scispace - formally typeset
Search or ask a question

Showing papers in "SA Journal of Information Management in 2022"


Journal ArticleDOI
TL;DR: Benassi et al. as mentioned in this paper defined state-owned enterprises (SOEs) as entities established according to the statutory laws of the country; they can be either wholly or partially owned, with the government having a significant level of shareholding and ownership.
Abstract: In the knowledge-based economy, organisational knowledge assets are the cornerstone and sources of superior performance, innovation and sustainability. The knowledge-based view (KBV) of the firm calls for the protection of organisational tacit knowledge assets through the investment in relevant knowledge management (KM) practices (Grant 1996; Phaladi 2021; Takeuchi 2013). Sultan Balbuena (2014:9) defines state-owned enterprises (SOEs) as entities established according to the statutory laws of the country; they can be either wholly or partially owned, with the government having a significant level of shareholding and ownership. Stateowned enterprises (SOEs) are the business entities owned by the government to meet the socioeconomic objectives or mandates of their home countries. They are economic transformation and job creation agents at the heart of economic and innovation development in many countries (Saxen & Das 2021). In their own right, SOEs are knowledge-creating and knowledge-based organisations which play an important role in the knowledge economy (Benassi & Landoni 2019). Globally, SOEs are economic drivers in both developed and non-developed countries (OECD 2018; Saxen & Das 2021). In South Africa, SOEs are central to positioning the country as a developmental state and play a critical role in the job creation space (Gumede, Govender & Motshidi 2011). State-owned enterprises play a significant role in the global knowledge economy (Benassi & Landoni 2019). These enterprises are most prevalent in strategic sectors such as energy, minerals, infrastructure, and other utilities and, in some countries, development financial services. State-owned enterprises are also used as instruments for socioeconomic development in South Africa (Gumede et al. 2011), but many of them are in perpetual struggle facing the issue of Background: State-owned enterprises (SOEs) in South Africa face a serious challenge of knowledge loss caused largely by resignations, the ageing workforce and a lack of knowledge management (KM) practices.

4 citations


Journal ArticleDOI
TL;DR: This study provides insights into the critical success skills needed to harness the socio-economics brought about by the 4IR by identifying soft skills to allow IKM practitioners an opportunity to identify and develop these skills.
Abstract: Background: Many technology jurisdictions have peddled the narrative that the key determinant for an innovative and sustainable fourth industrial revolution (4IR) environment is possessing hard technical skills. Hard technical skills are important to design the actual 4IR-based applications. Postmodernity demands that appropriate soft skills complement the hard skills to effectively integrate technology into various socio-economic value chains. In fact, soft skills are slowly becoming one of the critical enablers to harness the promise of the 4IR.Objectives: This research article aimed to critically understand the soft skills considered to be essential in the South African context by different information and knowledge management (IKM) practitioners. The aims and objectives of the study were to fill the gap where other disciplines have specified soft skills whilst IKM does not. This study looked to identify soft skills to allow IKM practitioners an opportunity to identify and develop these skills.Method: This research was designed based on the Delphi study principles and further used a systematic and targeted literature review to allow the researchers to make logical conclusions deductively. The authors followed a multimethod approach and analysed data using content analysis.Results: The study results have demonstrated that soft skills are considered significantly more important than hard skills in South Africa. The study identified 57 total skills. However, only 17 had consensus from experts.Conclusion: This study provides insights into the critical success skills needed to harness the socio-economics brought about by the 4IR. Further studies are required in different contextual settings to understand the global skills pertinent to the 4IR.

2 citations


Journal ArticleDOI
TL;DR: It is observed from this article that communication in hospitals through EHR template is user friendly, safe and possible within the hospital and to outside facilities for effective paperless management of patients.
Abstract: Background: Communication of patient information in a healthcare setting in previous years was based on documented information on paper records carried from one location to another. However, with the introduction of electronic health records (EHRs), communications are now conducted electronically via installed and connected computer systems that are networked together. Inadequate communication of patients’ information can deter patients’ health and threaten their lives, putting them in unnecessary danger.Objective: The objective of this study was to design a standard EHR template model of communication for tertiary hospital that can be used in communicating patients’ information between various departments involved in the management of patients without carrying papers around or tossing Patients or their relatives up and down.Method: The research adopts soft system methodology (SSM) with communication concepts from knowledge management, combining observations with various practical information to make a conclusion based on past experiences through a process of inductive reasoning, a communication model was developed that can be used as a template for hospitals to upgrade/integrate paper-based patient information management to electronic based in a bid to enhance patient care and information management.Results: The developed communication template model has been designed to be adopted for use in a bid to manage patients’ information electronically in all tertiary hospitals and other hospitals that may so desire its use.Conclusion: It is observed from this article that communication in hospitals through EHR template is user friendly, safe and possible within the hospital and to outside facilities for effective paperless management of patients.

2 citations


Journal ArticleDOI
TL;DR: Owing to the unique characteristics of digital health users in SSA, technologies and content should be tailored to the diverse needs of the population, like adherence to medication, diet and exercise programmes.
Abstract: like adherence to medication, diet and exercise programmes. Conclusion: Owing to the unique characteristics of digital health users in SSA, technologies and content (particularly those for self-management of chronic diseases) should be tailored to the diverse needs of the population. It is through this that the region can fully benefit from the potential of digital health use in self-management of chronic diseases associated with NCDs.

