Дисертації з теми "Business enterprises Computer networks Malaysia"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Business enterprises Computer networks Malaysia".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ruyter, Masood. "The measurement of enterprise architecture to add value to small and medium enterprises." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2293.
Повний текст джерелаSouth Africa has a complex financial and retail service industry with high reliance on the use of IT systems to ensure effectiveness and maintainability. Decision making and improved outcomes may be done through an IT aligned enterprise architecture (EA) strategy. EA is a capability that contributes to the support and success of an organisations' IT. Organisations are currently using EA to better align IT and the business strategy which provides a comprehensive v.ew of the IT system. Thus, EA is increasing in organisations yet the measurement and value of EA is limited to organisations and enterprise architects. The discussions of the benefits and value of EA has been discussed for several years, however there are still no consensus about how the benefits and value of EA can be measured. The lack and clear understanding of the benefits and value of EA needs to consider different aspects of IT as well as the shareholders when measuring the benefits and value of EA to an organisation.
Rosenbaum, Gustav Filip Computer Science & Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.
Повний текст джерела郭偉本 and Wai-pun Kwok. "Business opportunities in internet." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31267208.
Повний текст джерелаGubanich, Bradford C. "How are U.S. corporations using Intranets for their company's internal communication?" Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1998. http://www.kutztown.edu/library/services/remote_access.asp.
Повний текст джерелаSource: Masters Abstracts International, Volume: 45-06, page: 2700. Typescript. Abstract precedes thesis as preliminary leaves [1-2]. Includes bibliographical references (leaves 75-77).
Jacoby, Grant A. "A metric model for Intranet portal business requirements." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FJacoby%5FPhD.pdf.
Повний текст джерелаSherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.
Повний текст джерелаThe purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
Lenaburg, Allen Gregg. "Intranet concept for small business." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2710.
Повний текст джерелаPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Повний текст джерелаSmeda, Jorina. "Benefits, business considerations and risks of big data." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96684.
Повний текст джерелаENGLISH ABSTRACT: Big data is an emerging technology and its use holds great potential and benefits for organisations. The governance of this technology is something that is still a big concern and as aspect for which guidance to organisations wanting to use this technology is still lacking. In this study an extensive literature review was conducted to identify and define the business imperatives distinctive of an organisation that will benefit from the use of big data. The business imperatives were identified and defined based on the characteristics and benefits of big data. If the characteristics and benefits are clear, the relevant technology will be better understood. Furthermore, the business imperatives provide business managers with guidance to whether their organisation will benefit from the use of this technology or not. The strategic and operational risks related to the use of big data were also identified and they are discussed in this assignment, based on a literature review. The risks specific to big data are highlighted and guidance is given to business managers as to which risks should be addressed when using big data. The risks are then mapped against COBIT 5 (Control Objectives for Information and Related Technology) to highlight the processes most affected when implementing and using big data, providing business managers with guidance when governing this technology.
AFRIKAANSE OPSOMMING: ‘Big data’ is 'n ontwikkelende tegnologie en die gebruik daarvan hou baie groot potensiaal en voordele vir besighede in. Die bestuur van hierdie tegnologie is egter ʼn groot bron van kommer en leiding aan besighede wat hierdie tegnologie wil gebruik ontbreek steeds. Deur middel van 'n uitgebreide literatuuroorsig is die besigheidsimperatiewe kenmerkend van 'n besigheid wat voordeel sal trek uit die gebruik van ‘big data’ geïdentifiseer. Die besigheidsimperatiewe is geïdentifiseer en gedefinieer gebaseer op die eienskappe en voordele van ‘big data’. Indien die eienskappe en voordele behoorlik verstaan word, is 'n beter begrip van die tegnologie moontlik. Daarbenewens bied die besigheidsimperatiewe leiding aan bestuur sodat hulle in staat kan wees om te beoordeel of hulle besigheid voordeel sal trek uit die gebruik van hierdie tegnologie of nie. Die strategiese en operasionele risiko's wat verband hou met die gebruik van ‘big data’ is ook geïdentifiseer en bespreek, gebaseer op 'n literatuuroorsig. Dit beklemtoon die risiko's verbonde aan ‘big data’ en daardeur word leiding verskaf aan besigheidsbestuurders ten opsigte van watter risiko's aangespreek moet word wanneer ‘big data’ gebruik word. Die risiko's is vervolgens gekarteer teen COBIT 5 (‘Control Objectives for Information and Related Technology’) om die prosesse wat die meeste geraak word deur die gebruik van ‘big data’ te beklemtoon, ten einde leiding te gee aan besigheidsbestuurders vir die beheer en kontrole van hierdie tegnologie.
Fitzgerald, Kyle Andrew. "E-commerce application utilisation by South African SMME’s." Thesis, Cape Peninsula University of Technology, 2005. http://hdl.handle.net/20.500.11838/1772.
