Browsing by Author "Naidoo, Karunagaran."
Now showing 1 - 12 of 12
- Results Per Page
- Sort Options
Item The adoption of agile software development methodologies by organisations in South Africa.(2015) Vanker, Cassim.; Klopper, Rembrandt.; Naidoo, Karunagaran.The software development life cycle (SDLC) is considered to be the oldest software de-velopment methodology and is often described as a deliberate, methodical and structured approach that is used by development teams to develop information systems. There are two SDLC methodologies, which are currently being utilized by programming practition-ers, namely traditional development and Agile development. The traditional view to software development assumes that the customer does not have a full understanding of their requirements and would thus need a detailed specification de-signed before development begins. Unlike the traditional view, the agilest views software as unpredictable and rely on people and their creativity rather than on processes. Anecdotal evidence suggests various benefits associated with Agile methodologies, these include increased collaboration, the quality of the end product, transparency and produc-tivity. An international Survey conducted, amongst software development companies, shows that 80% of respondents indicated that they had practiced Agile. While international research shows the popularity of Agile methodologies very little is known about Agile in South Africa. This research provides insight into the adoption of Agile, by South African organisations. The results of the study indicate that Agile methods are being used by organisations in South Africa. However, there is no evidence to suggest its being used overwhelming. Furthermore, this study uses the Gartner hype cycle as the underpinning theoretical model and places Agile methods on the Gartner hype cycle as being in the trough of disillusionment.Item Alignment of IT and business strategies in small and medium-size enterprises in the Eastern Cape Province.(2017) Motsilili, Phomolo.; Naidoo, Karunagaran.In today’s business environment, leveraging Information Technology (IT) is of key importance as it helps organisations improve their performance. However, to achieve this, companies must ensure that their IT and business strategies are aligned. The fundamental goal of aligning IT and business strategies is to ensure that IT capability supports, enables and leads business strategy where appropriate. Alignment explains the degree to which the business plans, goals, and mission support, or are supported by their IT complements (Reich & Benbasat, 1996; Walter, Kellermanns, Floyd, Veiga, & Matherne, 2013). In this, alignment develops into a relationship where business and IT functions adjust their strategies simultaneously. Such alignment can improve business performance. Importantly, large amounts of research conducted in this area focus on large organisations, particularly in developed countries. Yet little is known about the subject in SMEs especially in developing countries. This study investigates the alignment of IT and business strategies in SMEs in the Eastern Cape Province. A survey methodology was employed to collect data, with a questionnaire as a tool. Forty-two questions developed from four main questions: the state of communication, the state of IT metrics, the state of IT business planning, and the state of alignment practices. According to data obtained from the Border-Kei Chamber, at the time of data collection, there were one hundred and seventy-three SMEs registered with the organisation. However, from that population, one hundred and twenty-eight questionnaires were filled, returned and analysed. The results showed significant agreement that there is communication between IT and business strategies in SMEs, on Metrics and on IT Business planning. However, pertaining the use of alignment models and alignment practises, there was a significant disagreement. The study recommends that SMEs should create platforms to educate IT personnel about the business; more work on value metric is required. Participation of IT in business strategic planning should be encouraged. It is recommended that SMEs look into alignment model/s that can be used to support how IT planning/ investment, managing and governance of IT is done.Item Cloud adoption for organisations in the eThekwini area.