Doctoral Degrees (Information Systems and Technology)
Permanent URI for this collectionhttps://hdl.handle.net/10413/6926
Browse
Browsing Doctoral Degrees (Information Systems and Technology) by Date Accessioned
Now showing 1 - 20 of 35
- Results Per Page
- Sort Options
Item Records management practices and public service delivery in Kenya.(2007) Kemoni, Henry N.; Stilwell, Christine.; Ngulube, Patrick.Abstract not available.Item Application of knowledge management approaches and information and communication technologies to manage indigenous knowledge in the agricultural sector in selected districts of Tanzania.(2009) Lwoga, Edda Tandi.This study investigated the extent to which knowledge management (KM) approaches and information and communication technologies (ICTs) can be used to manage agricultural indigenous knowledge (IK), and introduce relevant exogenous knowledge in some local communities of Tanzania. The recognition and management of local practices do not only give confidence to farmers that their knowledge and skills are valued, but also leads to the preservation and continued use of their IK. Managing IK within and across communities can help to enhance cross-cultural understanding and promote the cultural dimension of agricultural development in the local communities. The current state of managing agricultural IK and access to relevant exogenous knowledge in the selected local communities in Tanzania was investigated. The study used mixed research methods, where the qualitative approach was the dominant method. Both quantitative and qualitative data were gathered simultaneously during a single phase of data collection. The primary purpose was to gather qualitative data through the semi-structured interviews, focus groups, non-participant observation, and participatory rural appraisal tools (information mapping and linkage diagrams, and problem trees). The secondary purpose was to gather quantitative data through closed questions which were embedded in the same semi-structured interviews. Both qualitative and quantitative data analyses were kept separate, and then they were combined or integrated into the meta-inferences. Some of the qualitative themes were also transformed into counts, and these counts were compared with descriptive quantitative data. The study participants included three categories of respondents: local communities (farmers and village leaders), IK policy makers (institutions that deal with intellectual property policies in Tanzania), and knowledge intermediaries (institutions that deal with agricultural KM activities in the rural areas). The findings indicated that KM approaches can be used to manage IK and appropriately introduce exogenous knowledge in the local communities, and thus the integration of both indigenous and exogenous knowledge can be feasible. The study findings showed that farmers possessed an extensive base of agricultural IK. However, this knowledge was acquired, developed and shared within a small, weak and spontaneous network, and thus knowledge loss was prevalent in the surveyed communities. Formal sources of knowledge mainly focused on disseminating exogenous knowledge in the local communities, which showed the predominance of the exogenous knowledge system over IK in the surveyed local communities. The study found that most of the farmers’ knowledge was tacit and it was created and shared through human interactions, and thus lack of ICTs did not constitute a barrier for KM practices in the rural areas. The study findings showed that radio was the major ICT used to access exogenous and indigenous knowledge in the local communities. There was low use of ICTs to share and preserve agricultural IK in the local communities. Although there was a predominance of the exogenous knowledge system over IK in the local communities, farmers applied IK gained from tacit and explicit sources of knowledge in their farming systems as compared to exogenous knowledge in the surveyed communities. Farmers trusted their own knowledge since it did not challenge their assumptions as would new knowledge from research institutions and universities. Low use of exogenous knowledge on some farming aspects was attributed to the fact that few knowledge intermediaries had identified and prioritized farmers’ knowledge and needs in the local communities. Individual and collective interactions were already used to integrate farmers’ knowledge and exogenous knowledge in the local communities, however, they needed to be strengthened through KM practices. The study findings showed that various factors determined access to knowledge in the communities, which included ICTs, culture of a certain locality, trust, status, context and space. The findings also showed that the lack of IK policy and existence of Intellectual Property Rights (IPR) that inadequately recognised and protected IK, limited acquisition, sharing and preservation of IK in the surveyed communities in Tanzania. The study concluded that unless KM approaches are applied, IK will continue to disappear, and the rural farmers will have nothing to rely on, for their farming practices. Since knowledge is the collective expertise of everyone in the communities, this study recommends that KM practices should be embedded in the community, private and public agricultural actors and other government and private institutions as they currently function in the local communities. The government and private agricultural actors should foster the KM practices in the local communities by engaging the community leaders and rural people in the whole process. Since IK is site-specific, it can therefore seldom be scaled up without an adaptation, however it can be used to stimulate experimentation and innovation in other communities. With this view, this study recommends that knowledge should not be separated from the individuals who possess it, instead efforts should be made to enable the communities to manage their own knowledge, and to adapt other knowledge systems to suit their local context for effective KM practices. Indigenous knowledge would be effectively managed and integrated with exogenous knowledge if the government ensures that there are policies and Intellectual Property Rights (IPRs) that recognise and protect the existing knowledge in the country. These policies may include sectoral policies that deal with IK, rural development, agriculture, ICTs, education issues and various other issues. These policies should comprise the following: (i) a shared definition of and vision for KM in the country; (ii) the clear goals/strategies for the innovation initiatives to take place in the rural areas; and (iii) guidance with regard to prioritizing, deciding upon, and taking action to institutionalize KM processes in the rural areas with linkages to gender perspectives. Issues related to the capacity building, culture, content, infrastructure, and leadership should be addressed at this level for effective implementation of KM services in the rural areas. This will enable the communities and agricultural actors (such as research, extension, NGOs, libraries) to establish KM practices and a culture that is conducive for KM activities in their localities. Further, the study recommends that public and private institutions, knowledge intermediaries (such as research, extension, NGOs, libraries) and village leaders should be involved in the KM practices in the rural areas, and they should ensure that there is a committed leadership for KM activities, knowledge culture, appropriate ICTs, favourable context and space, and mapping to locate knowledge bearers and knowledge resources in the rural areas. However, the absence of ICTs should not constitute a barrier for KM and knowledge integration processes, since the findings showed that communities are more likely to understand, acquire and use knowledge that is shared through indigenous communication channels which are oral in nature rather than other approaches such as ICTs.Item Information and communications technology (ICT) integration in teaching and learning : a critical analysis.