Повний текст джерелаThe Internet was functioning on Internet protocol (IP) and transmission control protocol (TCP) in the 1970s and soon afterwards electronic mail (email) was invented allowing messages to be sent from one person to another using packet switch services (PSS). However email did not form an information space for information to permanently exist. The World Wide Web (Web) arrived in the late 1980s, riding on top of the Internet providing a global and persistent information space available to everyone. This information space has assisted in small business facing dramatic change, often referred to as the 'e-commerce evolution'. Compared to the industrial revolution with the advent of the railways and electricity the magnitude of ecommerce is no less. Advances in the information technology (or e-comrnerce elements) and the use of Information systems (or applications) are the main drivers behind this e-commerce evolution. Some authors believe all businesses will be equal in the utilisation of e-commerce eroding any competitive advantage the one may have over the other. The 'digital economy' is now available with the explosive popularity of the Internet and the Web as seminal applications of e-commerce. In South Africa the maturity level of e-commerce adoption has increased from skepticism to positivism since the world wide availability of the Internet. Although e-commerce has generated a profusion of articles in South Africa, there has been a lack of research into the effects and benefits of e-commerce utilisation by small business. Various elements of e-commerce are explored highlighting the suitability of use towards a small business. This stUdy will explain the fundamentals that small business owners will need to understand to enable them to knowledgably participate in the global phenomenon of e-commerce. Authors nationally and internationally have explored the applications of e-commerce for example email and electronic data interchange (EDI).
Wang, Gong, and 王宮. "Service-oriented multi-agent system architecture for virtual enterprises: with ontology-based negotiations." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47029110.
Повний текст джерелаToutcha, N'souh Yonkwa. "The impact of cloud computing on the role of an IT department : a case study of a higher education institution in the Western Cape." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2653.
Повний текст джерелаInformation and communication technologies are moving fast. Consequently, organisations must be aware of this evolution and adapt to take full advantage of the benefits offered by these technologies. Cloud computing is a new concept of accessing data centers and various computing resources via the internet through any devices and from anywhere. Large organizations, such as Higher Education Institutions (HEI), are gradually adopting cloud computing to reduce their very high budgets. In emerging countries, more and more HEIs are adopting the services offered by cloud computing, more precisely in South Africa in the Western Cape. However, cloud computing affects the way IT services are delivered by traditional HEI IT departments. Thus the objective of this study is to explore the impact of cloud computing on the role of the IT department of HEIs, using a case study. To fulfil this objective, interviews were conducted within the IT department of an HEI, including the IT staff, and it was found that cloud computing affects the role of the IT department by changing the roles and responsibilities of some IT staff, as well as the focus of certain posts in the department. In addition, cloud computing also affects the department's culture. Fortunately, no IT staff have lost their posts. Other results show that training and certification were necessary for the IT to adapt to the changes. Cloud computing adds value to the IT department because it offers a daily 24-hour service as opposed to the traditional IT department.
Lethbridge, Nick. "An improved model of structural changes resulting from use of e-commerce." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/616.
Повний текст джерелаWang, Xiaohuan, and 王晓欢. "Knowledge sharing and utilization of the ontological agent-based virtual enterprises." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46593056.
Повний текст джерелаPather, Shaun. "E-commerce information systems (ECIS) success: A South African study." Thesis, Cape Peninsula University of Technology, 2006. http://hdl.handle.net/20.500.11838/1409.
Повний текст джерелаAs a phenomenon of the 1990s, e-Commerce is relatively new. Its advent offered the promise of new opportunities to businesses and entrepreneurs around the world. The hyperbole associated with the Internet and the Web resulted in a mindset that e-Commerce was an easy road to success. It was believed that this new technology-based approach would revolutionise business in a number of ways, including changing the relationships between thestakeholders and allowing small organisations to play on the global stage. However, the road to business enhancement through e-Commerce has not been easy. Many organisations have not survived their attempts to engage. in e-Commerce and others have radically changed their approach since the e- . Bubble burst. There were many reasons for the failure of these e-Commerce initiatives. They included poor business ideas, no control of expenditure, lack of general business experience and immaturity, as well as little understanding of the crucial importance of managing the technology through which the Internet and the Web delivers e-Commerce opportunities. This thesis explores the intricacies of IS within the Sduth African B2C eCommerce environment and argues that without a coherent understanding of the factors affecting IS success, the implementation of traditional IS evaluation mechanisms may be problematic. A comparative analysis of studies in this field between the pre- and post- e-Commerce eras, ascertained a paucity of theoretical frameworks and a fragmented body of knowledge in the extant literature, with a narrow focus on web-interface issues.
