A common currency for countries within the economic community of West African states
- Authors: Djessou, Oze Marie Pascale
- Date: 2018
- Subjects: Economic Community of West African States , Africa, West -- Economic integration , Africa -- Economic conditions
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/22027 , vital:29814
- Description: While the West African sub-region has progressed in its efforts to achieve sustainable development, more intensive efforts are needed to address its developmental constraints. Among these constraints, the fragmentation of the sub-continent into small and landlocked countries remain one of the structural challenges to be faced. For this reason, strengthening regional co-operation and economic integration is a significant part in the improvement of the region’s economic performance. Monetary integration, which involves the use of a common currency within the area, is part of the process of economic integration. This study reflects upon the difficulties experienced by countries within the Economic Community of West African States (ECOWAS) without a common currency to facilitate economic growth and development. The study adopted a descriptive methodology and embarked on a thorough analysis of recent and relevant secondary sources. This was done in order to determine the expected effects of a common currency in the community, as well as to evaluate the viability of a single currency in the area. The findings indicate that there are potential gains expected from the establishment of a common currency in the relevant community of countries. These gains are contingent upon the meeting of a number of preconditions. These conditions include, inter alia, the need for a multidimensional approach to regionalism, the sustainability of the fiscal policy framework in the region and a greater convergence of the ECOWAS economies.
- Full Text:
- Date Issued: 2018
A comparative analysis of the low voter turnout in 2006 and 2011 municipal elections: Lukhanji municipality
- Authors: Jakuja, Noxolo
- Date: 2015
- Subjects: Elections -- South Africa -- Eastern Cape , Voter turnout -- South Africa , Voter registration -- South Africa , South Africa -- Politics and government
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/5995 , vital:21023
- Description: The aim of this study was to conduct a comparative analysis of the low voter turnout of the 2006 and 2011 municipal elections in Lukhanji Municipality. The study came as a result of the researcher’s observations of the low voter turnout during the 2011 municipal elections across the country. Upon further investigation, it was discovered that the previous municipal election of 2006 also experienced low voter turnout. However, this was not the case with national and provincial elections, because since the first election that took place in 1994, voter turnout has been high. Lukhanji Municipality, which is the area of residence for the researcher, was no different from the rest of South Africa, when it comes to low voter turnout for the municipal elections and high voter turnout for national and provincial elections. It was noted that there has never been a detailed research study conducted in Lukhanji Municipality regarding the subject in question, and also that there is a limited amount of literature that seeks to investigate voter turnout in local elections in South Africa. The large amount of available literature focuses on voter turnout during national and provincial elections in established democracies. The literature review extensively explored the determinants of voter turnout in all levels of elections. From those tested elsewhere, it was evident that no single factor can be the cause of low voting during an election, therefore it was fundamental to investigate the causes of low voter turnout of the municipal elections with special focus on Lukhanji Municipality. It became evident from the study, that indeed various factors may have led to low voter turnout during 2006 and 2011 municipal elections in Lukhanji Municipality.
- Full Text:
- Date Issued: 2015
A critical analysis of ethnic conflict in Kenya : the politicisation of ethnicity in Kenya subsequent to the 2007 elections
- Authors: Daweti, Siyabulela
- Date: 2014
- Subjects: Ethnic conflict -- Kenya , Kenya -- Politics and government
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8345 , http://hdl.handle.net/10948/d1020780
- Description: This study examines the interface between Kenyan politics and ethnicity. More specifically it examines why ethnicity is at the core of Kenyan politics. Although this study discusses how colonialism influenced the ethnicisation of African politics, it focuses more on the era of post-colonial politics. The objective of the study is to investigate how post-colonial Kenyan leaders have shaped the content of Kenyan politics. This study explores ethnic conflicts in Kenya, more especially the 2008 conflict. In order to provide a clear framework for the analysis of Kenyan society, Zambian politics and its social dynamics were also examined in this study. In terms of political development and other variables, one could describe Zambia as Kenya’s peer. It is, therefore, an ideal country against which to evaluate Kenya. In terms research methodology, this study has taken a descriptive and an explanatory approach. Thematic and content analysis has also been employed as data analysis methods. This study has established that the manner in which Kenyan politics are organised is centred on ethnicity. The study found that Kenya’s unique political and social components have predisposed Kenya to ethnic conflicts. For example, a political future within Kenyan political parties and in public office is heavily influenced by one’s ethnicity. Ethnicity also plays a role in the nature of political coalitions. As a solution to the Kenyan problem, this author has recommended that Kenya’s politics (and political campaigns) be based on issues related to the development of Kenyan society, rather than ethnicity. Those in public office should also elevate national identity above ethnic identity.
