Repository logo
 

Masters Degrees (Information Systems and Technology)

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 20 of 91
  • Item
    Case study: an evaluation of the comprehensibility of information security policies in a South African bank.
    (2023) Razack, Riyadh Sayed.; Maharaj, Manoj Sewak.
    Information security policy and its resultant implementation is seen as pivotal in organisations that want to protect their information both internally and externally. Employees are relied heavily upon to read and understand and therefore comply with the information security policy including all its principles. The study has used readability and comprehension tests to assess the policy to analyse what the minimum required reading level is, how much abbreviations and jargon are contained therein. Employees were surveyed to understand the implications of security policy on them, the study utilised interviews of staff and asked questions pertaining to awareness, ideal ways to eradicate jargon and technical terms as well as views around security policy implementation. Ultimately directing implications around improvements to be made, but not limited to the removal of jargon and technical terms. Further to this, recommendations are detailed for policy writers and implementors, as well as critical success factors for ISMS managers and security specialists who are tasked with crafting policy, embedding this through the organisation and ensuring staff comply and adhere to organisational information security strategy. A conceptual multidimensional framework to coordinate the significant outcomes identified in the study is also developed to enable robust information security design, and monitoring. Within the context of the study a number of important and noteworthy outcomes have been established. Any conceptual framework must provide a dimension to remediate the readability challenges. The other established outcome pertains to awareness and socialisation/training pertaining to policies, where respondents did not believe awareness of information security policies were adequate and accessibility was viewed as problematic, this was confirmed by the interviews where most staff did not know where to locate information security policy/ies. Respondents did not feel included in the development of policy and accompanying improvement mechanisms and consequently any conceptual framework which does not incorporate users is inherently flawed.
  • Item
    Understanding the factors influencing the adoption of cloud computing in higher education during coronavirus disease: a case of University of KwaZulu-Natal.
    (2023) Zondi, Minenhle.; Civilcharran, Surika.
    Cloud computing (CC) as a model for internet-based service provisioning, enables the delivery and access of services based on dynamically scalable and virtualized resources (infrastructure, platforms, etc.). For higher education institutions (HEIs) cloud computing provides services anywhere and anytime, as a result of its scalability and pay-as-you-use approach. Although scalable processing and storage, data sharing, and anytime, anywhere access are some of the key advantages that CC may offer enterprises, there are also risks and barriers to adoption, and it is still in its infancy in developing nations. The Coronavirus (Covid-19) pandemic, which struck the entire world in 2020, compelled institutions to alter their procedures and methods as a result of the social distancing laws that were put in place to stop the spread of Covid-19. The sudden surge of the Covid-19 pandemic caused a quick acceleration towards the adoption and use of CC in learning and education to ensure the continuation of classes. CC had a significant impact in fighting the epidemic and became a saviour for various fields including the education sector. This study seeks to investigate the factors influencing the adoption of CC in HEIs during the upsurge of the Covid-19 virus. The research model utilised is the unified theory of acceptance and use of a technology (UTAUT). The study used a quantitative technique to identify the factors that influence the adoption of cloud computing through a questionnaire survey that was administered to a convenient sample at the UKZN Pietermaritzburg campus. The study found that effort expectancy (EE), performance expectancy (PE) and social influence (SI) all positively influence the behavioural intention (BI) to use CC for learning purposes, with performance expectancy being the highest predictor of behavioural intention to adopt CC for students. Additionally, facilitating conditions (FC) and behavioural intention (BI) were also found to influence the actual sage of CC for learning purposes. These findings are useful as they give university’s policymakers, designers insights into what factors are crucial when implementing CC to ensure the successful adoption by students.
  • Item
    Understanding students’ compliance behaviour with the information security measures within a South African university.
    (2022) Masinga, Sabelo Moses.; Civilcharran, Surika.
    Today’s organisations are continuously and increasingly being exposed to security breaches. Higher education institutions have also been affected by the increasing occurrences of security breaches. Higher education institutions’ exposure to security breaches have been attributed to factors such as human error and lack of information security compliance among students. Studies have shown that students do not comply with information security policies. Hence, students, like most humans, remain the weakest link in the exposure of information and information systems to cyberattacks. In this study, the protection motivation theory was used as the guiding theoretical framework to understand students’ compliance behaviour with information security measures. This study employed an exploratory research design supported by a quantitative research approach to investigate the factors influencing students’ compliance with information security measures. The data was collected using a questionnaire and was analysed using the statistical package for social science (SPSS). From a stratified sample of 376 participants, the findings indicate that Perceived Severity and Perceived Rewards have the most significant effect on student compliance with information security measures. This study further makes suggestions that may help improve compliance with information security controls within higher education institutions, such as replacing the student card system with biometric fingerprint scanners which are a more convenient method to access the university.