Wang, Wenli. "Control and assurance services for electronic commerce /." Full text (PDF) from UMI/Dissertation Abstracts International, 2000. http://wwwlib.umi.com/cr/utexas/fullcit?p9992934.
Повний текст джерелаLeung, Kin-heung Ray, and 梁健鄉. "How to use networking to increase internal efficiency and then increase external effectiveness in an international environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31268110.
Повний текст джерелаHughes, Grant Douglas. "A framework for software patch management in a multi-vendor environment." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2478.
Повний текст джерелаSoftware often requires patches to be installed post-implementation for a variety of reasons. Organisations and individuals, however, do not always promptly install these patches as and when they are released. This study investigated the reasons for the delay or hesitation, identified the challenges, and proposed a model that could assist organisations in overcoming the identified challenges. The research investigated the extent to which the integration of software patch management and enterprise data security is an important management responsibility, by reviewing relevant documents and interviewing key role players currently involved in the patch management process. The current challenges and complexities involved in patch management at an enterprise level could place organisations at risk by compromising their enterprise-data security. This research primarily sought to identify the challenges causing the management of software patches to be complex, and further attempted to establish how organisations currently implement patch management. The aim of the study was to explore the complexities of software patch management in order to enhance enterprise data security within organisations. A single case study was used, and data were obtained from primary sources and literature. The study considered both technological and human factors, and found that both factors play an equally important role with regard to the successful implementation of a patch management program within an organisation.
Gwaka, Leon Tinashe. "Social media risks in large and medium enterprises in the Cape Metropole : the role of internal auditors." Thesis, Cape Peninisula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2086.
Повний текст джерелаSocial media has undoubtedly emerged as one of the greatest developments in this technology driven generation. Despite its existence from years back, social media popularity has recently surged drastically, with billions of users worldwide reported to be on at least one social media platform. This increase in users of social media has further been necessitated by governmental and private-sector initiatives to boost Internet connectivity to bridge the digital divide globally. Mobile Internet access has also fuelled the use of social media as it allows easy and economical connectivity anytime, anywhere. The availability of hundreds of social media platforms has presented businesses with several opportunities to conduct business activities using social media. The use of social media has been reported to avail businesses with plenty of benefits when this use is strategically aligned to business objectives. On the flipside of the coin, these social media platforms have also emerged as new hunting grounds for fraudsters and other information-technology related criminals. As with any invention, engaging social media for business has its own inherent risks; this further complicates existing information-technology risks and also presents businesses with new risks. Despite blossoming into a global phenomenon, social media has no universally accepted frameworks or approaches (thus no safeguards) when engaging with it, resulting in almost unlimited risk exposures. The uncertainly, i.e. risks surrounding social media platforms, proves problematic in determining the optimum social media platform to use in business. Furthermore, organisations are facing challenges in deciding whether to formally adopt it or totally ignore it, with the latter emerging not to be a viable option. The complex nature of social media has made it difficult for enterprises to place a monetary value and determine a return on investment on these platforms. From a governance perspective, it remains a challenge for most enterprises to identify and appoint individuals responsible for social media management within businesses, although recently social media strategist positions have been surfacing. Due to their nature, the social media trigger matters relating to governance, risk and compliance, which imply that internal auditors therefore are expected to champion the adoption of social media in enterprises. As a relatively new concept, the role that internal auditors should play towards social media appears not to be well defined. Through examination of existing guidelines, an attempt is made to define the role of internal auditors towards social media.
Fulford, Richard. "Towards a theory of management and evaluation of operational enterprise resource planning applications." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2008. https://ro.ecu.edu.au/theses/171.
Повний текст джерелаTekeh, Emmanuel Temban. "The adoption of virtual teams and virtual technology in human resources management : a South African perspective." Thesis, Cape Peninsula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2075.
Повний текст джерелаThis study explores factors contributing to the slow adoption of virtual teams and virtual technology by South African organisations in Cape Town. The study adopted the Technology Organisation and Environment (TOE) framework to examine the influence of technological organisational and environmental contextual factors on organisation’s adoption of virtual teams and virtual technology. Three organisations from different industries in Cape Town were chosen as a case study. Data was collected via qualitative interviews and quantitative questionnaires while content analysis and a statistics package for social sciences were used to analyse and generate results. The results indicated that all three dimensions of the TOE framework significantly either enabled or inhibited organisational adoption of virtual teams and virtual technology. Technological contextual factors such as availability of technology were found to enable adoption while high set-up cost inhibited adoption, and perceived benefit and drawbacks either inhibited or enabled adoption due to the influence of other contextual factors. Organisational contextual factors like available resources and slacks were found to facilitate, whereas organisational competency and formal and informal linking structures impeded adoption. Management commitment, communication process, degree of centralisation, organisation size and technological competency were found to either enable or inhibit technology adoption owing to the influences of other contextual factors. Environmental contextual factors such as competition, government regulation and rapidly growing industries were found to encourage technology adoption. Lack of skilled labour was found to restrain technology adoption while industry characteristics, market structures and technology support infrastructure either enabled or inhibited organisational adoption of virtual teams and virtual technology due to the influence of other contextual factors.
