85 research outputs found

    An assessment of risk associated with digitalisation in the South African construction industry

    Get PDF
    Abstract: In recent years, globalisation, international trade and industry competition have become a part of the construction industry’s operative. In this regard, time and space are progressively diminishing as obstacles to deliver customised and best services to clients at constrained budgets and time frames. All these deliverables call for an innovative approach in conducting business with effective communication being a key to its success. It is for this reason that digital methods and processes are slowly becoming a requirement for any construction company in South Africa to keep abreast with competitors in the same market. Digitalisation is the term used to describe the optimisation of information that has been digitised to improve business operations. Companies around the globe are considering this digital transition in order improve bottom line figures. However, the introduction of digital methods that threaten processes that have been working for years is perceived as a risk. Previous research studies outline a wide range of benefits related to the implementation of digital technology in the construction industry; however, studies do not highlight the inherent critical risk factors. This reveals an information deficit, which this study sought to fill. This study therefore assessed risks that are related to digitalisation uptake in the South African construction industry. In pursuit of this, a quantitative approach was adopted with questionnaires used as the instrument for data collection from construction professionals in the Gauteng Province...M.Tech. (Quantity Surveying

    A descriptive review and classification of organizational information security awareness research

    Get PDF
    Information security awareness (ISA) is a vital component of information security in organizations. The purpose of this research is to descriptively review and classify the current body of knowledge on ISA. A sample of 59 peer-reviewed academic journal articles, which were published over the last decade from 2008 to 2018, were analyzed. Articles were classified using coding techniques from the grounded theory literature-review method. The results show that ISA research is evolving with behavioral research studies still being explored. Quantitative empirical research is the dominant methodology and the top three theories used are general deterrence theory, theory of planned behavior, and protection motivation theory. Future research could focus on qualitative approaches to provide greater depth of ISA understanding

    An evaluation of information and communication technology application in South African construction industry

    Get PDF
    Abstract: The construction industry is evolving like other allied industries. New innovations are borne out of the quest to achieve more value for money, while also retaining a competitive edge in the international sphere. A comprehensive study on the application of information and communication technology (ICT) for construction work in South Africa, particularly the stages of construction work, is lacking. This study seeks to evalaute information and communication technology tools used for construction activities in the South Africa construction industry. The research evaluates the level of awareness of construction professionals as to the use of new ICT tools in the fourth industrial revolution era. It also discusses the ICT tools used at the planning stage of construction, the design and the construction stage. It employed the Professional Client/Consultants Service Agreement Committee (PROCSA) template but limited it to stage 0 to 5. It also discusses the challenges, drivers and benefits of using ICT tools for construction activities in South Africa. The primary data was collected through a questionnaire which was distributed online via Questionpro platform to South African construction professionals in Gauteng Province only. One hundred and fifty (150) questionnaires were distributed. One hundred and twenty (120) of the responses were valid and used for the analysis. This accounted for eighty per cent (80%) of the total survey. In ensuring the reliability of the research questionnaire, Cronbach's alpha coefficient reliability was conducted on the scaled research questions. Compare mean was used to address the level of awareness of ICT tools and ICT tools used at the planning, design, and construction stages. Factor analysis was used to analyze the factors which serve as challenges to, drivers of, and benefits of the effective use of ICT tools. The study revealed that professionals have different awareness levels of ICT tools. They are more aware of ICT tools that are the core of their professional duties. At the planning stage of construction work in South Africa, all professionals use design/estimation and simulation-based tool most. In the design stage, the most frequently used tools are the computer-based tools and the design/estimation-based tools which are used by engineers, architects, and construction project managers. At the construction stage, computer-based tools and administrative tools are the highest-ranked tools. The exploratory factor analysis revealed that the challenges to the use of ICT in the South African construction industry are classified into people, cost, standardization, and management-related problems. The measures to ensure the effective use of ICT tools for construction processes in South Africa are also grouped into user-related factors, ICT knowledge and end-uses. The benefits from the effective use of ICT tools for construction...M.Tech. (Construction Management

    Broadband Power Line Communication in Railway Traction Lines: A Survey

    Get PDF
    Power line communication (PLC) is a technology that exploits existing electrical transmission and distribution networks as guiding structures for electromagnetic signal propagation. This facilitates low-rate data transmission for signaling and control operations. As the demand in terms of data rate has greatly increased in the last years, the attention paid to broadband PLC (BPLC) has also greatly increased. This concept also extended to railways as broadband traction power line communication (BTPLC), aiming to offer railway operators an alternative data network in areas where other technologies are lacking. However, BTPLC implementation faces challenges due to varying operating scenarios like urban, rural, and galleries. Hence, ensuring coverage and service continuity demands the suitable characterization of the communication channel. In this regard, the scientific literature, which is an indicator of the body of knowledge related to BTPLC systems, is definitely poor if compared to that addressed to BPLC systems installed on the electrical transmission and distribution network. The relative papers dealing with BTPLC systems and focusing on the characterization of the communication channel show some theoretical approaches and, rarely, measurements guidelines and experimental results. In addition, to the best of the author's knowledge, there are no surveys that comprehensively address these aspects. To compensate for this lack of information, a survey of the state of the art concerning BTPLC systems and the measurement methods that assist their installation, assessment, and maintenance is presented. The primary goal is to provide the interested readers with a thorough understanding of the matter and identify the current research gaps, in order to drive future research towards the most significant issues

