Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Business

Emerging Internet Technologies And The Regulation Of User Privacy, Phil Nyoni, Mthulisi Velempini, Nehemiah Mavetera Dec 2020

Emerging Internet Technologies And The Regulation Of User Privacy, Phil Nyoni, Mthulisi Velempini, Nehemiah Mavetera

The African Journal of Information Systems

Modern Internet-based technologies pose a threat to privacy, as they possess multiple sensors or features that collect data about users. There is a need to determine the privacy risks that affect users in South Africa as there are a few studies on the subject. A qualitative study was done which involved interviewing seven experts and a survey consisting of 101 respondents. The results show that regulators view emerging technologies as potentially risky and are motivated by public interest to develop protective laws. It therefore is necessary that regulators develop robust laws to help prevent privacy violations. Furthermore, this paper proposes …


Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu Oct 2020

Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu

The African Journal of Information Systems

The pervasiveness of public sector corruption has been a major concern by successive governments and their citizenry. In order to curb such corruption, previous studies have focused on the anti-corruption strategies adopted by governments in isolation, but little or no study has focused on the interactions of the anti-corruption strategies. Using the concept-centric approach, we reviewed 91 studies systematically to understand the trends of government anti-corruption strategies. From the synthesized studies, we identified three dominant themes of anti-corruption strategies and their associated concepts. In addition, we also identified one dimension that captures information technology (IT) as a vehicle that enhances …


Automated License Plate Recognition Using Existing University Infrastructure And Different Camera Angles, Andre Calitz, Matthew Hill Aug 2020

Automated License Plate Recognition Using Existing University Infrastructure And Different Camera Angles, Andre Calitz, Matthew Hill

The African Journal of Information Systems

Number or license plate recognition has become an essential technology for traffic and security applications. Providing access control at any organization or academic institution improves the level of security. However, providing security personnel to manually control the access of vehicles at an academic institution is costly, time-consuming, and to a limited extent, error prone. This study investigated the use of an automated vehicle tracking system, incorporating experimental computer vision techniques for license plate recognition that runs in real-time to provide access control for vehicles and provide increased security for an academic institution. A vehicle monitoring framework was designed by using …


The Form, Function And Materiality Of Portable It In Inter-Organizational Control, Gamel O. Wiredu Jul 2020

The Form, Function And Materiality Of Portable It In Inter-Organizational Control, Gamel O. Wiredu

The African Journal of Information Systems

Extant explanations of inter-organizational (IO) control are based on functional assumptions of information technology (IT) at the expense of structural assumptions. By focusing on structural assumptions, this paper explains how and why the formal and material properties of portable IT shape IO control. Based on analysis of portable IT mediation between a government agency and traders for tax administration, it was found that portable IT, with the support of the IO structure, reduces IO control. This occurs because portable IT invites users to subvert its connectivity and visibility with the support of the IO structure. Portable IT and IO structures …


Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick Jul 2020

Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick

The African Journal of Information Systems

Research shows that the information systems domain is underrepresented in project complexity as it has only eight percent representation within the project complexity landscape. Emphasis is placed mostly on generic project management and engineering project management. This begs the question of how well IS project complexity is understood in literature? The goal of this research is to perform the groundwork for developing new theoretical foundations for information systems (IS) project complexity by enriching previous work. Complexity theory was applied to develop a comprehensive theoretical model for IS project complexity. The IS project complexity (ISPC) model was developed and revealed that …


A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku Jul 2020

A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku

The African Journal of Information Systems

The coordination of communication and awareness efforts in the process of Information Security Incident Management (ISIM) has been identified as a critical means of enhancing information security protection in organizations. This paper aims to explore the nuances of organizational information security with respect to the coordination of communication and awareness efforts among organizational stakeholders towards achieving a shared, interactive, and participatory ISIM. According to the findings of the study in the organizations sampled, it has been identified that reporting, communication, and awareness efforts within ISIM were found to be largely uncoordinated. The exploratory findings provided a rationale for the proposal …


A Conceptual Information Technology Project Management Assurance Framework, Elizabeth Mkoba, Carl Marnewick May 2020

A Conceptual Information Technology Project Management Assurance Framework, Elizabeth Mkoba, Carl Marnewick