- Full Text:
- Date Issued: 2014
A critical analysis of land redistribution and economic development of farm workers in the Stellenbosch Agricultural Area : a research treatise
- Authors: Stemela, Mbuyiselo
- Date: 2008
- Subjects: Land reform -- South Africa , Land tenure -- South Africa , Land Redistribution for Agricultural Development (South Africa) , Agriculture -- Economic aspects -- South Africa , Compensation (Law) -- South Africa , Economic development -- South Africa -- Stellenbosch
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8232 , http://hdl.handle.net/10948/852 , Land reform -- South Africa , Land tenure -- South Africa , Land Redistribution for Agricultural Development (South Africa) , Agriculture -- Economic aspects -- South Africa , Compensation (Law) -- South Africa , Economic development -- South Africa -- Stellenbosch
- Description: This study critically analyzed land redistribution and economic empowerment of farm workers in the Stellenbosch agricultural area. Past socio-economic and political policies have resulted in a racially skewed and inequitable distribution of land as well as overcrowding, overstocking and poverty in the countryside. It has become imperative that fundamental change is brought about in order to improve economical opportunities of all South Africans to access land for beneficial and productive use. Land reform, as the central thrust of land policy, is not only part of the effort towards the creation of equitable land distribution, but also of national reconciliation and stability. This study analyzed the notion of economic empowerment of farm workers. It looked at historical overview of the evolution of politics in South Africa and contemporary legislative framework pertaining to land redistribution and farm workers in the Western Cape. A case study of Bouwland farm in the Stellenbosch agricultural area was used as an example of how land redistribution can contribute to economically empower farm workers.
- Full Text:
- Date Issued: 2008
A critical appraisal of 21st century peacebuilding in post-colonial Africa
- Authors: Kepe, Lukhanyo
- Date: 2018
- Subjects: Peace-building -- Africa -- 21st century , Conflict management -- Africa Africa -- Politics and government Peacekeeping forces -- Developing countries
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/30726 , vital:31035
- Description: This study presents a critical appraisal of 21st century peacebuilding in Africa predicated on the evasive nature of peace and development on the continent. Peacebuilding and development initiatives have tended to be unsustainable and post-conflict states have tended to revert to conflict shortly after transitions. This reversion is a cause for concern as the continent has made concerted efforts in establishing organisations and invested large sums of funds in ensuring that the prevalence of conflict and subsequent issues culminating from the instability of conflict-ridden nations diminish. Peacebuilding in Africa remains a field that is continually scrutinised due to the nuanced nature of conflict which occurs in the continent. These include, inter alia, the historically Eurocentric nature of conflict resolution endeavours of the contemporary society which subjects Africa towards being aspirants of modernity in perpetuity through peacebuilding efforts that embody conflict resolution methods that overlook the antecedents of the conflict; an endemic cycle that is erroneous to the efforts of bringing peace that is sustainable. Moreover, although there is an extensive body of work pertaining to understanding of sustainable peace, which focusses mostly on the political economy of conflict resolution and peacebuilding, it has been identified that not many studies have been done in a way which seeks to address the Eurocentric epistemologies, philosophies and practices which may affect peacebuilding in conflict ridden ‘post-colonial’ African states. Thus, the analytical perspective of the study will be to explore the orientation of ‘coloniality’ and ‘subjectivity’ in the field and attempt to bring in a decolonial perspective to the debates on conflict and peace in Africa. Quintessential to the author was the prevalence and reoccurrence of conflict in Africa, a pertinent feature which resulted to the development of this study. Moreover, the author undertook the journey which sought to unravel the nuanced nature in which conflict manifests in an African context, as well as seeking to establish sustainable methods of resolving conflict. By analysing various efforts and existing methods of peacebuilding, the author aims to find the problem to the cause which leads conflict ridden states to revert to conflict. The study is fundamentally premised on the theoretical and analytical critic of conflict resolution in Africa.
