To see the other types of publications on this topic, follow the link: Business enterprises – Information technology – Rwanda.

Dissertations / Theses on the topic 'Business enterprises – Information technology – Rwanda'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Business enterprises – Information technology – Rwanda.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sarosa, Samiaji. "The information technology adoption process within Indonesian small and medium enterprises." University of Technology, Sydney. Faculty of Information Technology, 2007. http://hdl.handle.net/2100/427.

Full text
Abstract:
This thesis examines the adoption process of Information Technology (IT)-based solutions within small and medium enterprises (SMEs) in Indonesia, in the furniture and handicraft industries. As the Indonesian SMEs grew in size, they faced new problems in managing their businesses. They have tried to use IT to support their business and resolve some of these problems. Yet in their efforts to adopt IT, they often faced new problems by introducing new technology into the organisation. The thesis examines the experiences of 35 Indonesian SMEs when they adopted IT. We investigated what factors were influencing IT adoption; the process of IT adoption which covers decision making, implementation or deployment and evaluation; and how SMEs cope with and recover from failure. The participants’ experiences were compared to what has been reported in the existing literature. Analysis of the relevant research literature revealed some unexplored issues concerning IT adoption within SMEs. Most of the published research has been conducted in developed countries, with little in developing or less developed countries. From those few, only one was conducted in Indonesia and it was about IT diffusion. The focus of previous studies was mainly to explore factors influencing IT adoption and they mostly utilised survey techniques to elicit the factors. The scant literature suggests that exploring IT adoption can be approached from three different perspectives: individualist, structuralist, and interactive process. This thesis uses the interactive process approach to explore how well those factors that have been well documented in the literature actually work in Indonesian SMEs’ IT adoption. As a result of our exploration, we formulated a model of an interactive process view of IT adoption within Indonesian SMEs. A qualitative approach was used to answer research questions and explore the participants’ experiences in depth. In this thesis, we used in-depth interviews to explore participants’ experiences. These interviews enabled us to draw out not only IT adoption processes but also successes and failures in IT adoption. Semi-structured interviews were used as the data collection tool. They provided guidance so the interviews stayed well within the focus of the thesis, yet provided room to explore new and relevant issues that emerged during the interview process. Content analysis of the interview transcripts was used to extract answers given during the semi-structured interviews and to identify new themes that emerged from the data. The analysis resulted in important findings. First, it confirms some factors found in the literature as actually influencing IT adoption in Indonesian SMEs. Despite some similarities, we found some differences such as government role and competitors’ influence on IT adoption. The other findings are concerned with the failures faced by some of the participants. We then explore the differences between failed and successful participants, and how Indonesian SMEs cope with and recover from failed IT deployment. Finally, we revised the initial model of the interactive process of IT adoption. The extended model captures new insights into success and failure of IT adoption, and could provide a better understanding of IT adoption within Indonesian SMEs. The interaction between different factors in the IT adoption shows how those factors influence each other and how different stakeholders could manage their own interests related to IT adoption. The improved model could be used to guide Indonesian SME managers to manage their adoption of IT more effectively.
APA, Harvard, Vancouver, ISO, and other styles
2

Lan, Yi-Chen. "Management of information technology issues in enterprise globalisation /." View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20031217.130842/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leung, Lai-chun Fiona. "Information technology implementation in small and medium-sized enterprises : a cross-country comparison of Hong Kong and Singapore /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18831576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chan, Ki-hung. "Implementation of information technology in small and medium retail and wholesale enterprises /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18837086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Whittaker, Donna. "The entrepreneurial orientation of selected ICT SMME's." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1011417.

Full text
Abstract:
Despite the demand for ICT skills, businesses are experiencing an ICT skills shortage. Constantly changing ICT technologies require business leaders to find qualified ICT professionals to implement new business strategies and business processes. The Information and Communications Technology (ICT) sector is experiencing a continued skills shortage and various initiatives have been launched to address the problem. Businesses continually struggle to find qualified and suitably skilled ICT personnel. As a result businesses have had to outsource their ICT requirements off-shore to obtain the required ICT skills and maintain their competitive advantage. In a country desperate for job creation, entrepreneurial inclination and start up of new businesses may play a pivotal role in the economic development and well being of individuals able to capitalise on the availability of ICT opportunities. Entrepreneurship is a critical factor in promoting innovation, creating employment opportunities and generating social and economic wealth in a country's economy. Sectors such as Information and Communication Technologies can be seen as archetypal entrepreneurial industries and can consequently play a key role in economic development. In the research that follows the author identifies an ICT skills shortage in South Africa. This is followed by an exploratory study that investigates the influence of psychological traits and socio-cultural variables on the entrepreneurial intent of selected ICT SMME’s in the Nelson Mandela Metropolitan Area. The findings revealed that both psychological traits together with socio-cultural variables influence an individual’s intention to start up a business. The predominant psychological trait discovered during the research was perseverance. Family environmental issues were the dominant socio-cultural variable influencing entrepreneurial intention amongst the case study subjects.
APA, Harvard, Vancouver, ISO, and other styles
6

Fonseca, da Silva Joao Paulo. "New hybrid offering development in new technology-based firms." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lan, Yi-chen 1969, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Management of information technology issues in enterprise globalisation." THESIS_CSTE_CIT_Lan_Y.xml, 2003. http://handle.uws.edu.au:8081/1959.7/314.

Full text
Abstract:
Domestic companies are increasingly trying to expand to become globalised firms or multinational corporations (MNCs). Existing business strategies, visions and information systems need to be re-analysed and perhaps reconstructed to fulfil the business goals, operations and characteristics of the global organisation. Information technology is a critical element in enabling globalisation, and enterprises need to identify and consider information technology and system management issues. Depending on the structure of multinational organisations, different emphases need to be placed on issues such as business information systems management, information technology management, people management, end-user management, and culture. A global transition issue priority model is constructed to support the following hypothesis: the global transition issue priority varies depending on the type of organisational structure. With the assistance of this model, MNCs are able to pinpoint the emphasis of issues in preparing the globalisation process according to their organisational structures. Surevsy were onducted to investigate the priority of issues, and outcomes suggest that the emphasis of each issue class is dependent on the type of organisational structure. The main contribution of this research is to develop a global information systems management priority model that will assist MNCs in preparing the strategic plan in the global transition process, and develop a global transition framework for enterprises which will facilitate construction of their global information systems.
Doctor of Philosophy (PhD)
APA, Harvard, Vancouver, ISO, and other styles
8

Romero, Christian P. "Development of an information technology plan for a virtual enterprise program at a community college." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/CRomero2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Okundaye, Kessington Enaye. "Adoption of Information and Communication Technology in Nigerian Small- to Medium-Size Enterprises." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2679.

Full text
Abstract:
Small- to medium-size enterprises (SMEs) play a vital role in a dynamic economy through job creation, poverty alleviation, and socioeconomic development in developed and developing countries. The purpose of this multiple case study was to explore how SME leaders in Lagos, Nigeria, adopted information and communication technology (ICT) as a business strategy to increase profitability and compete globally. Organizational leaders have adopted ICT so that their organizations can become more efficient, effective, innovative, and globally competitive. This study involved 4 SMEs that had successfully implemented ICT. The participants included 5 SME leaders from each of the SMEs. The data collection method included in-person semistructured interviews of participants and review of existing company data. Data were analyzed using inductive data analysis, which included member checking to ensure trustworthiness of interpretations and occurred until theoretical saturation had occurred. The technology acceptance model (TAM), which specifies the relationship between perceived usefulness, perceived ease of use, attitude toward computer use, and intention to use technology, was applied as a framework to explain the Nigerian SME's ICT adoption strategies. Four major themes emerged from the data analysis: ICT adoption factors, ICT roles and benefits, role of government, and SME success factors. The findings of this study may help SME leaders and government leaders address many of the factors inhibiting the adoption of ICT in SMEs. The findings of this study may positively affect social change by ensuring that SMEs are successful and able to create jobs, which in turn may help to alleviate poverty and promote socioeconomic development through adoption of ICT.
APA, Harvard, Vancouver, ISO, and other styles
10

Hoffman, A. R. "Information technology decision making in South Africa : a framework for company-wide strategic IT management." Master's thesis, University of Cape Town, 1989. http://hdl.handle.net/11427/15854.