The African Journal of Information Systems

Over the last decade, information technology (IT) projects have continued to fail at an alarming rate. Project managers are still battling to manage and deliver successful IT projects in organizations. The conceptual information technology project management assurance framework developed consists of project assurance processes. The conceptual framework was validated through a survey of 121 IT project managers from organizations in seven African countries. The purpose of this paper is to present research findings on how well project assurance processes are implemented and their importance in achieving a successful IT project outcome in organizations. The findings indicate that most project assurance …


Causes Of Challenges In Implementing Computer-Based Knowledge Management Systems In Healthcare Institutions: A Case Study Of Private Hospitals In Johannesburg, South Africa, George Maramba, Alfred Coleman, Felix F. Ntawanga May 2020

Causes Of Challenges In Implementing Computer-Based Knowledge Management Systems In Healthcare Institutions: A Case Study Of Private Hospitals In Johannesburg, South Africa, George Maramba, Alfred Coleman, Felix F. Ntawanga

The African Journal of Information Systems

The advent of computer-based knowledge management systems has changed the world, especially in the way businesses operate, making them an integral aspect to modern economies and the drivers of success. Studies show that the implementation of computer-based knowledge management systems is challenging, particularly in healthcare institutions. This paper presents a study that was undertaken to identify the causes of challenges encountered when implementing computer-based knowledge management systems in healthcare institutions. A case was used as this study’s research methodology in which three private hospitals based in Johannesburg, South Africa, were utilized. Six participants, two from each private hospital, were purposively …


In-Service Biology Teachers’ Perceptions And Pedagogical Rating Of Two Mobile Learning Applications Recommended For Learning Biology In Nigerian Secondary Schools, Uchenna Udeani Prof, Jeremiah Nosakhare Akhigbe Mr May 2020

In-Service Biology Teachers’ Perceptions And Pedagogical Rating Of Two Mobile Learning Applications Recommended For Learning Biology In Nigerian Secondary Schools, Uchenna Udeani Prof, Jeremiah Nosakhare Akhigbe Mr

The African Journal of Information Systems

The study investigated in-service biology teachers’ perceptions of the instructional use of smartphones equipped with Biology Mobile Learning Applications (BMLAs) in the learning of biology concepts in Nigerian senior secondary schools and the pedagogical rating of two commercially available mobile learning applications recommended for learning biology. The study utilized a descriptive survey design. Data collected were analyzed using descriptive and inferential statistics. Findings gathered revealed that the in-service biology teachers had good perceptions of the instructional use of BMLAs and that these perceptions influence their pedagogical rating and selection of mobile applications. The study also revealed that demographic variables such …


Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu Mar 2020

Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu

The African Journal of Information Systems

Although considerable literature has grown around cyberbullying, there are still only limited studies on this within developing economies, especially African countries. In particular, studies on cyberbullying in Africa have failed to have a direct focus on the prevalence of this phenomenon among students in universities. Not only does cyberbullying have an emotional-social impact, it has ramifications on the learning process as well. This subject remains of utmost relevance within academia, and a number of institutions continue to grapple with its impact. The study reported here is an exploratory investigation of 396 students from one of the private universities within Nairobi, …


Enabling Factors And User Requirements For Microcredit Services Through Mobile Devices - Dar Es Salaam Tanzania Context., William Clifford Gomera, Jarkko Suhonen Dr., George Oreku Prof. Jan 2020

Enabling Factors And User Requirements For Microcredit Services Through Mobile Devices - Dar Es Salaam Tanzania Context., William Clifford Gomera, Jarkko Suhonen Dr., George Oreku Prof.

The African Journal of Information Systems

Microfinance institutions (MFIs) play a considerable role in providing capital to micro businesses (MBs) through microcredit services. However, the interplay between MFIs and MB owners has been hindered by several factors, such as challenges with information sharing. The current study aims at identifying the specific challenges of microcredit services in Dar es Salaam, Tanzania, and also at determining the enabling factors, preferred features, and general requirements for a mobile technology solution to support the interplay between MFIs and MBs. The participants in the study were 91 MB owners and 22 MFI officers, and the data for the study were collected …