  • Item
    Factors that influence the acceptance of the revenue management system at the eThekwini municipality in KwaZulu-Natal.
    (2022) Khumalo, Zandile Rosemary.; Ranjeeth, Sanjay.
    Traditional business processing models have been transformed by the intervention of technology. Technology has generally improved levels of productivity, efficiency, and accuracy when it comes to the processing of data. These attributes of the technological era have prompted many organisations to make a substantial investment in technological systems with the expectation of making achieving a competitive advantage and an elevated level of maturity of technology usage. This trend has been followed in the domain of public sector governance with many South African municipalities opting to follow the business model of using technological systems to replace manual systems and to redesign process models so that there is a strong alignment with the technology. However, the expectation of success due to technological intervention does not always guarantee a successful outcome. This has been prompted in response to anecdotal evidence that attests to a failed information system used by the eThekwini Municipality in the province of KwaZulu-Natal. The main purpose of the system is to collect revenue from the citizens of the municipality based on services that are delivered at the municipality. The empirical phase of the study focused on the use of the Revenue Management System (RMS) at the eThekwini Municipality, South Africa. The study is aimed at evaluating the user acceptance of the RMS by employees of the eThekwini Municipality. The objective of the study is to ascertain the influence that technology acceptance factors play on the end users’ intention to accept the RMS at the eThekwini Municipality. The Unified Theory of Acceptance and Use of Technology model was used to underpin a quantitative empirical phase. The main output from the study is the analysis of a set of technology acceptance factors that influence the usage of the system. Primary data was collected using questionnaire from 180 employees, and only 105 responses of which only 102 were useful. The Statistical Package for Social Sciences (SPSS) was used to analyse the primary data collected. Descriptive and inferential statistics were used to address the research objectives. The research findings of this study have revealed that performance expectancy, effort expectancy and facilitating conditions are the factors that significantly influence employees’ behavioural intention to accept and use RMS at the municipality. With the research findings and the recommendations presented, the management should ensure that the RMS at the municipality is improved, this will contribute to the optimum usage of the system thereby improving staff morale and contribute towards better service delivery to the citizens of the eThekwini Municipality.
  • Item
    The influence of big data on monitoring the factual quality of digital media in Southern Africa.
    (2022) Dlomo, Andile Samkeliso.; Quilling, Rosemary Diane.
    This research study will explore how big data can drive innovation in response to dynamic change and aid society in establishing an advantage when fact-checking/monitoring new media and dealing with false information. The study emphasises that big data might answer questions and offer insights society never had access to before. In the current news media environment, the services that enable the sharing and production of large amounts of data are not sufficient to combat increasing fake news, ongoing public mistrust, and false, partisan media content for capital gains from gaining more influence in society. There is an urgent need for intervention, which big data innovation can provide. There are, however, some myths regarding the use of big data that need to be dispelled, such as the idea that an analysis of the data will ensure transparency and reliable content distribution from the developers of big data systems to the audience consuming the data. Innovating and obtaining an advantage from data is more complex than just collecting lots of data; a look at the impact big data will have on a society is vital in leveraging big data. The study explores this notion by looking at the Digital Data Genesis Capability Model. The model guides the structure and how the case study will be conducted in the media fact-checking sector. The development of the big data initiative is built on fundamental expertise. According to the findings, highly skilled employees with knowledge of both proprietary and open-source tools are essential in the development of big data systems. Furthermore, there is a high level of compatibility with the existing web environment standard and the tools being used when deploying a big data system in the web. As a result, development of a big data initiative by a technology focused organisation is only limited by their ability to implement an effective big data workflow. However, this requires detailed planning, cloud computing for hardware; software; outsourced third party services; the work on data structure built in-house; and the use of docker containers that enable mobility in the development process and the adoption of new technology when implementing the searching and querying of large datasets and streams. There was a deviation from the existing model noted. The context of the study exposed that it is possible to implement big data initiatives among more than one company as a partnership, if the companies share some business traits or the same philosophy: thus, changing the dynamic of routines and responsibility in the existing landscape.
  • Item
    Barriers and enablers experienced by women in senior information technology positions in South Africa.
    (2022) Shange, Pretty Ngenzeni.; Quilling, Rosemary Diane.