Full text
Abstract:
Includes bibliography.
The area of interest in which this Study is set is the linking of a company's business strategies with its strategic planning for IT (information technology). The objectives of the Study are: to investigate how the IT planning environment is changing for business enterprises in South Africa; to establish how successfully South African companies are managing IT strategically; to propose a new approach to strategic IT decision making that will help South African management deal with the major issues; to propose a way of implementing the approach. In Chapter 2, conclusions are drawn from an examination of the key strategic IT planning literature. It appears that fundamental changes are indeed taking place, and are producing significant shifts in the way researchers, consultants and managers think about IT. The survey of South African management opinion is described in Chapter 3. The opinions analyzed range over environmental trends, strategic decision making practices, and what an acceptable strategic IT decision making framework would look like. The need for a new, comprehensive approach to strategic IT decision making in South Africa is clearly established. In Chapter 4, a theoretical Framework is proposed as a new, comprehensive approach to strategic IT decision making. The Framework covers five strategic tasks: analysing the key environmental issues; determining the purposes and uses of IT in competitive strategy and organizational designs; developing the IT infrastructure, human systems, information systems, and human resources to achieve these purposes and uses; implementing the strategic IT decisions; and learning to make better strategic IT decisions. In Chapter 5, ways of implementing the Framework in practice are .identified. A means of evaluating its acceptability in a specific company is also proposed. The general conclusions of the Study are presented in Chapter 6. The Framework developed in this Study is intended for use, not directly by the IT decision makers themselves, but by the persons responsible for designing the IT decision making processes of the company. It is not, however, offered as a theory or a methodology. The aim is· simply to provide a conceptual "filing system", to help designers uncover and classify the IT strategy problems of their own company, to identify the tools their decision makers need, and to put appropriate problem solving processes in place.
APA, Harvard, Vancouver, ISO, and other styles
11

Chan, Ki-hung, and 陳己雄. "Implementation of information technology in small and medium retail and wholesale enterprises." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31267853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Naidoo, Lavendra. "The strategic alignment maturity of business and information technology at Volkswagen South Africa." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1003910.

Full text
Abstract:
During the past three decades Information Technology (IT) has been constantly evolving and has emerged into a significant component and enabler of most organisations strategy, to the point that modern day organisations are intrinsically dependent on IT (Peppard and Ward, 2004). Henderson and Venkatraman (1993) advocate that for an organisation to be successful in a dynamic and competitive business environment it is imperative that there is an effective and efficient IT strategy that enables the business strategy and processes. Volkswagen South Africa (VWSA)in 2007 launched its corporate strategy, 1:10:100 – 2010 At the end of this stated period 2010, VWSA achieved several of its objectives, namely surpassing its competitors in passenger vehicle sales volume, improving its customer satisfaction, achieving a higher level of local parts content per unit, developing its people and improving its infrastructure and processes.
APA, Harvard, Vancouver, ISO, and other styles
13

Pather, Shaun. "E-commerce information systems (ECIS) success: A South African study." Thesis, Cape Peninsula University of Technology, 2006. http://hdl.handle.net/20.500.11838/1409.

Full text
Abstract:
Thesis (DTech (Information Technology))--Cape Peninsula University of Technology, 2006
As a phenomenon of the 1990s, e-Commerce is relatively new. Its advent offered the promise of new opportunities to businesses and entrepreneurs around the world. The hyperbole associated with the Internet and the Web resulted in a mindset that e-Commerce was an easy road to success. It was believed that this new technology-based approach would revolutionise business in a number of ways, including changing the relationships between thestakeholders and allowing small organisations to play on the global stage. However, the road to business enhancement through e-Commerce has not been easy. Many organisations have not survived their attempts to engage. in e-Commerce and others have radically changed their approach since the e- . Bubble burst. There were many reasons for the failure of these e-Commerce initiatives. They included poor business ideas, no control of expenditure, lack of general business experience and immaturity, as well as little understanding of the crucial importance of managing the technology through which the Internet and the Web delivers e-Commerce opportunities. This thesis explores the intricacies of IS within the Sduth African B2C eCommerce environment and argues that without a coherent understanding of the factors affecting IS success, the implementation of traditional IS evaluation mechanisms may be problematic. A comparative analysis of studies in this field between the pre- and post- e-Commerce eras, ascertained a paucity of theoretical frameworks and a fragmented body of knowledge in the extant literature, with a narrow focus on web-interface issues.
APA, Harvard, Vancouver, ISO, and other styles
14

De, Jong Piet. "Factors affecting information technology implementation in the mobile telecommunications industry : a family business case." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1486.

Full text
Abstract:
This treatise investigates how information technology (I.T.) enables growth in a family business (the firm) in Port Elizabeth. The firm operates in the mobile telecommunications sector. The objective of the study is to gain a deeper understanding on why family businesses adopt information technology in their firm by means of a case study. The firm found its technology (or lack thereof) completely out-dated compared to the competition and customer demands. The future of the firm was in jeopardy. The study starts with a literature review of the following three topics which form part of the scope of the research: 1. Family businesses; 2. Influence of I.T. as a driver of growth in business; and 3. An introduction into the mobile telecommunications industry. Data are collected through structured interviews with family members involved in the business. The data are consequently linked to the theory and provides insight as to what the drivers are for I.T. adoption and the required core competencies or critical success factors of the firm. Although it might seem trivial for a small family business to adopt information technology, the research concludes that I.T. is critical for continuous growth and survival of this family business. Conversely due to a lack of internal skills the firm is heavily reliant upon outside consultants for advice, implementation and support. Recommendations which are of particular interest to family businesses in a similar environment are: • Embrace technology early, utilise I.T. solutions to grow and enhance current competitive advantage, do not see I.T. as a competitive advantage alone (Pavlou & Sawy, 2006); • If information expertise is not present within the company it is advisable to invest in that expertise through recruitment, training, partnership, or outsourcing; • Ensure software meets specification / is effective enough – this can be achieved by frequent releases cycles with small changes instead of infrequent release cycles with many big changes; • Engage the consultants in a partnership by i.e. providing a profit share – this will ensure that the consultants are committed to the cause and will also ensure that their involvement is also in their own best interest; • Choose local consultants who are easily accessible – build relationships and focus on trust; • Create lock-in (Amit & Zott, 2001), provide tools free-ofcharge for customers, this will make switching to competitor more difficult; • Automate as much as possible, enable standard work practices, routinize; • Be ready to adjust the organisational structure or relinquish control (Bruquea & Moyanob, 2007)
APA, Harvard, Vancouver, ISO, and other styles
15

Sisavic, Florian Michael. "Job Attribute Preferences of the Workforce in Polish High Technology Enterprises." PDXScholar, 1993. https://pdxscholar.library.pdx.edu/open_access_etds/1185.

Full text
Abstract:
A key precept in work place motivation theory is that management knows what job attributes are valued by the employee. Management can benefit by asking employees what they want from their work experience (i.e., job attribute preferences), rather than assume they know. This is particularly important to Polish high technology companies that are in transition to a free-market economy and to Polish workers who must be appropriately motivated to compete globally. This study attempts to better understand the job attribute preferences of Polish managers and workers, the potential gaps between Polish managers' perception of their workers' preferences (system), and how these preferences are affected by the worker's personal economic situation (sub system) and by business organization type (supra system). Managers and workers from five Polish high technology enterprises were surveyed on-site regarding their job attribute preferences. The results compared to a similar survey done with six American high technology firms(Eder 1988). Consistent with Maslow's prepotentcy theory, workers who tended to be optimistic about their personal economic situation rated all five extrinsic job attributes higher and four of the five intrinsics lower than those workers who tended to be pessimistic. Polish workers at firms that operated under central planning had only a few differences in their job attribute preferences indicating a strong supra-system or organizational effect on individuals in the firm. Contrary to what was expected, the Polish managers and workers rated a number of intrinsic attributes higher than their American counterparts suggesting a pent up need for intrinsic-type motivational policies. Polish managers appeared to be closer and more in touch with their workers than their American counterparts. American managers clearly underestimated the importance of intrinsic job attributes and overestimated the importance of the extrinsics, while Polish managers accurately predicted most of the workers' job attribute preferences. The results also raised questions regarding the stability of job attributes and the concept of clusters of extrinsic and intrinsic groups of job attributes.
APA, Harvard, Vancouver, ISO, and other styles
16

Nyandoro, Cephus K. "Factors influencing information communication technology (ICT) acceptance and use in small and medium enterprises (SMEs) in Kenya." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10024096.

