A model for user requirements elicitation specific to users in rural areas
- Authors: Isabirye, Naomi
- Date: 2009
- Subjects: Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11130 , http://hdl.handle.net/10353/145 , Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Description: Dwesa is a rural town situated in South Africa's Eastern Cape Province that has been selected as a testing site for an e-commerce project to address some of the challenges faced by the community. These challenges include difficulties stemming from poverty, poor access to public services, unemployment and low levels of literacy. The Siyakhula Living Lab project’s aim is to develop an e-commerce platform that will 'connect' the residents with the necessary access to services and markets by providing them with the necessary tools that can help in alleviating some of their challenges. In order for the project to achieve its objectives, a deeper understanding into the needs of the prospective users is required. User requirements elicitation deals with the process of interacting with the prospective users to understand and document their needs. This research aims at evaluating existing requirements elicitation techniques and methodologies in the context of rural information technology implementations. The primary objective is to develop a model for user requirements elicitation in Dwesa. Many requirements elicitation techniques and frameworks exist, but few have been evaluated in the context of rural software implementations. Requirements elicitation techniques should not be applied simply as steps to gather information. Instead this research project proposes a model that can be applied to assimilate the contribution of knowledge regarding the stakeholders, problem and solution characteristics, and other characteristics into the software development process for the effective elicitation of requirements.
- Full Text:
- Authors: Isabirye, Naomi
- Date: 2009
- Subjects: Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11130 , http://hdl.handle.net/10353/145 , Internet marketing , Electronic commerce , Land reform -- South Africa -- Eastern Cape , Sustainable development -- South Africa -- Eastern Cape , Rural poor -- South Africa -- Eastern Cape , Information resources management
- Description: Dwesa is a rural town situated in South Africa's Eastern Cape Province that has been selected as a testing site for an e-commerce project to address some of the challenges faced by the community. These challenges include difficulties stemming from poverty, poor access to public services, unemployment and low levels of literacy. The Siyakhula Living Lab project’s aim is to develop an e-commerce platform that will 'connect' the residents with the necessary access to services and markets by providing them with the necessary tools that can help in alleviating some of their challenges. In order for the project to achieve its objectives, a deeper understanding into the needs of the prospective users is required. User requirements elicitation deals with the process of interacting with the prospective users to understand and document their needs. This research aims at evaluating existing requirements elicitation techniques and methodologies in the context of rural information technology implementations. The primary objective is to develop a model for user requirements elicitation in Dwesa. Many requirements elicitation techniques and frameworks exist, but few have been evaluated in the context of rural software implementations. Requirements elicitation techniques should not be applied simply as steps to gather information. Instead this research project proposes a model that can be applied to assimilate the contribution of knowledge regarding the stakeholders, problem and solution characteristics, and other characteristics into the software development process for the effective elicitation of requirements.
- Full Text:
A model to measure the maturuty of smartphone security at software consultancies
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
Deriving value from IT investments within botique hotels: a Buffalo City case study
- Authors: Mathe, Thabelang
- Date: 2009
- Subjects: Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11134 , http://hdl.handle.net/10353/d1000975 , Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Description: Even though many organizations invest in IT, the value that IT is expected to contribute is still not clearly understood. Researchers agree that IT has become a crucial element to business operations and business existence. However, while there is continued investment in new information technologies and systems, organizations are not certain whether significant value is derived from IT investments. The failure to realize good return on IT investments is ascribed to a lack of understanding of IT by organizations and also the failure by organizations to align IT strategies with business strategies. The lack of alignment leads to the failure to match the right IT to the correct task, which leads to the poor application of systems and poor allocation of human resources to tasks. Therefore, organizations such as Small and Medium Enterprises (SMEs) in particular Boutique Hotels, are noted for their failure to derive better IT value. Their unique characteristics are understood to be influential in the way IT is used and managed by affecting the delivery of value from technology. In order to enable Boutique Hotels to derive more value from IT, the IT governance frameworks, Val IT and CobiT (ITGI, 2007), were examined as these integrate good practices to ensure that an organization‘s IT supports the business objectives. In addition, the Task Technology Fit (TTF) (Goodhue and Thompson, 1995) and Gap Analysis (Heeks, 2001) theories were highlighted as these prescribe the platform ideal for more value to be derived from IT. The current status of Boutique Hotels in Buffalo City was assessed through the use of questionnaires and interviews. The collected data was analyzed and resulted in the development of a model that can be used by Boutique Hotels in order to derive more value from IT and to maximize the use of IT.
- Full Text:
- Authors: Mathe, Thabelang
- Date: 2009
- Subjects: Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11134 , http://hdl.handle.net/10353/d1000975 , Information technology , Hotels -- Finance , Boardinghouses -- Finance , Small business -- South Africa -- Eastern Cape , Small business -- Finance
- Description: Even though many organizations invest in IT, the value that IT is expected to contribute is still not clearly understood. Researchers agree that IT has become a crucial element to business operations and business existence. However, while there is continued investment in new information technologies and systems, organizations are not certain whether significant value is derived from IT investments. The failure to realize good return on IT investments is ascribed to a lack of understanding of IT by organizations and also the failure by organizations to align IT strategies with business strategies. The lack of alignment leads to the failure to match the right IT to the correct task, which leads to the poor application of systems and poor allocation of human resources to tasks. Therefore, organizations such as Small and Medium Enterprises (SMEs) in particular Boutique Hotels, are noted for their failure to derive better IT value. Their unique characteristics are understood to be influential in the way IT is used and managed by affecting the delivery of value from technology. In order to enable Boutique Hotels to derive more value from IT, the IT governance frameworks, Val IT and CobiT (ITGI, 2007), were examined as these integrate good practices to ensure that an organization‘s IT supports the business objectives. In addition, the Task Technology Fit (TTF) (Goodhue and Thompson, 1995) and Gap Analysis (Heeks, 2001) theories were highlighted as these prescribe the platform ideal for more value to be derived from IT. The current status of Boutique Hotels in Buffalo City was assessed through the use of questionnaires and interviews. The collected data was analyzed and resulted in the development of a model that can be used by Boutique Hotels in order to derive more value from IT and to maximize the use of IT.
- Full Text:
- «
- ‹
- 1
- ›
- »