    The under-representation of women in senior and leadership positions in the IT industry has long been an issue of concern for both organisations and governments. This has led to this topic gaining global attention, which has led to studies undertaken to understand the causes of this under-representation. In South Africa we have seen efforts such as employment equality acts by government and diversity programmes by organisations that aim to address this under-representation. This study aims to understand the barriers that women encounter in their career journeys and the enablers that helped them overcome the barriers as they persisted and advanced in IT. This study followed a qualitative research approach using open-ended online interviews for data production using a sample of fifteen female senior IT managers. This sample consisted of Chief Information Officers (CIOs), Heads of Department, and different IT managers in their areas of specialities within IT. The results of this study showed that factors such as computer access at a young age played an important role in creating a positive attitude towards IT or computer related careers. Factors such as availability of bursaries for IT qualifications and knowledge of family members about the IT careers were most likely to increase the chances of a young woman to choose an IT career. The results also showed that young women who liked Science, Technology, Engineering, and Mathematics (STEM) subjects such as mathematics were also more likely to study IT or computer related qualifications. The IT industry career stream and the support employees received from family and organisations also played a big role in determining the persistence of women in their IT career. Furthermore, mentorship and sharing of opportunities within professional networks also contributed positively to the advancement of women in this industry. The flexibility and ability to work from home were among the highlighted benefits that encouraged women to persist. Results also showed that more women were concentrated in middle management and that the career path to the Csuite level is not clear. The understanding of barriers and enablers presented in this study will guide and inform the choices women and the societies make about this industry and better position government and organisations with understanding needed in creating an IT industry that nurtures women to success.
  • Item
    Cloud adoption for organisations in the eThekwini area.
    (2022) Mngomezulu, Thuthukani Givenson.; Naidoo, Karunagaran.
    Cloud computing is a computing model that enables developing countries to open new business ventures without having to spend extensive amounts of money in upfront capital investment; “cloud computing is a practical approach to experience direct cost benefits, and it has the potential to transform a data centre from a capital-intensive set up to a variable priced environment. The main character of cloud computing is in the virtualization, distribution and dynamically extendibility” (Chauhan, 2012, p. 1). Of all the models that utilise the network as means for delivering computing resources, cloud computing is the best one yet; the cloud is more scalable and allows consumers to add and remove resources as their computational needs change without impacting business processes (Nuseibeh, 2011). There are other opportunities that organisations stand to benefit from cloud computing adoption, but in spite of all the opportunities, the rate at which organisations are adopting cloud Computing is increasing at a slower pace than expected in South Africa. From the statistics released in 2018 by the Business Software Alliance (BSA) and Global Cloud Computing Scorecard, it was highlighted that South Africa had fallen behind in its efforts to adopt Cloud Computing and different reasons were highlighted as a cause of this lag (BSA, 2018). This research study aimed to investigate potential issues that impacted the organisation's desire to adopt the cloud resulting in the low adoption rate. The technology-organisation-environment (TOE) framework was the framework that was used in this research study. Four research questions were developed as part of achieving the objectives for this research study. A sample of organisations in the KwaZulu-Natal province was identified for this research study using the convenience sampling technique and an online survey hosted in Survey Monkey was sent out to the selected organisations. The collected data were analysed using SPSS tools. After analysis was performed on the data, it was found that most challenges that organisations faced were from external factors like infrastructure readiness, which organisations had no control over. Internal challenges also affected the organisation’s adoption and usage of the cloud, but when data was grouped according to either belonging to the internal or external group, it was found that external issues affected organisations more than internal issues.
  • Item
    Factors that influence proficiency in the learning of computer programming by Information Technology students.
    (2022) Ranjeeth, Lerushka.; Padayachee, Indira.
    The main objective of the study was to ascertain the factors that influence the acquisition of computer programming skills by students who are enrolled for an Information Technology (IT) degree at a tertiary education institution. The study is driven by a societal need to empower as many individuals as possible with computer programming skills. The study is very relevant to the South African context in the light of the decision taken by the education department to establish computer programming as a niche skill for South African citizens. The learning of computer programming is however, not that straight forward and requires an intensive cognitive effort to ensure that students obtain a high degree of skill and expertise in computer programming. The study has been conducted at the University of KwaZulu-Natal (UKZN) where the Discipline of IT has been challenged by students’ performances in computer programming assessment. While there are “pockets” of excellence, there are numerous instances where students have performed poorly in computer programming assessment. The case of UKZN presents an ideal opportunity to study this phenomenon because it provides a diversified student population with regards to degree enrolment as well as gender and location. From a teaching and learning perspective, this knowledge will be pivotal for the IT academic department at UKZN as well as the general domain of teaching and learning of computer programming. The study adopted a quantitative approach and was guided by a conceptual framework. The study used a questionnaire that contained an open-ended question that enriched the analysis and discussion. The study’s main objective was to ascertain factors that will predict computer programming performance was achieved. The main factors that were identified as significant predictors of computer programming performance were problem solving ability and self- efficacy. A concomitant outcome from the study was the analysis of validity of the study’s conceptual model which was subjected to multiple regression and path analysis. The path analysis exercise resulted in the generation of a conceptual model that had a better fit to the study’s data than the a priori conceptual model. The study also discovered trends of computer programming strengths and weaknesses at UKZN and it is envisaged that this knowledge will contribute to enhance computer programming pedagogy and student performance in assessment tasks.
