefits from virtual organising within complex B2B interactions by utilising the facilitators of successful e-business change. The research demonstrates that successful e-business transformation with ERP occurs when value propositions are realised through integration and differentiation of technologies used to support new business models to deliver products and services online. The associated management practice evolves through efficiency from self-service, effectiveness through empowerment towards customer care, and value enhancement from extensive relationship building with multiple alliances. The new theory of e-business transformation identifies the stages of e-business growth and development as a comprehensive plan that should assist managers of ERP-based organisations in migrating their company towards a successful e-business organisation. The detailed analysis of the findings offers a foundational per11pectlve of strategies, tactics and performance objectives for e-ERP implementations. The strength of the theory lies in the synthesis of multiple case analyses using three different lenses over three separate time periods. The triangulation of the three research frameworks provides a method for study at appropriate levels of complexity. It is evolutionary in nature and is content driven. Other researchers are urged to apply similar multi-viewed analysis.
APA, Harvard, Vancouver, ISO, and other styles
44

Nocanda, Xolani Wittleton. "Web-based business positioning : an investigation in the tourism industry." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/19797.

Full text
Abstract:
Thesis (MBA) -- Stellenbosch University, 2011.
The use of the web-based technology to conduct business has been growing in many industries globally, this has been the case in the tourism industry. The growing popularity of the web-based technology can be attributed to the benefits it brings to the tourism industry. The study has look into the overall benefits brought by the web-based technology in the tourism industry and how it can be further exploited to benefit the organizations. The application of the web-based technology has included the introduction of the website. The website has given companies exposure to the global market and has been a platform for conducting marketing activities. The website has been used extensively in the tourism industry as a source of information. The website has enabled travel consumers purchase tourism products and services. Having a website may not be sufficient in meeting an organisation’s intended objectives. Many companies in the tourism industry are making use of the website, hence the use of website in search engines has become competitive. Companies need to implement website optimisation techniques to benefit both the travel suppliers and travel consumers. To conduct the organisations marketing activities successfully, the websites needs maximum exposure to the target audience. This can be achieved through the website design aimed at ensuring that the website is highly ranked by search engines. Added features like video, up to date information and photos add value to travel consumers. Through these features travel consumers are able to understand tourism products and services, and hence make informed decisions. The study has looked at the application of the web-based technology in four sectors of the tourism industry in South Africa. These are attraction, accommodation, tour operators and transport. Suppliers in each sector were selected for analysis and they are: - in attraction, Kruger National Park and Hluhluwe Game Reserve; - in accommodation, Hilton hotel and Southern Sun hotel; - in tour operator, Thompson Holiday and Tourvest; and - in transport, Kulula, South African Airways, Avis and Europcar. Suppliers in the tourism industry in South Africa were found to use the website for the following reasons: - Provides information about the organisation and its products and services. - Used as a marketing tool: The website is used to facilitate communication between the travel supplier and the travel consumer. It is also a platform to sell tourism products and services. - Used to enhance collaboration in the industry. Collaboration through websites has resulted in a better supply chain. Customers have been able to buy one package including the airline ticket, accommodation and car hire using one website. - Used to conduct business transactions: Customers have been able to make bookings and reservations and payments through the website. - Used to attract customers to the organisation’s products and services. Attractive features such as photos and videos have been included in the website. The Safari Company is a tour operator in South Africa. Using web-based technology; the company has changed its business model to be able to serve its customers better. The company has developed a new website that adds value to both travel suppliers and travel consumers. Travel suppliers are able to market their services and products through the website. The website provides travel consumers with the latest information and expert advice in tourism products in the Southern and Eastern Africa. The Safari Company website has been a platform for the company to communicate its social responsibility with the global community. The Safari Company donates 10% of its revenue to an organization called Touch the Land. Touch the Land is a foundation that implements projects in Southern and Eastern Africa aimed at poverty alleviation.
APA, Harvard, Vancouver, ISO, and other styles
45

Blanken, Olaf. "Creating business value through e-marketplace participation: a South African exploratory case study – Kalahari Marketplace." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/97312.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: E-commerce in South Africa is currently experiencing considerable growth, as in the rest of the world. Substantial foreign investments are being made in selected South African online retail stores and the majority of businesses have an online presence to sell or promote their products and services. Yet, as e-commerce is a dynamic and relatively new industry, there is a need for South African companies to understand business model adaptation for e-commerce, and specifically for successful e-marketplace participation. Kalahari Marketplace was established in 2011 as a C:C platform for customers to sell books and media. In January 2014, this platform was expanded to a fully integrated B:C platform that enables third-party retailers to sell directly to Kalahari.com customers in various categories. The Kalahari Marketplace platform follows the same development outline as the very successful Amazon.com Marketplace platform in the United States. The premise is that sellers have an additional channel to sell to customers they would not normally have had, and customers benefit by having access to a wide product range and competitive pricing. The aim of this research study is to understand the typical business model of a successful e-marketplace participant. It furthermore set out to explore the success factors, which translate into value creation for the seller achieved through participation in an e-marketplace. This investigation was done through a case study approach by examining existing sellers retailing through Kalahari Marketplace. To achieve the research aim, qualitative, exploratory research was conducted. The research method involved a combination of primary and secondary research. Secondary research was conducted regarding the external environmental factors of Kalahari Marketplace sellers. Primary data was gathered through in-depth semi-structured interviews with Kalahari Marketplace sellers. The external environmental analysis for participating in an e-marketplace, such as Kalahari Marketplace, was overall positive, taking into consideration challenges such as expensive Internet and low Internet usage penetration. The key findings from the internal analyses were that participating in an e-marketplace has substantial benefits for a traditional retailer that wants to trade online. These advantages include transaction cost savings, exposure to new customers, and reduced marketing expenses. The following recommendations were made for successful e-marketplace participation: • Take an active involvement in e-marketplace listings; • Effective procurement and use of resources; • Excellent customer service; • Build reliable and cost effective delivery channels; and • Offer a wide and mixed product range. The research limitation of this study stated that Kalahari Marketplace is a moderately new B:C e-retailing platform; therefore, retailers are still learning to adapt. Suggested additional research involves a wide-reaching quantitative research into key success factors for e-marketplace participation from a South African perspective.
APA, Harvard, Vancouver, ISO, and other styles
46