(2022) Mngomezulu, Thuthukani Givenson.; Naidoo, Karunagaran.Cloud computing is a computing model that enables developing countries to open new business ventures without having to spend extensive amounts of money in upfront capital investment; “cloud computing is a practical approach to experience direct cost benefits, and it has the potential to transform a data centre from a capital-intensive set up to a variable priced environment. The main character of cloud computing is in the virtualization, distribution and dynamically extendibility” (Chauhan, 2012, p. 1). Of all the models that utilise the network as means for delivering computing resources, cloud computing is the best one yet; the cloud is more scalable and allows consumers to add and remove resources as their computational needs change without impacting business processes (Nuseibeh, 2011). There are other opportunities that organisations stand to benefit from cloud computing adoption, but in spite of all the opportunities, the rate at which organisations are adopting cloud Computing is increasing at a slower pace than expected in South Africa. From the statistics released in 2018 by the Business Software Alliance (BSA) and Global Cloud Computing Scorecard, it was highlighted that South Africa had fallen behind in its efforts to adopt Cloud Computing and different reasons were highlighted as a cause of this lag (BSA, 2018). This research study aimed to investigate potential issues that impacted the organisation's desire to adopt the cloud resulting in the low adoption rate. The technology-organisation-environment (TOE) framework was the framework that was used in this research study. Four research questions were developed as part of achieving the objectives for this research study. A sample of organisations in the KwaZulu-Natal province was identified for this research study using the convenience sampling technique and an online survey hosted in Survey Monkey was sent out to the selected organisations. The collected data were analysed using SPSS tools. After analysis was performed on the data, it was found that most challenges that organisations faced were from external factors like infrastructure readiness, which organisations had no control over. Internal challenges also affected the organisation’s adoption and usage of the cloud, but when data was grouped according to either belonging to the internal or external group, it was found that external issues affected organisations more than internal issues.Item Cybersecurity for industrial Internet of Things: a case study of the South African transport sector.(2024) Pretorius, Barend Hendrik.; Van Niekerk, Brett.; Naidoo, Karunagaran.There is an increasing drive for the fourth industrial revolution, which has resulted in increasing deployments of Industrial Internet of Things (IIoT). IIoT deployments have led to multiple security incidents. This study focuses on determining the factors influencing cybersecurity for IIoT and the pressing need to secure IIoT devices and networks in South Africa’s transportation sector, which is crucial to the nation’s economy. Examples include maritime, ports, railways, airports, trains, and road transportation. A mixed-method approach is used. Quantitative methods include questionnaires, and qualitative methods include the analysis of documents (industry best practices, standards, and frameworks) used to identify and assess the technological, organisational, procedural and people factors influencing cybersecurity for IIoT in the transport sector of South Africa (SA). The population for this study consisted of 58 participants with knowledge of IIoT security in the transport sector of SA. Questionnaires are analysed using descriptive statistics, correlation, and inferential statistics. Data collected from documents are analysed using thematic analysis. The conceptual research framework underpinning this study is the Design Science Research combined with Business Model for Information Security (BMIS) framework. The areas of BMIS that guided the study are technology, organisation, procedure, and people. The findings of this study bring to light significant organisational and procedural challenges, including the crucial role of cybersecurity staff for IIoT, the necessity for robust incident response plans, and the looming technological threats such as ransomware and cyber espionage. From a people factor, the lack of training, communication, and employee satisfaction emerges as a significant concern, underscoring the need for immediate attention and action. Through the data triangulation from the qualitative and quantitative methods, the relationship between the four BMIS factors is determined, and a framework for IIoT cybersecurity in the SA transport sector is developed. The cybersecurity framework is evaluated against the MITRE ATT&CK framework. Future research includes exploring control breakdowns, implementation feasibility, use of a honeypot to simulate IIoT device vulnerabilities, and alignment with legal requirements, thereby offering the potential for enhanced security measures for organisations in the South African transport sector.Item Evaluating critical success factors of remote work for bank employees, in Gauteng, South Africa.