8 research outputs found

    Research & innovation report 2018/19

    Get PDF
    Annual report highlighting the research and innovation undertaken by the Nelson Mandela Universit

    Research & innovation report 2018/19

    Get PDF
    Annual report highlighting the research and innovation undertaken by the Nelson Mandela Universit

    Bring Your Own Device (BYOD) adoption in South African SMEs

    Get PDF
    The advancement in technological development is now altering the conventional order in the diffusion of IT innovation from a top-down approach (organisation to employees) to a bottom-up approach (employees to organisation). This change is more notable in developed economies and has led to the Bring Your Own Device (BYOD) phenomenon which promises increased productivity for employees and their organisations. There have been several studies on the corporate adoption of BYOD but few have investigated the phenomenon from a small and medium enterprise (SME) perspective and from developing countries specifically. This study investigated the BYOD phenomenon in South African SMEs. The goal was to identify contextual factors influencing BYOD adoption with the purpose of understanding how these factors shaped and reshaped by SME actions. The Perceived EReadiness Model (PERM) was adopted to unearth contextual BYOD adoption factors, while the Structuration Theory was adopted as the theoretical lens from which the social construction of the BYOD phenomenon was understood. The study adopted an interpretive stance and was qualitative in nature. Data was collected from SMEs using semi-structured interviews, and analysed using a thematic analysis approach. The findings show that for BYOD to be adopted and institutionalized in an SME there needs to be organisational readiness in terms of awareness, management support, business resources, human resources, employees' pressure, formal governance, and technological readiness. Specifically, business resources, management support and technological readiness were perceived to be of the outmost importance to the success of BYOD. Environmental factors of market forces, support from industry, government readiness and the sociocultural factor are identified. Findings from the structuration analysis reports the presence of rules and resources (structures) which SMEs draw upon in their BYOD actions and interactions. It provides understanding on the guiding structures such as "no training" and "no formal governance" within which BYOD meanings are formed, and actions such as allowing employees to use their devices to access organisational resources without the fear of security breaches and data theft, are enacted. While it is true that the successive adoption of ICTs in organisation depends on the availability of a conducive formal policy, findings in the study show that SMEs used their business resources and management support as guiding structures of domination which were legitimized by internal informal verbal rules, lack of an institutional BYOD specific policy, minimal industry support; and the presences of social pressure

    Toward a broadband service delivery model over wireless technologies to resource-constrained public high schools in South Africa

    Get PDF
    Information and Communication Technologies (ICTs) are capable of expanding access to quality education, educational resources, and also provide teachers with new skills. Nevertheless, a majority of rural public schools have limited ICTs, mainly due to geographical landscape, lack of service delivery and poverty. As a result, they currently seem not to be adequately benefiting from current advancements in ICTs. The main objective of this research study was to investigate an appropriate broadband services delivery model using wireless access technologies, such as a Global System for Mobile communication (GSM) and Enhanced data rates for GSM Evolution (EDGE) to deliver electronic-based educational information to resource-constrained public high schools. An exploratory case study approach was adopted to identify and understand the challenges faced by rural schools in the Greater Tubatse Municipality (GTM), including educational services and content considered by the schools as relevant and useful. The research results indicate that resource-constrained schools in the GTM are facing challenges of lack of access to electronic educational information and services, and as a result, teaching and learning becomes limiting and challenging. Based on the research findings, the results show that having access to learning material via electronic platforms could afford educators and learners the opportunity to interact with the outside world, improve learning and teaching and benefit the community as a whole. The broadband services delivery conceptual model (BSDCM) was proposed, developed and evaluated to address the lack of electronic educational information and services for resource-constrained public high schools. The BSDCM is composed of both technical and non-technical components that consider requirements of all role players, ICT challenges, policy makers and Information Communication Technology for Education (ICT4ED) interventions. The proposed model addressed some of the challenges regarding lack of access to educational content. However, it is recommended that the ICT4ED policies governing the use of mobile devices in the classrooms be introduced by the relevant authorities. In addition, a comparative analysis of other network technologies should be conducted to establish if the TCP/IP header compression on Point to Point Protocol (PPP) improves the performance of the network in resource-constrained environments. Furthermore, it is recommended that further research and experiments be conducted to determine if other various third party content providers could create and deploy various educational services and content for different computing platforms using the proposed BSDCM.School of ComputingM. Tech (Information Technology