Kistasamy, Christopher. "The role of service-oriented architecture as an enabler for enterprise architecture." Thesis, Cape Peninsula University of Technology, 2011. http://hdl.handle.net/20.500.11838/2298.
Повний текст джерелаThe adoption of Enterprise Architecture (EA) methodologies within organizations is causing an interest in the methodologies and supporting technologies available. Service Oriented Architecture (SOA) supports EA in many facets. However, there is much suspension with regard to the relationship between EA and SOA within organizations as well as the guidelines that organisations should follow in order for SOA to enable EA. There are potential problems that may arise if this relationship between SOA and EA is not agreed to at the outset of implementing an EA. The purpose of this research is to investigate the guidelines that are needed for SOA to enable EA, in order to provide practical steps that organisations can use to begin aligning SOA and EA, ensuring that these initiatives are driven from a business perspective. A qualitative approach using a case study was used as a methodology for this research. The data collection was conducted using semi-structured interviews, and the guidelines that were derived were validated through a survey that was distributed to industry architecture practitioners. The contribution of this research was a set of guidelines that can be used for SOA to enable EA. Further research areas were highlighted, including investigating the mapping of the guidelines that were derived from this research, into the EA frameworks that exist such as TOGAF and ZACHMAN.
Motjolopane, Ignitia. "A preliminary study into strategies for determining the level to start e-commerce adoption for success in SMMEs." Thesis, Cape Peninsula University of Technology, 2006. http://hdl.handle.net/20.500.11838/1769.
Повний текст джерелаE-commerce improves value chain integration, enables customisation and also provides smaller companies opportunity to reach customers worldwide. However e-commerce poses challenges to companies, including how to approach e-commerce to gain competitive advantage. Although a number of studies report on e-commerce adoption, these do not provide clear guidelines to determine how SMMEs should progress or move into e-commerce adoption. The aim of this research study is to examine the various available approaches and propose a model to assist SMMEs to determine how to start e-commerce adoption. Findings from this research study indicate that a small percentage of SMMEs are selling online in the Western Cape and realizing benefits derived from ecommerce adoption. The SMMEs interviewed followed an “adoption ladder” approach to e-commerce adoption, however, some had the perception that with maturity of e-commerce, a “managed strategic” approach would be possible. In conclusion the research study proposes a model to assist SMMEs to progress into e-commerce adoption, illustrating two available approaches.
Warden, Stuart Charles. "E-commerce adoption by SMMEs : how to optimise the prospects of success." Thesis, Cape Peninsula University of Technology, 2007. http://hdl.handle.net/20.500.11838/1410.
Повний текст джерелаThe expansion of the Internet and increased use of Web-based technologies over the last decade have led to the development of many new online business applications. The expanded global business world, commonly termed the new economy, has propelled networking to form new relationships. : Traditional relationships between businesses and their customers on the one side, and between businesses and their supply chains on the other side are being challenged. In addition, new distribution channels using the Internet have emerged enabling businesses to reach a much wider audience than using traditional brick-and mortar models. However, commercial entities do query the maturity of the Internet and Web-based technologies at times and are often concerned to what extent this can add value to their businesses. There are unanswered questions such as how important are customer relations, what products or services should ideally be used and what are the security, fraud and trust issues pertaining to e-commerce adoption. Furthermore, some uncertainties have emerged that may have an impact on the success of e-comrnerce initiatives for example, bandwidth limitations, customer loyalty and legal requirements. Over time existing business models have been adapted while new models have emerged for online business.
Burgess, Stephen Keith 1958. "Business-to-consumer interactions on the Internet : a model for small businesses." Monash University, School of Information Management and Systems, 2001. http://arrow.monash.edu.au/hdl/1959.1/8027.
Повний текст джерелаTeesri, Sumuscha. "Implementation business-to-business electronic commerce website using active server pages." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/3023.
Повний текст джерелаModimodale, Lloyd. "ICT and SMEs competitiveness in South Afirca : how SMEs could use ICT to become competitive in South Africa." Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-08272008-111005.
Повний текст джерелаCripps, Helen. "Collaborative business relationships and the use of ICT: The case of the marine, defence and resources cluster, Western Australia." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/301.
Повний текст джерелаChauma, Crecencia Naison. "The application of project management tools and techniques in ICT SME projects in Western Cape." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2546.