1 citations


Journal ArticleDOI
TL;DR: In this article , the authors provided an analysis of factors to promote knowledge-sharing culture change and to recommend strategies that encourage knowledge sharing in higher education institutions in the African continent, and found that rewards, recognition, promotion, and bonuses are significant factors in promoting knowledge sharing culture change.
Abstract: Background: Knowledge-sharing culture permits knowledge reuse, exchange of knowledge, experiences and insights in an institution to achieve strategic goals. Knowledge-sharing requires motivation through rewards and recognition to improve employee engagement. The article provides an analysis of factors to promote a knowledge-sharing culture change.Objectives: The two objectives were designed to examine the factors that promote knowledge-sharing culture change and to recommend strategies that encourage knowledge- sharing.Method: An online questionnaire was used to gather quantitative data from a higher education institution in Zimbabwe: a developing country on the African continent.Results: The results established that rewards, recognition, promotion and bonuses are significant factors in promoting a knowledge-sharing culture change. It emerged that 53.3% of the participants approved that knowledge- sharing is dependent on the disposition of the individual whilst the other 46.7% of the participants were either indecisive or disagreed with the proposition. Rewards are important to the extent that 91.7% of the participants approved the proposition. It was also confirmed by 95% of the participants that recognition adds value to an institution. Moreover, 80% of the participants submitted that recognition contributes to employee retention and engagement. Fascinatingly, 88.3% of the participants settled on the proposition that recognition allows access to top talent and 68.3% concurred that promotion encourages loyalty.Conclusion: Rewards, recognition, promotion and bonuses are important factors that encourage a knowledge-sharing culture. Rewards strengthen employee value proposition whilst recognition allows access to top talent. Promotion inspires employees whilst bonuses are perceived as signalling employee appreciation, which stimulates a knowledge-sharing culture.

1 citations


Journal ArticleDOI
TL;DR: In this paper , the authors examined students' challenges in the innovative e-academic advising during emergency remote teaching (ERT) in a higher education institution in South Africa and found that students experienced personal challenges more than institutional and technological challenges.
Abstract: Background: The sudden shift by higher education institutions (HEIs) to emergency remote teaching (ERT), driven by the coronavirus disease 2019 (COVID-19) pandemic, pushed academic advisors of HEIs to suddenly shift towards e-academic advising to continue with the provision of academic advisory support services. However, few studies have concentrated on e-academic advising innovation challenges in the context of developing countries.Objectives: Therefore, the objective of this study was to examine students’ challenges in the innovative e-academic advising during ERT in a HEI in South Africa.Method: The study employed an online survey method and a stratified random sampling technique to select 240 first-year university undergraduate students from six faculties for the study. Structural equation modelling (SEM) with post hoc analysis, Bonferroni correlation, factor analysis with promax rotation and the Kaiser–Meyer–Olkin measure of sampling adequacy were employed in analysing the collected data.Results: The findings revealed significantly correlated institutional, technological and personal challenges to e-academic advising. Despite e-academic advising challenges being experienced differently across faculties, findings revealed that students experienced personal challenges more than institutional and technological challenges.Conclusion: Personal challenges are the most important factors for consideration when innovating to e-academic advising. The study concludes that the management of the HEI studied could improve the success of its innovation of integrating e-academic advising solutions to its academic affairs by considering a holistic approach that recognises the multifaceted challenges identified.Contribution: The study contributes to the discussion on student success in online learning environments. Once the challenges are identified, measures can be put in place to address them.

1 citations


Journal ArticleDOI
TL;DR: In this article , the authors evaluate the extent to which the Big Five personality traits (openness, conscientiousness, extraversion, agreeableness and neuroticism) elicit socially desirable responses within the context of privacy-related decision-making.
Abstract: Background: Socially desirable responding within the context of self-reported surveys is a well-known and persistent problem that plagues quantitative studies. Such forms of responding are particularly problematic within the context of personality-based studies that investigate privacy-related decision-making. In such instances, certain respondents may feel pressured to provide socially desirable responses, which reduces the overall quality of the collected data.Objectives: The objective of this study was to evaluate the extent to which the Big Five personality traits (openness, conscientiousness, extraversion, agreeableness and neuroticism) elicit socially desirable responses within the context of privacy-related decision-making.Method: To evaluate their hypotheses, the authors empirically situate their study within the context of respondents’ intended use of Facebook privacy settings. To this end, 576 survey responses were analysed using partial least squares structural equation modelling (PLS-SEM).Results: It was found that some personality traits were indeed significantly related to socially desirable responding – albeit not always as expected. For example, highly agreeable individuals were unlikely to provide socially desirable responses: choosing honest responses. Neuroticism, on the other hand, had the opposite effect.Conclusion: Based on the results, the authors conclude that neurotic individuals seem predisposed towards responding in a socially desirable manner within the context of privacy-related surveys. The authors, therefore, advise researchers within the field of privacy-based personality studies to take care when analysing their results.