(2006) Govender, Desmond Wesley.; Maharaj, Manoj Sewak.Technology availability is quite often mistaken for technology adoption and use. In the White Paper on E-Education, launched by the South African National Department of Education, the government has indicated its intention to ensure that every school has access to a wide choice of diverse, high quality communication services which will benefit all learners and local communities. It is important that the National Department of Education recognizes that, regardless of the amount of technology and its sophistication, technology will not be used unless educators have the skills, knowledge and attitudes necessary to infuse it into the curriculum. The study focused on educator preparedness to integrate Information and Communications Technology (ICT) into the curriculum. The findings of the study suggest that educators have positive attitudes towards ICT integration in education. One strong predictor of educators' attitudes towards ICT integration was computer attributes followed closely by cultural perceptions and, to a limited extent, by computer competence. Educator attitudes were also predicted by constructs extracted from the different Information Systems (IS) model/theories for technology adoption. The strongest construct to predict educators' attitudes toward ICT integration was extrinsic motivation followed by perceived usefulness, complexity, perceived behavioural control and relative advantage. The results point to the importance of educators' vision of technology itself, their experiences with it, their perceived computer competence, and the cultural conditions that surround its introduction into schools in shaping their attitudes towards technology and its subsequent diffusion into their educational practice. A combination of the different constructs from the IS models/theories was able to account for as much as 83% of the variance in educator attitudes toward technology and thus technology adoption. This is a significant result since most previous research has only been able to account for between 17% and 69% (Venkatesh et a!., 2003) of the variance in user intentions to use technology. These constructs (the strong predictors) were grouped to form a new model which is proposed for predicting educator technology adoption. Further, Perceptual Control Theory was used as a framework for understanding educator adoption of technology. This framework considers educators' use of technology by examining the goals of educators and how the use of technology might help or hinder their goals. Educator lack of computer competence is a major challenge for the KwaZulu-Natal Department of Education, and an immediate plan of action is required that will address this through educator professional development.Item A systems thinking approach to the planning of rural telecommunications infrastructure.(2001) Andrew, Theophilus Nethiekreethum.; Petkov, Doncho.The research reported in this thesis is concerned with the provision of telecommunications infrastructure to rural areas in developing countries. The primary focus is to improve the current practice in the planning of such infrastructure. An in depth analysis of the critical issues that characterise rural telecommunications in developing countries revealed that the rural telecommunications system is not just a technological system but a complex system of people and technology interdependent on other systems/subsystems. A systems approach lead to a conceptual model of The Rural Telecommunications System as an open complex sociotechnical system. Consequently the planning of rural telecommunications infrastructure requires an approach that addresses such complexity. Critical systems thinking was chosen as the overall systems thinking approach for the development of a systemic planning framework for rural telecommunications infrastructure, that accommodates the system of problems inherent in the complex sociotechnical rural telecommunications system. The framework was built on the principles of Multimethodology and consists of Interactive Planning as a general orientation, mixed with Interpretive Structural Modelling and Critical Systems Heuristics. The framework is enhanced by the inclusion of current techniques from Systems Engineering practice, and softer techniques such as rich pictures. A case study based on the Mapumulo rural area in KwaZulu Natal was used for the practical validation of the framework.Item The use of information and communication technologies in South African hotels : a self-evaluation by hotel managers.(2011) Mndzebele, Nomsa Margareth.; Maharaj, Manoj Sewak.; McArthur, Brian Walter.It is fair to assume that the level of participation in a world economy depends on the capacity of business organisations to use technology efficiently. Conducting business in the world today is driven by information technology. Internet technology has changed various business activities and transactions. In the Internet age, the development of electronic commerce (EC) is considered a major indicator of the overall competitiveness of organisations. An EC marketing channel can bring customers more benefits such as greater shopping convenience and potentially lower prices. Today, most hotels have been forced by the market to consider adopting EC to carry out business processes more efficiently. Hence, the purpose of the study is to determine the determinants of EC adoption by hotels in South Africa. This study is based on Tornatzky and Fleicher’s (1990) technological, organizational and environmental (TOE) model that includes technological context, organisational context and environmental context. The TOE model has been widely used to examine the factors that influence organisational technology adoption. The research model looked at eight determinants, which are (1) relative advantage, (2) compatibility, (3) complexity, (4) organisational size, (5) technology knowledge, (6) managers’ attitudes towards EC, (7) information intensity and (8) competition. A quantitative research design was used and a questionnaire was used to collect data and answer the research questions in the study. Four hundred hotels were randomly selected from the three groups of hotels suggested by the South African Tourism office, i.e. (1) Tourism Grading council hotel listing, (2) Tshwane accommodation listing and (3) AA travel accommodation. A total of 332 questionnaires were collected for data analysis, which represents a 94.9% response rate. Descriptive statistics, correlational statistics, one way analysis of variance, (ANOVA), regression analysis, cross