- Full Text:
- Date Issued: 2018
A descriptive study of conflict management strategies of the Johannesburg Central Methodist Church refugee community
- Authors: Burger, Christine-Maria
- Date: 2009
- Subjects: Conflict management , Central Methodist Church Refugee Community , Refugees -- Housing -- South Africa -- Johannesburg
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8199 , http://hdl.handle.net/10948/1301 , Conflict management , Central Methodist Church Refugee Community , Refugees -- Housing -- South Africa -- Johannesburg
- Description: The growth of forced migration populations - i.e. the movement of people within and across national boarders as a result of conflicts, disasters, and development policies and projects - has been a defining feature of the twentieth century and will no doubt remain with us well into the twenty-first century (Rutinwa, 2001: 13). Literature searches suggest that the ‘refugee’ constitutes the most powerful label within the forced migration discourse. Published calculations regarding the number of refugees in the world at the end of 2008, range between 15.2 million (UNHCR, 2009: 2) and 13.6 million (World Refugee Survey, 2009: 33). The refugee experience of a small representative population of these figures namely, the Zimbabwean refugees living within the Central Methodist Church (CMC) or Central Methodist Mission (CMM) refugee community, in Johannesburg city centre is the concern of this treatise. From the perspective of the conflict management scholar, the informal and formal conflict management strategies adopted among and between the CMM refugees, have been studied. Analysis of existing literature, interviews conducted with the refugees, as well as hours of experience within the refugee community, substantiate the descriptive study that follows. Guided by the grounded theory approach, research findings have emerged out of the descriptions. The research findings in turn have founded the development of the recommendations that appear in the conclusion to the treatise.
- Full Text:
- Date Issued: 2009
A foucaultian critique of the conception of individual subjectivity within contemporary environmental discourse
- Authors: Konik, Inge
- Date: 2009
- Subjects: Environmentalism , Environmental policy , Environmental management -- Social aspects
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8422 , http://hdl.handle.net/10948/d1016201
- Description: Certain prominent environmental theorists have accounted for and/or addressed our unmitigated environmentally damaging behavior in cognitive terms, related to a common (misplaced) belief that economic development and technological advancement, among other contemporary processes, will solve our environmental problems. However, I argue that they have not given due consideration to the complex (predominantly non-cognitive/non-conscious) discursive constitution of the individual, and thus seem to adhere to a Kantian notion of autonomy that overlooks such non-cognitive factors. Focusing on this non-cognitive aspect of discursive constitution, I ascribe our ecological apathy mainly to the fact that we have been discursively constituted as docile bodies and prostrate subjects. Further, I argue that, because this process of discursive constitution is primarily non-cognitive, any attempts to remedy our ecological apathy at a cognitive level alone will not be completely effective. Consequently, I propose that a more effective way of fostering pro-environmental dispositions may be for individuals to engage in an ethic/culture of the self that is not exclusively conceptual in orientation, and which is centered on the practice of a counter-discourse that does not constitute the individual as docile and prostrate nor negate the individual’s dependence on the environment. Alternatively, in order to engender pro-environmental civilizational change, it may be necessary to operate within the discursive parameters of dominant/popular institutions, in order to incrementally alter the discourses employed within, and disseminated through, these institutions, in a manner that would lead to the problematization, rather than the endorsement, of the ecologically deleterious technological, political and economic trajectories of our time.