Full text
Abstract:

Research demonstrates that there is a gap in focusing understanding factors of information communication technology (ICT) acceptance and use in small and medium enterprises (SMEs). ICT is gaining popularity because it is a force in the economic growth equation. SMEs adopt ICT to promote their business strategy, performance, and growth. This study focused on the factors influencing ICT acceptance and use in SMEs. The research questions were 1) what factors influence SME owners/managers to accept ICT in Kenya? 2) What is the relationship between ICT acceptance and SMEs retail business growth in Kenya? and 3) What is the relationship between ICT usage and SMEs retail business growth in Kenya? The researcher used quantitative research methodology to survey SME owners/managers in Kenya. The researcher hand delivered the survey to 121 potential participants, of which 118 responded. This study evaluated factors of ICT acceptance in SMEs, the relationship between ICT acceptance and SME growth, and the relationship between ICT usage and SME growth. Research findings showed that customer services, cost reduction and business relationships were the most influential factors of ICT acceptance. Computer applications and mobile phones were the most commonly used ICT tools. The study found a strong positive relationship between ICT acceptance and SME growth, and a moderate positive relationship between ICT usage and SME growth. The research results are valuable to stakeholders including potential entrepreneurs, sponsors, government official and financial institutions who make informed decision and formulate policies about ICT investment and effective business strategies for SMEs growth.

APA, Harvard, Vancouver, ISO, and other styles
17

Morris, Robert Franklin Byrd Terry Anthony. "The effects of key moderators on the relationship between firm-wide IT capability and firm performance an empirical investigation of an integrative model of IT business value /." Auburn, Ala., 2006. http://repo.lib.auburn.edu/Send%2012-15-07/MORRIS_ROBERT_26.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Van, Biljon Sharon Susanna. "Role of access to 'real-time' information in the survival of enterprises." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/16506.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2004.
ENGLISH ABSTRACT: The rise of the network economy had a resounding impact on the world economy. Business remains transfixed between choosing between hierarchical organizational structures suited to a control and command mindset or transforming to an organizational structure intent on sensing and responding. Flexible and adaptive enterprises are more suitable to an increasingly volatile business environment. Current business trends worldwide seem to point in this direction. This may be an indication of the way in which organizations strive to avoid running the risk of business insignificance. Driven by business volatility, organizational structures are turning increasingly to naturally occurring ‘organizations’ to construct their own malleable versions. The redesign of an organizational structure is as important as reviewing information flows, optimizing technology and most importantly, finding the right type of employee to set the wheels of a real-time enterprise (RTE) in motion. Any discussion pertaining to real-time will touch on time. A reflection on hierarchical organizations highlights their stability, but also their inflexibility and sufficing information practices. It then becomes clear that the new business direction in an intensely competitive environment will have little tolerance for any measure of organizational rigidity. But how driven and fast can information really be processed and still enhance the value of an enterprise? The RTE is not a fully automated enterprise. Its employees may be less involved in its everyday tasks, but remain part of its decision-making process. To what degree does the RTE business model then facilitate value-adding information processing by both automation and manual interventions? Do limits exist where speed and time wastage in business are concerned? Is speed at all costs the only concern of the RTE? The aim of this paper is to answer these questions conceptually. Cognizance was taken of the impact of the volatile business environment on organizational structures influencing the current understanding. The highlighted business trends are based on recently published global and authoritative industry papers, business analyses and academic interpretations. Some of the best material was sourced from professional journals discussing the infinite angles of real-time information. Castells’s work on the network society proved to be extremely valuable to gain a holistic understanding. The latest developments were obtained from well-established research companies. During the investigative phase of this paper, the author encountered one thesis on real-time information focusing on information technology. It was evident that more research is required to answer the questions posed. The eventual findings were in line with the complexity and scope of the subject. The current demands of a global network economy necessitate agile and adaptive networked enterprises, not hierarchies. Roles are becoming more important than positions in the organizational transition phase to a networked, flat structure. A failure to start with such a transformation programme will result in a failure to survive in a fiercely competitive global business environment. It was clear that the RTE is dependent on the establishment of a balance struck between business entities in their interactions with one another as parts of a whole, replete with conditions and requirements. It is only in this sense that access to real-time information could be seen as a differentiating factor in global business.
AFRIKAANSE OPSOMMING: Die ontstaan van die netwerk-ekonomie het ‘n beduidende invloed op wêreldhandel gehad. Besigheid het nog nie uitsluitsel verkry tussen twee soorte organisatoriese strukture nie, naamlik, ‘n hiërargiese organisasiestruktuur wat pas by ’n beheer-en-regeer denkwyse en die ander, ’n veranderende organiese struktuur wat aanvoeling en reaksie belangriker ag. Buigsame, aanpasbare organisasies is uitstekend aangepas by ’n toenemend onsekere besigheidsomgewing. Dit wil voorkom of organisasies tans in hierdie rigting neig om die risiko van onbeduidenheid in die hedendaagse sakewêreld op dié manier te systap. Onsekerheid in besigheid noop organisatoriese strukture om hul toenemend te wend na organisasiestrukture wat natuurlik voorkom, ten einde ‘n eiesoortige buigsame weergawe daarvan te skep. Organisatoriese herstrukturering is ewe belangrik as die hersiening van inligtingsvloei, die optimisering van tegnologie en bowenal, die soektog na die regte soort werknemer wat dryfkrag aan die ‘real-time enterprise’ of RTE sal verleen. ‘Real-time’ besprekings sluit noodwendig die tydskwessie in, terwyl enige nabetragting oor hiërargiese organisasies sal fokus op stabiliteit, maar ook op onbuigsaamheid en ontoereikende inligtingspraktyke. Die nuwe besigheidsrigting in ’n uiters mededingende omgewing laat min ruimte vir enige mate van organisatoriese onbuigsaamheid. Die vraag ontstaan egter hoe vinnig en gedrewe inligting verwerk kan word ten einde besigheidswaarde te vermeerder? RTE’s is nie volledig geoutomatiseerde organisasies nie. Hoewel werknemers nie ten volle betrek word by alledaagse werk nie, is hulle steeds deel van die besluitnemingsproses. Maar vergemaklik die RTE-besigheidsmodel inderdaad die verwerking van inligting deur gedeeltelike outomatisering? Hoe word spoed en tydsvermorsing in organisasies hanteer? Sou spoed byvoorbeeld ten alle koste die enigste belang wees van die RTE? Die doel van hierdie proefskrif is om hierdie vrae in beginsel te beantwoord. Die invloed van besigheidsonsekerheid op organisatoriese strukture wat die huidige denkwyse beïnvloed, word erken. Die aanduiding oor organisatoriese ontwikkeling is gebaseer op internasionale, gesaghebbende spesialisgeskrifte, besigheidsontledings, sowel as akademiese vertolkings. Voortreflike literatuur is bekom in professionele joernale oor die ontelbare nuanses van ‘real-time’ inligting. Castells se werk oor die netwerkgemeenskap was van onskatbare waarde vir ’n oorsigtelike insig, terwyl die jongste ontwikkelinge verkry is uit artikels afkomstig van gevestigde navorsingsinstansies. Die skrywer het gedurende die navorsingsfase slegs een proefskrif teengekom oor ‘real-time’ inligting met inligtingstegnologie as die hooffokus. Dit is duidelik dat toenemende navorsing steeds ontbreek. Die uiteindelike bevindings het ooreengestem met die ingewikkeldheid en omvang van die onderwerp. Die eise van ’n internasionale netwerk kan slegs beantwoord word deur ratse en aanpasbare netwerk organisasies, allermins deur hiërargieë. ’n Rol, pleks van ’n aanstelling, raak van toenemende belang in die organisatoriese oorgangsfase na ’n plat struktuur wat deel is van ’n netwerk. Versuim om te begin met so ’n oorgangsprogram sal mislukking tot gevolg hê in die geweldig mededingende besigheidsomgewing wat dwarsoor die wêreld heers. Die RTE is afhanklik van die daarstelling van ‘n balans tussen besighede as dele van ’n geheel in hul omgang met mekaar wat die nodige voorwaardes en vereistes insluit. Dis slegs binne hierdie raamwerk dat toegang tot ‘real-time’ inligting beskou kan word as ’n unieke faktor wat aan besigheidsorganisasies wêreldwyd gebied word.
APA, Harvard, Vancouver, ISO, and other styles
19

Van, der Hoogen Anthea. "An enterprise architecture for environmental information management and reporting." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021040.