1 citations


Journal ArticleDOI
TL;DR: In this paper , the authors evaluated the current knowledge management toolkit used by the South African client-facing professionals of a global multinational corporation and found that the most value-adding tool was the Experience Tool, whereas the Collaboration Tool ranked the least valuable.
Abstract: Background: Professional services firms utilise knowledge management tools, for example, IBM and Oracle solutions and toolkits, in their day-to-day client-facing operations. The effectiveness of toolkits must be evaluated to establish their actual value.Objectives: This article evaluates the current toolkit used by the South African client-facing professionals of a global multinational corporation.Method: Pragmatism philosophy was used because of the various perspectives needed to interpret the data. Data were collected from 30 participants who adhered to sample eligibility criteria. An interview was used to collect data to help determine which tools worked well and what had to be improved on.Results: The most value-adding tool was the Experience Tool, whereas the Collaboration Tool ranked the least valuable. The Collaboration Tool showed the most potential to increase its value. The results gave a clear indication of areas of improvement that will enable a professional services firm to strategically position its knowledge management toolkit towards adding value for client engagements.Conclusion: The study contributes towards evaluating the knowledge management toolkit, analysing areas of improvement, and recommending components such as machine learning, online collaboration and other activities that would enhance the knowledge management toolkit.

1 citations


Journal ArticleDOI
TL;DR: The lack of a dedicated unit for knowledge management (KM) and the lack of support for KM professionals are some of the barriers to the successful implementation of formal KM initiatives within the KwaZulu-Natal Department of Public Works as mentioned in this paper .
Abstract: Background: Knowledge management (KM) holds a major influence on the effective delivery of services in government departments as it is tactically affiliated to the formation, composition, and sharing of information to prevent ‘reinvention of the wheel’ by staffs when performing their jobs. However, few government departments within the South African context have implemented formal KM initiatives.Objectives: This research sought to examine the KwaZulu-Natal Department of Public Works (Pietermaritzburg) employees’ awareness of any KM initiatives, their benefits, and barriers that are preventing the successful implementation of a formal initiative.Method: A survey research approach was utilised in which structured questionnaires were administered to respondents. Data were analysed using the Statistical Package for the Social Science (SPSS).Results: The research established that KM initiatives are being practiced informally within the Department and there is a reasonably high level of awareness of these initiatives together with the benefits associated with them. The lack of a dedicated unit for KM and KM professionals are some of the barriers to the successful implementation of formal initiatives.Conclusion: The research concluded that the Department is in dire need of a formal KM initiative to reap the potential benefits and improve service delivery.

1 citations


Journal ArticleDOI
TL;DR: In this paper , the role of social trust in health information exchange on social network sites (SNSs) has been investigated in the light of the confusion and panic about health information leading to and during the worldwide lockdown, in an attempt to control the spread and symptoms of coronavirus disease 2019 (COVID-19).
Abstract: Background: The purpose of this study is to conduct a systematic literature review of the role of social trust in health information exchange on social network sites (SNSs). In the light of the confusion and panic about health information leading to and during the worldwide lockdown, in an attempt to control the spread and symptoms of coronavirus disease 2019 (COVID-19). Although the sharing of health information on SNS did not start during the COVID-19 lockdown, the concerns about health information interchange were highlighted during the lockdown. Objectives: This study investigates the nature of the association between health information exchange and social trust and how social trust has influenced health information exchange from 2005 to 2021. Method: In line with the purpose of the study, the researcher applied a systematic literature review to review conference articles, accredited journal articles and book chapters. The review process involved a rigorous procedure towards a definition of review protocol, extraction of articles, formulation of selection criteria and the review itself. Results: This study reveals a transactional interplay between the constructs of social trust (benevolence, integrity and competence) and social network site user roles (information seeker, information passer and information giver). Conclusion: In summary, the researcher argues that public health officials would benefit from setting up an SNS that proactively provides health information. The health information exchange experience should be designed in a way that takes into account how social trust can be used to moderate health information exchange in the SNS by different types.

1 citations


Journal ArticleDOI
TL;DR: In this paper , the authors identify which factors influence digitalisation in the hairdressing industry, and explain the impact on key stakeholders within the products and services value chain, and provide a unique perspective on how digitalisation has influenced and transformed the professional haircare industry.
Abstract: Background: Pandemic fears during the coronavirus disease 2019 (COVID-19) pandemic have caused hairdressers, beauty salons and distributors, as well as the producers of professional haircare and colouring products, to come together to adapt the value chain of professional services. Aesthetic beauty and physical image have gained personal and economic value amongst all age groups and genders, making the South African hairdressing industry a key player as a socio-economic contributor. Objectives: The main objective of this study was to identify which factors influence digitalisation in the hairdressing industry, and to explain the impact on key stakeholders within the products and services value chain. Method: The methodological approach taken in this study is a mixed methodology, categorised in two phases: phase 1 presented a quantitative approach and phase 2 presented a qualitative approach based on the dynamic nature of the professional hairdressing industry. One hundred responses were collected via an online survey and analysed using descriptive and inferential statistics. Thereafter, six virtual online interviews were conducted with purposively selected industry participants. The data were then triangulated to infer recommendations for the hairdressing industry. Results: The findings, which were triangulated, showed that digitalisation has influenced and transformed businesses and the way in which they interact and transact with consumers. Furthermore, digitalisation has created a convenient and enhanced consumer experience in terms of how consumers interact and transact with businesses. Conclusion: This research provides a unique perspective on how digitalisation has influenced and transformed the professional haircare industry. The study also identified what influence digitalisation has had on key stakeholders in the professional products and services value chain.