- Full Text:
- Date Issued: 2009
A framework for digital signature implementations for e-government services
- Authors: Kumalo, Mmaphefo Octavia
- Date: 2020
- Subjects: Electronic government information , Internet in public administration Municipal government -- Data processing
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/46086 , vital:39490
- Description: The advent of the Internet has brought with it new innovations, new ways of doing business, new ways of working, new ways of engaging, and new forms of business models. It has ultimately disrupted the traditional ways in which we communicate, socialise, and live life in general. This era has heralded the requirement for digitization and has brought about the digital economy and the Fourth Industrial Revolution. The fundamental ways in which companies and governments do business are changing due to the increased innovation, and the cost efficiencies that this era has brought with it. Like most governments worldwide, the South African government has responded to the Internet revolution and is taking advantage of it through e-government initiatives. The direct effects of e-government include cost savings, efficiencies, improved and continuous interactions and communications with citizens, better public procurement, and improved tax collection. The area of digitization has the potential to improve how the South African government delivers services to citizens and those that reside within the borders of the country. Amongst the five elements of successful e-government transformation, process reform is at the top of the list. e-Government is not just about the automation of existing processes and inefficiencies. It is also about the creation of new processes and new relationships between all the stakeholders involved. In the South African context, the lack of optimised, automated, and digitalised processes within various government departments has impeded crossfunctional processes’ effectiveness and efficiencies. Manual interventions in processing and transactions occur to comply with the legal requirement to manually sign documents. This poses difficulties in integrating processes within government departments to achieve a seamless experience for the citizen. As a result, this treatise sets out to answer the question of what needs to be in place to allow for the utilisation of digital signatures in automating the processing of e-government services for a seamless experience for citizens and businesses. The resulting Digital Signature Framework can be used by government departments to implement digital signatures and provides providing guidance, facilitating understanding, and providing ease of use, scalability, and agility.
- Full Text:
- Date Issued: 2020
A framework to enhance Information and Communication Technology (ICT) readiness for business continuity at the South African Revenue Services (SARS)
- Authors: Mathase, Euphodia
- Date: 2020
- Subjects: Internet in public administration -- Taxation -- South Africa Electronic commerce -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49496 , vital:41726
- Description: Many organisations, especially public sector organisations, are required to ensure that they are able to continue with their operation in cases of major disasters that affect the organisations. In the same light, the South African Revenue Services (SARS), being a quasi-government organisation, faces a similar phenomenon. The main purpose of conducting this research was to explore a problem in depth that was identified at the SARS. SARS does not have a comprehensive business continuity plan. The study therefore examined possible techniques or actions for ensuring information and communication technology (ICT) readiness and business continuity, explored various frameworks and policy documents which will assist public entities with readiness for business continuity, and identified frameworks that will assist SARS in implementing an effective ICT readiness for business continuity. The study adopted the design science research approach and aspects of design science research in information systems. Data gathered through the questionnaire instrument was used to design a framework that can be adopted at SARS to enhance ICT readiness for business continuity. The research findings show the importance of effective business continuity management (BCM) and a framework that can be used to implement an effective BCM.
- Full Text:
- Date Issued: 2020
A framework to guide cybersecurity governance efforts in non-profit organisations
- Authors: le Roux, Wickus
- Date: 2019
- Subjects: Computer security , Information technology Nonprofit organizations -- security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/44918 , vital:38188
- Description: The average non-profit organisation is faced with the same cybersecurity challenges as an international multi-corporation that generates income. However, it may lack the competencies or resources to fully utilise, implement, monitor, or evaluate cybersecurity governance to a satisfactory or acceptable level. A literature review revealed limited publicly accessible documents to guide NPOs in particular in the task of cybersecurity governance. Therefore, the problem addressed by this research is the lack of a framework to guide cybersecurity governance efforts in non-profit organisations. This real-world problem was approached using the design science paradigm. It was important to identify, firstly, factors unique to the general context of non-profit organisations, including the constraints and limitations faced by non-profit organisations. Secondly, the key cyber risks for non-profit organisations and how they can materialise through the use of emails, social media, and BYODs in the NPO context, were identified. As a third step, available cybersecurity governance guidelines were analysed to determine best practices. This investigation also revealed the people, process, and technology elements as the pillars of information security. This resulted in the development of a framework (the PotLer framework) to guide cybersecurity governance efforts in non-profit organisations based on the input of the three points mentioned above. The framework was constructed around four conceptual elements, namely information security governance; people, process, and technology; governance elements; and key risks. The PotLer framework expands the high-level generic constructs beyond the conceptual space and provides implementation guidance in the form of a questionnaire to be completed by NPOs. The questionnaire was developed as an interactive spreadsheet that requires “Yes” or “No” responses from participants and generates a recommendation based on these answers. To evaluate the PotLer framework, the aforementioned questionnaire was completed by four NPOs. An additional questionnaire obtained their input on the utility and comprehensiveness of the framework.