Full text
Abstract:
Organisations globally are communicating their environmental sustainability impact to stakeholders by means of the widely used sustainability report. A key benefit of environmental sustainability reporting is that organisations can gain a positive reputation when these reports are presented to stakeholders. Organisations in South Africa are faced with many challenges regarding managing sustainability information and producing an environmental sustainability report. Two of the primary challenges are the many diverse standards for sustainability reporting and data quality issues. Information Technology (IT) can be used to support and improve the process of sustainability reporting but it is important to align the environmental sustainability strategies with the strategies of business and also with the IT strategy to avoid silos of information and reporting. Enterprise Architecture (EA) can be used to solve alignment problems since it supports business-IT alignment. EA is defined by the International Standards Organisation (ISO) as “The fundamental concepts or properties of a system in its environment embodied in its elements, relationships, and in the principles of its design and evolution”. It can be argued, therefore, that EA can be used to support environmental sustainability information management and the reporting process by means of its support of improved business-IT alignment and ultimately integrated systems. The main objective of this study is to investigate how EA can be used to support environmental information management (EIM) and reporting. A survey study of thirty one prominent South African organisations was undertaken in order to investigate the status of their EA adoption and environmental reporting and EIM processes. An EA for EIM Toolkit and a set of guidelines are proposed which can provide support for EIM through the use of EA. These guidelines were proposed based on best-practice for each of the three process levels of an organisation, namely, the strategic level, the operational level and the technological level. The toolkit and guidelines were derived from theory and the results of the industry survey were then validated by an in-depth analysis of a case study consisting of multiple cases with key employees of seven South African organisations which have proved to be successful at EA and EIM and reporting. The results of the case study show that the EA for EIM Toolkit and related guidelines can assist organisations to align their environmental sustainability strategies with their organisational and IT strategies.
APA, Harvard, Vancouver, ISO, and other styles
20

Mulamula, George S. L. "An examination of the relationships between the transfer of information and communications technologies and capacity building towards sustainable development of small and medium enterprises : a focus on Rwanda and Tanzania." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/64303.

Full text
Abstract:
In the modern era, it is widely acknowledged that information and communication technologies have become foundational to every aspect of human endeavor and well-being. The policies of private and public sector organizations, and more so of governments of sovereign states, emphasize the deployment and utilization of information and communication technologies in virtually all forms of business activities. Comparatively, there is consensus that economic and social development of countries can be highly dependent on small and medium enterprises. A broader question arises as to how information and communication technologies can be combined with small and medium enterprises to accelerate sustainable development, especially in nations classified as least developing countries. This research provides some empirical evidence on the extent of the triangular correlation between the transfer of information and communication technologies, capacity building of small and medium enterprises for sustainable development in the least developed country context. The study provides useful insights for policy making with regards to leveraging small and medium enterprises plus information and communication technologies towards stimulating and accelerating sustainable development of least developed countries.
Thesis (PhD)--University of Pretoria, 2016.
Graduate School of Technology Management (GSTM)
PhD
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
21

Kandetu, Tengovandu Kakeni. "Business and information technology alignment : a case analysis at the Government Institutions Pension Fund (Namibia)." Thesis, Stellenbosch : Stellenbosch University, 2007. http://hdl.handle.net/10019.1/20831.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2007.
ENGLISH ABSTRACT: The incumbent needs for business excellence has placed demands on seamless relations between the IT organization and the business. This is a relationship that can never be left to chance. Hence, the objectives of this research were to assess whether the information technology strategy is aligned to the business strategy of the Government Institutions Pension Fund in Namibia and to ascertain how to narrow the gap between IT and business strategies at GIPF. This research has utilized a questionnaire as the main data source. The questionnaire had a Cronbach's alpha reliability coefficient = 0.956, signaling a great internal consistency for the 33 questions of the survey instrument. The survey was performed on a random sample size limited to n=35, which indicates that the results may not be conclusive. The research revealed that the needs of the business should take pre-eminence in the alignment initiative and that IT implementations should be aimed at achieving those needs. However, there are times when IT needs to drive the business agenda in order to champion new opportunities and stimulate new efficiencies. In conclusion, it was established that the credibility of the IT organization, the management of demand for services and the relationship between IT and business executives are central to the quest for alignment. Proper consideration of these issues should be maintained to enable the use of IT for the benefit of business strategy.
AFRIKAANSE OPSOMMING: Die huidige behoeftes vir besigheids-uitnemendheid het hoe vereistes geplaas op 'n geoliede en foutloose verhouding tussen inligtingstegnologie (IT) en die besigheid. Daar kan nie aanvaar word dat hierdie verhouding vanself sal ontwikkel nie. Die doelwitte van hierdie navorsing is juis om vas te stel of die GIPF van Namibie se inligtingstegnologie strategie in Iyn is met die besigheidsstrategie en om te bepaal hoe hierdie gaping nouer gemaak kan word. Die navorsing het gebruik gemaak van 'n vraelys as die hoof bron van data. Die vraelys het 'n Cronbach alpha betrouebare koeffisient van 0.956, wat aandui dat daar groot interne konsekwentheid is vir die 33 vrae van die ondersoek instrument. Die ondersoek was gedoen op 'n willekeurige toetsgrootte waar n=35 wat mag aandui dat die resultate nie bepalend is nie. Die navorsing toon dat die behoeftes van die besigheid prominensie moet neem in die belynings inisiatief en dat IT implementering daarop gemik moet wees om hierdie doelwitte te bereik. Maar, daar is kere waar die inligtingstegnologie se behoetes die dryfveer vir die besigheidsagenda moet wees om nuwe geleenthede te ondersoek en om nuwe bekwaamhede te stimuleer. Ter samevatting, is dit vasgestel dat die aanneemlikheid van die IT organisasie, die bestuur van die vraag na dienste en die verhouding tussen IT en die besigheids bestuur sentraal is vir die soeke na 'n verhouding wat volkome in Iyn is. Daar moet deurlopend deeglik aandag aan hierdie aspekte geskenk word om te verseker dat IT gebruik word ter ondersteuning van die besigheidstrategie.
APA, Harvard, Vancouver, ISO, and other styles
22

Leung, Lai-chun Fiona, and 梁麗珍. "Information technology implementation in small and medium-sized enterprises: a cross-country comparison ofHong Kong and Singapore." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31268122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Mykityshyn, Mark. "Assessing the maturity of information architectures for complex dynamic enterprise systems." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/26686.

Full text
Abstract:
Thesis (Ph.D)--Industrial and Systems Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Dr. William B. Rouse; Committee Member: Dr. Amy Pritchett; Committee Member: Dr. Leon McGinnis; Committee Member: Dr. Mike Cummins; Committee Member: Dr. Steve Cross. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
24

Tshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.

Full text
Abstract:
The research shows the critical success factors when implementing information security projects. Many Information security projects in the past have not been successful because these factors were not identified and emphasised effectively. By identifying these factors the research basically presents a model by which information security projects can be executed with guaranteed success. The factors identified during the study cover the following streams: top management commitment as a factor of success; accountability as a factor of success; responsibility as a factor of success; awareness as a factor of success and an information security policy as a factor of success. For the empirical study, a physical questionnaire was administrated to a pool of experts in project management and information security. The study consisted of 60 participants who were verified to have minimum requirements core for questionnaire completion. The questionnaire requested for biological information of the participants and their perceived relations (based on their experience) between project success versus accountability, information security project success versus responsibilities, information security project success versus training & awareness, information security project success versus top management commitment and information security project success versus information security policy. The participants’ responses were structured according to a Likert-type scale. Participants had to indicate the extent to which they agreed with each of the statements in the questionnaire. The responses obtained from the survey were presented and analysed. The researcher observed in this study that information security projects are so specific that critical success factors need to be emphasised from project inception. With the identified critical success factors, the researcher recommends that a project methodology be structured to include these factors so that there is a standard in running information security projects successfully. The researcher also identified that amongst the critical success factors identified, there are some that need to be emphasised more than the others due to their level of importance in such projects.
APA, Harvard, Vancouver, ISO, and other styles
25

Alhassan, Mohammed. "Enterprise architecture driven design of an artefact to support strategic Information Technology decision-making of Small Enterprises in Nigeria and South Africa." Thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/28345.