  • Item
    The impact of implementing critical success factors during information technology outsourcing: eThekwini Metropolitan Municipality case study.
    (2021) Goba, Innocentia Nokulunga.; Quilling, Rosemary Diane.
    IT outsourcing is a decades-old practice that has been used by businesses. Organisations engage in this activity because they lack the necessary capabilities in-house to complete the assignment, and it is sometimes more cost-effective to outsource the work to another company. Using Duhamel's Outsourcing Technology Enactment model, the goal of this qualitative exploratory case study was to determine the influence of crucial success variables during IT outsourcing (Duhamel, Gutierrez-Martinez, et al., 2014). Snowball sampling was utilised to find study participants within the participating company who could offer information about the IT outsourcing initiatives. Members of the eThekwini Municipality's IT outsourcing project team served as the sample criteria. Project deputy heads, senior managers, specialists, analysts, developers, and project managers were among the participants in the study. The reason for the limitation is that the researcher was looking for participants that play a huge role and that are able to make managerial decision during IT outsourcing. NVivo Pro 12 research software was used to analyse the interviews. The tool was chosen because it has been widely used by researchers and scholars to analyse data (Syarifuddin et al., 2017). The result of this case study shows that the study participants from eThekwini Municipality understand the concept of outsourcing and the Municipality uses different types of outsourcing depending on the project to be implemented. The study participants, to a large extent, considered trust, shared knowledge and communication during a project. These factors are all important because they play a different role, they are intertwined. However, it is indicated by two senior participants that trust do not exist in business and the relationship is governed by a contract and a service level agreement. Institutional arrangements at the Municipality delays projects and should be reviewed to match up with the ever-changing IT environment. The outcomes of a project are measured using time, scope and budget. The findings from this study may be used by IT leaders and project teams for future and current projects when deciding to implement IT outsourcing projects.
  • Item
    Acceptance of mobile money technology by retailers in Accra, Ghana.
    (2022) Cato, Valentine Nii Lante.; Marimuthu, Mudaray.
    Mobile Money technologies have become part and parcel of people's daily lives in developing countries, especially Africa. Much effort has been made in making Mobile Money technologies available, safe, reliable, and effective amongst people in Africa. One area where the technology seems to be gradually diffusing into is the business world. More and more businesses seem to be adopting the technology. However, little is known about the dynamics involved in retailers' acceptance and usage of Mobile Money. Hence, this study sought to explore the acceptance of Mobile Money in the retail business sector while also finding out factors that influence the acceptance. The Unified Theory of Acceptance and Use of Technology (UTAUT2) was selected as a theoretical framework for this study. Using a quantitative survey approach, retailers in the business area of Accra, Ghana, were sampled using convenience sampling. Findings revealed that all retail businesses were aware of Mobile Money supporting businesses. Most retail businesses are using Mobile Money in different ways to support their business. Basic transactions such as receiving payments from customers and payment payments or remittances were common. Factors such as performance expectancy, effort expectancy, price value, hedonic motivation, and habit were seen to impact the use of Mobile Money by retailers. Therefore, designers of Mobile Money services must consider these factors when developing these applications by ensuring it has functionality that is useful and easy to use. Furthermore, telecommunication companies that make Mobile Money services available to retailers and the government need to work together to decrease commission and transaction costs. These measures will results in increased acceptance of Mobile Money by retailers.
  • Item
    The compliance framework for the 7th POPIA condition in the SME ICT sector.
    (2021) Moraka, Lehlohonolo Itumeleng.; Singh, Upasana Gitanjali.