Journal ArticleDOI
TL;DR: The findings of the study indicated that personal norms in the domain of cybersecurity have a positive influence on individuals’ attitude towards engaging in cybersecurity misbehaviour, and this has a significant relationship with their reduction of insider threats (RIT).
Abstract: Background: Cybersecurity breaches have become a growing challenge in today’s digital economy. Organisations are faced with the responsibility of protecting their information resources from cybersecurity threats, and insider threats are one of them. Organisations have sophisticated technologies to protect themselves against these attacks, and their employees are often less guarded when it comes to protecting valuable company information systems.Objectives: This research was aimed to develop and conceptualise a model to reduce cybersecurity insider threats in a South African telecommunication organisation.Method: This study was conducted using a survey research approach, where close-ended questionnaires were utilised to collect data from respondents. The collected data was then analysed using IBM Statistical Package for Social Science (SPSS).Results: The findings of the study indicated that personal norms in the domain of cybersecurity have a positive influence on individuals’ attitude towards engaging in cybersecurity misbehaviour, and this has a significant relationship with their reduction of insider threats (RIT).Conclusion: This study suggests that management should give close and thoughtful attention to factors that encourage their employees to engage in cybersecurity misbehaviour. As an efficient and effective approach to mitigate the risk of cybersecurity insider threats, identification and classification of these factors should be followed by proper planning with a goal of reducing their negative effect on employees’ behaviour.

Journal ArticleDOI
TL;DR: In this article , the authors proposed an IoT-SCADA system architecture for optimum system functioning and compared the proposed architecture with the existing utility SCADA architecture to highlight the impact and benefits of the proposed architectures.
Abstract: Background: A Supervisory Control and Data Acquisition (SCADA) system is critical for remote monitoring and control of devices in various industries such as power utilities, oil and gas refineries, and manufacturing. Previous generations of SCADA systems have numerous limitations in today’s business environment. The latest technological advancements have brought forth new SCADA architecture variants that can be configured to ensure optimised operations. There is a need to assess the latest SCADA architectures that are posed to replace previous generations.Objectives: This research study aims to review various SCADA architectures and proposes an optimum SCADA system architecture for power utility. The proposed architecture is compared with the existing power utility SCADA system to highlight the impact and benefits of the proposed architecture.Methods: The research uses a qualitative approach and a comparative case study method to compare 10 SCADA architectures against a literature review-based criterion. A Multi-Criteria Decision-Making (MCDM) matrix is used to evaluate SCADA architectures and proposes an optimum Internet-of-Things (IoT)-SCADA system architecture for the power utility case study.Results: The research proposed an IoT-SCADA system architecture for optimum system functioning and compared the proposed architecture with the existing utility SCADA architecture. Moreover, the impact and benefits of the proposed architecture to the utility company are presented.Conclusion: The proposed IoT-SCADA system architecture has the potential to resolve many of the challenges encountered with previous generations of SCADA system architectures.

Journal ArticleDOI
TL;DR: A technology to increase blood donation is presented that aims to improve the quality of blood donation and reduce the need for unnecessary transfusions.
Abstract: a technology to increase blood donation.

Journal ArticleDOI
TL;DR: The South African Journal of Information Management explores the latest developments and trends in information and knowledge management to offer research that can be used to further the application of sound information-and-knowledge management practice as mentioned in this paper .
Abstract: The South African Journal of Information Management explores the latest developments and trends in information and knowledge management to offer research that can be used to further the application of sound information and knowledge management practice.

Journal ArticleDOI
TL;DR: In this article , the authors employed the South African context to enrich knowledge on the effects of knowledge management on SMME competitiveness and the extent to which operational efficiency mediates the process.
Abstract: Background: Although knowledge management (KM) directly impacts firm competitiveness, in efficiency-driven economies such as South Africa, the contribution of operational efficiency to this relationship has been underexplored in KM literature.Objectives: This study examined how operational efficiency interacts with KM to influence firm competitiveness. The study employs the South African context to enrich knowledge on the effects of KM on firm competitiveness and the extent to which operational efficiency mediates the process.Method: Using a quantitative approach with a survey design, 300 structured questionnaires were distributed to 300 small, medium and micro enterprise (SMME) owners and managers in the Free State province to establish the interaction of KM, operational efficacy and competitiveness.Results: The results of path coefficients revealed KM’s positive and significant effect on firm competitiveness. Moreover, operational efficiency partially mediated KM (recognition) (B = 0.1545, p = 0.019) and KM (implementation)’s (B = 0.0697, p = 0.050) effects on firm competitiveness.Conclusion: The prevalence of highest qualification among SMME owners/managers demonstrates that human capital development, especially business management training during business start-ups, may contribute to increased firm competitiveness. Moreover, the lack of resources in managing knowledge for implementing daily routines and increasing sales demonstrates that improved resource mobilisation by SMMEs might improve their competitiveness.Contribution: The study provides strategic interventions for improving SMME competitiveness through better management of their knowledge practices and operational efficiency.