- Full Text:
- Date Issued: 2019
A framework to implement information security awareness, education and training within the Limpopo economic development agency group
- Authors: Mokobane, Ntsewa Benjamin
- Date: 2019
- Subjects: Computer security , Computer networks -- Security measures Data protection
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/42063 , vital:36622
- Description: Cybersecurity awareness, education and training of employees is key in reducing and preventing cyber-attack opportunities. The ignorance and/or lack of understanding of employees about the information security risks around them might expose the LEDA Group to cyber-attacks. This led to the problem that the level of awareness of employees regarding information security was not known. The implication of this not knowing was that an argument for the nature of an intervention to ensure awareness, as well as to educate and train employees regarding information security was not possible. The aim of this treatise was to develop a framework as an effective guideline for the implementation of cybersecurity awareness, education and training of employees. In the study, the LEDA Group employees were surveyed to determine their cybersecurity knowledge gap. An online questionnaire was randomly sent to 314 LEDA Group employees. The survey was voluntary and confidential. One hundred and thirty seven (137) employees completed the survey. The results of the survey were analysed to determine the gap between the current cybersecurity knowledge of the LEDA Group employees and state-of-the-art cybersecurity knowledge. The gap was used in the development of the framework for the implementation of the cybersecurity awareness, education and training (F-CSAET). Central to F-CSAET is the governance principles guided by best practices such as King IV, COBIT5, ISO27001, ISO27005, ISO27008 and ISO27032 and the compliance requirements to POPIA, the Copyright Act and the Cybercrimes and Cybersecurity Bill. The F-CSAET has six steps, namely Assess, Analyse, Create, Plan, Implement and Reinforce. The framework was evaluated for applicability by the team called the cyber security interest team, which was established specifically for the purpose of the F-CSAET.
- Full Text:
- Date Issued: 2019
A framework to measure the degree of alignment between corporate and IT/IS objectives at Randwater
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Business enterprises -- Computer networks -- Security measures , Data protection Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47156 , vital:39818
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature
- Full Text:
- Date Issued: 2020
A framework to measure the degree of alignment between corporate and IT/IS objectives at Randwater
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Information technology -- Management , Business enterprises -- Computer networks
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/48841 , vital:41145
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. v The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature available on business strategic alignment with ICT goals.
