- A-Z Publications
- South African Journal of Information Management
- OA African Journal Archive
- Volume 9, Issue 2, 2007
South African Journal of Information Management - Volume 9, Issue 2, 2007
Volumes & issues
Volume 9, Issue 2, 2007
Author V.H. PirttimakiSource: South African Journal of Information Management 9 (2007)More Less
The literature review shows that business intelligence (BI) has a long history even though its systematic use in the business context is more recent. Despite the importance of systematic BI, the concept is still trying to find a footing in both academia and the business world. From the literature review, one sees that there are numerous intelligence concepts and that their categorization is ambiguous. The BI concept is also multidimensional as there is no precise or universal conception of what BI is. The article aims to provide an analysis of BI definitions and related intelligence concepts, such as the content of each key concept, what it descriptionbes and how intelligence concepts relate to each other. Another objective of the article is to increase the academic understanding and status of this recent field of research on intelligence activities.
Author M.M.M. SnymanSource: South African Journal of Information Management 9 (2007)More Less
To survive and prosper in a highly competitive and rapidly changing environment, organizations need to explicitly manage their knowledge. This article reports on a knowledge management framework that provides a clear and unambiguous knowledge base, which in turn can serve as a platform for the development of an effective knowledge management strategy. An appropriate knowledge framework is selected and combined with an appropriate management framework to create a well defined, theoretically sound knowledge management framework.
Author S.C. WardenSource: South African Journal of Information Management 9 (2007)More Less
The management of information flow in the order processing activities of small enterprises is not always understood. An inefficient supply chain is often the result of the lack of timely and accessible inter-firm information and data exchange. Small suppliers often do not have the technology infrastructure and capable resources available for proper integration with supply chains. This research investigated suppliers and fast moving consumer goods (FMCG) retailers, adopting business-to-business (B2B) e-commerce. Small businesses are the focus of this research, as they contribute to a large portion of the South African economy and play an important role in the supply chains of retailers. Case study research using evidence obtained from nine small, medium and micro enterprises (SMMEs) and suppliers located in the Western Cape, South Africa, was used. It was found that small suppliers have different processes for conducting business with various retailers. Literature revealed little evidence of using the Internet as an enabling technology in on-line order processing. From the analysis, nine improvement areas were identified to enhance the conduct of efficient B2B order processing and associated information flow. These improvement areas were merged with four factors that were identified in a framework when adopting e-supply chains. This resulted in the proposition of guidelines for small suppliers when adopting B2B e-commerce for order processing.
Assessment of current practices in creating and using passwords as a control mechanism for information accessAuthor L.P. SteenkampSource: South African Journal of Information Management 9 (2007)More Less
One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.