tabulation tests and multivariate analyses of variance (MANOVA) were used to analyse the data. The results indicated that all three contexts (TOE) were important in the decision of EC adoption by the hotels in South Africa. The findings indicated that not all the determinants used had a statistically significant relationship with the extent of EC adoption in the hotel industry. The researcher also found out that hotels were more concerned about the benefits of EC than the organisational ability to adopt EC, the hotels that had sufficient resources were more willing to adopt EC. The findings also indicated that managers’ attitude towards EC adoption is influential on the extent of EC adoption. Finally, findings indicated that there is a lot of pressure from suppliers and customers for the hotels to use EC. Even though the mangers that filled in the questionnaire were computer literate, technology knowledge of EC would help managers to realise which systems are most appropriate.Item The suitability of wireless technologies for implementing an ebusiness infrastructure in Kenyan Micro and Small Enterprises.(2010) Wamuyu, Patrick Kanyi.; Maharaj, Manoj Sewak.This thesis interrogates the suitability of wireless technologies to implement an eBusiness infrastructure in Micro and Small Enterprises (MSEs) in developing countries, particularly in Kenya. A research model was developed based on literature and information obtained from a pilot study. The proposed model extended Task-Technology Fit with two core constructs from the Unified Theory of Acceptance and Use of Technology. A preliminary study was conducted to refine the proposed model and inclusion of any variables limiting the suitability of wireless technologies as MSEs’ eBusiness infrastructure. The proposed model was empirically tested using data collected using a survey questionnaire and five descriptive case studies on MSEs in Kenya. A proportionate stratified random sampling method within well defined geographic clusters was used to collect data from 570 MSEs. The constructs were assessed for reliability, validity and exploratory factor analysis using SPSS and validated via a confirmatory factor analysis using Structural Equation Modeling with AMOS maximum likelihood method. Most Kenyans live in rural areas of the country with no access to mainstream technologies and a considerable digital divide exists, particularly between the urban and rural areas. This necessitated an intra-country comparison of access and use of wireless technologies in rural and urban MSEs in implementing an eBusiness infrastructure. The results of the intracountry comparisons indicate that while there are indisputable similarities in usage and perception of barriers and benefits of using wireless technologies to implement eBusiness infrastructure between the rural areas and urban centers in Kenya, there are also considerable differences. The relationships among the research model constructs were different depending on whether the sample was rural or urban. However, the differences between rural and urban MSEs’ ratings of the proposed research model constructs were not statistically significant. The study finds that there are evident positive performance impacts on MSEs that use wireless technologies for their eBusiness infrastructure and that the research model fit well with the data collected. The results also indicate that Task-Technology Fit and Usage directly and significantly affect organizational performance while Performance Expectance, Social Influence and Task-Technology Fit were significant determinants of Usage. Among the three proposed barriers of Security Risks, Affordability and Performance Risks, only Performance Risks had a significant negative effect on Usage. Finally, the study’s results, theoretical, managerial and policy implications are discussed and recommendations for future research given.Item Do Web 2.0 social media impact transnational social advocacy? : a study of South African civil society and Greenpeace.(2012) Pillay, Kirubagaran Jagathesan.; Maharaj, Manoj Sewak.This study focuses on how civil society organisations deploy Web 2.0 technologies for transnational social advocacy, the context of this technology use, and the effect of this adoption in achieving organisational goals. It analyses the effectiveness of these technologies in an attempt to understand the strategic intent in deploying these social media services. The reciprocal impact of this technology adoption on civil society organisations’ roles, structure, and orientation was also investigated. The technologies targeted for study are those commonly described as Web 2.0 social media including social networking sites, blogs, podcasts and wikis amongst others. While the literature points to many studies relating to the use of the Internet for advocacy it also suggests that emerging technologies have not been studied in any detail. In particular there are no recent studies that investigate Web 2.0 technologies. These studies have the potential to provide new perspectives to current theoretical frameworks. This study is designed as part case study and part exploratory. The research adopts an interdisciplinary approach using both qualitative and quantitative methods. A survey of South African civil society organisations painted a picture of the extent of adoption of Web 2.0 social services across South African civil society, and detailed the reasons, and the benefits - both perceived and actual - of such adoption. The global environmental justice organisation, Greenpeace is used as a case study. The organisation’s major goal is to advocate for changes in environmental policy and behaviour, has been at the forefront of environmental issues since its inception, and has used the mass media as an effective campaigning tool. The key findings that emerged in the South African context was that of a sector that has a low-level of knowledge of social media services and an accompanying low level of adoption. This is partly explained by factors at a national level including macro-economic policies, and a low level of Internet penetration and ICT readiness. Using Greenpeace as a case study revealed that while social media-led activism is increasingly being seen as strategic, there is a level of organisational introspection that is required to precisely determine how traditional CSOs can exploit social media while maintaining their core values and traditions. Social media is not a panacea for the issues confronting activism in an increasingly connected world, but rather is seen as complementing traditional advocacy with its ability to coordinate, synchronise and document campaigns.Item Vulnerability assessment of modern ICT infrastructure from an information warfare perspective.