- Full Text:
- Date Issued: 2020
A regulatory framework for investment promotion by WESGRO in the Western Cape province, 2014 – 2017
- Authors: Nodada, Lubabalo Yandisa
- Date: 2019
- Subjects: Investments, Foreign -- South Africa -- Western Cape , Infrastructure (Economics)-- South Africa -- Western Cape Economic development -- South Africa -- Western Cape Finance, Public -- South Africa -- Western Cape
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/42847 , vital:36699
- Description: The primary aim of this study was to investigate the extent to which the attraction of foreign direct investment (FDI) was impeded by an underperforming economy in the Western Cape Province between 2014 and 2017. In order to stimulate economic growth during the period under review, Wesgro, the organization invested with the mandate of attracting FDI to the Western Cape Province, was required to market and attract high volumes of FDI. As the Western Cape economy was not growing at the required rate, Wesgro set its FDI target ranges to within achievable levels. In order to create a foundation for understanding laws and economic policies relevant to marketing to attract FDI, this study reviewed regulatory frameworks for FDI in South Africa and the Western Cape Province. In addition, the National Development Plan (economic growth policy of South Africa) and the Western Cape Provincial Strategic Plan 2014-2019 (economic growth policy of the Province) were discussed. The research methodology of this study followed a descriptive research approach, analysing existing secondary data extracted from books, academic journals, research reports, Acts of Parliament, economic growth policies and annual reports from the 2013/14 to 2016/17 financial years. Relevant data emanating from reviewed regulatory frameworks, economic growth policies, official FDI and its various forms, academic debates on FDI and the strategic roles and approaches employed by IPAs when marketing to attract FDI to home destinations was withdrawn, analysed and the findings presented. The findings revealed that a weak growing Western Cape economy impeded the potential of Wesgro to attract FDI beyond its targeted ranges between 2014 and 2017. The findings also indicated that the Western Cape economy experienced lack of investment, low economic activity, low economic growth and high unemployment because Wesgro did not attract sufficient FDI to stimulate economic growth. High volumes of FDI are needed to stimulate the Western Cape Province’s economic growth. Based on the findings of this study, various recommendations were made on ways in which the Western Cape economy could grow.
- Full Text:
- Date Issued: 2019
A strategic approach towards the successful implementation of corporate governance of Information and Communication Technology in the Kwazulu-Natal Department of Social Development
- Authors: Siziba, Makabongwe Johnson
- Date: 2020
- Subjects: Corporate governance -- South Africa -- KwaZulu-Natal -- Management Information technology -- Management -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49617 , vital:41741
- Description: Information is a critical asset in any organisation and its management, including the associated technological channels, requires the attention of decision-makers to ensure that information assets are utilised for the intended purposes. Therefore, decision-makers need to have appropriate governance oversight on technology that produces information and information itself. Over the years, the governance of ICT has been adopted in the public sector given the fact that state funding received from tax collections is utilised to invest in IT solutions with the intention of expediting service delivery and increase productivity. The purpose of this treatise was to identify the root causes of why the department is not implementing Corporate Governance of ICT successfully despite the fact that most good controls do exist. The research revealed that there is insufficient budget to implement ICT projects coupled with inadequate ICT staff to implement ICT strategy. Furthermore, it cited a lack of ICT governance skills with ICT Strategic Committee members who are tasked with pioneering ICT governance. This weakness relates directly to other identified weaknesses such as end-user resistance to adopt ICT projects and a lack of project management function in the department.
- Full Text:
- Date Issued: 2020
A strategy for adopting cloud computing services in small, medium and micro enterprises (SME) in the Nelson Mandela Metropole
- Authors: Sarpong, George
- Date: 2019
- Subjects: Cloud computing , Technological innovations -- Management Information technology -- Management Management information systems New business enterprises -- South Africa -- Nelson Mandela Bay Municipality Small business -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/43567 , vital:36920
- Description: Small, medium and micro enterprises (SMEs) in South Africa continue to form the foundation for growing the economy. Thus, these enterprises have a significant role in to play in helping the country to eliminate poverty and unemployment. In order for these businesses to continue to grow and stay abreast with the changing business landscape, these businesses need to adopt some or other form of technology. One such technology is cloud computing, which is at times referred to as external hosting. Cloud computing is a type of technology that allows any business to operate as if it had a team of dedicated professional information technology (IT) personnel continually checking and monitoring its IT systems. As a result, cloud computing often allows a business to save on costs, improve communication with clients and speed up the transfer of information across the business. Thus, as SMEs often have small or non-existent IT departments, cloud computing offers these business an opportunity to compete with larger corporations without having to compromise on the quality of their service. However, in spite of these benefits, cloud computing still remains something of a novelty to many small businesses that operate in Nelson Mandela Metropole, as these businesses tend to either adopt a small portion of the technology or not to adopt the technology at all. The reasons for not significantly investing in the technology are usually far ranging but are often linked to these businesses not understanding how the service can be best used to help their business to grow. This study includes a description of a strategy that SMEs can follow when adopting cloud computing services as part of their business models. In addition to this, this study includes a discussion on the various benefits and disadvantages that await SMEs that make the decision to invest in the service.