(2023) Hadebe, Pearl Mbali.; Naidoo, Karunagaran.Remote working occurs when employees conduct work outside the traditional office location of the employer. This practice has been steadily increasing over the years due to technological enablers and globalization. However, the COVID-19 pandemic accelerated remote working in the past few years because of government social distancing regulations, that were enforced to circumvent the spread of the virus. The regulations influenced many organizations to unexpectedly adopt remote work policies. This was due to their required adherence to COVID-19 restrictions and sustained business continuity, during the global health crisis. Even though literature provides numerous studies on remote work, they are often not in the context of South Africa and the COVID-19 period. The focus of this research was to determine predictors of remote work success in a South African context, considering the pre- and post-COVID periods. This research was undertaken to evaluate critical success factors of remote work for bank employees in Gauteng, South Africa to provide conclusive evidence of the most important predictors of remote work success. This will facilitate, decision making for organizations that continue with telecommuting beyond the pandemic period. In this study, remote work success is defined as the ability of an organization tomeet or exceed its business objectives whilst working remotely. A conceptual framework was defined to frame the study and it included organizational, people, Information Communication Technologies (ICTs), location and environmental factors. Then a quantitative post-positivism research methodology was applied to further analyze each of the proposed critical success factors of telework. This study was conducted in the field of Information Systems and Technology, and it sought to understand the social phenomenon of employee perceptions of what they considered critical success factors of remote work. Therefore, the selected structured quantitative research approach was deemed suitable. The data collection for the study was conducted using a closed-ended electronic questionnaire. The sample population of this study consisted of 150 remote-working bank employees. Empirical evidence from statistical tests confirmed that all the proposed critical success factors suggested in the conceptual framework of this research were significant predictors of successful remote working except for organizational factors. The people factors were identified as the greatest predictor of remote working success. The research outcomes also indicated that even though the surveyed respondents had a great preference for remote work, they sometimes wanted to work from the office location. Despite the research outcomes demonstrating that employees perceived remote work as more successful and productive than working from the office. There were slight differences in significant agreements across the sample population demographics such as gender, marital status, ethnicity, and age. In conclusion, the research found that the most critical success factor of remote working was employees of the organization. The research outcomes demonstrated that people factors were instrumental to the success of remote working organizations. Provided the people felt empowered with adequate telecommuting IT tools, remote work policies and management support.Item Evaluation of the adoption of information and communication technology in secondary school management.(2017) Kamalizeni, Aubrey.; Naidoo, Karunagaran.In this Information and Communication Technology (ICT) era, any business transactions can now be effectively and efficiently carried out to realise organisational goals, with education administration in secondary schools not spared. Specifically, this research was driven by the realisation that despite support by the Department of Education through the purchase of ICT infrastructure, these resources remain underutilised and therefore, become obsolete. While there is considerable literature on the use of ICTs in supporting learning and teaching, not much has been covered on the use of ICTs in managing secondary schools. The cited theories revealed that ICT usage in the management of secondary schools were likely to improve the quality of education. This study therefore aimed at evaluating the use of ICT in the management of secondary schools in Mashishila Circuit. The quantitative research method was used to analyse data. In order to achieve this objective, the researcher employed purposive sampling, where 77 respondents from senior management teams (SMT) were drawn from Mashishila circuit, which had a total population size of 152 staff members. The sample comprised 28.6% males and 71.4% females, with the majority of the respondents (40.3%) being in the 50 to 59 age group. The researcher collected data using a questionnaire that was tested to generate relevant data. The results of the study revealed that there was sufficient evidence to suggest that ICT for management was being used in some secondary schools of the Mashishila Circuit, although