Повний текст джерелаIntroduction The research looked at the application of project management tools and techniques in ICT SME projects in the Western Cape. Problem Statement Previous literature revealed that small to medium enterprises (SMEs) are vital to developing economies as they provide employment and contribute to overall sustainable economic productivity. Literature further alludes that project management tools and techniques enhance SME’s ability to innovate, grow and compete in industry. However, it is unclear if ICT SMEs in Western Cape are applying project management tools and techniques in their projects. Therefore, this study aimed to investigate whether ICT SMEs in Western Cape applied these tools and techniques in their projects. Aims / Objectives The primary objective of the research was to determine the extent to which ICT SMEs in Western Cape were using project management tools and techniques. The secondary research objectives were: to determine the extent to which ICT SMEs in Western Cape knew about the project management tools and techniques and how to use them; to establish the extent to which the ICT SMEs knew the benefits of using project management tools and techniques; and to determine the extent to which project management tools and techniques were used by SMEs to achieve success. Methodology The research was non experimental. An electronic questionnaire was distributed using Survey Monkey and Mail Chimp to collect responses. Some questionnaires were hand delivered to ICT SMEs based in the Cape Town CBD areas accessible to the researcher. The results presented in the research were based on a survey of ICT SMEs, located in Western Cape. Out of the 341 responses targeted a total of 210 responses were obtained. The results obtained represent 60- 70% of the population interviewed. The sample was chosen using stratified random sampling that classified the respondents according to organisational hierarchy, and the amount per strata was noted. The respondents within each stratum were chosen using simple random sampling thus eliminating bias.
Tillemans, Stephen. "Development of an instrument for data collection in a multidimensional scaling study of personal Web usage in the South African workplace." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/21646.
Повний текст джерелаIn a relatively very short period the Internet has grown from being virtually unknown to becoming an essential business tool. Together with its many benefits, the Internet has unfortunately brought with it several new organisational challenges. One of these challenges is how to manage personal Web usage (PWU) in the workplace effectively. Although many managers see PWU as a form of workplace deviance, many researchers have pointed out its potential benefits such as learning, time-saving, employee well-being and a source of ideas. To help organisations manage PWU in the workplace more effectively, this research realised the need for a typology of PWU behaviours in the South African workplace. Multidimensional scaling (MDS) was identified as an objective method of creating such a typology. The objective of this research was therefore to develop an instrument to gather data for a multidimensional scaling study of PWU behaviours in the South African workplace. A questionnaire was designed that consists of three distinct sections. The first section contains seven pre-coded demographics questions that correspond with specific demographic variables, proven to have a relationship with PWU. The second section of the questionnaire is designed to gather dissimilarity data for input into an MDS algorithm. To begin with, 25 Web usage behaviours of South Africans were identified using Google Ad Planner. After weighing up various options of comparing the Web usage behaviours, the pairwise comparison method was selected. Ross sequencing was used to reduce positioning and timing effects. To reduce the number of judgements per participant, the 300 required judgments are split six ways, resulting in 50 judgements per participant. The last section of the questionnaire is designed to gather data to assist with interpreting the dimensions of the MDS configuration. Eight benefits and risks of PWU were identified. These are combined into a matrix together with the 25 Web usage behaviours. The data from this section will allow future research to use linear regression to discover the relationship between the Web usage behaviours (the objects), and the benefits and risks of PWU (the variables). It is believed that this design offers a fair compromise between the time and effort required of participants and the quality and integrity of the acquired data.
Faruqui, Saif Ahmed. "Utility computing: Certification model, costing model, and related architecture development." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2756.
Повний текст джерелаMillar, Gary Engineering & Information Technology Australian Defence Force Academy UNSW. "The viable governance model (VGM) : a theoretical model of IT governance with a corporate setting." Awarded by:University of New South Wales - Australian Defence Force Academy. Engineering & Information Technology, 2009. http://handle.unsw.edu.au/1959.4/44262.
Повний текст джерелаMartinus, Ian. "Can B2G portals be used effectively to stimulate business in SMEs?: A case analysis of the 2Cities Business To Government portal." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/1611.
Повний текст джерелаMethawut, Elena. "The effect of computer mediated communication to communication patterns." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2644.
Повний текст джерелаMayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.
Повний текст джерелаTshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.
Повний текст джерелаConstance, Leroy David William. "Alignment between business and IT strategies : a case study at a transport organisation." Thesis, Cape Peninsula University of Technology, 2011. http://hdl.handle.net/20.500.11838/2297.