Journal ArticleDOI
TL;DR: In this paper , the authors investigated who should be responsible for the process and who is actually responsible for realising benefits, and the results provided little insights as the interviewees are not in agreement with who is responsible for benefits realisation management.
Abstract: Background: Information technology (IT) projects are undertaken to deliver benefits to the organisation. These benefits range from financial benefits to the improvement of productivity. Yet, benefits are not realised, and organisations do not receive value from their investments. This can be attributed to various reasons. Objectives: One of the reasons is that there is confusion on who should be responsible for the entire benefits realisation management process. This research investigates who should be responsible for the process and who is actually responsible for realising benefits. Method: A qualitative approach was required to gain an in-depth understanding of the phenomenon at hand. Semi-structured interviews were conducted and thematic analysis was done on the transcribed interviews. The themes allowed the researchers to compare the practice of benefits realisation with the theory. Results: The results provided little insights as the interviewees are not in agreement with who should be responsible for benefits realisation management. However, this is in line with international research where there is still confusion on who the benefits owner should be. The results therefore support the current literature. Conclusion: Organisations need to make a concerted effort to appoint a benefits owner. This will ensure that benefits are realised and that IT projects’ success rate increased. Organisations should then also achieve value from their various IT investments. Contribution: The study contributes to the current debate on who is responsible for benefits realisation and provides a South African perspective to the dilemma.

Journal ArticleDOI
TL;DR: In this article , the authors proposed a method to solve the problem of "uniformity" in the literature.and.and, and, respectively, the authors' work.
Abstract: and

Journal ArticleDOI
TL;DR: In this paper , the authors investigated the antecedents of the adoption of blockchain technology as a tool to improve the management of patients' health information in the South African public healthcare sector.
Abstract: Background: Currently, the South African public healthcare system is hampered by a lack of effective patient data management. This leads to, amongst other challenges, a lack of transparency in the management of patients’ health information and unsecure medical records. Blockchain, on the other hand, can make healthcare records more secure, easily auditable, and hence more reliable. These advantages, among others, make Blockchain an appealing technology for managing patients’ health information in the South African context.Objectives: The study investigated the antecedents of the adoption of blockchain technology as a tool to improve the management of patients’ health information in the South African public healthcare sector.Method: The four pillars of a health information system (strong leadership, contingency plan, security and privacy, and IT or vendor support) were adopted as the theoretical grounding for the study. Qualitative data were collected through interviews with IT specialists and healthcare professionals working in the public healthcare sector.Results: The study identified 11 antecedents that can be related to the four pillars of a health information system. These antecedents must be addressed for blockchain to contribute meaningfully to enhancing patients’ health information management in South Africa.Conclusion: Although blockchain can contribute meaningfully to addressing health information management challenges in South Africa, contextual factors need to be considered for it to fulfil its promises. It is anticipated that the study findings will help stakeholders in the South African public healthcare sector to make informed decisions in their quest to deploy technology innovations like blockchain.

Journal ArticleDOI
TL;DR: In this article , the authors investigated the determinants of intranet utilisation for knowledge management in Nigerian banks from the users' perspective, and concluded that system quality is the most important intranets feature in predicting intrapartition utilisation.
Abstract: Background: All banks in Nigeria have fully implemented an intranet, and it has been used to link all branches across the country and provide access to varieties of information and facilitate knowledge management (KM) activities. The potential of the intranet to facilitate KM in an organisation is well spelled in the literature. However, little attention has been given to its use for KM, and factors that determine its use for KM in Nigerian banks have not been examined.Objectives: This study investigates the determinants of intranet utilisation for knowledge management in Nigerian banks from the users’ perspective.Methods: A survey was adopted and a questionnaire was distributed to 555 banks’ employees across 11 banks head office in Lagos, Nigeria. Data collected were analysed using frequencies and percentages, Pearson multiple correlations, and multiple linear regression.Results: The result shows that the intranet is used for knowledge creation, storage, retrieval, distribution, and application in Nigerian banks. Furthermore, system quality was found to be the best predictor of the four KM processes followed by task technology fit, while service quality was not.Conclusion: The study concluded that system quality is the most important intranet feature in predicting intranet utilisation for all the KM processes followed by perceived task technology fit, while service quality was found not to be a good predictor.Contribution: This study is unique and one of the pioneer studies in Nigeria that focused on using intranet to manage knowledge in the Nigerian banking sector. The study identified intranet characteristics that are best predictors of KM processes.

