- A-Z Publications
- South African Journal of Information Management
- Previous Issues
- Volume 6, Issue 3, 2004
South African Journal of Information Management - Volume 6, Issue 3, 2004
Volumes & issues
Volume 6, Issue 3, 2004
Author Marie-Luce MullerSource: South African Journal of Information Management 6 (2004)More Less
Without a proper and appropriate intelligence process and structure, it is difficult to develop intelligence in an enterprise. Companies' efforts to weigh the determining factors of strategic versus tactical needs, decentralized organizational structures, and the focus of decision making lead to the availability of three general organizational structures for the intelligence function, namely highly centralized systems that report to a single corporate entity, decentralized systems that typically incorporate multiple intelligence units serving several organizational components, or hybrid systems that combine features of both previous options. A case study of how competitive intelligence is organized in a South African company, Automaker Inc., is presented.
Author S. LubbeSource: South African Journal of Information Management 6 (2004)More Less
This article deals with information managers' need to access and use information for decision-making. Searches are conducted by employees, but managers do not specify precisely what information they require. This is problematic for searchers. The efficient use of information is a key factor to success. Information use is also affected by perceived usefulness and perceived ease of use and these two aspects must be kept in mind by managers. Novice searchers have a problem with this and are not sure how the cognitive aspects work. It is concluded that, because of important epistemological differences between information and decision making, much can be gained from interaction between them.
Author Anesh Maniraj SinghSource: South African Journal of Information Management 6 (2004)More Less
The Internet and the World-Wide Web have revolutionized modern business and communication. Some of the benefits include cost savings, time savings, increased productivity, access to wider markets, 24 hour convenience all year round and instant communication, among other things. However, it has also brought with it a number of problems that include hacking, fraud, pornography, viruses, spying and spam. Many of these offenses are perpetrated from the facilities of employers, which could affect profitability and productivity, tarnish the reputation of the organization and expose it to costly litigation. This study examined the types of abuses and their impact on organizations, and the possible remedies available to employers. The focus of this study was on the development of Internet Usage Policies as a remedy, as it is inexpensive, it is easily implemented and it can be amended as and when necessary. A guide for developing an effective policy was also developed, taking into consideration the existing legislation that would impact on such a policy and the parties to it. The research also identified the broad contents of an Internet usage policy, which included the following: who are the parties affected by the policy, what is acceptable usage, what is unacceptable usage and what are the consequences of unacceptable usage. More specific contents that were identified include passwords, interpersonal etiquette, overuse and misuse of resources and time frames for the storage of unread e-mail. The study clearly highlighted that managing employee Internet abuse is the responsibility of line management supported by the information systems and human resources departments. Although policies have their limitations, they serve as a deterrent and a means of affording both the employer and employee some protection.
Source: South African Journal of Information Management 6 (2004)More Less
An adapted version of Michael E. Porter's five competitive forces model was used to determine the competitiveness of the water utility consulting industry on the Internet, in South Africa. This was done by analysing the hits that were obtained by using the search phrase 'water utility' in a South African search engine, Aardvark. Furthermore, an analysis was done of the database of consulting engineering enterprises registered with the South African Association of Consulting Engineers (SAACE). The reason for the database analysis was to determine the number of enterprises or potential entrants, that currently had the potential to render services to water utilities enterprises and which could not be traced via the Internet. The results of the research indicated that there was very little competitiveness in the water utility consulting industry on the Internet in South Africa. However, there were also indications that the situation could change if water utility consulting enterprises started to advertise all the services they render on the Internet and specifically indicated that these services could be rendered to water utility enterprises.
Author C. De BeerSource: South African Journal of Information Management 6 (2004)More Less
As with any virtual higher education environment, there are various electronic information resources that can be used for academic purposes, for example past examination papers, e-databases, e-journals, electronic theses and dissertations and electronic course reserves. These systems administer and control access to the academic information sources. This article focuses on how access is gained to password restricted electronic course reserves from within the WebCT environment without requiring students to authenticate again in the electronic course reserves module, and therefore emphasizes the seamless integration of the WebCT education platform and the library and information centre's electronic course reserves.
Source: South African Journal of Information Management 6 (2004)More Less
The concept of world-class performance is explored as it applies to the field of knowledge management. The authors propose a framework of elements that can be used to measure world-class performance - each element is explored and applied to the field of knowledge management. The article concludes with brief recommendations on how the framework should be applied.
Empirical evaluation of one of the relationships between the user, search engines, metadata and Web sites in three-letter .com Web sitesAuthor M. WeidemanSource: South African Journal of Information Management 6 (2004)More Less
Internet users often rely on search engines in an attempt to find relevant data on Web pages. Some Web pages contain metadata to enable search engines to categorize their contents more easily. As a result, a set of relationships exists between users, search engines, Web pages and metadata. One of these is the relationship between descriptionptive metadata on a Web page and the Web page itself. It was assumed that Web page authors make full use of metadata to increase the electronic visibility of their Web pages to Internet search engines. An empirical experiment has shown that the actual usage of a variety of metadata elements in a subset of randomly selected Web sites is surprisingly low. The overall average score for Web page visibility for this sample is 3, 75 out of 6. Not one of the selected Web pages contained any Dublin Core elements. One of the reasons for this low usage of metadata could be reluctance amongst search engine designers in recognizing metadata. Future research in this area could concentrate on some of the other relationships, as well as the implementation of the Dublin Core metadata elements.