(2011) Van Niekerk, Brett.; Maharaj, Manoj Sewak.The overall objective of the study is to provide a vulnerability assessment of the mobile communications infrastructure to information warfare attacks; this study has a South African focus. The mobile infrastructure was selected as the infrastructure and mobile devices incorporate the majority of modern ICT technologies, namely social networking, wireless connectivity and mobility, mass storage, as well as the telecommunications elements. The objectives of the study are to: Propose a new information warfare model, and from this deduce a vulnerability assessment framework from the specific information warfare perspective. These are the guiding frameworks and model for the study. Gather information regarding threats and vulnerabilities, with particular focus on potential use in information warfare and relevance to South Africa. Establish the criticality of the mobile infrastructure in South Africa. Use the gathered information in the vulnerability assessment, to assess the vulnerability of the mobile infrastructure and related devices and services. The model and framework are generated through desk-based research. The information is gathered from research protocols that are relevant to both research and risk and vulnerability assessment, these include: expert input through interviews and a research workshop, incident and trend analyses through news and vendor reports and academic publishing, computer simulation, questionnaire survey, and mathematical analyses. The information is then triangulated by using it in the vulnerability assessment. The primary and secondary data shows that attacks on confidentiality are the most prevalent for both computer-based networks and the mobile infrastructure. An increase in threats and incidents for both computer and mobile platforms is being seen. The information security trends in South Africa indicate that the existing security concerns are likely to worsen, in particular the high infection rates. The research indicates that the mobile infrastructure is critical in South Africa. The study validates the proposed framework, which indicates that South Africa is vulnerable to an information warfare attack in general. Key aspects of vulnerability in the mobile infrastructure are highlighted; the apparent high load of the mobile infrastructure in South Africa can be seen as a high risk vulnerability. Suggestions to mitigate vulnerabilities and threats are provided.Item Maximising return on investment in IT training : a South African perspective.(2012) Denny, Peter.; Maharaj, Manoj Sewak.This thesis explores the impact of teacher student cultural congruence, specifically in respect of race, home language and gender, on cognitive learning in the information systems and technology discipline. The study is conducted in the South African context and investigates the cultural factors that impact and predict information systems and technology students’ academic achievement. The research aims to contribute significantly to closing the culture-based academic performance gaps, and to improving the returns on investment that technology education and skills development stakeholders in South Africa are able to realise. A thorough review is undertaken of international studies that explore culture and teacher student congruence as significant factors in cognitive learning. Culture-based performance gaps are explored and the theories presented by international researchers to explain these gaps are considered. A review of the results of these international studies shows that different ethnic, language and gender groups perform differently on cognitive testing, suggesting that these groupings do indeed learn differently and that certain pedagogical strategies may favour some groups over others. This appears to be true across various age groups and across various subjects. Teacher student congruence as a predictor of performance is considered in detail in terms of learning style, home language, gender and ethnicity. International findings are reviewed which suggest significant relationships between teacher student cultural consonance and cognitive learning performance, as well as the role of teacher and student perceptions and racial identity as factors influencing the student learning experience and academic performance. The unique South African context for this research is discussed, including the history of inequality in education, the unusually diverse cultural landscape, the culture-based academic performance gap and the factors that account for this. The research conducted as part of this study investigates culture-based academic performance disparities and the impact on cognitive learning of matching teachers and students in terms of race, home language and gender among first year Information Systems and Technology students at a public university in South Africa. In addition, culture-based differences in student perceptions of collective self-efficacy in respect of teacher effectiveness are considered, as well as the relationship between these perceptions and student academic performance. The study finds that cultural factors are significant predictors of cognitive test performance and that matching teacher and student in respect of cultural factors significantly improves student cognitive test performance in information systems and technology education and training. The study further finds that both student and teacher perceptions of collective teaching self-efficacy vary among cultural groupings and are significantly related to higher student test scores for students who are matched with their teachers in terms of cultural factors. The findings are considered in the light of Bandura’s Social Cognitive Theory and Phillips’ five level framework for return on investment in training analysis.Item Targeted sanctions as a new political discourse in Zimbabwe: a transition or obstacle to democracy from 2000-2013.(2016) Kanyongo, Dzikamai Edwin.; Ndlovu, Joram.The main aim of the research was to critically analyse the potential impact of targeted sanctions in promoting or impeding democracy in Zimbabwe. The research was centred around the conflicting views on the use of targeted sanctions as a tool in coercing and dissuading the target governments pursuing retrogressive policies deemed undemocratic. The use of targeted sanctions is a fairly new discourse in international relations and the efficacy of which is highly debatable. Due to the failure to recognise and promote human rights and its covenants on economic, social and cultural rights, Zimbabwe has been under targeted sanctions for over a decade. Disputed elections, the chaotic land reform program, and poor monetary policies compounded the problem. To understand democracy and sanctions, two theories were used, namely; the substantive approach to the theory of democracy and the institutional theory of sanctions. In order to achieve the objectives of the study, a triangulation was used where both qualitative and quantitative research designs were used. In depth interviews were conducted with key informants who were conveniently selected. Questionnaires were self-administered in order to achieve a high return rate. The researcher made use of thematic data analysis by examining themes and patterns emerging from the data. Furthermore, secondary data in the form of historical statistical data, journals, newspaper articles and government reports were used to complement the study. In total 85 usable questionnaires were returned, and eight interviews were successfully conducted. The empirical evidence shows that generally, there is a negative perception with regards to controversial laws passed by the government in 2002 and 2004 respectively. Interviewees differed in their perceptions with regards to ZANU PF’s repressive laws. However, there was consensus on the partial success of sanctions in aiding democracy in Zimbabwe. Suggestions are that, sanctions fuelled the party’s quest for power and domination which had a negative domino effect on the economy and ultimately on the ordinary people. Ironically, the Government of National Unity formed in 2009 assisted in reversing some of the stringent policies, measures and laws passed by the Government in response to the sanctions. The study concludes that the use of sanctions as a protest action on undemocratic regimes should consider the country’s socio-political factors. Considering the above issues, for the country to be re-integrated into the international community, there is need to mend its diplomatic course for the sake of its citizens and transition to a more viable democratic system. This would aid in forging an appropriate sanction package without harming ordinary citizens both economically and socially.Item The role of information and communications technology in improving food security in KwaZulu-Natal.