Journal ArticleDOI
TL;DR: Dangers such as identity theft and phishing attacks are exacerbated by the willingness of users to overshare PII across social networks, so a concerted user awareness campaign to promote user PIS needs to be revisited whilst incorporating innovative ways to raise interest amongst users regarding these dangers.
Abstract: Background: There is concern that information technology (IT) users are not taking cognisance of personal information security (PIS), with many keen to disclose personal identifiable information (PII) across connected and integrated IT systems that use the Internet. Compromised PII has led to many users being vulnerable to information security risks emanating from malicious software and hackers.Objective: This article elicits perspectives from IT users in the metropole area of Johannesburg, South Africa, in an effort to raise awareness of the dangers of oversharing PII across the Internet.Methods: The study uses a quantitative approach to elicit data on user perspectives. The quantitative data were collected through online surveys distributed amongst IT employees working across various companies in Johannesburg.Results: The results revealed that of the four constructs drawn from the literature review, namely training, interest, awareness and action that possibly predict user predisposition to maintain information security at a personal level, of concern is that only the construct interest would not likely predict PIS.Conclusion: Dangers such as identity theft and phishing attacks are exacerbated by the willingness of users to overshare PII across social networks. A concerted user awareness campaign to promote user PIS needs to be revisited whilst incorporating innovative ways to raise interest amongst users regarding these dangers. South African companies are encouraged to invest resources in bespoke ways to increase user interest, which would be seen as an ideal starting point to making PIS great again.

Journal ArticleDOI
TL;DR: In this article , the authors report on the benefits and challenges of adopting professional social networks (PSNs) by South African higher education academics and present a qualitative study to determine the degree to which academic staff engage with PSNs at different public universities in South Africa.
Abstract: Little is known about how professional social networking is perceived by scholars in South African universities. Whilst there are benefits associated with adopting different types of PSNs, there are also challenges involved. This article reports on the benefits and challenges of adopting PSNs by South African higher education academics. These objectives were achieved by answering the following questions: in in tertiary Background: Professional social networks (PSNs) have changed the research landscape by influencing how different communities of scholars engage within the community. Whilst there has been much research on this topic focusing on students and large public communities, perceptions around PSNs by scholars remain largely uncertain. Objectives: This study determines the degree to which academic staff engage with PSNs at different public universities in South Africa. Methods: The study adopted a quantitative approach using an online survey that was completed by 950 academic and research scholars at 17 public universities in South Africa. Additional support was provided with a qualitative approach using 10 semistructured interviews. Results: Scholars at South African public universities have adopted traditional, generic and PSNs to disseminate publications, enhance online visibility and collaborate with peers both nationally and globally. Scholars’ disinclination to use PSNs was associated with plagiarism, copyright, commercialisation of content, privacy, security challenges, issues related to the design, government and organisational challenges. Furthermore, there were no official policies, guidance from institutions, support from governments or professional social networking services. Conclusion: Scholars have adopted PSNs but do not use these online systems extensively. This is attributed to a lack of support from various stakeholders, missing policies and system misalignments, resulting in reduced research productivity. University leadership should be guided by this study and introduce active measures to encourage collaboration and dissemination of research outputs.

Journal ArticleDOI
TL;DR: This study aimed to investigate data governance (DG) related to challenges associated with healthcare information systems (HIS) by reviewing guidelines emerging from academic sources as part of a consolidated systematic literature review (SLR).
Abstract: Many organisations realise that data governance (DG) as a promising method of keeping data as a valuable asset (Otto 2011a, 2011b). Kitchenham and Charters (2007) suggest that a systematic literature review (SLR) is a strategy of assessing and interpreting all existing papers that are pertinent to the study. Siddaway (2014) explains an SLR as a method that addresses problems resulting from conflicting findings, produced by researchers. Piper (2013) points out that SLR permits complete, unbiased and literature-wide assessment of study results, design and quality. Okoli (2015) argues in detail that an SLR when properly done is valuable and turns into a highly cited part of the study that researchers pursue when undertaking a new investigation. Furthermore, such freestanding reviews summarise the evidence that is available to identify gaps in a research. The SLR method identifies, integrates and critically evaluates such findings. Background: This study aimed to investigate data governance (DG) related to challenges associated with healthcare information systems (HIS), by reviewing guidelines emerging from academic sources as part of a consolidated systematic literature review (SLR). The research contributed theoretically towards the body of knowledge, by reviewing challenges and guidelines related to DG within the healthcare environment. It contributed practically to the body of knowledge through understanding the healthcare information’s systems status. The study also contributed methodologically and significantly to SLR strategies. Objectives: The objective of this study was to understand the features of HIS; acquire information about DG success and understand the influence noted on DG. Method: The study conducted an SLR over the period 2010–2020. Literature collection was not only restricted to South African publications but was extended to international sources. This study adapted a mono method. Results: The study revealed that many organisations have realised that the only method to fix the data problem is the implementation of effective DG. With the increased adoption and rise of cloud computing, DG is gaining interest amongst specialists. Conclusion: The shift from paper-based systems led organisations to seek organisational change through digital transformation. The proper collection and utilisation of electronic healthcare record is the foundation of the digital healthcare. Many organisations value DG as a promising method of maintaining data as a valuable asset.