- Full Text:
- Date Issued: 2019
A strategy for improving the maturity levels of IT service management in higher education institutions in South Africa
- Authors: Hilmer, Thomas
- Date: 2019
- Subjects: Information technology -- Management , Information technology Education, Higher -- South Africa Education -- Effect of technological innovations on -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/40161 , vital:35824
- Description: IT Service Management (ITSM) refers to a set of activities that an organisation can perform to develop, supply, operate, manage and improve information technology related services in order to meet the needs of the business. The interest in ITSM is based on the expectation that applying best practice ITSM processes will result in lower expenses, fewer incidents and improved customer satisfaction. Various standards, frameworks, methodologies and processes have evolved to support this move to a value-driven, service-orientated approach to managing an organisation’s information systems. Between 2007 and 2009, Higher Education Institutions (HEIs) in South Africa benefited from a national project to improve the quality of their IT services through training in ITIL, a best practice ITSM framework. An assessment at the time, however, found that the maturity levels of the ITIL processes implemented after the intervention remained low, and this observation is common in other industries as well. The implementation of industry best practice ITSM frameworks does not always proceed smoothly; they can be costly, have long implementation times, and can be seen as excessively complicated and suited mainly for large organisations. Therefore, it is often challenging for organisations such as HEIs to improve their ITSM process maturity levels. The aim of this study is to develop a strategy that may assist South African HEIs in taking steps to improve their IT Service Management maturity levels. This primary research objective is addressed through a number of secondary research objectives, namely, to understand the challenges that HEIs often encounter when implementing ITSM; to determine the ITSM implementation status at a number of South African HEIs; to determine the various elements and components required to formulate the ITSM strategy; to determine whether alternatives to ITIL are feasible options for HEIs in South Africa; and to validate the proposed strategy by verifying its quality, utility and efficacy. A comprehensive literature review provides information on various ITSM standards, frameworks and methodologies. It also investigates ITSM adoption and implementation by organisations in general, and HEIs in particular, and how modern practices such as DevOps, Agile and Lean relate to ITSM. Thereafter, an online survey is used to determine the status of ITSM maturity levels at South African HEIs, and whether alternatives to ITIL are being used. Expert interviews are used to obtain additional information on what is required to formulate the proposed strategy. The findings from the literature review, survey and expert interviews are used to develop a four-step strategy, which was evaluated for its quality, utility and efficacy through an online assessment by the same experts. This strategy can be considered a useful tool for Higher Education Institutions in South Africa if they wish to increase their levels of IT Service Management maturity. The findings of this study make a substantial contribution to the field of ITSM research at South African Higher Education Institutions.
- Full Text:
- Date Issued: 2019
A strategy to effectively manage the disaster recovery plan (DRP) at the city of Johannesburg: roads sector
- Authors: Maphutha, Selina Masai
- Date: 2019
- Subjects: Management information systems , Data recovery (Computer science) Computer security Emergency management Local government -- South Africa -- Johannesburg
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/40944 , vital:36274
- Description: Electronic information is critical to Municipalities, the City of Johannesburg (Road sector) rely on computerised systems to perform their operations and deliver services to its inhabitants. Disaster recovery planning for the City of Johannesburg is crucial and urgent, as it will ensure that the organisation is able to recover the core business functionality of its software, data, and systems after the occurrence of a natural or man-made disaster. Municipalities should have adequate recovery strategies in place in case of disasters. Planning for recovery from a disaster is quickly becoming recognized as a necessity, however organisational leaders are not putting recovery strategies as a priority and thus result in challenges when implementing the recovery processes i.e. Lack of resources, overlooking risk management, lack of leadership commitment to continuity processes and lack of understanding the concept of DRP and BCP. Disruption can happen when not anticipated, It is impossible to foresee what may hit an organisation. It is thus necessary and compulsory for organisation to plan for disasters most especially with ever-increasing dependence of business processes on technology services. The purpose of this research was to assess the adequacy of the Disaster recovery plan at the City of Johannesburg (Road sector) and to develop a strategy to effectively manage the DRP. The research revealed that the DRP at the City of Johannesburg (Road sector) is not comprehensive and that there are other processes that are not effectively implemented. There is a lack of resources for implementing the DRP. The dedicated staff is not adequately technically skilled to implement the disaster recovery processes. This study has revealed that the challenges noted were common to other institutions. An adequate DRP is crucial; capacity management and seamless procurement processes are also crucial for the success of the disaster recovery processes. Theoretically, this research adds to the literature on disaster recovery management and highlights the challenges and complexities involved. Practically, the research provides several lessons and guiding principles that the organisation may consider around disaster recovery management.