(2015) Jere, Ntabeni.; Maharaj, Manoj Sewak.This thesis explored the role of Information and Communications Technology in improving food security. The study was conducted in the South African context and is based on KwaZulu-Natal Province. It investigated the factors that impacted and contributed towards the adoption and diffusion of Information and Communications Technology amongst smallholder farmers. The study aimed to contribute to reducing food insecurity in South Africa using Information and Communications Technology. The outcome of this study highlighted important factors that need to be taken into account when considering ICT’s influence in food security. This exploratory research study took an interdisciplinary approach combining the disciplines of Information Systems and Agriculture and making use of quantitative methods of analysis. Data from a sample of 533 smallholder farmers and 41 agricultural extension officers from the four local municipalities in the district municipality of iLembe were collected using a questionnaire. This study makes use of the five main constructs from Rogers Diffusion of Innovation (DOI) theory, Hofstede’s cultural dimensions theory and the technology acceptance model (TAM) to develop a model to better understand the role of ICTs in food security in KwaZulu-Natal. The key findings that emerged in the South African context were that ICT’s play an important role in reducing food insecurity. The study also puts forward the proposition that ICT adoption in food security is associated with culture, perceived usefulness and perceived ease of use of the ICT innovation. However, there were no associations found with the constructs, attributes of innovation and nature of the social system. The growing population of people living in extreme hunger worldwide has become a matter of global concern. The World Bank highlights the importance of smallholder farming in increasing the productivity levels in the agricultural sector that in turn has the potential to stimulate economic growth in other sectors of a the economy of a country. It is in attempts to stimulate increased productivity of smallholder farmers and hence reducing food insecurity that ICT’s are being incorporated in farming practices. It is this gap in literature that this research makes a contribution. While the literature points to many studies relating to ICT adoption and diffusion, the role of ICT’s in food security has not been studied in detail. Furthermore, there have not been any studies that looked at the relationship between smallholder farmers and extension officers in relation to ICT’s. A further gap in the literature highlighted there were no recent studies that investigated specific ICT’s such as GIS and Knowledge Management Systems and their role on food security. This study made the following unique contribution to the existing body of knowledge: vi The identification of constructs that influence ICT adoption in food security amongst smallholder farmers in KwaZulu-Natal The identification of the determinants of ICT’s in food security in KwaZulu-Natal The study provides empirical evidence regarding ICT influence on Food Security The development of a proposed theoretical model for understanding diffusion and adoption of ICT’s and its role on food securityItem Potential adoption of mobile health technologies for public healthcare in Burundi.(2016) Ndayizigamiye, Patrick.; Maharaj, Manoj Sewak.Mobile health (or mHealth) describes the utilisation of wireless mobile communications devices in public and private healthcare. These include, but are not limited to, mobile telephones, personal digital assistants, and patient monitoring devices. Although the outcomes of mHealth interventions in developing countries have generally been assessed as positive, there is a need for designing mHealth interventions that are specifically tailored to the context of individual countries. It is in this context that this research investigates the potential adoption of mHealth technologies to provide healthcare services in Burundi from the institutional level point of view (Burundi’s Ministry of Health and Fight Against AIDS (MoH&A) and the Ministry of Communication (MoC)), users point of view (primary healthcare professionals) and mobile technology point of view (mobile technology providers). Using three theoretical frameworks i.e. the Capabilities Approach (CA) model, the Diffusion of Innovation (DOI) theory and the Unified Theory of Acceptance and Use of Technology (UTAUT), this research firstly identifies the determinants and impediments to mHealth adoption in Burundi. It further describes how mHealth could be used to address the current challenges that the Burundi’s Ministry of Health faces in terms of providing public healthcare services. It further proposes a framework for the adoption of mHealth in Burundi. At the institutional level and mobile technology point of view, semi-structured interviews were held with civil servants from the two Ministries and with mobile technology services providers. At the users’ level, a survey was conducted with primary healthcare professionals from 47 primary healthcare centres. Findings reveal that mHealth adoption can contribute to disease prevention, disease management and the provision of quality healthcare in Burundi. Although there is limited knowledge of mHealth capabilities within the Burundi’s public healthcare sector, there is a general willingness towards the adoption of mHealth notwithstanding challenges associated with its adoption. Although DOI construct-related factors such as relative advantage, compatibility, trialability and observability significantly influence the adoption of mHealth in Burundi, complexity does not. In addition, performance expectancy, effort expectancy and facilitating conditions are UTAUT constructs that significantly influence the adoption of mHealth adoption. The research advocates for an integrated and collaborative approach to addressthe impediments to mHealth adoption in Burundi.Item Computer-based productivity estimation of academic staff using the fuzzy analytic hierarchy process and fuzzy topsis method.