Koekemoer, Johannes Frederik. "A grounded theory analysis of networking capabilities in virtual organizing." Thesis, Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-11102008-150737/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Dabous, Feras Taleb Abdel Rahman School of Information Systems Technology &amp Management UNSW. "A pattern based approach for the architectural design of e-business applications." Awarded by:University of New South Wales. School of Information Systems Technology and Management, 2005. http://handle.unsw.edu.au/1959.4/22047.

Full text
Abstract:
With the widespread use of the Internet and its associated technologies, enterprises have to evolve in the way they are conducting business. 'e-business applications' refer to a new class of distributed applications that involves the Internet as a communication platform. Each e-business application supports the full automation of business processes that can span across multiple enterprises. For a given application domain that involves e-business application development, a number of design decisions that best fullfil stakeholders requirements have to be made. One important issue is the reuse of functionality which exists within legacy systems that can belong to one or more enterprises within the same domain. Most existing design approaches are inadequate in supporting the exploration of all design combinations. Moreover, there is little work on how to identify the best design decisions systematically for a given application domain. In this thesis we present a pattern-based approach that addresses the architectural design of e-business applications. We identify a number of architectural patterns whose instantiation on a given design problem correspond to different architectural design alternatives. We also identify models that enable the estimation of quality attributes for such alternatives. Then we investigate and utilise methods to select the best pattern for a given design problem. We also describe the process of generating the alternative architectures, estimating their qualities, and then ranking them with respect to any quality attribute or a combination of quality attributes. We validate this approach on a real life case study in the area of capital markets. The case study concerns realistic e-business applications that rely on existing legacy applications. The validation exercise has produced predictions which have been compared with actual design decisions that have been made. The thesis also proposes a framework for the systematic identification of architectural patterns. An additional set of architectural patterns and their impact on the case study are discussed. The main contribution of this thesis is in the identification of patterns and quality attributes models for the architectural design of e-business applications that aid in the systematic selection of the most appropriate architectural pattern for a given problem context.
APA, Harvard, Vancouver, ISO, and other styles
48

Njeje, Sicelo Given. "Implementing a robust, cost effective, e-commerce platform for a disadvantaged community of the Eastern Cape, South Africa." Thesis, University of Fort Hare, 2008. http://hdl.handle.net/10353/75.

Full text
Abstract:
The development of electronic commerce (e-commerce) is the most visible business use of the World Wide Web. The primary goal of an e-commerce site is to sell goods and services online. This project deals with developing an e-commerce platform for marginalized communities of the Eastern Cape region, South Africa. An online “shopping mall” to support the marketing of art and crafts from disadvantaged communities is presented, with Linux-Apache-MySQL-PHP (LAMP) as the development environment. Free and Open Source Software has been chosen to develop the virtual shopping mall system because the use of Open Source allows easy localization and extensions to the system developed and long term sustainability, as the source code is available. Also, it might start a “virtuous” circle, whereby young members of the communities hosting art and craft makers become involved in maintenance, and then production, of software systems. One important design constraint from the e-commerce platform presented in this thesis is the possibility for the art and craft makers to manage their shops directly, from the initial loading of their wares to the day-to-day maintenance, such as changes of price or items. The user requirement elicitation and initial field testing were conducted in Dwesa, an area on the wild coast, South Africa. The system currently comprising two shops is live at the time of writing this thesis at www.dwesa.com.
APA, Harvard, Vancouver, ISO, and other styles
49

Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
APA, Harvard, Vancouver, ISO, and other styles
50

Valli, Craig. "Non-business use of the World Wide Web : A study of selected Western Australian organisations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1311.

Full text
Abstract:
Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what extent is the World Wide Web used by employees for non-business related activities in organisations and can filtering or organisational policies impact on this activity? This research specifically examines contextually, the level of misuse with respect to the use of the World Wide Web in three selected Western Australian organisations using multiple interpretive case study as the vehicle for the study. The research is significant internationally to all organisations that use Internet in their everyday work. The research has discovered anomalous behaviour on the part of non-business users who have employed a variety of techniques and tactics to mask their activities. Also, organisational management in the cases examined had demonstrated shortfalls in their perception of misuse within their organisations and, the implementation of effective policy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography