Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- AIS (1)
- Accounting information systems (1)
- Advance fee fraud Mails (1)
- Africa (1)
- E-Commerce (1)
-
- E-Mail Tracers (1)
- E-commerce (1)
- IS strategy (1)
- Information security culture; Information security; information security awareness (1)
- Kenya (1)
- Least Developing Countries (LDC) (1)
- Libyan banks (1)
- MSEs (1)
- Mobile Internet (1)
- Mobile Money Transfer (1)
- Nigeria (1)
- Origin (1)
- Process change (1)
- Small and Medium Enterprises (SMEs) (1)
- Spam (1)
- Structuration theory (1)
- Tanzania (1)
Articles 1 - 5 of 5
Full-Text Articles in Business
Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn
Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn
The African Journal of Information Systems
This article reports on the recent implementation and current deployment of accounting information systems in Libyan commercial banks. A case study approach is adopted that moves from an initial screening of the 14 main Libyan banks to a final in-depth study of just three banks. Business process modeling and systems profiling are used to assess the status of the banks in terms of systems use, process change and information systems strategy development. Libyan banks are well advanced in their installation of modern packaged software but could be used to greater effect to optimize business processes and improve efficiencies. Training and …
Information Security Culture In Public Hospitals: The Case Of Hawassa Referral Hospital, Temesgen Gebrasilase, Lemma Ferede Lessa
Information Security Culture In Public Hospitals: The Case Of Hawassa Referral Hospital, Temesgen Gebrasilase, Lemma Ferede Lessa
The African Journal of Information Systems
Information security culture is mainly considered as a set of information security characteristics that the organization values. In this paper, an attempt has been made to assess the information security culture of Hawassa Referral Hospital located in the south central part of Ethiopia. The study aimed at identifying determinant factors or issues impacting the implementation of an effective culture of information security in the hospital with an intention of improving the existing information security practice in the hospital. To that end, an information security culture assessment model and instrument were adopted from previous studies. The instrument (customized for the current …
Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj
Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj
The African Journal of Information Systems
This paper interrogates the suitability of Mobile Technologies to facilitate e-commerce in Kenyan Micro and Small Enterprises (MSEs). The study proposed a theoretical model and empirically tested it using a sample selected using proportionate stratified sampling within well-defined geographic clusters. The study revealed that, while there is massive use of mobile Internet Services (MIS), there is limited use of Mobile Money Transfer Services (MMTS) for B2B and B2C transactions as opposed to C2C and C2B e-commerce transactions. Results also indicated that utilizing MIS and MMTS, positively and significantly influenced organization’s performance through operational, transactional and interactional benefits. On the research …
On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan
On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan
The African Journal of Information Systems
One issue that is concerning to the web security community is the correct identification of the origins of advance fee fraud mails. This has serious implications for directing concerted efforts towards mitigating the malaise in the right direction. Although previous research (Cuckier et al, 2007, Gbenga, 2007; Igwe, 2007; Progame, 2007) opined that these mails originate mainly from Nigeria and other West African Countries, research is warranted using available tracking tools to validate previously held notions about the issue of advance fee e-fraud mails. We harvested in real-time aggregated advance fraud e-mails over a two year period using the sinkhole …
“E-Commerce Institutionalization Is Not For Us”: Smes Perception Of E-Commerce In Tanzania, Salah Kabanda
“E-Commerce Institutionalization Is Not For Us”: Smes Perception Of E-Commerce In Tanzania, Salah Kabanda
The African Journal of Information Systems
E-Commerce in least developing countries (LDCs) is believed to be non-existent because few businesses, especially Small and Medium Enterprises (SMEs) who are usually the vanguard of the LDCs economy, have adopted E-Commerce and even those that have, none have institutionalized the technology. Using structuration theory as a lens, this study attempts to provide an explanation as to what E-Commerce means to SMEs with the purpose of unraveling the underlying cause for the lack of E-Commerce institutionalization in LDC - Tanzania. Results indicate that SMEs use their social context to create symbolic interpretive schemes that facilitate their shared understanding of E-Commerce. …