    Data privacy legislation has gained momentum throughout the world and affects users of electronic communication devices in both the private and public sectors. Organisations must adopt data privacy regulations to safeguard data belonging to parties who transact using electronic devices. Furthermore, they need to invest in an organised data privacy solution, such as an information security management system. POPIA, refers to the Protection of Private Information Act, which is the data privacy legislation in South Africa. The POPIA is a legal document consisting of eight conditions, and the 7th condition in the POPIA speaks directly to information security management systems. The aim of the data privacy legislation is for the government and legislature to give data owners control over their data, which is stored in third-party organisations. The third-party organisations, which store and process the data, must follow strict and mandatory protocols with the aim of protecting the data of a data subject, and using it with the consent of the data subject. The overall aim of this study is to produce a framework that will assist small and medium enterprises (SME) with complying with the POPIA. Furthermore, it seeks to understand the work done by SMEs in implementing information security by looking at what they do to align with data privacy; to implement data privacy; the resources used for compliance; security threats affecting SMEs; and resources made available for compliance. In the same light, the study looks at existing international data privacy rules and regulations and examines their relationship with the POPIA. The findings of the study indicate that organisations needed a frame of reference to assist them with implementing the 7th condition of the POPIA. In addition to this, the governments assistance is required by organisations as they implement the POPIA. Moreover, organisations seem to have a fairly knowledgeable structure internally which is resourced and supported by senior management with implementing the POPIA. However, they require external support and validation from government as they are not sure of their efforts align to what the 7th POPIA condition requires. Lastly, the frame of reference is developed by adapting best practice and frameworks which deal specifically to issues indicated in the POPIA 7th condition, and recommendations made by the participants in the study.
  • Item
    Security practices of smartphone users at UKZN Westville Campus and its effects on the institutional information systems.
    (2021) Kaka, Oluwafisayo.; Naidoo, Karunagaran.
    Technology has evolved through the years and brought about innovations in telecommunication tools such as smartphones, widely used today for various reasons, like educational purposes. Similar to other mobile devices, smartphones are prone to online attacks, and their usage on a university network may lead to cyber-attacks on a university's information systems. Many universities utilise information systems such as mobile websites and mobile applications like Office Outlook email, Moodle and Turnitin. Therefore, ensuring adequate online security is fundamental to mitigate online threats, but such actions are disregarded by most students who are considered the security administrators of their smartphones. This study used a quantitative research method to assess smartphone users' security practices at the UKZN Westville Campus and its effects on the Institutional Information Systems. The University of KwaZulu-Natal’s information systems includes a mobile website that enables students to access UKZN student central for academic and support services. The university also uses mobile applications such as MyUKZN, Turnitin and Moodle. The study gathered data via paper-based and online questionnaires from the University of KwaZulu-Natal students that own and use smartphones to connect to the internet via the university’s WIFI on campus. The findings of this study revealed that online threats might occur through students disregard for the university's online security guidelines. Some students’ lack of online security knowledge was also discovered, making these individuals’ smartphones possible entry points for online attacks. Regardless of online security skill level, students demonstrated inconsistent security behaviour. The above mentioned inadequate security practices by students can result in the UKZN experiencing a data breach, financial loss, disruption of services, intellectual property theft, and much more damages. The findings further indicated that students that possess good security skills do not readily implement security measures because the process is assumed to be stressful.
  • Item
    The determinants of effective computer mediated communication between lecturers and students at a tertiary education institution.
    (2021) Ntombela, Nonhlanhla Fortunate.; Ranjeeth, Sanjay.; Ako-Nai, Sonny Anyetei Moses.
    Computer Mediated Communication (CMC) is the transmission of data communication between individuals using two or more electronic devices. CMC provides digital platforms for one-on-one communication, conferencing and collaboration that is instantaneous. However, in the literature, there’s a lack of research that focuses on the interaction between lecturers and students through CMC in South Africa. Hence, there is a need for this study to understand the factors that influence an effective interaction between lecturers and students through CMC, and propose adequate strategies to foster such kind of interaction. In this study, an effective CMC interaction is defined as the behavioural intention to use CMC between a lecturer and a student that is perceived as prompt, professional and supportive by both the students and lecturers. The afore-mentioned constructs have been used to develop a conceptual model that guided the current study to investigate the determinants of the behavioural intention to use CMC between lecturers and students at a tertiary education institution, from the student’s perspective. The study made use of quantitative methods as its fundamental research approach. The study’s sample consisted of 276 students at the University of KwaZulu-Natal. These students were surveyed using a closed-ended online questionnaire. From a research nomenclature perspective, the study’s theoretical constructs were identified as immediacy, professionalism and support which constitute the independent variables while intention to adopt/adoption of CMC has been labelled as the study’s dependent variable. The study’s main outcome revealed that the majority of students acknowledge the importance of immediacy, support, and professionalism in the facilitation of an effective CMC-based relationship. Empirically, the study confirmed a moderate, positive correlation between the constructs and students’ intention to adopt CMC as a conduit to achieving excellence in their studies. Evaluation derived from a structured equation modelling derivative of the original conceptual model revealed that the construct of support had more of a mediating influence on students’ intention to adopt a CMC-based learning approach. A concomitant outcome from the study was that a majority of the students preferred using CMC with academic staff than face-to-face communication, with a preference for technological platforms that support CMC based learning rather than general social media networking platforms. At the time that the study was conducted, the institution from which empirical data was collected had transformed to a remote/online learning approach that was necessitated by the Covid-19 pandemic. As a consequence, many of the study’s respondents had a natural preference for the video conferencing tool that was currently employed at the institution.
  • Item
    Critical success factors that influence the performance of agile software development methodologies in organisations.
    (2020) Peters, Yeshmeeta Deodutt.; Marimuthu, Mudaray.
    The agile manifesto was brought into existence in 2001 and agile as a methodology was derived in the 1990s. The reason for the formulation of this methodology was to create methods to produce software in a better manner that could fulfill the customer’s needs in an environment that was iterative and controlled. The types of agile methodologies being followed are Scrum, extreme project management, adaptive project management, and dynamic project management method and scrum is the most widely utilized. There is insufficient research into the hierarchy of importance of the critical success factors that affect agile projects. Critical success factors of organisational structure, people, process, technical and, project factors have been identified in previous studies, however, the ranking of these factors in terms of the level of importance for agile success has not been studied enough. These critical factors are classified as Technical, Organisational, Process, Project, and People categories. There were suggestions from researchers that test automation and cloud computing can also positively affect the success of a project using agile. Since these two factors were not studied in conjunction with the other critical factors mentioned previously, this study extended previous studies by incorporating these factors. This study expanded the factors by including cloud computing and test automation as possible critical factors to the successful implementation of agile software development. The research method chosen for this study was the quantitative method. The data was collected using questionnaires and was analyzed via descriptive and inferential statistics. To achieve an acceptable statistical power, a sample size of 200 agile practitioners was targeted, but the researcher was able to obtain 110 responses. SPSS version 27.0 was used for the descriptive and inferential data analysis and the statistical tests. The main findings indicated that people, technical factors, and test automation were the top three critical success factors in terms of importance. The project, people, and organisational structure were the top three critical success factors in terms of performance. Cloud computing was found to be less important whereas test automation was found to be an important factor for agile success. Significant gaps were identified between the critical success factors and their performance in organisations. The study recommends that organisations place additional emphasis on the critical success factors that affect agile success and the performance of these factors to close the gap identified in this study. Further recommendations are to provide adequate training in agile processes.
  • Item
    E-textbook preferences: a case study of Information Technology students' preferences at a private higher education institution.
    (2020) Osih, Shammah Chukwuehike.; Singh, Upasana Gitanjali.
    Textbooks can be defined as a printed and bound artefact that consists of certain idea or information about a particular topic. The debate between using printed textbooks (traditional) or e-textbooks (digital textbooks) is ongoing in the educational sector. Students are often required to buy textbooks in order to complete a course in the university, and this textbook can either be printed or e-textbook. Students who are usually reluctant to read a printed text or electronic texts are not familiar with the advantages and disadvantages of each text, respectively. Thus, the absence of information prompts the students to employ only one kind of text either digital or printed. The purpose of this research was to investigate whether university students prefer printed textbooks or digital textbooks (e-textbooks). Through this research we will be able to discover the elements affecting the adoption of e-textbooks and printed textbooks and why university students prefer one to the other. The importance of the research is to understand why students are making the decision to use either traditional textbooks or e-textbooks and what makes them develop these preferences. The benefits that will be derived from this research will help illustrate what the students feel about traditional (printed) and e-textbooks (digital) and the choices that go into making that decision. Data was collected from Pearson Institute undergraduate students via questionnaires. The study applied the mixed methods to analyse the relationship between perceived ease of use (PEOU), perceived usefulness (PU), attitude (ATT), complexity (CMX) and compatibility (CMP) on Behavioural intention to use. A final number of 80 responders were used as the research sample. Findings from the study revealed evidence that Perceived usefulness impacts Behavioural intent to use e-textbooks, Perceived usefulness impacts attitude to use e-textbooks, Perceived ease of use affects Behavioural intent to use e-textbooks, Perceived ease of use affects Perceived usefulness to use etextbooks, Perceived ease of use affects attitude to use e-textbooks, Attitude affects Behavioural intent to use e-textbooks., Compatibility impacts Behavioural intent to use e-textbooks, Compatibility impacts perceived usefulness to use e-textbooks, Complexity has little or no influence on intention to use etextbooks and complexity has little or no influence on intention to use e-textbooks. The overall result led to the conclusion that students prefer e-textbook to the printed textbook.
  • Item
    Potential adoption of mHealth applications to induce healthy lifestyles among UKZN (PMB) students.