insignificantly. The results also showed that the majority of the senior managers lacked ICT management professional qualifications, with some of them having received little training in the area. However, over the years, they have developed hands-on skills, with regards to carrying out different managerial activities through self-discovery. This was attributed to some informal training which they received from the Department of Education. It was also revealed that several reasons negatively impacted on the senior managers’ willingness to use ICT for management in schools. These were seen to be dealt with by the various authorities, including the Department of Education and education officers. Further findings showed that ICT for management tended to improve managerial duties of leaders in these schools. Additionally, school leaders were able to monitor financial records and stores quite effectively using ICTs. Based on these findings, the study therefore recommended that leaders of schools needed to structure their activities through cooperation and the adoption of ICTs. This was to be supported by control objectives of information related technologies. The study further recommended some future enquiry that deals with an integrated system incorporating school management with education district and regional offices, through comprehensive training and empowerment, specifically focusing on the use of ICTs in the management of secondary schools.Item A framework for the adoption of digital terrestrial television - the case of eThekwini Municipality. Uhlaka Lokutholwa Kwe-Digital Terrestrial Umabonakude - Udaba lukaMasipala weTheku.(2022) Mabaso, Brian George.; McArthur, Brian Walter.; Naidoo, Karunagaran.Digital Terrestrial Television (DTT) brings many benefits to viewers compared to regular analogue televisions. Although many countries around the world introduced DTT with such benefits in mind, the rates of DTT adoption have been slow compared to other developing nations, and consequently, many countries, including South Africa, had to postpone the analogue switch-off date. Given the lagging consumer adoption of DTT in eThekwini Municipality, The purpose of this study is to apply the UTAUT model in predicting the citizens’ intention to adopt DTT and to determine the possible reasons for the slow adoption of DTT in eThekwini Municipality. This study is exploratory and employs a mixed methods approach, combining a quantitative approach using a survey questionnaire as a data collection tool, and a qualitative research approach, using interviews to collect data from industry experts. A total of 138 out of 267 respondents participated in the quantitative study, resulting in a 52% response rate, while 10 industry experts were interviewed as part of the qualitative study. The structural equation model (SEM) was employed to measure and analyse the relationships of observed values and latent variables, resulting in a new developed model. The findings indicate that the effect of the moderator variables on the relationship between the exogenous constructs and the dependent variable was found not to have a significant impact. The exogenous constructs of the UTAUT model that were investigated are Performance expectancy, The results from the quantitative study showed that there was a positive and significant relationship between the exogenous construct constructs and the behavioural intention to adopt, meaning that the citizens have intention to adopt DTT if it is made available. The qualitative results showed that leadership instability, policy inconsistencies, political interference and self-serving interest from some stakeholders were some of the factors behind the slow adoption of DTT. Iqoqa: I-Digital Terrestrial Television (DTT) inosizo olukhulu kubabukeli uma kuqhathaniswa nohlobo lomabunakude abayi-analogue. Nakuba amazwe amaningi emhlabeni ethula lolu hlobo lwe-DDT emazweni awo ngoba elandela lezi zinto eziningi ezitholakalayo, amazinga okwamukela i-DTT asephansi kabi uma kuqhathaniswa nokwasemazweni asathuthuka kangangokuthi elaseNingizimu Afrika sekukaningi lihlehlisa usuku lokucima uhlelo lwe-analogue. Ngenxa yokulibala kwabanikazi bomabonakude ukuthi bashintshele ku-DTT ezindaweni zikaMasipala waseThekwini lolu cwaningo luhlose ukusebenzisa imodeli i-UTAUT ekuzameni ukuhlonza ngezinhloso zezakhamuzi ekuthatheni i-DTT kanye nokuthola izizathu okuyizona ezibangela ukuthi kuthathe kancane ukwamukelwa kwalolu hlelo lwe-DTT eThekwini. Lolu wucwaningo oluhlolayo futhi lusebenzisa indlela engxube luyihlanganisa neyikhwantithethivu. Ekuqoqeni imininingo lusebenzisa uhlu lwemibuzo yesaveyi bese kuthi ngokwendlela yokucwaninga eyikhwalithethivu lusebenzisa izinhlolomibono ekuqoqeni imininingo kochwepheshe bakule mboni. Kwababezophendula imibuzo abangama-267 bayi-138 sebebonke ababamba iqhaza ocwaningweni oluyikhwalithethivu, okusho ukuthi izinga lalabo abaphendula