(2014) Parbanath, Steven.; Maharaj, Manoj Sewak.Universities generally use a human-intensive approach such as peer evaluations, expert judgments, group interviews or a weighting system to estimate academic productivity. This study develops an algorithmic approach by integrating the fuzzy Multi-Criteria Decision Making (MCDM) and the fuzzy TOPSIS methods to estimate productivity of academic staff at tertiary institutions. Currently, evaluations are done in the conventional manner and as a result, the outputs are difficult to quantify. There are no standard methods in evaluating the outputs and the estimates are therefore hard to validate. It is therefore suggested that a data intensive approach (also referred to as algorithmic approach) be adopted. An algorithmic approach is empirical and will produce results that are easily quantifiable. The algorithmic approach allows for the IS Principles of data collection, processing, analysis and interpretation to be easily applied. If an algorithmic approach were adopted, it would generally revolve around the numeric-value approach, which produces a precise measure of productivity. Recently however, the software engineering domain had to also consider non-numeric attributes (also referred to as linguistic expressions) such as very low, low, high and very high for productivity estimation (Odeyale et al., 2014). The imprecise nature of these attributes constitutes uncertainty in their interpretation and therefore could not be measured or quantified appropriately in the past. It is now possible to do so using fuzzy logic and fuzzy sets. Since academic departments are constantly faced with imprecision and uncertainty, an algorithmic fuzzy-based decision model is the most suitable approach that can be used to estimate productivity. The nature of duties performed by academic staff lends itself more efficiently to a qualitative rather than a quantitative evaluation (Chaudhari et al., 2012). These qualitative evaluations are reliant on human judgment and could be described using linguistic expressions such as weak, average, good and excellent (Khan et al., 2011). In this study, a fuzzy MCDM method called Fuzzy Analytic Hierarchy Process (FAHP) is used to estimate productivity of academic staff. Choosing the most preferred alternative, ranking and selection will be done using the fuzzy TOPSIS method. The Design Science Research Methodology (DSRM) was used to develop a fuzzy-based productivity estimation system using these two methods. The results of the study indicated that the fuzzy-based system produced results that were more reliable than conventional methods. Future research should however explore how fuzzy logic and fuzzy set theory could be integrated into other productivity estimation techniques such as the DEA and SAW models.Item Business intelligence information systems success : a South African study.(2016) Mudzana, Taurayi.; Maharaj, Manoj Sewak.Business Intelligence (BI) systems hold promise for improving organisational decision making in South Africa. Additionally, BI systems have become increasingly important over the past few decades and are one of the top spending priority areas of most organisations. Yet till now, the factors influencing the success of BI systems in South Africa have not been fully investigated. The study found no scholarly research for managers and other practitioners to assess post implementation success of BI systems in South Africa. This lack of research may directly affect managers’ not knowing how best to implement BI systems and could thereby delay the successful implementation of BI systems in South African organisations. The study extends that of DeLone and McLean (2003), conducted in developed economies by applying it to a developing economy context, namely South Africa. The DeLone and McLean (2003) model has been widely utilised to study factors that influence information systems (IS) success. This study extends the DeLone and McLean (2003) by adding a user quality factor and suggests a theoretical model consisting of six factors, which are: (1) system quality, (2) service quality, (3) information quality, (4) user satisfaction, (5) individual impact, (6) and user quality. The theoretical model was formulated from the literature review. It was then validated and enhanced through a qualitative study of three interviews with end users of BI systems based in South Africa. The theoretical model was then presented to a panel of experts for verification. A questionnaire survey method was employed as the main method to collect data and to answer the main research question. Statistical analysis methods and Structural Equation Modelling (SEM) with SPSS was used to analyse the data. The results of the hypotheses were mixed. Three suggested that relationships were statistically significant, while the other four did not. The study finds that information quality is significantly and positively related to user satisfaction in a BI system. The results also indicate that user quality is positively related to user satisfaction in a BI system and system quality is positively related to individual impact in a BI system. The results have both managerial and research implications. The results of this study will add value to IS and specifically BI literature. Organisations, which have adopted BI or are planning to adopt BI, can use the important variables of the study to undertake an internal check to find out how they compare in terms of these variables. The unique contribution of this study is the identification of post implementation success factors of BI systems in a South African context. The factors identified also served in providing a set of management guidelines for the BI environment in South Africa.Item Three-dimensional security framework for BYOD enabled banking institutions in Nigeria.(2019) Ofusori, Lizzy Oluwatoyin.; Subramaniam, Prabhakar Rontala.Bring your own device (BYOD) has become a trend in the present day, giving employees the freedom to bring personal mobile devices to access corporate networks. In Nigeria, most banking institutions are increasingly allowing their employees the flexibility to utilize mobile devices for work-related activities. However, as they do so, the risk of corporate data being exposed to threats increases. Hence, the study considered developing a security framework for mitigating BYOD security challenges. The study was guided by organizational, socio-technical and mobility theories in developing a conceptual framework. The study was conducted in two phases, the threat identification and the framework evaluation, using a mixed-methods approach. The main research strategies used for the threat identification were a questionnaire and interviews while closed and open-ended questions were used for the framework evaluation. A sample consisted of 380 banking employees from four banks were involved in the study. In addition, the study conducted in-depth interviews with twelve management officials from the participating banks. As for the framework evaluation, the study sampled twelve respondents to assess the developed security framework for viability as far as mitigating security threats emanating from BYOD in the banking sector is concerned. The sample consisted of eight executive managers of the bank and four academic experts in information security. Quantitative data was analysed using SPSS version 21 while qualitative data was thematically analysed. Findings from the threat identification revealed that banking institutions must develop security systems that not only identify threats associated with technical, social and mobility domains but also provide adequate mitigation of the threats. For the framework evaluation, the findings revealed that the security framework is appropriate in mitigating BYOD security threats. Based on the findings of the study, the developed security framework will help banks in Nigeria to mitigate against BYOD security threats. Furthermore, this security framework will contribute towards the generation of new knowledge in the field of information security as far as BYODs are concerned. The study recommends ongoing training for banks’ employees as it relates to mitigation of security threats posed by mobile devices.Item Alleviating higher education challenges through strategic integration of technology: a case of selected universities in Africa.