    (2020) Mtshali, Nompumelelo Cebisile Witness.; Ndayizigamiye, Patrick.; Govender, Irene.
    Over the years, the World Health Organization has reported an increasing number of young people affected by Non-Communicable Diseases (NCDs). There is also evidence that there is an increased prevalence of NCDs amongst the youth in South Africa. This surge in NCDs amongst the youth is often related to unhealthy lifestyles. It is also known that the rate of smartphone adoption among the youth in South Africa is high. This high rate of smartphone adoption presents an opportunity to devise mobile applications-driven interventions to induce healthy lifestyles amongst the youth. It is in this context that this study examined the potential adoption of mobile health applications to promote healthy lifestyles, that is, to monitor one’s diet and physical exercise amongst the youth in South Africa. The study adopted the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain the youth’s intention to adopt mobile health applications that help induce healthy lifestyles. Data was collected from a convenient sample of 320 students registered at the University of KwaZulu-Natal, Pietermaritzburg campus using a survey questionnaire. The descriptive analysis was conducted to assess and understand the perceptions and awareness of students pertaining to the use of mobile health applications. The Partial Least Structured Equation Model was used to assess the proposed model for the adoption of mobile health applications that promote healthy lifestyles. The results revealed that effort expectancy (EE), performance expectancy (PE) and social influence (SI), and facilitating conditions are the factors that influence the adoption of mobile health applications that help to induce healthy lifestyles. In addition, the study found that there is limited awareness of mobile health applications among UKZN (PMB) students. The study recommended that there is a need for interventions to raise awareness on the use of mHealth applications that help induce healthy lifestyles amongst the youth. Furthermore, any interventions that seek to promote healthy lifestyles amongst the youth should consider the identified factors that significantly influence the adoption of mHealth applications that help induce healthy lifestyles.
  • Item
    Attitude of healthcare workers towards the use of the virtual electronic medical record system at Ithembalabantu Clinic, Durban.
    (2020) Kalalizi, Bahindwa.; Subramaniam, Prabhakar Rontala.
    Successful implementation of electronic medical record systems (EMRs) can result in many benefits. This study conceptualized a model to investigate the predictors influencing the use of the Virtual Electronic Medical Record (VEMR) system. The Theory of Reasoned Action was adopted to investigate healthcare workers’ attitudes and behaviours toward the use of the VEMR system at Ithembalabantu clinic. The model guided in measuring the attitude of healthcare workers towards the use of the VEMR system at Ithembalabantu clinic, Durban by conducting observation and interview schedules. Thirty (30) responses were obtained from the employees who were exposed to the use of the VEMR system where narrative qualitative technique was used to analyze the results. The individual attitude toward the use of the system, the subjective norms and the intention behaviour were found to be significant predators of the actual usage of the VEMR system. System benefits and user satisfaction were found to hypothetically lead to the continuance intention to use the system. As a result of this study, healthcare facilities will be better placed to understand the insights of healthcare workers regarding the adoption of the VEMR system and how those come to influence their usage behaviours.
  • Item
    The role of vulnerability disclosure programs in an organisational cybersecurity strategy.
    (2020) Jobraj, Trishee.; Naidoo, Karunagaran.
    Today’s world is a technological one, with devices and software becoming more interconnected. Inherent to these devices and software are vulnerabilities that if discovered by malicious parties, may be exploited. In order to discover, investigate and remediate these vulnerabilities timeously with little or no impact to users, organisations have started to invest in vulnerability disclosure programs (VDP). This provided researchers with a platform in order to communicate discovered vulnerabilities to the organisation in a standardised and consistent manner. It also provided organisations with a method of detecting security flaws that were not normally detected by vulnerability scanners. VDP’s assist in identifying these vulnerabilities in a coordinated manner to facilitate speedy remediation. This research investigated the challenges and benefits of VDP’s and the need for such a program as part of the organisational cybersecurity strategy. Quantitative analysis was used to conduct the study by means of an online questionnaire. 147 participants who were members of ISACA South Africa spread across South Africa, with Information Technology (IT) and cybersecurity experience, responded to the questionnaire. The questionnaire measured the opinions, views and experience of the various stakeholders. The questionnaire comprised of rating and ranking scales such as the Likert scale in order to obtain a rich and accurate data set for analysis. The questionnaire data was analysed using descriptive analysis (i.e.: frequency analysis, mean and standard deviation) and correlation. Statistical analysis tools such as PSPP and Real Statistics which is an add on in Excel were used to analyse the data. Based on the research performed, the key findings were around the lack of awareness of VDP’s in the IT and cybersecurity space within South Africa. This included the understanding of the types of VDP’s as well as the processes associated with VDP’s as well as the lack of management support towards VDP’s. It was also evident that many organisations did not have an official channel to report VDP’s.