Повний текст джерелаFor almost three decades practitioners, academics, consultants, and research organisations have identified 'attaining alignment between IT and business' (Luttman & Kempaiah, 2007), as a pervasive problem. Despite the wide acceptance of the term "strategic alignment", there was no consensus on how to achieve alignment. The research philosophy was of an interpretive study and an inductive research approach was used. The research strategy was by means of a case study, namely PRASA Western Cape, a business unit of Passenger Rail Agency of South Africa (PRASA). The time horizon for this research was cross sectional. For the data collection a semi-structured interview, supported by secondary data from the business plan and annual report, was used. The research problem was "PRASA has dysfunctional and fragmented institutional arrangements, resulting in misalignment between business and IT". The primary research question to address this problem was "How can PRASA manage strategic alignment between business and IT?" The aim of this research was to understand why the misalignment between business and IT strategies exists at PRASA. A further aim was to propose a guideline to manage alignment between business and IT strategies with the intention of overcoming the fragmented and dysfunctional institutional arrangements. To address resolving the research problem three theoretical models were used. The strategic alignment model was used to ascertain the strategic perspective of PRASA as well as to identify the external strategic fit and internal functional integration of an organisation. The second model used was the strategic alignment maturity model. This model was used to identify the alignment maturity of the business/IT strategies. The final model used was the balanced scorecard. Alignment is one of the best practices recommended by the balanced scorecard, and it recommends aligning all to the strategy of the company. The reason for using the balanced scorecard was that the company currently uses this tool to manage performance. The research finding concluded that PRASA had the strategic execution alignment perspective - business strategy dictates the IT strategy. The overall strategic alignment maturity of the organisation was found to be in initial process. The balanced scorecard methodology was known by all, yet few knew what the performance measures for the organisation was for the year. The triangulated conclusion was that strategic alignment between business and IT was a problem at PRASA. The recommendation was that the organisation conducts three surveys firstly to identify its strategic choice, secondly to identify the strategic alignment maturity and lastly to do a balanced scorecard best practice survey.
Hu, Feng-Ming. "Integrated Apartment Management System." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3004.
Повний текст джерелаObioha, Chinonye Leuna. "User-centred design to engender trust in e-commerce." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2414.
Повний текст джерелаConsumer trust is a core element for any e-commerce website. This study aimed to explore attributes of business-to-consumers (B2C) e-commerce websites that can communicate and engender trust from the users’ perspective using user-centred design. E-commerce websites are known to have features such as security certificates and encryption methods to ensure trust, but this requires technical knowhow to understand. The technologies used to develop websites have improved so far, but it has little effect on improving the trust of the users of e-commerce mostly in developing countries (Africa in particular). E-commerce users do not realise that these features have been put in place for the trustworthiness of the websites which contributes to their reluctance to conduct business transactions online, thus reducing their buying intentions. There is a need to design e-commerce websites to communicate/ convey trust from the users’ perspective. The study explored various sources of data to obtain insight and understanding of the research problem—user-centred design (UCD) group activity with users, interviews with developers, and secondary prior literature. Using UCD as the main methodology, an intensive UCD workshop activity with a group of eight e-commerce users was carried out. Furthermore, to obtain the view of experts (developers) on what is currently done to engender trust in B2C e-commerce websites, interviews with four respondents were also carried out. These interviews were intended to reduce any prejudice or bias and to obtain a clearer understanding of the phenomenon being studied. The findings from the study revealed six main attributes to engender trust, namely aesthetics design, security and information privacy, functionality design, trustworthiness based on content, development process, and vendor attributes. Proposed guidelines for each of the attributes were outlined. The findings from the users showed that those who were acquainted with the e-commerce technologies were those whose backgrounds are computer and technology related. Most users focused on aesthetics design, functionality, and security of their privacy and private details. Less emphasis was placed on the technology behind the e-commerce websites. Users use their aesthetic and cognitive value in their judgement for trust. The findings from the research were further validated using the Domestication of Technology Theory (DTT), which resulted in the development of a user-centred e-commerce trust model.
Basson, Delton Jade. "Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2535.
Повний текст джерелаThe balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.
Stockdale, Rosemary. "Identification and realisation of the benefits of participating in an electronic marketplace : An interpretive evaluation approach." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1333.
Повний текст джерелаGoosen, Riana. "The development of an integrated framework in order to implement information technology governance principles at a strategic and operational level for medium-to-large sized South African business." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20279.
Повний текст джерелаENGLISH ABSTRACT: In today's technologically advanced business environments, Information Technology (IT) has become the centre of most, if not all businesses' strategic and operational activities. It is for this reason that the King III report has dedicated a chapter to IT governance principles, in effect making the board of directors and senior management responsible for implementing such principles. King III's guidance on these principles is only described in broad terms and lack sufficient detail as how to implement these principles. Though various guidelines, in the form of IT control frameworks, -models and -standards exist, it remains highly theoretical in nature and companies tend to view these control frameworks, -models and -standards on an individual basis, implementing them in an ad hoc manner, resulting in the implementation of an inefficient IT governance system, that does not address the key strategic areas and risks in a business. The purpose of this study is to develop an IT best practices integrated framework which can assist management in implementing an effective IT governance system at both a strategic and operational level. The integrated framework was developed by performing a detailed literature review of a best practice control framework, -model and -standard, including its underlying processes. By combining and aligning the relevant processes of the control framework, -model and -standard to the business' imperatives, a framework was developed to implement IT governance principles at a strategic level. The integrated framework is extended to provide guidance on how to implement good IT controls at an operational level. The control techniques, of the applicable processes identified at a strategic level, are implemented as well as the controls around a company's various access paths, which are affected by a company's business imperatives. These access paths are controlled through the implementation of applicable configuration controls. By making use of the integrated framework which was developed, an effective and efficient IT governance system can be implemented, addressing all applicable IT risks relevant to the key focus areas of a business.