Journal ArticleDOI
TL;DR: In this article , the feasibility of South African government institutions in adopting a guideline that will assist in implementing a sustainable ERP system to improve their information systems strategy is investigated, and 13 factors that allow ERP systems to be successfully implemented were identified.
Abstract: requirements, social responsibilities and higher public expectations. In the early 1980s, governments worldwide started experimenting with improving functions and processes through enterprise resource planning (ERP) systems. Objective: This study investigated the feasibility of South African government institutions in adopting a guideline that will assist in implementing a sustainable ERP system to improve their information systems strategy. Method: This study followed the qualitative dominating mixed research methodology. A survey was distributed to 20 participants with closed-ended questions to collect quantitative data and open-ended questions to collect qualitative data. Results: Thirteen factors that allow ERP systems to be successfully implemented were identified. Some of the factors included effective change management policies, end-user specialised knowledge, organisation culture fit, top management support, ERP training before and post-implementation, visibility of activities throughout the workflow, and willingness to change. Sixteen issues that restrict ERP implementation were also identified. Some of the restricting factors include ERP system complexity, high levels of customisation, inadequate flexibility, budget, maintenance costs, lack of vendor support, implementation delays and cost overruns. The current state of ERP implementation in the investigated organisation is of acceptance with growth being achieved gradually and steadily. Conclusion: The proposed framework provides core competencies such as top management support, ERP training before and post-implementation, and effective change management policies among others, that can be used to establish corrective measures before and during the installation of ERP systems. Contribution: This study contributed to the body of knowledge by identifying the success and hindering factors of ERP system implementation. The proposed framework outlines guidelines for organisations to successfully adopt and implement ERP systems.

Journal ArticleDOI
TL;DR: Insight into the significance of IMCS for building resilient communities and recommendations for establishing and maintaining the systems are provided and IMCSs from the South African disaster policy perspective are described.
Abstract: Background: Establishing a disaster information management and communication system (IMCS) is a mandate of the South African National Disaster Management Framework of 2005 (NDMF). The inception of such systems is supposed to be at the initial set-up of disaster management centres. The comprehensive functioning of a disaster centre will require an interoperable system that can collect, process, store and disseminate data. The lack of such a system might result in poor disaster risk reduction (DRR) and ineffective response.Objective: This article identified and described IMCSs from the South African disaster policy perspective.Methods: Qualitative in-depth interviews were used to investigate the status quo of all nine provincial disaster management centres (PDMCs) regarding the existence, functioning and understanding of IMCSs. The NDMF informed the interview questions administered to 29 purposively selected participants. Themes from descriptions by informants were used to analyse the data.Results: All the centres operating for more than 10 years lack integrated IMCSs. The disaster managers perceive IMCSs as more information technology, computers and other physical devices and less human input systems and governance capabilities. The lack of integrated and well-governed disaster information and communication affects disaster management operations and service delivery mandate.Conclusion: To date, no studies have explored the establishment and management of interoperable IMCSs in disaster management centres. Therefore, this study contributes to the literature on disaster information and communication discourse and practical contributions to improve the capacity of PDMCs. This article provides insight into the significance of IMCS for building resilient communities and recommendations for establishing and maintaining the systems.

Journal ArticleDOI
TL;DR: In this article , the authors employed a qualitative research methodology through semi-structured interviews with 10 purposively selected academic librarians attached to the University of Limpopo library and found that respondents were mostly familiar with WhatsApp, Facebook, Twitter and Instagram, which they used in their personal capacity.
Abstract: Background: As social media tools spread across every aspect of human life, academic librarians were apt to be their early adopters to boost the service provision in academic libraries.Objective: Guided by Technology Acceptance Model, this article examined a variety of social media tools used by academic librarians; usage and usefulness of social media; organisational support provided to academic librarians to use social media; and the factors that impede usage of social media in academic libraries.Methodology: This article employed a qualitative research methodology through semi- structured interviews with 10 purposively selected academic librarians attached to the University of Limpopo library.Results: The results showed that respondents were mostly familiar with WhatsApp, Facebook, Twitter and Instagram, which they used in their personal capacity. However, in their work environment, they utilised the library blog and Facebook to market and promote library services and to liaise with their users in schools or faculties. Restrictions of access to social media platforms during working hours, lack of skills, own social media policy and management support in the form of training were found to be factors that impede social media usage by academic librarians.Conclusion: Social media have a great deal of potential to contribute immensely towards the delivery of information services in academic libraries, though they are neglected.Contribution: Incorporation of social media in library work environment requires social media policies and subject librarians to be well equipped with different kinds of social media platforms for the advantage of academic libraries and their users.

Journal ArticleDOI
TL;DR: In this article , actor network theory is used as a lens to assess and propose how the use of Big Data Analytics (BDA) in Technical and Vocational Education and Training (TVET) environment can be used to improve decision-making.
Abstract: a framework that allows the analysis and management of a larger amount of data (Moreno et al. 2016). Furthermore, Big Data is less about data that is big, but more of a capacity to search, aggregate, and cross-reference large data sets (Boyd & Crawford 2012). Actor network theory (ANT) is used as a lens to assess and propose how the use of Big Data Analytics (BDA) in Technical and Vocational Education and Training (TVET) environment can be used to improve decision-making. The rest of the article is organised as follows: we start with the background followed by brief review of the literature of BDA, then the discussion of the four translations of ANT, research methods and then the results and conclusions. Background: Big data analytics in education is a new concept that has the potential to change the decision-making landscape in South African Colleges. Higher institutions of learning, including Technical and Vocation Education Training (TVET) colleges like all other organisations, rely on data for their decision-making. These decisions affect the way pedagogy and student management is administered. Colleges collect huge quantities of data in different formats from students, staff and stakeholders for different reasons and occasions. Objectives: The goal of this study was to investigate how Big Data analytics and their tools may improve decision making in TVET colleges in South Africa through the lens of actor-network theory (ANT). Method: A qualitative, interpretive inquiry was undertaken. A case study using focus group was conducted. The data collected through interviews were arranged into themes and a thematic approach was employed to analyse these themes using QDA Miner Lite software. Results: The results from focus group interviews revealed that TVET colleges collect an enormous amount of data. These data are extracted for different reasons, yet there are no Analytics used for decision-making. Decisions are made by the highest-paid individuals (HiPPO) in colleges. Conclusion: This dissertation recommends that the TVET colleges invest in data science skills for their staff, and Big Data infrastructure. Big Data technologies such as Mongo DB and Hadoop are recommended as the most commonly and advanced tools that can be used for Big Data analytics.