- Full Text:
- Date Issued: 2019
A strategy to motivate continued instructor usage of learning management systems (LMSS) in higher learning institutions of Zimbabwe
- Authors: Siwela, Ndukuyenkosi
- Date: 2020
- Subjects: Web-based instruction , Computer systems Organizational learning -- Zimbabwe Internet in education
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47259 , vital:39837
- Description: The purpose of this study was to develop a strategy to motivate continued usage of Learning Management Systems in higher learning institutions of Zimbabwe. A related goal was to identify unique challenges experienced by instructors in their use of LMSs. The use of LMSs is now global and has been fairly successful in developed countries even though past research shows that instructors tend to discontinue usage over a period of time. Whereas most LMSs research is carried in the context of the developed world, the candidate demonstrates that Vantankesh's IS Success Model and Davis' Technology Acceptance Model can be successfully replicated into the developing world on condition that local environment is taken into context. The results showed that LMSs in Zimbabwe higher learning institutions hold a promise of success even though challenges exist. The findings have wider implications on the need to invest in neccessary infrustructure and future predictions on learner interests. The study demonstrates that shared success can be achieved if the local conditions are taken into context when developing a strategy to motivate instructor continued LMS usage. The study holds the practical implication that institutions can motivate instructors to continue with usage of LMSs to deliver quality output in their daily duties.
- Full Text:
- Date Issued: 2020
A strategy to promote awareness and adherence to information security policy at Capricorn District Municipality
- Authors: Mamabolo, Mokgadi Hellen
- Date: 2019
- Subjects: Computer security -- Management , Data protection -- Management Computer security Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/40867 , vital:36245
- Description: The purpose of this research was to investigate the reasons for non-adherence to the ISP and to measure the current level of adherence to the ISP. The research revealed that non adherence to the ISP is caused by lack of training or awareness, and through non-communication of the ISP to employees. The study was conducted at Capricorn District Municipality, Polokwane Local Municipality, Molemole Local Municipality and Blouberg Local Municipality. A web-based questionnaire (QuestionPro) was developed and it was directed to every official who uses or interacts with municipal information, to quantify the level of adherence to ISP by employees. An email with the questionnaire link administered by www.questionpro.com was then sent to the population of 152 employees. Presently ISP adherence is one of the key concerns that are faced by organisations. Employees are perceived as one of the reasons that there are security breaches within organisations; hence, it is of paramount importance that these security breaches are noticed, as well as technical matters. Most researchers have reasoned that non-adherence to ISP is one of the major challenges faced by organisations. The non-adherence to ISP will lead to potential information security threats and unauthorised access to information that might compromise municipal business operations. The Information Security Officer together with the help of management must educate employees regarding the value of IS and why it is crucial to adhere to these policies. The proposed strategy summarises the various concepts required in the promotion of awareness and adherence to an effective ISP. Ultimately, this research study concludes that if management continually trains employees, raising awareness about ISP and monitoring their adherence to ISP, this should increase the adherence level.
- Full Text:
- Date Issued: 2019