    Balancing Migration: Overcoming the challenge to SaaS provisioning for core business activities: A South African case study

    Get PDF
    Cloud computing provides shared information and communication technology (ICT) resources to individuals and organisations, including hardware and software resources that were previously too costly for an individual organisation to manage and own. Cloud computing makes vast amounts of ICT resources available to business organisations, resources that can improve business processes and allow business organisations to leverage ICT in ways that were previously impossible. The correct implementation, adoption and usage of ICT within a business organisation can lead to enhancements in productivity, innovation, and new products and services, as well as the reduction of production costs. Recent literature has attested to the fact that the adoption of cloud computing has been much lower than expected. Business organisations that have adopted cloud computing have done so mainly in products and services that can be categorised as support or non-core activities, such as HR, accounting, and marketing. In order to understand why the adoption pattern of cloud computing in business organisations has focused mainly on non-core activities, this study aims to identify the core challenge facing cloud service providers (CSPs) that provision cloud solutions to business organisations in the investment management industry. These would include cloud solutions that investment managers can use in their core business activities. Furthermore, the aim of this dissertation is to identify how CSPs overcome the core challenge faced. A case study was performed on a single CSP that provisions a SaaS solution to the investment management sector in South Africa. The case study identified migration as the core challenge experienced by CSPs. Classical grounded theory was used to generate the theory of “Balancing Migration” being the resolution to the core challenge identified. The results of the study point to the fact that investment management organisations have processes and systems that have become entrenched in their business over many years. Migrating an established system to the cloud is more than just substituting software. Migration to the cloud requires investment managers to migrate both business processes and operating strategy, and to migrate the actual software products and infrastructure. A CSP provisioning a SaaS solution for a core business activity needs to migrate the products that they offer as well as their business strategy. The theory of “Balancing Migration” proposes that these four categories of migration challenges need to be addressed simultaneously and holistically. In summary, “Migration” is the core concern to a CSP provisioning a SaaS solution for a core business activity, and “balancing migration” is how this core concern is resolved

    Three-dimensional security framework for BYOD enabled banking institutions in Nigeria.

    Get PDF
    Doctoral Degree. University of KwaZulu-Natal, Durban.Bring your own device (BYOD) has become a trend in the present day, giving employees the freedom to bring personal mobile devices to access corporate networks. In Nigeria, most banking institutions are increasingly allowing their employees the flexibility to utilize mobile devices for work-related activities. However, as they do so, the risk of corporate data being exposed to threats increases. Hence, the study considered developing a security framework for mitigating BYOD security challenges. The study was guided by organizational, socio-technical and mobility theories in developing a conceptual framework. The study was conducted in two phases, the threat identification and the framework evaluation, using a mixed-methods approach. The main research strategies used for the threat identification were a questionnaire and interviews while closed and open-ended questions were used for the framework evaluation. A sample consisted of 380 banking employees from four banks were involved in the study. In addition, the study conducted in-depth interviews with twelve management officials from the participating banks. As for the framework evaluation, the study sampled twelve respondents to assess the developed security framework for viability as far as mitigating security threats emanating from BYOD in the banking sector is concerned. The sample consisted of eight executive managers of the bank and four academic experts in information security. Quantitative data was analysed using SPSS version 21 while qualitative data was thematically analysed. Findings from the threat identification revealed that banking institutions must develop security systems that not only identify threats associated with technical, social and mobility domains but also provide adequate mitigation of the threats. For the framework evaluation, the findings revealed that the security framework is appropriate in mitigating BYOD security threats. Based on the findings of the study, the developed security framework will help banks in Nigeria to mitigate against BYOD security threats. Furthermore, this security framework will contribute towards the generation of new knowledge in the field of information security as far as BYODs are concerned. The study recommends ongoing training for banks’ employees as it relates to mitigation of security threats posed by mobile devices
    corecore