(2018) Abatan, Omotayo Kayode.; Maharaj, Manoj Sewak.The higher education sector in Africa is evolving and information technology continues to play a key role in driving these changes. Information and communications technologies are improving the creation and transmission of knowledge. This is attributed to the way people learn and create ideas as well as disseminate information within the educational environment and in the public sphere. In this study, an exploratory research was conducted to identify and understand the challenges and opportunities associated with information technology integration in higher education. A survey of 592 staff at the University of Lagos, Nigeria, the University of KwaZulu-Natal, South Africa and University of South Africa was undertaken to address the research problem. The study makes use of a blend of theoretical frameworks to provide the foundation for identifying, proposing, planning and suggesting information technology strategies that can be integrated into higher education to alleviate higher education challenges in order to enhance teaching and learning outcomes. The three models used are: The Change Management Model; Model of Technology Adoption in the Classroom; and the Diffusion of Innovation Theory. The study evaluates the role of ICTs in higher education and also identified issues, challenges and instances of ICT strategic integration in higher education institutions at the selected universities in Africa. In the process of understanding the strategic integration of information technology in higher education institutions at the selected universities, the study identified what was considered successful technology integration strategies, what were not as successful, and why this was the case. The study further identified the factors that influence information technology integration in higher education. Having identified the limitations to technology integration and the significance of information technology in higher education at the selected universities, the study proffered recommendations and proposed a strategic framework. The framework offers strategies for the integration of information technology into higher education which can be used to alleviate higher education challenges, enhance teaching and learning outcomes, sustain the integrated information technologies and achieve ICTs promised benefits to higher education.Item Assessing the cyber-security status of the metropolitan municipalities in South Africa.(2018) Mabaso, Nkosiyephana Jerome.; Maharaj, Manoj Sewak.The intention of this enquiry was to assess the status of cyber-security in the metropolitan municipalities in South Africa. The focus on this level of local government was driven by the fact that metropolitan municipalities are the economic hubs with a variety of industrial facilities and are the places with high population densities. The metropolitan municipalities have adopted information infrastructures to support the daily administrative processes and, equally important, to support the delivery of essential services such as the distribution of electricity and clean water to the local citizens and communities. Entrenched in the adoption of information infrastructures are the cyber ills which if left unattended could have devastating consequences on people and industrial facilities. Failures or interruptions to information infrastructures have cascading effects due to interconnectedness of these infrastructures. The study used the Constructivist Grounded Theory Methodology to explore the activities that are performed by the metropolitan municipalities with the intention to determine what needs to be in place to safeguard their information infrastructures from cyber ills. Cyber-security is a serious concern in all types of businesses that are largely supported by information infrastructures in pursuit of the business objectives. Information infrastructures are susceptible to cyber-security threats, which if left unattended can shut the municipality operations down with disastrous consequences. A substantive theory of integrated development cyber-security emerged from the Constructivist Grounded Theory Methodology processes of data collecting through comprehensive interviews, initial coding, focused coding, memoing, and theoretical coding. A municipal cyber-security conceptual framework was developed from the integrated development cyber-security theory constructs of integrated development cyber-security which are the core category, cyber-security governance category, cyber-security technical operations category, and human issues in cyber-security category. The conceptual framework was used to formulate the cyber-security status assessment survey questionnaire that was adopted as an instrument to assess the cyber-security status in the metropolitan municipalities. The cyber-security status assessment instrument was deployed in metropolitan municipalities, wherein data was collected and statistically analysed to test and confirm its validity. The assessment results were analysed and showed the as is posture of cyber-security, the gaps in the current implemented cyber-security controls were identified together with the risks associated with those gaps, corrective actions to address the identified deficiencies were identified and recommended/communicated to the management of relevant municipalities.Item An analysis of the role of competitive intelligence (knowledge management and business intelligence) in globalisation of Saudi Arabia ICT firms.