Journal ArticleDOI
TL;DR: In this paper , the role of human resource managers in facilitating knowledge-driven organisational cultures and structures for the reduction of tacit knowledge loss in South African SOEs was examined by deploying an exploratory sequential mixed methods research design.
Abstract: Background: Many state-owned enterprises (SOEs) in South Africa face the serious problem of knowledge-unfriendly organisational cultures, structures and human resource management (HRM) practices that hinder the reduction of the risks associated with tacit knowledge loss.Objective: The article examines the role of HRM in facilitating knowledge-driven organisational cultures and structures for the reduction of tacit knowledge loss in South African SOEs.Methods: The study deployed an exploratory sequential mixed methods research design to examine the role of HRM in facilitating organisational cultures and structures that are supportive of knowledge management (KM). In the qualitative phase, data were collected through interviews with 20 purposively selected HR managers in nine SOEs. In the quantitative phase, a questionnaire was distributed to 585 randomly selected employees in three state-owned companies. The instrument was considered reliable with a Cronbach’s alpha of 0.94 and a response rate of 25%.Results: The research findings revealed that a majority of organisational cultures and structures in SOEs did not facilitate or assist to propel and support KM activities, behaviours and practices. On a positive note, human resource managers acknowledge that they have a crucial role to play in influencing culture management and structural designs in their companies to boost KM activities, behaviours and cultures.Conclusion: Numerous SOEs did not exhibit certain knowledge-driven behaviours and cultures because of a lack of structures to drive KM. Human resource managers did not exert their role in driving and influencing such knowledge-based behaviours, cultures and structures to lessen potential tacit knowledge loss.

Journal ArticleDOI
TL;DR: In this article , the City of Cape Town Libraries adopted social media usage in the 2015-2016 financial year and assessed librarians' perception and response to the implementation and adoption of social media for library services.
Abstract: Background: Social media use by libraries has facilitated communication and marketing of services to user communities. The City of Cape Town Libraries adopted social media usage in the 2015–2016 financial year. This study is set out to assess librarians’ perception and response to the implementation and adoption of social media for library services.Objectives: The research sought to appraise the City of Cape Town public librarians’ experiences of social media use in the provision of information services, evaluate librarians’ perceptions of social media use for information provision services and recommend ways in which social media information services provision can be improved upon.Method: A quantitative research method and a descriptive survey research design approach was adopted for the study, and a web-based questionnaire was used for data collection. The study was anchored on the technological acceptance model, and employed total enumeration sampling to collect data from the 102 City of Cape Town librarians-in-charge.Results: City of Cape Town librarians have positive perception and acceptance towards the use of social media to perform library-related duties. Librarians utilised social media in engaging with library users, including marketing of library services, and promotion of library events. Experiences including lack of guidance in dealing with copyright issues and organisational policy favouring a single social media platform were reported.Conclusion: Library services through is vastly positive but expansion across multiple social media platforms is necessary to encourage further engagement with users. A third construct: preference of choice is proposed for the TAM model.

Journal ArticleDOI
TL;DR: In this article , the authors adopted a Unified Theory of Acceptance and Use of Technology (UTAUT) model to determine the factors influencing organizations to use robotics technology when performing auditing activities.
Abstract: Background: The auditing profession has been burdened with high costs and reputational damage resulting from false results because of a high dependency on manual tasks susceptible to errors or manipulation. Automating repetitive tasks with the use of robots can help minimise these errors to achieve efficiencies and cost reduction.Objectives: This study adopted a Unified Theory of Acceptance and Use of Technology (UTAUT) model to determine the factors influencing organisations to use robotics technology when performing auditing activities.Methods: The study was quantitative, using a survey consisting of 37 questionnaires and two semi-structured interview questions. The sample consisted of 59 professional auditors and 26 non-auditors involved in auditing in South Africa.Results: The study results show that performance expectancy and facilitating conditions are key factors that influence the adoption of robotics in the auditing profession. A lack of training, data quality, and inadequate investment in robotics technology are mentioned as critical barriers to adopting robotics in auditing. Management support, good change management processes and technology skills are quoted as potential key enablers of robotics technology in the auditing profession.Conclusion: The conclusion drawn from the study is twofold. Firstly, the performance management system and the business case for robotics in the auditing process should be linked to the tasks of auditors. Secondly, resources should be made available to support the use of technology in the profession. The study provides more insight into how leaders and management in the auditing profession could influence the adoption of robotics in auditing.