Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Business

The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi Nov 2023

The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi

The African Journal of Information Systems

This paper investigates factors influencing the adoption of social media analytics (SMA) for citizen relationship management (CzRM). Three real-world cases of government departments, two in South Africa and one in Germany, were investigated, and focus group discussions were conducted. The technological, organizational, and environmental (TOE) theory and qualitative content analysis guided the data analysis. The findings revealed that in all cases, staff usually conducted a manual analysis of social media and SMA had not been implemented sufficiently to realize its full potential. Insights were obtained from TOE and factors were identified that should be considered for improving the planning of …


Modeling Identity Disclosure Risk Estimation Using Kenyan Situation, Peter N. Muturi, Andrew M. Kahonge, Christopher K. Chepken, Evans K. Miriti Nov 2023

Modeling Identity Disclosure Risk Estimation Using Kenyan Situation, Peter N. Muturi, Andrew M. Kahonge, Christopher K. Chepken, Evans K. Miriti

The African Journal of Information Systems

Identity disclosure risk is an essential consideration in data anonymization aimed at preserving privacy and utility. The risk is regionally dependent. Therefore, there is a need for a regional empirical approach in addition to a theoretical approach in modeling disclosure risk estimation. Reviewed literature pointed to three influencers of the risk. However, we did not find literature on the combined effects of the three influencers and their predictive power. To fill the gap, this study modeled the risk estimation predicated on the combined effect of the three predictors using the Kenyan situation. The study validated the model by conducting an …


Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom Oct 2023

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom

The African Journal of Information Systems

Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …


Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi Oct 2023

Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi

The African Journal of Information Systems

e-Health solutions in low-income countries are fragmented, address institution-specific needs, and do little to address the strategic need for inter-institutional exchange of health data. Although various e-health interoperability frameworks exist, contextual factors often hinder their effective adoption in low-income countries. This underlines the need to investigate such factors and to use findings to adapt existing e-health interoperability models. Following a design science approach, this research involved conducting an exploratory survey among 90 medical and Information Technology personnel from 67 health facilities in Uganda. Findings were used to derive requirements for e-health interoperability, and to orchestrate elements of a service oriented …


Phishing Attacks: A Security Challenge For University Students Studying Remotely, Blessing Nyasvisvo, Joel M. Chigada Sep 2023

Phishing Attacks: A Security Challenge For University Students Studying Remotely, Blessing Nyasvisvo, Joel M. Chigada

The African Journal of Information Systems

The emergence of the deadly global respiratory coronavirus disease (COVID-19) in 2019 claimed many lives and altered the way people live and behave as well as how companies operated. Considerable pressure was exerted on Institutions of Higher Learning (universities) to salvage the academic projects through the process of business model reconfiguration. Students were required to study remotely and were, therefore, exposed to phishing and scamming cyber-attacks. The effects of these attacks were examined in this study with the support of literature and empirical research leading to appropriate recommendations being proposed. Data were obtained through semi-structured interviews from students at a …


Smartphone Use In Financial Management Among Women’S Informal Saving Groups In Dodoma, Tanzania, Madina H. Juma, Jarkko Suhonen, Nasibu Rajabu Mramba, Matti Tedre, Alsen F. Kapinga Jul 2023

Smartphone Use In Financial Management Among Women’S Informal Saving Groups In Dodoma, Tanzania, Madina H. Juma, Jarkko Suhonen, Nasibu Rajabu Mramba, Matti Tedre, Alsen F. Kapinga

The African Journal of Information Systems

Diffusion of smartphone technology has created multiple opportunities for economic development. This research investigated the use of smartphones in financial management among women’s informal saving groups in Dodoma, Tanzania. Qualitative data were collected from 10 groups, derived from 15 interviews and 3 focus group discussions (FGDs) with 22 participants and thematic analysis was done. The findings revealed that research participants were using smartphones to access WhatsApp, the camera, mobile money applications and the calculator for coordination, recording, calculation, and payment. It was also found that untrustworthy communications, high charges and mobile fraud were challenges experienced by the groups. Familiarity, ease …


A Methodology For Context—Specific Information Systems Design Theorizing, Muluneh Atinaf, Salehu Anteneh, Mesfin Kifle May 2023

A Methodology For Context—Specific Information Systems Design Theorizing, Muluneh Atinaf, Salehu Anteneh, Mesfin Kifle

The African Journal of Information Systems

Prescriptive knowledge constitutes one of the important contributions of information systems design theorizing in information systems (IS) research. Existing methods for IS design theorizing apply kernel/reference theories as sources of justificatory knowledge that serve to justify and validate the knowledge produced. This has gaps in guiding how specific contexts of stakeholders and their practices can be entertained in the design process. This research attempts to address the above void, taking a socio-technically complex agricultural extension information service and the contexts that define it into account. The research builds on an existing IS design theory framework and shows how it can …


Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria, Funmilola Olubunmi Omotayo, Joy Oluwabukola Olayiwola Feb 2023

Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria, Funmilola Olubunmi Omotayo, Joy Oluwabukola Olayiwola

The African Journal of Information Systems

The purpose of this paper is to investigate information privacy and security awareness among online social media (OSM) users in the Ibadan metropolis, Nigeria. Building upon the social exchange theory, some factors that could influence the disclosure of private information on social media were identified. Findings from the analysis of data of 255 respondents revealed that most were aware of information privacy and security measures available on OSM, and the risks associated with the disclosure of private information on OSM. Privacy and security awareness, the perception of benefits associated with the use of OSM, the perception of risks associated with …


Using Accounting Software For Teaching And Learning In A Second-Year Accounting Course, Lesley J. Stainbank Prof, Thanesha Reddy Jankeeparsad, Aarthi Algu Jan 2023

Using Accounting Software For Teaching And Learning In A Second-Year Accounting Course, Lesley J. Stainbank Prof, Thanesha Reddy Jankeeparsad, Aarthi Algu

The African Journal of Information Systems

The aim of this paper is to report students’ perceptions on whether the use of accounting software enhances their understanding of the accounting cycle, and improves their information technology skills. Kolb’s experiential learning cycle is used to argue that offering a concrete learning experience increases effective learning. The study uses survey research to determine students’ perspectives of the usefulness of using accounting software in enhancing their understanding of the accounting cycle in a real business environment. The results show that students perceived the accounting example they used in the accounting software training to have some benefits in helping their understanding …