Full text
Abstract:
Information Technology (IT) is inevitably influencing the way enterprises operate, compete, and grow. The contemporary disruption has not excluded small companies. Small enterprises play a significant role in the growth of every economy but are hindered by limited skills, time, and money. The attributes of small enterprises influence the strategic and day-to-day operations. Small enterprise owners are often the managers who make the strategic decisions in order to solve specific problems. The decision style of small enterprise owner-managers limits the leveraging of IT. To ensure the sustainability of small enterprises in a contemporary business ecosystem, it is pertinent to strategise IT investment decisions. Enterprise architecture is a well-known approach to business and IT alignment. This study aimsto discover and develop how the complex enterprise architecture principles can strategise the IT decisionmaking process in small enterprises with limited resources and informal structures. The pragmatic philosophic stance was the premise for understanding the decision challenges and the development of a roadmap to intervene the problems the researcher identified. The Vaishnavi and Kuechler design science research methodology guided this study. The qualitative research approach was employed to collect verbal data with eleven small enterprise ownermanagers to understand the processes and the challenges of making IT decision in small enterprises. A thematic analysis of the findings revealed that lack of formalisation, limited information, and lack of IT skill created a critical bottleneck of IT investment decisions in small enterprises. An enterprise architecture-driven framework was developed to overcome the bounded rationality approach to IT choices in small enterprises. The framework holistically assesses organisational business-IT capabilities, constraints, and criteria to guide the decisionmaker's choice. The characteristics of small enterprises limit the successful implementation of the enterprise architecture-driven framework as a theoretical guideline for making optimal IT decisions in small enterprises. This study further developed an online IT decision-assistive tool informed by the framework. The instantiation artefact was demonstrated with six small enterprise owners from Nigeria and South Africa. The findings affirmed the prospect, potential, and relevance of an enterprise architecture-driven artefact as a tool to optimise strategic IT decisions in small manufacturing, service, and retail enterprises. The artefact developed in this study provided a practical intervention to the challenges of IT investment decisions in small enterprises.
APA, Harvard, Vancouver, ISO, and other styles
26

Basson, Delton Jade. "Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2535.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2017.
The balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.
APA, Harvard, Vancouver, ISO, and other styles
27

Salleh, Noor Akma Mohd. "The effect of enacted capabilities on adoption and utilisation of innovative information systems : a study of small- and medium-sized enterprises /." [St. Lucia, Qld.], 2006. http://adt.library.uq.edu.au/public/adt-QU20060626.094619/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nsubuga-Mugoa, Josephine Kayaga. "Successful Strategies for Using Knowledge Management in Small and Medium-Sized Enterprises." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6464.

Full text
Abstract:
Knowledge management (KM) is vital for an organization to succeed in a highly dynamic and competitive world. The purpose of this multiple case study was to explore strategies that managers of small and medium-sized enterprises (SMEs) use to effectively integrate KM into business practices. The study population comprised 5 managers from 2 SMEs operating in Uganda. The eligibility criteria for this study were that participants had to be from Ugandan SMEs with a knowledge-intensive environment, managers with some responsibility of KM in the organization, and experienced with at least 1 year of successful KM practices. The conceptual framework for this study was theory z. Data were collected through face-to-face, semistructured interviews and reviews of company documents. Member checking was completed to strengthen credibility and trustworthiness. After methodological triangulation of the data sources collected and completion of Yin's 5-step process of data analysis, 5 themes emerged: having supportive leadership, ensuring sustainability, embedding KM practices in the organization culture, socialization, and embracing modern technology. The findings of this study might promote social change by supporting SME managers' use of KM to expand opportunities for employees to learn new skills and knowledge leading to the expansion of employment opportunities.
APA, Harvard, Vancouver, ISO, and other styles
29

Xiao, Wenbin. "Determinants of new technology-based firms performance in catch-up regions evidence from the u.s. biopharmaceutical and it service industries 1996-2005 /." Diss., unrestricted, 2008. http://etd.gsu.edu/theses/available/etd-07092008-164934/.

Full text
Abstract:
Thesis (Ph. D.)--Georgia Institute of Technology and Georgia State University, 2008.
Title from file title page. Philip P. Shapira (Georgia Tech), committee chair; Marco Ceccagnoli, Mary Frank Fox (Georgia Tech); Gregory B. Lewis, John P. Walsh (Georgia State), committee members. Electronic text (146 p. : col. ill., col maps) : digital, PDF file. Description based on contents viewed Sept. 17, 2008. Includes bibliographical references (p. 143-146).
APA, Harvard, Vancouver, ISO, and other styles
30

van, Blerk Willem Eben. "The role of emotional intelligence in implementing information technology strategies." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1411.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Doctor of Technology: Information Technology in the Faculty of Informatics and Design at the Cape Peninsula University of Technology 2013
The alignment between business and information technology (IT) strategies has been a challenge for many years. Strategic alignment models and enterprise architecture methodologies and frameworks have been developed to assist business and IT managers with improving alignment between business and IT strategies. The business analyst, systems analyst and project manager are key role players in delivering the information systems (IS) needs of business and therefore key in aligning business and IT strategies. Despite literature and research suggesting a positive influence of emotional intelligence on occupational performance in various industries, the development of emotional intelligence of the business analyst, systems analyst and project manager is neglected by software development organisations. Emotional intelligence is neglected in industry IS competency models as well as documented standards for the business analysis and project management profession (BABOK and PMBOK). Emotional intelligence is not addressed in strategic alignment models and enterprise architecture methodologies and frameworks. Emotional intelligence is equally neglected in IS literature. Systematic research investigating the impact of emotional intelligence on occupational performance of IT professionals remains sparse. The purpose of this study was to determine which emotional intelligence competencies are needed to improve the occupational performance of business analysts, systems analysts and project managers in delivering business information system needs. The study took the form of a multiple interpretive case study. Qualitative data was collected using semi-structured interviews with stakeholders from 20 software development organisations utilising the roles of the business analyst, systems analyst and project manager. Quantitative data was collected using the Genos Emotional Intelligence Inventory with the aim of identifying the patterns of emotional intelligence visible in the sample of business analysts, systems analysts and project managers assessed. The study suggests emotional intelligence has a role to play in alignment between business and IT strategies. It is proposed that industry IS competency models as well as the standards for the business analysis and project management profession as documented in BABOK and PMBOK include specific emotional intelligence competencies. The study also proposes that higher education institutions in IT/IS such as universities of technology, as well as training providers focusing on business analysis, systems analysis and project management, should focus not only on technical skills but emotional intelligence skills as well when developing the supply pipeline of business analysts, systems analysts and project managers. Keywords: Emotional intelligence, business – IT alignment, information technology, enterprise architecture, business analyst, systems analyst, project manager, competencies, non-technical skills.
APA, Harvard, Vancouver, ISO, and other styles
31

Smeda, Jorina. "Benefits, business considerations and risks of big data." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96684.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: Big data is an emerging technology and its use holds great potential and benefits for organisations. The governance of this technology is something that is still a big concern and as aspect for which guidance to organisations wanting to use this technology is still lacking. In this study an extensive literature review was conducted to identify and define the business imperatives distinctive of an organisation that will benefit from the use of big data. The business imperatives were identified and defined based on the characteristics and benefits of big data. If the characteristics and benefits are clear, the relevant technology will be better understood. Furthermore, the business imperatives provide business managers with guidance to whether their organisation will benefit from the use of this technology or not. The strategic and operational risks related to the use of big data were also identified and they are discussed in this assignment, based on a literature review. The risks specific to big data are highlighted and guidance is given to business managers as to which risks should be addressed when using big data. The risks are then mapped against COBIT 5 (Control Objectives for Information and Related Technology) to highlight the processes most affected when implementing and using big data, providing business managers with guidance when governing this technology.
AFRIKAANSE OPSOMMING: ‘Big data’ is 'n ontwikkelende tegnologie en die gebruik daarvan hou baie groot potensiaal en voordele vir besighede in. Die bestuur van hierdie tegnologie is egter ʼn groot bron van kommer en leiding aan besighede wat hierdie tegnologie wil gebruik ontbreek steeds. Deur middel van 'n uitgebreide literatuuroorsig is die besigheidsimperatiewe kenmerkend van 'n besigheid wat voordeel sal trek uit die gebruik van ‘big data’ geïdentifiseer. Die besigheidsimperatiewe is geïdentifiseer en gedefinieer gebaseer op die eienskappe en voordele van ‘big data’. Indien die eienskappe en voordele behoorlik verstaan word, is 'n beter begrip van die tegnologie moontlik. Daarbenewens bied die besigheidsimperatiewe leiding aan bestuur sodat hulle in staat kan wees om te beoordeel of hulle besigheid voordeel sal trek uit die gebruik van hierdie tegnologie of nie. Die strategiese en operasionele risiko's wat verband hou met die gebruik van ‘big data’ is ook geïdentifiseer en bespreek, gebaseer op 'n literatuuroorsig. Dit beklemtoon die risiko's verbonde aan ‘big data’ en daardeur word leiding verskaf aan besigheidsbestuurders ten opsigte van watter risiko's aangespreek moet word wanneer ‘big data’ gebruik word. Die risiko's is vervolgens gekarteer teen COBIT 5 (‘Control Objectives for Information and Related Technology’) om die prosesse wat die meeste geraak word deur die gebruik van ‘big data’ te beklemtoon, ten einde leiding te gee aan besigheidsbestuurders vir die beheer en kontrole van hierdie tegnologie.
APA, Harvard, Vancouver, ISO, and other styles
32

Modimodale, Lloyd. "ICT and SMEs competitiveness in South Afirca : how SMEs could use ICT to become competitive in South Africa." Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-08272008-111005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rastrick, Karyn Christine. "Combining Capabilities: A Resource Based Model of ICT Advantage." The University of Waikato, 2008. http://hdl.handle.net/10289/2611.

Full text
Abstract:
Significant levels of interest and organisational spending on information and communication technologies (ICT's) have triggered debate as to whether these investments are worthwhile. While there has been some acknowledgement that investments result in positive returns, little is known about how ICT's may lead to competitive advantage. This thesis starts to inform this gap, by investigating how ICT's are combined with other organisational resources in the context of an exemplar organisation. The resource based view (RBV) is used as a framework to guide this study. The RBV is an appropriate lens to guide this research due to its focus on resources and capabilities as sources of advantage. This research employs an interpretive case study design based in an organisation with a long history of innovation and success with regard to ICT's. A grounded integrated model of advantage is presented based on two distinct groupings of integrated capabilities: lifecycle and embedded foundational capabilities. The integrated model of advantage, along with key actions outlined to support such capabilities, provides researchers and practitioners with a new way of understanding ICT based advantages. In essence, this research demonstrates how the total ownership of ICT's, within the case studied, presents a potential advantage. The advantage is realised through the combination of capabilities and the inclusive approach to ICT development employed in the case organisation. The research finds support from propositions of the RBV, in that the model demonstrates sources of advantage are based on organisational capabilities which are valuable, firm specific, and socially complex. As such, the integration of capabilities evident in the integrated model of advantage is a likely source of sustained competitive advantage. This means advantages gained from the integration of capabilities are not easily imitated or competed away. Furthermore, advantages have an even greater potential to be a source of sustained advantage than any single resource or capability. The research has important implications for theory and practice. While many individual sources of advantage have been empirically examined, this research provides one of the first in-depth case studies which identify integrated capabilities. Understanding such sources of advantage will help practitioners better understand and protect key organisational capabilities to sustain or extend competitive advantages.
APA, Harvard, Vancouver, ISO, and other styles
34

Toutcha, N'souh Yonkwa. "The impact of cloud computing on the role of an IT department : a case study of a higher education institution in the Western Cape." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2653.

Full text
Abstract:
Thesis (MTech (Business Administration))--Cape Peninsula University of Technology, 2017.
Information and communication technologies are moving fast. Consequently, organisations must be aware of this evolution and adapt to take full advantage of the benefits offered by these technologies. Cloud computing is a new concept of accessing data centers and various computing resources via the internet through any devices and from anywhere. Large organizations, such as Higher Education Institutions (HEI), are gradually adopting cloud computing to reduce their very high budgets. In emerging countries, more and more HEIs are adopting the services offered by cloud computing, more precisely in South Africa in the Western Cape. However, cloud computing affects the way IT services are delivered by traditional HEI IT departments. Thus the objective of this study is to explore the impact of cloud computing on the role of the IT department of HEIs, using a case study. To fulfil this objective, interviews were conducted within the IT department of an HEI, including the IT staff, and it was found that cloud computing affects the role of the IT department by changing the roles and responsibilities of some IT staff, as well as the focus of certain posts in the department. In addition, cloud computing also affects the department's culture. Fortunately, no IT staff have lost their posts. Other results show that training and certification were necessary for the IT to adapt to the changes. Cloud computing adds value to the IT department because it offers a daily 24-hour service as opposed to the traditional IT department.
APA, Harvard, Vancouver, ISO, and other styles
35

Chauma, Crecencia Naison. "The application of project management tools and techniques in ICT SME projects in Western Cape." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2546.

Full text
Abstract:
Thesis (MTech (Business Administration))--Cape Peninsula University of Technology, 2017.
Introduction The research looked at the application of project management tools and techniques in ICT SME projects in the Western Cape. Problem Statement Previous literature revealed that small to medium enterprises (SMEs) are vital to developing economies as they provide employment and contribute to overall sustainable economic productivity. Literature further alludes that project management tools and techniques enhance SME’s ability to innovate, grow and compete in industry. However, it is unclear if ICT SMEs in Western Cape are applying project management tools and techniques in their projects. Therefore, this study aimed to investigate whether ICT SMEs in Western Cape applied these tools and techniques in their projects. Aims / Objectives The primary objective of the research was to determine the extent to which ICT SMEs in Western Cape were using project management tools and techniques. The secondary research objectives were: to determine the extent to which ICT SMEs in Western Cape knew about the project management tools and techniques and how to use them; to establish the extent to which the ICT SMEs knew the benefits of using project management tools and techniques; and to determine the extent to which project management tools and techniques were used by SMEs to achieve success. Methodology The research was non experimental. An electronic questionnaire was distributed using Survey Monkey and Mail Chimp to collect responses. Some questionnaires were hand delivered to ICT SMEs based in the Cape Town CBD areas accessible to the researcher. The results presented in the research were based on a survey of ICT SMEs, located in Western Cape. Out of the 341 responses targeted a total of 210 responses were obtained. The results obtained represent 60- 70% of the population interviewed. The sample was chosen using stratified random sampling that classified the respondents according to organisational hierarchy, and the amount per strata was noted. The respondents within each stratum were chosen using simple random sampling thus eliminating bias.
APA, Harvard, Vancouver, ISO, and other styles
36

Millar, Gary Engineering &amp Information Technology Australian Defence Force Academy UNSW. "The viable governance model (VGM) : a theoretical model of IT governance with a corporate setting." Awarded by:University of New South Wales - Australian Defence Force Academy. Engineering & Information Technology, 2009. http://handle.unsw.edu.au/1959.4/44262.

Full text
Abstract:
Empirical studies into IT governance have considerably advanced our understanding of the mechanisms and practices used by contemporary organisations to govern their current and future use of IT. However, despite the progress made in identifying the various elements employed by contemporary IT governance arrangements, there has been relatively little research into the formulation of a holistic model of IT governance that integrates the growing collection of parts into a coherent whole. To further advance the concept of IT governance, the Viable Governance Model (VGM) is proposed. The VGM is a theoretical model of IT governance within a corporate setting that is based on the laws and principles of cybernetics as embodied in Stafford Beer's Viable System Model (VSM). Cybernetics, the science of control and communication in biological and artificial systems, establishes a firm theoretical foundation upon which to design a system that directs and controls the IT function in a complex enterprise. The VGM is developed using an approach based on design science. Given the theoretical nature of the artefact that is being designed, the development and evaluation activities are primarily conceptual in nature. That is, the development activity involves the design of a theoretical model of IT governance using theoretical concepts and constructs drawn from several reference disciplines including cybernetics, organisation theory, and complexity theory. The conceptual evaluation of the VGM indicates that the model is sufficiently robust to incorporate many of the empirical findings arising from academic and professional research. The resultant model establishes a "blueprint", or set of design principles, that can be used by IS practitioners to design and implement a system of IT governance that is appropriate to their organisational contingencies. Novel aspects of this research include: the integration of corporate and IT governance; the reinterpretation of the role of the enterprise architecture (EA) within a complex enterprise; the exposition of the relationship between the corporate and divisional IT groups; and the resolution of the centralisation versus decentralisation dilemma that confront designers of IT governance arrangements.
APA, Harvard, Vancouver, ISO, and other styles
37

Upfold, Christopher Tennant. "An investigation of information security in small and medium enterprises (SME's) in the Eastern Cape." Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1003847.

Full text
Abstract:
Small and Medium Enterprises (SME’s) embrace a wide range of information systems and technology that range from basic bookkeeping and general purpose office packages, through to advanced E-Business Web portals and Electronic Data Interchange (EDI). A survey, based on SABS ISO/IEC 17799 was administered to a select number of SME’s in the services sector, in the Eastern Cape. The results of the survey revealed that the level of information security awareness amongst SME leadership is as diverse as the state of practice of their information systems and technology. Although a minority of SME’s do embrace security frameworks such as SABS ISO/IEC 17799 or the International equivalent, BS7799, most SME leaders have not heard of security standards, and see information security as a technical intervention designed to address virus threats and data backups. Furthermore, there are several “stripped-down” standards and guidelines for SME’s, based mostly on SABS ISO/IEC 17799, but designed as streamlined, more easily implemented options. Again, these “lighter” frameworks are scarcely used and largely unknown by SME’s. Far from blaming SME leadership for not understanding the critical issues surrounding information security, the research concludes that SME leadership need to engage, understand and implement formal information security processes, failing which their organisations may be severely impacted by inadvertent threats / deliberate attacks on their information systems which could ultimately lead to business failure.
APA, Harvard, Vancouver, ISO, and other styles
38

Sherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.

Full text
Abstract:
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007.
The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
APA, Harvard, Vancouver, ISO, and other styles
39

Hol, Ana. "An online system to guide etransforming SMEs." View thesis, 2009. http://handle.uws.edu.au:8081/1959.7/41373.

Full text
Abstract:
Thesis (Ph.D.)--University of Western Sydney, 2009.
A thesis presented to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics, in fulfilment of the requirements for the degree of Doctor of Philosophy. Includes bibliographies.
APA, Harvard, Vancouver, ISO, and other styles
40

Nocanda, Xolani Wittleton. "Web-based business positioning : an investigation in the tourism industry." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/19797.

Full text
Abstract:
Thesis (MBA) -- Stellenbosch University, 2011.
The use of the web-based technology to conduct business has been growing in many industries globally, this has been the case in the tourism industry. The growing popularity of the web-based technology can be attributed to the benefits it brings to the tourism industry. The study has look into the overall benefits brought by the web-based technology in the tourism industry and how it can be further exploited to benefit the organizations. The application of the web-based technology has included the introduction of the website. The website has given companies exposure to the global market and has been a platform for conducting marketing activities. The website has been used extensively in the tourism industry as a source of information. The website has enabled travel consumers purchase tourism products and services. Having a website may not be sufficient in meeting an organisation’s intended objectives. Many companies in the tourism industry are making use of the website, hence the use of website in search engines has become competitive. Companies need to implement website optimisation techniques to benefit both the travel suppliers and travel consumers. To conduct the organisations marketing activities successfully, the websites needs maximum exposure to the target audience. This can be achieved through the website design aimed at ensuring that the website is highly ranked by search engines. Added features like video, up to date information and photos add value to travel consumers. Through these features travel consumers are able to understand tourism products and services, and hence make informed decisions. The study has looked at the application of the web-based technology in four sectors of the tourism industry in South Africa. These are attraction, accommodation, tour operators and transport. Suppliers in each sector were selected for analysis and they are: - in attraction, Kruger National Park and Hluhluwe Game Reserve; - in accommodation, Hilton hotel and Southern Sun hotel; - in tour operator, Thompson Holiday and Tourvest; and - in transport, Kulula, South African Airways, Avis and Europcar. Suppliers in the tourism industry in South Africa were found to use the website for the following reasons: - Provides information about the organisation and its products and services. - Used as a marketing tool: The website is used to facilitate communication between the travel supplier and the travel consumer. It is also a platform to sell tourism products and services. - Used to enhance collaboration in the industry. Collaboration through websites has resulted in a better supply chain. Customers have been able to buy one package including the airline ticket, accommodation and car hire using one website. - Used to conduct business transactions: Customers have been able to make bookings and reservations and payments through the website. - Used to attract customers to the organisation’s products and services. Attractive features such as photos and videos have been included in the website. The Safari Company is a tour operator in South Africa. Using web-based technology; the company has changed its business model to be able to serve its customers better. The company has developed a new website that adds value to both travel suppliers and travel consumers. Travel suppliers are able to market their services and products through the website. The website provides travel consumers with the latest information and expert advice in tourism products in the Southern and Eastern Africa. The Safari Company website has been a platform for the company to communicate its social responsibility with the global community. The Safari Company donates 10% of its revenue to an organization called Touch the Land. Touch the Land is a foundation that implements projects in Southern and Eastern Africa aimed at poverty alleviation.
APA, Harvard, Vancouver, ISO, and other styles
41

Constance, Leroy David William. "Alignment between business and IT strategies : a case study at a transport organisation." Thesis, Cape Peninsula University of Technology, 2011. http://hdl.handle.net/20.500.11838/2297.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2011.
For almost three decades practitioners, academics, consultants, and research organisations have identified 'attaining alignment between IT and business' (Luttman & Kempaiah, 2007), as a pervasive problem. Despite the wide acceptance of the term "strategic alignment", there was no consensus on how to achieve alignment. The research philosophy was of an interpretive study and an inductive research approach was used. The research strategy was by means of a case study, namely PRASA Western Cape, a business unit of Passenger Rail Agency of South Africa (PRASA). The time horizon for this research was cross sectional. For the data collection a semi-structured interview, supported by secondary data from the business plan and annual report, was used. The research problem was "PRASA has dysfunctional and fragmented institutional arrangements, resulting in misalignment between business and IT". The primary research question to address this problem was "How can PRASA manage strategic alignment between business and IT?" The aim of this research was to understand why the misalignment between business and IT strategies exists at PRASA. A further aim was to propose a guideline to manage alignment between business and IT strategies with the intention of overcoming the fragmented and dysfunctional institutional arrangements. To address resolving the research problem three theoretical models were used. The strategic alignment model was used to ascertain the strategic perspective of PRASA as well as to identify the external strategic fit and internal functional integration of an organisation. The second model used was the strategic alignment maturity model. This model was used to identify the alignment maturity of the business/IT strategies. The final model used was the balanced scorecard. Alignment is one of the best practices recommended by the balanced scorecard, and it recommends aligning all to the strategy of the company. The reason for using the balanced scorecard was that the company currently uses this tool to manage performance. The research finding concluded that PRASA had the strategic execution alignment perspective - business strategy dictates the IT strategy. The overall strategic alignment maturity of the organisation was found to be in initial process. The balanced scorecard methodology was known by all, yet few knew what the performance measures for the organisation was for the year. The triangulated conclusion was that strategic alignment between business and IT was a problem at PRASA. The recommendation was that the organisation conducts three surveys firstly to identify its strategic choice, secondly to identify the strategic alignment maturity and lastly to do a balanced scorecard best practice survey.
APA, Harvard, Vancouver, ISO, and other styles
42

Lenhert, Lance Ronald. "The next generation: A look at where today's enterprise resource planning (ERP) systems came from and where technology is heading." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/1689.

Full text
Abstract:
"Currently, the largest barrier to any given market usually involves capital. If a company does not have enough investment capital to start with, it could fail before it even gets started. However, there is a new component that affects some of the largest corporations in the world. The problem relates to being able to sustain current internal processing, as well as adapt and grow in new markets with higher volumes. There are systems out there today that claim to address these issues along with e-commerce and other electronic sharing of information."
APA, Harvard, Vancouver, ISO, and other styles
43

Dragula, Peter. "Využití IT pro podporu firemních procesů." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222235.

Full text
Abstract:
The area of small and medium enterprises (SMEs) is an important factor, in which many see a promise of improvement of the economic situation. It is a well-founded request, and as shown in many advanced economies, this segment is an important part of economy. My thesis involves one of these situations, where a starting entrepreneur, with low capital investments, is looking for ways how to achieve his market goals and how to support business processes with the help of information technology (IT). The IT supported business model here, will be a model, where the main distribution channels are realized with help of IT technologies. With this distribution channel relates the use of social network services as a marketing tool enabling a development of a company and an effective but not capital-intensive tool designed to realize the business targets.
APA, Harvard, Vancouver, ISO, and other styles
44

Ponelis, S. R. (Shana Rachel). "An exploratory study of business intelligence in knowledge-based growth small, medium and micro-enterprises in South Africa." Thesis, University of Pretoria, 2011. http://hdl.handle.net/2263/28042.