AFRIKAANSE OPSOMMING: In vandag se tegnologies gevorderde besigheids omgewings het Informasie Tegnologie (IT) die middelpunt geraak van die meeste, indien nie elke onderneming se strategiese en operasionele aktiwiteite nie. Dit is vir hierdie rede dat die King III verslag 'n hoofstuk aan die beginsels van IT korporatiewe beheer wy. Dié verslag hou die direkteure en bestuur verantwoordelik vir die implementering van hierdie beginsels. Die King III verslag verskaf egter slegs in breë trekke leiding in verband met die implementering van hierdie beginsels en 'n gebrek aan meer gedetailleerde beskrywings bestaan. Alhoewel verskeie riglyne, in die vorm van IT kontrole raamwerke, -modelle en -standaarde bestaan, bly dit steeds teoreties van aard en is maatskappye geneig om hierdie riglyne op 'n individuele vlak te hanteer en op 'n willekeurige wyse te implementeer. Hierdie proses lei tot die implementering van 'n ondoeltreffende IT korporatiewe beheerstelsel. Die doel van hierdie studie is om 'n geïntegreerde beste praktykraamwerk te ontwikkel wat deur die direkteure en bestuur van 'n onderneming gebruik kan word om op beide 'n strategiese en operasionele vlak 'n doeltreffende IT korporatiewe beheermaatstelsel in plek te stel. 'n Geïntegreerde raamwerk is ontwikkel deur 'n volledige literatuurstudie uit te voer, gebaseer op 'n beste praktyk IT kontrole raamwerk, -model en -standaard en die gepaardgaande prosesse. Deur die toepaslike prosesse van hierdie kontrole raamwerk, -model en -standaard te kombineer en te belyn met 'n besigheid se besigheidsimperatiewe, word IT korporatiewe beheerbeginsels op 'n strategiese vlak in plek gestel. Die geïntegreerde raamwerk sluit riglyne in om goeie IT kontroles op 'n operasionele vlak te implementeer. Die kontrole tegnieke, wat verbind word met die gepaardgaande prosesse wat tydens die strategiese vlak geïdentifiseerd is, word geimplementeer asook die die toepaslike konfigurasie kontroles oor die verskeie toegangspaaie wat beïnvloed word deur 'n besigheids se besigheidsimperatiewe. Deur gebruik te maak van die ontwikkelde geïntegreerde raamwerk kan alle geaffekteerde IT risikos nou aangespreek word en 'n doeltreffende IT korporatiewe beheerstelsel in plek gestel word.
Ash, Colin. "Exploring The Antecedents Of Successful E-business Implementations Through ERP : A Longitudinal Study of SAP-based Organisations 1999-2003." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1486.
Повний текст джерелаNocanda, Xolani Wittleton. "Web-based business positioning : an investigation in the tourism industry." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/19797.
Повний текст джерелаThe use of the web-based technology to conduct business has been growing in many industries globally, this has been the case in the tourism industry. The growing popularity of the web-based technology can be attributed to the benefits it brings to the tourism industry. The study has look into the overall benefits brought by the web-based technology in the tourism industry and how it can be further exploited to benefit the organizations. The application of the web-based technology has included the introduction of the website. The website has given companies exposure to the global market and has been a platform for conducting marketing activities. The website has been used extensively in the tourism industry as a source of information. The website has enabled travel consumers purchase tourism products and services. Having a website may not be sufficient in meeting an organisation’s intended objectives. Many companies in the tourism industry are making use of the website, hence the use of website in search engines has become competitive. Companies need to implement website optimisation techniques to benefit both the travel suppliers and travel consumers. To conduct the organisations marketing activities successfully, the websites needs maximum exposure to the target audience. This can be achieved through the website design aimed at ensuring that the website is highly ranked by search engines. Added features like video, up to date information and photos add value to travel consumers. Through these features travel consumers are able to understand tourism products and services, and hence make informed decisions. The study has looked at the application of the web-based technology in four sectors of the tourism industry in South Africa. These are attraction, accommodation, tour operators and transport. Suppliers in each sector were selected for analysis and they are: - in attraction, Kruger National Park and Hluhluwe Game Reserve; - in accommodation, Hilton hotel and Southern Sun hotel; - in tour operator, Thompson Holiday and Tourvest; and - in transport, Kulula, South African Airways, Avis and Europcar. Suppliers in the tourism industry in South Africa were found to use the website for the following reasons: - Provides information about the organisation and its products and services. - Used as a marketing tool: The website is used to facilitate communication between the travel supplier and the travel consumer. It is also a platform to sell tourism products and services. - Used to enhance collaboration in the industry. Collaboration through websites has resulted in a better supply chain. Customers have been able to buy one package including the airline ticket, accommodation and car hire using one website. - Used to conduct business transactions: Customers have been able to make bookings and reservations and payments through the website. - Used to attract customers to the organisation’s products and services. Attractive features such as photos and videos have been included in the website. The Safari Company is a tour operator in South Africa. Using web-based technology; the company has changed its business model to be able to serve its customers better. The company has developed a new website that adds value to both travel suppliers and travel consumers. Travel suppliers are able to market their services and products through the website. The website provides travel consumers with the latest information and expert advice in tourism products in the Southern and Eastern Africa. The Safari Company website has been a platform for the company to communicate its social responsibility with the global community. The Safari Company donates 10% of its revenue to an organization called Touch the Land. Touch the Land is a foundation that implements projects in Southern and Eastern Africa aimed at poverty alleviation.
Blanken, Olaf. "Creating business value through e-marketplace participation: a South African exploratory case study – Kalahari Marketplace." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/97312.
Повний текст джерелаENGLISH ABSTRACT: E-commerce in South Africa is currently experiencing considerable growth, as in the rest of the world. Substantial foreign investments are being made in selected South African online retail stores and the majority of businesses have an online presence to sell or promote their products and services. Yet, as e-commerce is a dynamic and relatively new industry, there is a need for South African companies to understand business model adaptation for e-commerce, and specifically for successful e-marketplace participation. Kalahari Marketplace was established in 2011 as a C:C platform for customers to sell books and media. In January 2014, this platform was expanded to a fully integrated B:C platform that enables third-party retailers to sell directly to Kalahari.com customers in various categories. The Kalahari Marketplace platform follows the same development outline as the very successful Amazon.com Marketplace platform in the United States. The premise is that sellers have an additional channel to sell to customers they would not normally have had, and customers benefit by having access to a wide product range and competitive pricing. The aim of this research study is to understand the typical business model of a successful e-marketplace participant. It furthermore set out to explore the success factors, which translate into value creation for the seller achieved through participation in an e-marketplace. This investigation was done through a case study approach by examining existing sellers retailing through Kalahari Marketplace. To achieve the research aim, qualitative, exploratory research was conducted. The research method involved a combination of primary and secondary research. Secondary research was conducted regarding the external environmental factors of Kalahari Marketplace sellers. Primary data was gathered through in-depth semi-structured interviews with Kalahari Marketplace sellers. The external environmental analysis for participating in an e-marketplace, such as Kalahari Marketplace, was overall positive, taking into consideration challenges such as expensive Internet and low Internet usage penetration. The key findings from the internal analyses were that participating in an e-marketplace has substantial benefits for a traditional retailer that wants to trade online. These advantages include transaction cost savings, exposure to new customers, and reduced marketing expenses. The following recommendations were made for successful e-marketplace participation: • Take an active involvement in e-marketplace listings; • Effective procurement and use of resources; • Excellent customer service; • Build reliable and cost effective delivery channels; and • Offer a wide and mixed product range. The research limitation of this study stated that Kalahari Marketplace is a moderately new B:C e-retailing platform; therefore, retailers are still learning to adapt. Suggested additional research involves a wide-reaching quantitative research into key success factors for e-marketplace participation from a South African perspective.
Koekemoer, Johannes Frederik. "A grounded theory analysis of networking capabilities in virtual organizing." Thesis, Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-11102008-150737/.
Повний текст джерелаDabous, Feras Taleb Abdel Rahman School of Information Systems Technology & Management UNSW. "A pattern based approach for the architectural design of e-business applications." Awarded by:University of New South Wales. School of Information Systems Technology and Management, 2005. http://handle.unsw.edu.au/1959.4/22047.
Повний текст джерелаNjeje, Sicelo Given. "Implementing a robust, cost effective, e-commerce platform for a disadvantaged community of the Eastern Cape, South Africa." Thesis, University of Fort Hare, 2008. http://hdl.handle.net/10353/75.
Повний текст джерелаSahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Повний текст джерелаENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
Valli, Craig. "Non-business use of the World Wide Web : A study of selected Western Australian organisations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1311.
Повний текст джерела