    Conceptualising antecedents of systems innovation on information security risks

    Get PDF
    Abstract : This research represents a comprehensive conceptualisation of antecedents of systems innovation and how they affect systems innovation in an organisational context. It further examines the relationship between information security risks and systems innovation. Antecedents of systems innovation are identified based on the existing theories such as Diffusion of Innovation (DoI) and Organisational Innovation. This research makes use of new systems and technologies which include Big Data/Cloud Computing, Blockchain, Internet of Things (IoT), Virtual/Augmented reality and Artificial Intelligence (AI) to examine organisations strides towards systems innovation. This research is underpinned by the increase in systems innovation and the growing concerns of information security risks faced by organisations. A quantitative method of analysis was used to analyse data using statistical methods with a view to identify relationships between variables. Data collected shows that systems and technology must have increased benefits in order to be adopted and the complexity of systems does not affect the adoption of such systems and technologies. Individual characteristics were found to have no effect in systems innovation whereas organisational and environmental elements highly influence innovation in the organisation. A relationship could not be established between systems innovation and information security risks. This research highlights the importance of ensuring that new systems and technologies adds value to the organisation and equally important is to ensure management of organisational and environmental elements that affect systems innovation. Information security risks should also not be a deterrence for systems innovation.M.Com. (Business Management

    The Fourth Industrial Revolution and the Recolonisation of Africa

    Get PDF
    This book argues that the fourth industrial revolution, the process of accelerated automation of traditional manufacturing and industrial practices via digital technology, will serve to further marginalise Africa within the international community. In this book, the author argues that the looting of Africa that started with human capital and then natural resources, now continues unabated via data and digital resources looting. Developing on the notion of "Coloniality of Data", the fourth industrial revolutionis postulated as the final phase which will conclude Africa’s peregrination towards recolonisation. Global cartels, networks of coloniality, and tech multi-national corporations have turned Big Data into capital, which is left unguarded in Africa as the continent lacks the strong institutions necessary to regulate the mining of data. Written from a decolonial perspective, this book employs three analytical pillars of coloniality of power, knowledge and being. It concludes with an assessment of what could be done to help to turn the fourth industrial revolution from a curse into a resource. Highlighting the crippling continuation of asymmetrical global power relations, this book will be an important read for researchers of African studies, politics and international political economy

    Upgrading the Power Grid Functionalities with Broadband Power Line Communications: Basis, Applications, Current Trends and Challenges

    Get PDF
    This article reviews the basis and the main aspects of the recent evolution of Broadband Power Line Communications (BB-PLC or, more commonly, BPL) technologies. The article starts describing the organizations and alliances involved in the development and evolution of BPL systems, as well as the standardization institutions working on PLC technologies. Then, a short description of the technical foundation of the recent proposed technologies and a comparison of the main specifications are presented; the regulatory activities related to the limits of emissions and immunity are also addressed. Finally, some representative applications of BPL and some selected use cases enabled by these technologies are summarized, together with the main challenges to be faced.This work was financially supported in part by the Basque Government under the grants IT1426-22, PRE_2021_1_0006, and PRE_2021_1_0051, and by the Spanish Government under the grants PID2021-124706OB-I00 and RTI2018-099162-B-I00 (MCIU/AEI/FEDER, UE, funded by MCIN/AEI/10.13039/501100011033 and by “ERDF A way of making Europe”)

    A personality-based behavioural model: Susceptibility to phishing on social networking sites