  • Item
    The impact of social media on teaching and learning in higher educational institutions in Lesotho.
    (2020) Sehapi, Kolitsoe.; Naidoo, Karunagaran.
    Manning (2014) defined social media as the term used to denote new methods of media that involve interactive participation. It allows individuals and groups to network, create and share information online. Information is shared by users in a form of photographs, audio files, text and videos. Commonly used social media platforms are WhatsApp, LinkedIn, YouTube, Facebook, Twitter, and Google Plus. The majority of respondents in this study were familiar with WhatsApp, YouTube, and Facebook. Social media leads to increased interaction and engagement between teachers and students and it enhances students’ learning experience and practice. Other than interaction, social media maintains existing contacts, keeps one up to date with the advances in different fields, and promotes an individual’s work to peer and outside communities such as practitioners and industry. Therefore, social media has converted a routine daily exercise in some user’s lives into something that attracts the attention of students, researchers and academics progressively. Advantages of social media for learning were identified as social media is being used for recreation purposes, academic activities, and information seeking. On the other hand, disadvantages were identified as cyber bullying, health-related issues, emotional detachment, privacy, and miscommunication. Students are however concerned about inappropriate language and unsubstantiated content in social media. Some also believe that computer support, training and skills are necessary in order to use social media effectively (Public Media Alliance & UNESCO, 2017). Furthermore, this research used the conceptual framework. The framework was adapted from Bexheti, Ismaili & Cico (2014) which specified social media effects as connection, collaboration, creativity, and communication. A quantitative research approach was adopted for this research. This approach helps researchers to solve difficult problems in time with much accuracy and in a cost-effective way (Mishra & Jaisankar, 2007). A convenient sampling was used as a sampling technique for this study. It is a type of nonprobability sampling where participants of the target population that meet a particular practical conditions. The study used both primary and secondary data to answer research questions. Data was collected by using a questionnaire that was distributed to the respondents. Data were analysed with Statistical Package for the Social Sciences (SPSS) Version 25. This research intended to examine the effect of social media on students learning, the degree to which students are familiar with different social media platforms, and factors that influence use of social media. The effects of the study were identified as connect, collaboration, communication and connectivity. The study discovered that students are familiar with different social media platforms for learning purposes. Factors included; computer skills, IT support, unclear content, computer training, reliability on social media, inappropriate language, and unclear content on social media.
  • Item
    Software development project success: perspectives of project managers and developers in a South African bank.
    (2020) Seerpath, Aruna.; Price, Catherine Susan.
    Many researchers have attempted to define software development project success. While common factors have been found, the success of software projects in all industries cannot be judged by the same factors. Success is complex and means different things to different people. This study investigated what factors project managers and software developers, in a South African Bank, believed contributed to software development project success. The reasons why software developers and project managers were investigated were because software developers have a technical background whilst project managers have a business background. There were 41 respondents consisting of six project managers and 35 software developers that answered the questionnaire. Six participants were interviewed: four developers and two project managers. A case study research was adopted for this study. The results showed that there are many significant factors that contribute to success and failure. The study was divided into four categories to investigate the different success factors. These categories were individual, team, organisational and project. The most critical success factor from this study was the projects being strictly according to the on brief. This showed the software being built must fulfil the requirements that were defined in the project brief. The least important success factor was employees having more than ten years of experience. This showed that this group of respondents do not believe that such a high level of experience is directly related to project success. Respondents were also asked what they thought would lead to software project failure. The factor that was considered most significant was not understanding requirements. An individual factor that stood out was the level of skill of the staff. Both groups of employees believe that having the appropriate skills to do one’s job, contributes significantly to the success of a project. The only factors where project managers and developers responded significantly differently were when they were asked about work life balance and job satisfaction. Developers seemed to consider these factors more important than project managers. Project managers and software developers considered the scope and size of a project critical to project success as it ranked as the second most critical factor. Other critical success factors that appeared in the top five were the level of skill of staff, clearly defined business objectives and understanding requirements. This study contributes to existing literature as it shows that success factors that other researchers found cannot be generalized to all individuals, teams, organisations and projects. This study investigated what factors, project managers and software developers in this digital banking business unit considered to contribute to the success of a project. It concluded that there are many factors that contribute to success however, projects being on brief was the most important factor. Even though this study only investigated the views of project managers and software developers, there are other IT professionals that could offer different insights as to what success means to them. This study could therefore be expanded to include business analysts, system analysts and testers.