Full text
Abstract:
Small, medium and micro-enterprises (SMMEs) play an important part in all economies but particularly in developing economies. Growth 'SMMEs seek to grow either in size, revenue and/or asset value by reinvesting available resources; these enterprises tend to spend their available resources on operational when it comes to information and communication technology (ICT). But these systems, whilst necessary are not sufficient. They are geared toward capturing data but not producing information. Business intelligence (BI) can provide decision-makers, who in SMMEs are predominantly owner-managers, with access to information that enables them to make informed decisions on where to apply limited resources. Because BI requires operational systems to be in place to gather the data it is the logical next step. Despite increasing discussion in the press and amongst BI practitioners, academic research with regard to BI in SMMEs remains sparse. Since the potential contribution of BI to SMMEs can only be assessed by first understanding current information practices and needs in such enterprises, the purpose of this study is to explore the use of use of BI to support strategic, tactical and operational decision-making. This research uses an interpretive approach to collect data using semi-structured interviews from the owner-managers of six knowledge-based growth SMMEs in South Africa selected through purposive sampling. The research results suggest that BI can play an important role in knowledge-based growth SMMEs but that support and guidance is needed to ensure that BI is used appropriately to fully exploit available data for decision-making in addition to expanding available data sources. Future research can adopt a more rigorous positivist approach to confirm the findings of this study, expand the population to other sectors in South Africa and/or SMMEs in other countries. An action research methodology can also be used to apply BI interventions in SMMEs to investigate specific BI solutions in-depth. The research may be of value to participating and other SMME owner-managers, policy makers, government agencies, business advisers, and academic researchers.
Thesis (PhD)--University of Pretoria, 2011.
Information Science
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
45

Goosen, Riana. "The development of an integrated framework in order to implement information technology governance principles at a strategic and operational level for medium-to-large sized South African business." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20279.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2012.
ENGLISH ABSTRACT: In today's technologically advanced business environments, Information Technology (IT) has become the centre of most, if not all businesses' strategic and operational activities. It is for this reason that the King III report has dedicated a chapter to IT governance principles, in effect making the board of directors and senior management responsible for implementing such principles. King III's guidance on these principles is only described in broad terms and lack sufficient detail as how to implement these principles. Though various guidelines, in the form of IT control frameworks, -models and -standards exist, it remains highly theoretical in nature and companies tend to view these control frameworks, -models and -standards on an individual basis, implementing them in an ad hoc manner, resulting in the implementation of an inefficient IT governance system, that does not address the key strategic areas and risks in a business. The purpose of this study is to develop an IT best practices integrated framework which can assist management in implementing an effective IT governance system at both a strategic and operational level. The integrated framework was developed by performing a detailed literature review of a best practice control framework, -model and -standard, including its underlying processes. By combining and aligning the relevant processes of the control framework, -model and -standard to the business' imperatives, a framework was developed to implement IT governance principles at a strategic level. The integrated framework is extended to provide guidance on how to implement good IT controls at an operational level. The control techniques, of the applicable processes identified at a strategic level, are implemented as well as the controls around a company's various access paths, which are affected by a company's business imperatives. These access paths are controlled through the implementation of applicable configuration controls. By making use of the integrated framework which was developed, an effective and efficient IT governance system can be implemented, addressing all applicable IT risks relevant to the key focus areas of a business.
AFRIKAANSE OPSOMMING: In vandag se tegnologies gevorderde besigheids omgewings het Informasie Tegnologie (IT) die middelpunt geraak van die meeste, indien nie elke onderneming se strategiese en operasionele aktiwiteite nie. Dit is vir hierdie rede dat die King III verslag 'n hoofstuk aan die beginsels van IT korporatiewe beheer wy. Dié verslag hou die direkteure en bestuur verantwoordelik vir die implementering van hierdie beginsels. Die King III verslag verskaf egter slegs in breë trekke leiding in verband met die implementering van hierdie beginsels en 'n gebrek aan meer gedetailleerde beskrywings bestaan. Alhoewel verskeie riglyne, in die vorm van IT kontrole raamwerke, -modelle en -standaarde bestaan, bly dit steeds teoreties van aard en is maatskappye geneig om hierdie riglyne op 'n individuele vlak te hanteer en op 'n willekeurige wyse te implementeer. Hierdie proses lei tot die implementering van 'n ondoeltreffende IT korporatiewe beheerstelsel. Die doel van hierdie studie is om 'n geïntegreerde beste praktykraamwerk te ontwikkel wat deur die direkteure en bestuur van 'n onderneming gebruik kan word om op beide 'n strategiese en operasionele vlak 'n doeltreffende IT korporatiewe beheermaatstelsel in plek te stel. 'n Geïntegreerde raamwerk is ontwikkel deur 'n volledige literatuurstudie uit te voer, gebaseer op 'n beste praktyk IT kontrole raamwerk, -model en -standaard en die gepaardgaande prosesse. Deur die toepaslike prosesse van hierdie kontrole raamwerk, -model en -standaard te kombineer en te belyn met 'n besigheid se besigheidsimperatiewe, word IT korporatiewe beheerbeginsels op 'n strategiese vlak in plek gestel. Die geïntegreerde raamwerk sluit riglyne in om goeie IT kontroles op 'n operasionele vlak te implementeer. Die kontrole tegnieke, wat verbind word met die gepaardgaande prosesse wat tydens die strategiese vlak geïdentifiseerd is, word geimplementeer asook die die toepaslike konfigurasie kontroles oor die verskeie toegangspaaie wat beïnvloed word deur 'n besigheids se besigheidsimperatiewe. Deur gebruik te maak van die ontwikkelde geïntegreerde raamwerk kan alle geaffekteerde IT risikos nou aangespreek word en 'n doeltreffende IT korporatiewe beheerstelsel in plek gestel word.
APA, Harvard, Vancouver, ISO, and other styles
46

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Full text
Abstract:
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches for minimizing and recovering from cyber-attack losses and preventing further cyber-attacks are gaining more importance. Many studies exist that have increased our understanding of how individuals and organizations are motivated to reduce or avoid the risks of security breaches and cyber-attacks using safeguard mechanisms. The safeguards are sometimes technical in nature, such as intrusion detection software and anti-virus software. Other times, the safeguards are procedural in nature such as security policy adherence and security awareness and training. Many of these safeguards fall under the risk mitigation and risk avoidance aspects of risk management, and do not address other aspects of risk management, such as risk transfer. Researchers have argued that technological approaches to security risks are rarely sufficient for providing an overall protection of information system assets. Moreover, others argue that an overall protection must include a risk transfer strategy. Hence, there is a need to understand the risk transfer approach for managing information security risks. Further, in order to effectively address the information security puzzle, there also needs to be an understanding of the nature of the perpetrators of the problem – the hackers. Though hacker incidents proliferate the news, there are few theory based hacker studies. Even though the very nature of their actions presents a difficulty in their accessibility to research, a glimpse of how hackers perpetrate attacks can be obtained through the examination of their knowledge sharing behavior. Gaining some understanding about hackers through their knowledge sharing behavior may help researchers fine-tune future information security research. The insights could also help practitioners design more effective defensive security strategies and risk management efforts aimed at protecting information systems. Hence, this dissertation is interested in understanding the hackers that perpetrate cyber-attacks on individuals and organizations through their knowledge sharing behavior. Then, of interest also is how individuals form their URL click-through intention in the face of proliferated cyber risks. Finally, we explore how and why organizations that are faced with the risk of security breaches, commit to cyberinsurance as a risk management strategy. Thus, the fundamental research question of this dissertation is: how do individuals and organizations manage information security risks?
APA, Harvard, Vancouver, ISO, and other styles
47

Koekemoer, Johannes Frederik. "A grounded theory analysis of networking capabilities in virtual organizing." Thesis, Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-11102008-150737/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Xiao Wen. "Strategic supply chain management : application of QAD, a leading provider of industry-specific e-business software and services to manufacturers in China." Thesis, University of Macau, 2000. http://umaclib3.umac.mo/record=b1636662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Van, Schalkwyk Pieter Geldenhuys. "Using collaborative web 2.0 tools in enterprise system implementation to assist with change management as a critical factor." Diss., Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-08262008-114525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Simbanegavi, Godwishes. "Decision support systems adoption by emerging farmers in the wine industry : a case study of the Western Cape, South Africa." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2299.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2012.
The wine industry is complex hence the farmers and emerging farmers who operate in it are faced with environmental, social and economic constraints. Even though various issues have been pointed out to be contributing to the slow uptake of ICT by emerging farmers (Cox, 1995), McCartney (2007) however pointed out that DSSs can enhance gains in economic, social and environmental benefits. This study investigates how wine farmers use ICTs to support decision making in order to assist emerging farmers adopt and use the ICTs for decision making. Decision making is crucial; it is one of the most important tasks of management in running a successful business (Dralega, 2007). Emerging farmers have to operate in a complex environment and ICT use can lead to the effective use of information to support decision making in the industry. Experienced farmers use ICT tools to support decision making and use information to make informed decisions in their operations. Emerging farmers are at a distinct disadvantage as they have no previous knowledge of farming and have to find their way on a day to day basis. This has the potential of reducing profitability and sustainability of the emerging farmers who have entered the industry. The main research question is: "how can emerging farmers utilise ICT for decision making in the wine industry in the Breede River Valley region in the Western Cape?" Interviews were done to gather primary data. In this case it is information about the technological and information needs of farmers which might help them in decision making. The literature is reviewed in this study to gather secondary data. The study took an inductive approach and the epistemological stance in this study is interpretivism. The case study was used as strategy for the study. The interviewees emphasised the importance of ICTs in their decision making; they mentioned that without the use of ICTs in decision their businesses will crumble. In order to prosper in their business, emerging farmers need to invest in ICTs as this will also assist in improving livelihoods of the farmers and their workers.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography