Browsing by Author "Abimbola, Ajayi Nurudeen."
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Information assurance within supply chains’ structures and processes.(2017) Abimbola, Ajayi Nurudeen.; Maharaj, Manoj Sewak.Organisations are challenging the traditional linear-based market model which is characterised by a straight line movement of goods and services. As a result, they are increasingly forming and moving towards a value web of supply chain network that connects a whole ecosystem of trading partners. These networks, which are mostly complex and dynamic, are creating a global market environment in which organisations no longer focus only on their immediate suppliers and customers, but also on the optimization and the smooth flow of information, funds and materials, within their respective direct and remote trading networks. The large number of participants within most supply chain networks has necessitated that these networks be agile and resilient. For supply chain networks to be agile and resilient, and for supply chains’ structures, processes and resources to be synchronized and integrated, the organisations within the supply chain must share information. Hence, in today’s supply chains, interests are moving towards obtaining the most benefits from information. In order to obtain these benefits from information, organisations are making use of information systems and their related technologies to acquire, process and adequately share information. These systems are making it possible for organisations to form strategic partnerships within the supply chain networks. The global market environment is causing supply chains to expand, and the expansion is exposing information to various security vulnerabilities and risks. The exposure of information to different vulnerabilities and risks is forcing trading partners to seek assurance that the information within their supply chain network is adequately protected and also performs as advertised. To understand how the assurance sought by trading partners can be provided, this study investigated information and information systems’ security within supply chains’ structures and processes. The study also investigated how information assurance objectives (i.e. confidentiality, integrity, availability, authentication and non-repudiation) can be achieved optimally within supply chains. Finally, the study proposes an information assurance model, which if adopted by decision makers, could enable them sustain their respective functions and processes within the supply chain network. In order to achieve the objectives of this study, the exploratory design and the case study approach were adopted in this study. The study also adopted the qualitative research method, and hence, semi-structured interviews were conducted, and served as the primary means of data collection. Participants in this study were drawn from two categories of organisations, which are supply chain and logistics organisations, and Information Technology (IT) consulting organisations. Therefore, the purposive sampling method was adopted in this study. An inductive approach was adopted in the analysis of data, and as a result, thematic analysis was adopted as the analysis method. The main outcome of the study is the proposed information assurance model that can enable decision makers sustain their respective functions and processes within the supply chain network.Item Information risk management within supply chains.(2010) Abimbola, Ajayi Nurudeen.; Maharaj, Manoj Sewak.A supply chain is an integrated process wherein different organizations combine their efforts in acquiring raw materials, transforming the raw materials into finished products and delivering the finished products to the final consumers. Organizations are continuously searching for means to reduce costs and simultaneously making effort to enhance the quality of their products, and ultimately satisfying customers’ demand. There are three major components essential to achieving these: information flow, cash flow and material flow. In this research, we evaluate modern competitive global market, where it is challenging for any organization to function in isolation of its trading partners, and where organizations need the enhanced flow of information as well as an easier, reliable and faster access to the necessary information; as information has been identified as the foundation upon which decisions regarding the other supply chain process and activities are made, and is the link between all operations in any supply chain. This research considers the supply chain as a concept which is centred on the development of a value chain network. This network consists of entities that are committed to providing information, cash and resources in order to achieve the goals of an effective supply chain. In the global economy, this network is expanding, and this expansion is causing the extent of information flow in the supply chain to increase and hence become complex. The increasing length of information flow in the supply chain and the complexity of the value chain network are presently exposing information within the supply chain to risk. Hence, the objectives of this research are to identify information risks and consider ways in which these risks may be managed within supply chains. This study helps in identifying what information flows and how information flows within the supply chain. It provides an understanding of information vulnerabilities and risks associated with these vulnerabilities. It also helps identify how these information vulnerabilities and risks may be managed.Item Managing the challenges of digital divide among first year students : a case of UKZN.(2019) Faloye, Samuel Temitayo.; Raghavjee, Rushil.; Abimbola, Ajayi Nurudeen.The integration of technology into the educational system has brought about changes in the style of teaching and learning. Nowadays, institutions are adopting technologies such as computers and the Internet to enhance their teaching and learning activities. Students that grew up using computers and related technologies are often at an advantage with their learning because they would have developed the skills required for using technological resources to enhance their learning. However, students that have not been exposed to any form of technology are often at a disadvantage with their learning because they often lack or do not possess sufficient technological skills. The disparity between students that have been exposed to technology and those that have not, is often referred to as digital divide. The literature shows that the digital divide is a challenge that is impacting on students’ academic performance. This study was therefore conducted to understand the challenges faced by the first-year students of UKZN with regards to the digital divide. In this study, a quantitative research methodology was employed. The findings of this study show that students with little or no exposure to technology prior to joining the university often face challenges that include the use of application programs (e.g. MS Word, Spreadsheet), downloading of informative materials, conducting online tasks and navigating the Internet. The findings also show that time of access/ownership to technology (before or after joining the university), technology skills and computer anxiety affects student’s computer self-efficacy. However, the study’s findings also showed that irrespective of student’s exposure level to technology prior to joining the university, students are faced with the university’s technological challenges that include insufficient technological resources (e.g. printer, computers, scanners), power interruption, poor Wi-Fi connectivity and lack of technology assistants. Based on the findings in this study, it is therefore recommended that universities organize frequent orientation and IT training programs for first year students. Such programs should focus on the effective use of technologies for learning purposes. In addition, universities should ensure the availability of administrative and technical support whenever students are performing technology related learning tasks. Furthermore, universities should setup a team that will focus on continuous monitoring of whether students are coping with technology or not. This team should also evaluate the available resources on monthly basis to identify the possible or required maintenance.