    Get PDF
    The worldwide popularity of social networking sites (SNSs) and the technical features they offer users have created many opportunities for malicious individuals to exploit the behavioral tendencies of their users via social engineering tactics. The self-representation and social interactions on SNSs encourage users to reveal their personalities in a way which characterises their behaviour. Frequent engagement on SNSs may also reinforce the performance of certain activities, such as sharing and clicking on links, at a “habitual” level on these sites. Subsequently, this may also influence users to overlook phishing posts and messages on SNSs and thus not apply sufficient cognitive effort in their decision-making. As users do not expect phishing threats on these sites, they may become accustomed to behaving in this manner which may consequently put them at risk of such attacks. Using an online survey, primary data was collected from 215 final-year undergraduate students. Employing structural equation modelling techniques, the associations between the Big Five personality traits, habits and information processing were examined with the aim to identify users susceptible to phishing on SNSs. Moreover, other behavioural factors such as social norms, computer self-efficacy and perceived risk were examined in terms of their influence on phishing susceptibility. The results of the analysis revealed the following key findings: 1) users with the personality traits of extraversion, agreeableness and neuroticism are more likely to perform habitual behaviour, while conscientious users are least likely; 2) users who perform certain behaviours out of habit are directly susceptible to phishing attacks; 3) users who behave out of habit are likely to apply a heuristic mode of processing and are therefore more susceptible to phishing attacks on SNSs than those who apply systematic processing; 4) users with higher computer self-efficacy are less susceptible to phishing; and 5) users who are influenced by social norms are at greater risk of phishing. This study makes a contribution to scholarship and to practice, as it is the first empirical study to investigate, in one comprehensive model, the relationship between personality traits, habit and their effect on information processing which may influence susceptibility to phishing on SNSs. The findings of this study may assist organisations in the customisation of an individual anti-phishing training programme to target specific dispositional factors in vulnerable users. By using a similar instrument to the one used in this study, pre-assessments could determine and classify certain risk profiles that make users vulnerable to phishing attacks.Thesis (PhD) -- Faculty of Commerce, Information Systems, 202

    The Fourth Industrial Revolution and the Recolonisation of Africa

    Get PDF
    This book argues that the fourth industrial revolution, the process of accelerated automation of traditional manufacturing and industrial practices via digital technology, will serve to further marginalise Africa within the international community. In this book, the author argues that the looting of Africa that started with human capital and then natural resources, now continues unabated via data and digital resources looting. Developing on the notion of "Coloniality of Data", the fourth industrial revolutionis postulated as the final phase which will conclude Africa’s peregrination towards recolonisation. Global cartels, networks of coloniality, and tech multi-national corporations have turned Big Data into capital, which is left unguarded in Africa as the continent lacks the strong institutions necessary to regulate the mining of data. Written from a decolonial perspective, this book employs three analytical pillars of coloniality of power, knowledge and being. It concludes with an assessment of what could be done to help to turn the fourth industrial revolution from a curse into a resource. Highlighting the crippling continuation of asymmetrical global power relations, this book will be an important read for researchers of African studies, politics and international political economy

    Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education institutions: Implications for biomedical research.

    Get PDF
    >Magister Scientiae - MScHeadline reports on data breaches worldwide have resulted in heightened concerns about information security vulnerability. In Africa, South Africa is ranked among the top ‘at-risk’ countries with information security vulnerabilities and is the most the most cybercrime-targeted country. Globally, such cyber vulnerability incidents greatly affect the education sector, due, in part, to the fact that it holds more Personal Identifiable Information (PII) than other sectors. PII refers to (but is not limited to) ID numbers, financial account numbers, and biomedical research data. In response to rising threats, South Africa has implemented a regulation called the Protection of Personal Information Act (POPIA), similar to the European Union General Data Protection Regulation (GDPR), which seeks to mitigate cybercrime and information security vulnerabilities. The extent to which African institutions, especially in South Africa, have embraced and responded to these two information security regulations remains vague, making it a crucial matter for biomedical researchers. This study aimed to assess whether the participating universities have proper and reliable information security practices, measures and management in place and whether they fall in line with both national (POPIA) and international (GDPR) regulations. In order to achieve this aim, the study undertook a qualitative exploratory analysis of information security management across three universities in South Africa. A Technology, Organizational, and Environmental (TOE) model was employed to investigate factors that may influence effective information security measures. A Purposeful sampling method was employed to interview participants from each university. From the technological standpoint, Bring Your Own Device (BYOD) policy, whereby on average, a student owns and connects between three to four internet-enabled devices to the network, has created difficulties for IT teams, particularly in the areas of authentication, explosive growth in bandwidth, and access control to security university servers. In order to develop robust solutions to mitigate these concerns, and which are not perceived by users as overly prohibitive, executive management should acknowledge that security and privacy issues are a universal problem and not solely an IT problem and equip the IT teams with the necessary tools and mechanisms to allow them to overcome commonplace challenges. At an organisational level, information security awareness training of all users within the university setting was identified as a key factor in protecting the integrity, confidentiality, and availability of information in highly networked environments. Furthermore, the University’s information security mission must not simply be a link on a website, it should be constantly re-enforced by informing users during, and after, the awareness training. In terms of environmental factors, specifically the GDPR and POPIA legislations, one of the most practical and cost-effective ways universities can achieve data compliance requirements is to help staff (both teaching and non-teaching), students, and other employees understand the business value of all information. Users which are more aware of sensitivity of data, risks to the data, and their responsibilities when handling, storing, processing, and distributing data during their day to day activities will behave in a manner that would makes compliance easier at the institutional level. Results obtained in this study helped to elucidate the current status, issues, and challenges which universities are facing in the area of information security management and compliance, particularly in the South African context. Findings from this study point to organizational factors being the most critical when compared to the technological and environmental contexts examined. Furthermore, several proposed information security policies were developed with a view to assist biomedical practitioners within the institutional setting in protecting sensitive biomedical data
    corecore