lingama-52%, kanti kwabuzwa imibuzo kochwepheshe bakule mboni abayi-10 kuyo le ngxenye eyikhwalitheyithivu. Kwasetshenziswa i-structural equation model (SEM) ekuhloleni nasekuhlaziyeni ubudlelwano bamagugu abonakalayo kanye namavariyebuli acashile ukuze kuthuthukiswe imodeli entsha. Imiphumela iveza ukuthi umthelela wamavariyebuli aziwa ngele-moderator variables ebudlelwaneni obuphakathi kwezincazelokuzakhela eziqhamuka ngaphandle kanye nevariyebuli encikile wakhombisa ukuba namandla amakhulu. Izincazelokuzakhela zangaphandle zemodeli i-UTAUT ezaphenywa zaba ngezokusebenza okulindelekile. Imiphumela yocwaningo oluyikhwantithethivu yaveza ukuthi kunobudlelwane obuhle nobukhulu phakathi kwezincazelokuzakhela zangaphandle kanye nokuzimisela ukwamukela, okuchaza ukuthi izakhamizi zizimisele ukwamukela i-DTT uma isitholakala. Imiphumela eyikhwalithethivu yaveza ukuthi ukungazinzi kobuhloli, izinqubomgomo ezishintsha njalo, ukugxambukela kwezombusazwe kanye nokuba ogombelakwesakhe kwalabo abangababambiqhaza kungezinye zezimo ezidala ukwamukeleka kwe-DTT ngendlela ehamba kancane kakhulu. Imiphumela yalolu cwaningo inemithelela eminingi kulabo abenza izinqubomgomo kanye nabasakazi kanti ingabhekiswa kakhulu ezakhamizini ngoba imininingo yesampula yayiqoqwa ezinkundleni zokuxhumana, okuyinto eyayivalela ngaphandle labo emiphakathini abangenayo indlela yokusebenzisa lezi zinkundla zokuxhumana. Imiphumela yalolu cwaningo yenezezela kwinjulalwazi ngalezi zindlela ezilandelayo: imodeli i-UTAUT yenezezelwa ngolwazi lobuchwepheshe njengencazelokuzakhela eyengeziwe kanti ibuye yenze neziphakamiso kulabo abathuthukisa izinqubomgomo.Item The impact of social media on teaching and learning in higher educational institutions in Lesotho.(2020) Sehapi, Kolitsoe.; Naidoo, Karunagaran.Manning (2014) defined social media as the term used to denote new methods of media that involve interactive participation. It allows individuals and groups to network, create and share information online. Information is shared by users in a form of photographs, audio files, text and videos. Commonly used social media platforms are WhatsApp, LinkedIn, YouTube, Facebook, Twitter, and Google Plus. The majority of respondents in this study were familiar with WhatsApp, YouTube, and Facebook. Social media leads to increased interaction and engagement between teachers and students and it enhances students’ learning experience and practice. Other than interaction, social media maintains existing contacts, keeps one up to date with the advances in different fields, and promotes an individual’s work to peer and outside communities such as practitioners and industry. Therefore, social media has converted a routine daily exercise in some user’s lives into something that attracts the attention of students, researchers and academics progressively. Advantages of social media for learning were identified as social media is being used for recreation purposes, academic activities, and information seeking. On the other hand, disadvantages were identified as cyber bullying, health-related issues, emotional detachment, privacy, and miscommunication. Students are however concerned about inappropriate language and unsubstantiated content in social media. Some also believe that computer support, training and skills are necessary in order to use social media effectively (Public Media Alliance & UNESCO, 2017). Furthermore, this research used the conceptual framework. The framework was adapted from Bexheti, Ismaili & Cico (2014) which specified social media effects as connection, collaboration, creativity, and communication. A quantitative research approach was adopted for this research. This approach helps researchers to solve difficult problems in time with much accuracy and in a cost-effective way (Mishra & Jaisankar, 2007). A convenient sampling was used as a sampling technique for this study. It is a type of nonprobability sampling where participants of the target population that meet a particular practical conditions. The study used both primary and secondary data to answer research questions. Data was collected by using a questionnaire that was distributed to the respondents. Data were analysed with Statistical Package for the Social Sciences (SPSS) Version 25. This research intended to examine the effect of social media on students learning, the degree to which students are familiar with different social media platforms, and factors that influence use of social media. The effects of the study were identified as connect, collaboration, communication and connectivity. The study discovered that students are familiar with different social media platforms for learning purposes. Factors included; computer skills, IT support, unclear content, computer training, reliability on social media, inappropriate language, and unclear content on social media.Item The management of e-waste in KwaZulu-Natal.(2010) Naidoo, Karunagaran.; Klopper, Rembrandt.Information Technology is seen as that which makes one's life easier, fun and more comfortable. When a new cellular phone is launched one is eager to see what the new phone has to offer, and often one convinces oneself that the new device is required. This study investigates what happens to redundant or obsolete electronic devices like cellular phones, computers and other electronic devices. Are these devices stored, donated, thrown out with the garbage or are they recycled? Information from academic sources and from all types of media, including television, print and electronic was searched to enhance the survey that was undertaken. Both the informal and formal sectors of recycling were investigated. A questionnaire was used to supplement the information found in different kinds of sources. The collected data was interpreted through the use of SPSS. Descriptive as well as inferential statistics was used to draw conclusions and make inferences. An investigation into legislation controlling the disposal of e-waste is included in this study. International, national, provincial and local government legislation is outlined. The objectives of recycling electronic waste are listed together with the challenges that face the pro-recyclers. The quantitative research methodology approach has been employed for this research. A key technique used in this study is the Research Onion. Data analysis and interpretation are based on the p-value, Pearson's chi-square and Spearman's correlation. The study has really been an eye opener in that it considers the “darker side” of Information Technology. The “darker side” of Information Technology refers to the disposal of obsolete or broken electronic devices in a manner that is harmful to the environment. The cost or lack of profit is the main driving force for incorrect disposal methods. This study has found that the best method of disposal is the take back system, where manufacturers of electronic devices are responsible for the safe disposal of the devices that they manufactured.Item The role of vulnerability disclosure programs in an organisational cybersecurity strategy.(2020) Jobraj, Trishee.; Naidoo, Karunagaran.Today’s world is a technological one, with devices and software becoming more interconnected. Inherent to these devices and software are vulnerabilities that if discovered by malicious parties, may be exploited. In order to discover, investigate and remediate these vulnerabilities timeously with little or no impact to users, organisations have started to invest in vulnerability disclosure programs (VDP). This provided researchers with a platform in order to communicate discovered vulnerabilities to the organisation in a standardised and consistent manner. It also provided organisations with a method of detecting security flaws that were not normally detected by vulnerability scanners. VDP’s assist in identifying these vulnerabilities in a coordinated manner to facilitate speedy remediation. This research investigated the challenges and benefits of VDP’s and the need for such a program as part of the organisational cybersecurity strategy. Quantitative analysis was used to conduct the study by means of an online questionnaire. 147 participants who were members of ISACA South Africa spread across South Africa, with Information Technology (IT) and cybersecurity experience, responded to the questionnaire. The questionnaire measured the opinions, views and experience of the various stakeholders. The questionnaire comprised of rating and ranking scales such as the Likert scale in order to obtain a rich and accurate data set for analysis. The questionnaire data was analysed using descriptive analysis (i.e.: frequency analysis, mean and standard deviation) and correlation. Statistical analysis tools such as PSPP and Real Statistics which is an add on in Excel were used to analyse the data. Based on the research performed, the key findings were around the lack of awareness of VDP’s in the IT and cybersecurity space within South Africa. This included the understanding of the types of VDP’s as well as the processes associated with VDP’s as well as the lack of management support towards VDP’s. It was also evident that many organisations did not have an official channel to report VDP’s.Item Security practices of smartphone users at UKZN Westville Campus and its effects on the institutional information systems.(2021) Kaka, Oluwafisayo.; Naidoo, Karunagaran.Technology has evolved through the years and brought about innovations in telecommunication tools such as smartphones, widely used today for various reasons, like educational purposes. Similar to other mobile devices, smartphones are prone to online attacks, and their usage on a university network may lead to cyber-attacks on a university's information systems. Many universities utilise information systems such as mobile websites and mobile applications like Office Outlook email, Moodle and Turnitin. Therefore, ensuring adequate online security is fundamental to mitigate online threats, but such actions are disregarded by most students who are considered the security administrators of their smartphones. This study used a quantitative research method to assess smartphone users' security practices at the UKZN Westville Campus and its effects on the Institutional Information Systems. The University of KwaZulu-Natal’s information systems includes a mobile website that enables students to access UKZN student central for academic and support services. The university also uses mobile applications such as MyUKZN, Turnitin and Moodle. The study gathered data via paper-based and online questionnaires from the University of KwaZulu-Natal students that own and use smartphones to connect to the internet via the university’s WIFI on campus. The findings of this study revealed that online threats might occur through students disregard for the university's online security guidelines. Some students’ lack of online security knowledge was also discovered, making these individuals’ smartphones possible entry points for online attacks. Regardless of online security skill level, students demonstrated inconsistent security behaviour. The above mentioned inadequate security practices by students can result in the UKZN experiencing a data breach, financial loss, disruption of services, intellectual property theft, and much more damages. The findings further indicated that students that possess good security skills do not readily implement security measures because the process is assumed to be stressful.Item To investigate the state of IT governance in the South African banking sector - with particular reference to the Nedbank branch network at eThekwini.(2018) Pillay, Christopher.; Naidoo, Karunagaran.Information technology (IT) is at the core of banking operations; it is the fabric pervading everything. Banks cannot provide their products and services without relying on IT; they are completely dependent on IT. This dependence on IT is a source of significant risk because the non-availability of IT systems renders the business impotent to provide its product and services and to generate revenue. This gives rise to the paradoxical dilemma in that for banks to provide their products, services and to innovate, they are dependent on IT and this dependence is the source of significant risk. More so, banks are not merely dependent on IT for their daily operational needs but also reliant on IT to achieve their strategic goals and for overall advantageous competitive positioning and it is this irony that has banking executives, regulators and stakeholders concerned. It is well established that IT governance (ITG) is essential to the overall success of organisations. It provides a mechanism to manage the risks associated with IT as well as the ability to maximize and sustain organisational performance. Yet, given the axiomatic importance of ITG, we have seen failures of IT systems at large banking organisations resulting in huge financial losses and reputational damage; all attributed to failures in governance. More so disclosures related to these failures are opaque to non-existent; with the effectiveness of IT governance and strategic alignment being the least disclosed and transparent. The consequence of this is that we do not know the current state of IT governance nor its effectiveness at banking institutions due to the lack of transparency and disclosures in the reporting of IT failures resulting from a lapse in IT governance. Nor do we know how adequate the IT governance regime is. The externalities of banking institutions to the society at large warranted the need to understand the state of IT governance in the South African banking sector. This study investigates the state of IT governance in the South African banking sector with particular reference to the Nedbank branch network in eThekwini, a municipality in KwaZulu-Natal. Data was collected, from Nedbank branches included in the sample, using a self-administered questionnaire as the survey instrument with items developed to interrogate the state of strategic alignment and using this as a proxy for the maturity of IT governance. This approach is well established in the literature. The results of the study showed that the Nedbank branch managers in the eThekwini region of KwaZulu-Natal agreed or strongly agreed that there is significant strategic alignment at Nedbank and consequently a high degree or maturity of IT governance. The study, further, recommends that a larger study be conducted to include branches from all the provinces in South Africa and compare the results. The disparity in the gender of Nedbank branch managers was noted and it would be interesting to study whether this disparity contributed to the results and is recommended for future research.