(2019) Alarjani, Hasan Mesfer Falah.; Maharaj, Manoj Sewak.This study explored the role of technological, organisational, environmental and attitudinal factors in facilitating the globalisation of Saudi Arabian ICT companies. In particular, the study focused on identifying the drivers of globalisation, especially knowledge management and business intelligence, and steps Saudi ICT companies should take before expanding their businesses outside of Saudi Arabia. A mixed-methods approach was adopted. A total of 81 ICT companies registered with the Communication and Information Technology Commission (CITC) in Saudi Arabia participated in this study, including the three largest ICT operators in Saudi Arabia, namely STC, Mobily, and Zain. Publicly available data from the Saudi stock exchange and other sources were analysed in respect of the three large ICT companies. The CITC organisations were surveyed via questionnaires. A quantitative analysis of the survey data viewed through the lens of the Technology, Organisation, Environment (TOE) framework and the Knowledge, Attitude and Practices (KAP) model was undertaken, while a qualitative analysis of the documentary data from the three large companies was viewed through the TOE lens only. It was identified that the efficiency of software used in organisations helps them to globalise at any time and that competitive intelligence tools (KM and BI) are also very important. The organisational context is important; large ICT companies can globalise their activities while smaller companies have difficulties in doing so even though they recognise the potential economic benefits of regionalisation and globalisation. Regarding the environmental context, a country’s legislation helps and supports companies to globalise their activities. This is clearly noticeable in the three telecommunications operators, which have no obstacles to prevent them from operating in any country in the world. Finally, ICT and the attendant networked applications have accelerated the integration of the world’s economy through the globalisation of businesses. These effects are also felt by Saudi ICT companies, which are reconsidering their roles as regional economic players.Item Enhancing access to socioeconomic development information using mobile phone applications in rural Zimbabwe: the case of Matabeleland South Province.(2018) Maphosa, Vusumuzi.; Maharaj, Manoj Sewak.Mobile phone access has grown exponentially, transforming access to information and communication in Africa. Mobile phone penetration has increased dramatically across the urban-rural, rich-poor and literate-illiterate divides, which other technologies failed to bridge. The number of mobile phone subscriptions grew astronomically, from less than two million in 1998 to more than 620 million subscribers in Africa (Carmody, 2012). Internet users grew 85-fold from 4.5m users in 2000 to over 388m users in Africa at a rate higher than any other region (Internetworldstas, 2018). Global mobile app downloads have reached 175 billion in 2017, generating more than $85 billion, yet most African countries possess an insignificant share of this, due to low literacy levels, low economic opportunities and an infrastructure that is still developing (The Guardian, 2014; Perez, 2018). The growing presence of mobile phones must be harnessed to enhance access to socioeconomic information, in order to improve standards of life in the global south. Scholars and communication enthusiasts have argued that simply providing access to the internet, without considering the relevance of content, will not change the fortunes of rural communities (Internet.org, 2014; GSMA, 2015). There is the need to provide localised and relevant content – such as local news, market prices and bus timetables – to these communities. This research resonates with Goal 9 of the Sustainable Development Goals, which seeks to increase access to information and communication technology, and provide universal and affordable access to the internet in least developed countries by 2020 (UN, 2016). In Zimbabwe, radio and television are basic technologies used for disseminating socioeconomic information, yet most of the rural communities have no access to radio and television signals, 37 years after independence. Rural mobile phone ownership is about 80%, and broadband penetration is 46.5% (ITU, 2013). In addition, Zimbabwe’s average rural literacy is about 90%. These two factors – high rural literacy levels and high rural mobile phone ownership – motivated the researcher to develop a mobile phone application prototype that could be utilised by rural communities to enhance their access to socioeconomic development information that could, in turn, anchor sustainable development. The mobile phone application prototype has the potential to provide a new platform for accessing socioeconomic development information in the rural areas of Zimbabwe, including information on agriculture, health, community activities, education and the markets, plus local and national news. These can all promote sustainable development. The study followed a seven-cycle design science research methodology, from problem identification to communicating the utility of the aertefact which guided the development of the mobile phone application (Hevner, 2007). The development of the prototype followed a user-centred design, as well user experience, where high-fidelity prototypes were presented to participants selected through a random sample to be part of the development process. This process is iterative, incorporating user feedback and redesign of the prototype until the users and developers agree on the design. After designing the prototype, participants were randomly selected to evaluate the mobile phone application prototype using an adapted TAM2, whose main constructs relate to perceived usefulness and ease of use (Davis, 1989).Item Bridging the training needs of cybersecurity professionals in Mauritius through the use of smart learning environments.(2020) Sungkur, Roopesh Kevin.; Maharaj, Manoj Sewak.Teaching and Learning confined to within the four walls of a classroom or even online Learning through Massive Online Courses (MOOCs) and other Learning Content Management Systems (LCMS) are no longer seen as the optimal approach for competency and skills development, especially for working professionals. Each of these busy learners have their own training needs and prior knowledge. Adopting the one-size-fits-all teaching approach is definitely not effective, motivating and encouraging. This is why this research presents the use of SMART Learning Environment that makes use of Intelligent Techniques to personalise the learning materials for each learner. It has been observed that on one hand the country is not able to provide the required number of IT professionals with the desired skills and on the other hand, the number of unemployed graduates in areas other than IT is increasing. This mismatch in skills is becoming a pressing issue and is having a direct impact on the ICT Sector, which is one of the pillars of the Mauritian Economy. An in-depth Literature Review was carried out to understand the training needs of these Cybersecurity professionals and also to understand the different Intelligent Techniques that can be used to provide personalisation of learning materials. Data was collected during three phases, namely an Expert Reference Group Discussion, a pre-test questionnaire and a survey questionnaire. The Expert Reference Group Discussion was carried out to further shed light on the research question set and to further understand the training needs and expectations of Cybersecurity professionals in Mauritius. A SMART Learning Environment making use of Artificial Neural Networks and Backpropagation Algorithm to personalise learning materials was eventually designed and implemented. Design Science Research Methodology (DSRM), Activity Theory, Bloom’s Taxonomy and the Technology Acceptance Model were used in this study. Due to the inherent limitations of the models mentioned, the researcher also proposed and evaluated an emergent conceptual model, called the SMART Learning model. The major findings of this research show that personalisation of learning materials through the use of a SMART Learning Environment can be used to effectively address the training needs of Cybersecurity professionals in Mauritius.