- A-Z Publications
- South African Journal of Information Management
- Previous Issues
- Volume 6, Issue 4, 2004
South African Journal of Information Management - Volume 6, Issue 4, 2004
Volumes & issues
Volume 6, Issue 4, 2004
Author A. Van den BergSource: South African Journal of Information Management 6 (2004)More Less
CONSIT Interactive is an intervention designed and developed to enable the escalation of performance levels of a small business through the combination of effective management principles and a well-planned optimal use of IT. Part 1 considered the issues surrounding the design and development thereof. This article discusses the post-intervention design activities of pilot-testing, implementation and post-implementation intervention evaluation. The implementation methodology utilized for this study incorporated project management principles and methods. The post-test evaluation of CONSIT indicated the application of some refinements, which represented the addition of activities requested by the users and not the correction of defects. The evaluation furthermore presented evidence to indicate that CONSIT can be considered to be a viable and practical stand-alone tool, a strategic information resource that is able to fulfil the purpose for which it was designed and developed.
Author P.K.J. TobinSource: South African Journal of Information Management 6 (2004)More Less
Knowledge is now recognized as a company's most valuable asset. For the most part it resides in employees as tacit knowledge. Owing to the nature of tacit knowledge, efforts to diffuse it into an organization come with distinct challenges. The research objective was to identify the challenges of tacit knowledge diffusion that were most relevant and important to Eli Lilly SA, rank them in order of importance and make recommendations thereof. From the literature survey, nine hypotheses were developed and tested through a questionnaire sent via e-mail to 154 employees at Eli Lilly SA. Eighty-one responses were received of which 80 were used for analysis (53% response rate). Of the nine hypotheses, four were rejected while five were accepted. The main challenges identified that Eli Lilly SA faced when diffusing knowledge were distance and time. The conclusion was that Eli Lilly SA needed to build on the area of strength identified, which was leadership, and address the major challenges of distance and time by optimizing existing systems that were already in place in the organization.
Author G.J. De KlerkSource: South African Journal of Information Management 6 (2004)More Less
Information and communication technologies (ICT) have created a scenario where geographic location is no longer important. A virtual office (VO) is a work site situated outside of the traditional office where people still execute traditional administrative services supported by ICT, as opposed to employees who traditionally commuted to corporate offices. A teleworker is defined as a full-time corporate employee working at any other geographic location away from the corporate office during normal business hours for one or more days each month. The implications, as investigated in a holistic research project, which resulted in a doctoral thesis, found significant advantages to the corporate environment. These include improved work and personal life experiences for human resources (HR), improved environmental and social circumstances, a significant paradigm shift in the corporate management arena and revised education and training curricula or interventions providing formal and informal training interventions. In this article the focus is on relevant strategies, as investigated and implemented by Absa in order to launch telework in SA, where ICT was found to effectively sustain such initiatives.
Author J.A. KokSource: South African Journal of Information Management 6 (2004)More Less
Businesses today have to compete in a very competitive environment. Every businessperson should therefore consider the competitive standing of his or her business in the world economy and the competitiveness of its knowledge competencies. To improve the capabilities of an enterprise, its intangible assets should be mobilized and exploited. A proposal for a new framework for managing knowledge to gain competitive advantage is made by using the Seven-S model designed by McKinsey Management Consultants as the basis for the new framework. The framework consists of the following seven parts: strategy; systems; style of leadership; staff; skills; structure and shared values.
Author T.J.D. BothmaSource: South African Journal of Information Management 6 (2004)More Less
When a new discipline emerges, it usually takes some time and a great deal of academic discussion before concepts and terms become standardized. Text mining is one such new discipline. In a groundbreaking article, Untangling text data mining, Hearst tackled the problem of clarifying text-mining concepts and terminology. This article, a conceptual study, is aimed at building on Hearst's ideas by pointing out some inconsistencies and suggesting an improved and extended categorization of data-mining and text-mining techniques. A brief overview is given of the problems regarding text-mining concepts. This is followed by a summary and critical discussion of Hearst's attempt to clarify the terminology. The essence of text mining is found to be the discovery or creation of new knowledge from a collection of documents. The parameters of non-novel, semi-novel and novel investigation are used to differentiate between full-text information retrieval, standard text mining and intelligent text mining. The same parameters are also used to differentiate between related processes for numerical data and text metadata. These distinctions may be used as a road map in the evolving fields of data/information retrieval, knowledge discovery and the creation of new knowledge.
Hacker risk in e-commerce systems with specific reference to the disclosure of confidential informationAuthor C. LamprechtSource: South African Journal of Information Management 6 (2004)More Less
Many businesses have started engaging in electronic transactions in a Web-centric environment. This includes various parties, such as the e-commerce company, its client and a bank. Confidentiality and security are two of the essential building blocks in merging the business processes of this extended enterprise with the supporting technological processes, which further adds to the complexity of the Web-centric environment. Despite having security policies and procedures in place to control access to database information, unauthorized intrusion still occurs. The objective of this study was to identify the main hacker risks and to address them by identifying the components of control that should be in place to prevent such risks. Microsoft's SQL Server was chosen as an example of a database system that is used to manage confidential information. It is suggested that the best way to reduce hacker intrusion risks to an acceptable level is to implement a three-level control system. This system should firstly include a control framework with control objectives to manage systems, business risks and internal controls, secondly a control model for the design, implementation and maintenance of the risk management system and thirdly appropriate preventative, detective and remedial control techniques to address the stated business and control objectives.
Author C.W. RensleighSource: South African Journal of Information Management 6 (2004)More Less
Although not a novel concept, peer-to-peer computing is associated by many users with file sharing, in particular MP3 music files, but in reality peer-to-peer computing encompasses instant messaging, group collaboration and distributed computing. The social implications of peer-to-peer computing have wide-ranging ramifications for the Internet and its users. This research at the Rand Afrikaans University had as goal to identify student behaviour and utilization patterns when interacting with peer-to-peer systems available on the Internet. The respondents, all being Information Science students, completed a questionnaire that examined aspects such as information communication technology utilization, the frequency and duration of use, type of content downloaded and shared and the social aspects of peer-to-peer file sharing. Although distributed computing has various inherent problems such as copyright and privacy issues, peer-to-peer computing can be seen as a radical new mindset, setting the stage for a decentralized Internet future.
Teaching Information Economics to undergraduate Information Science students at the University of PretoriaAuthor J.J. BritzSource: South African Journal of Information Management 6 (2004)More Less
Information economics forms part of the discipline of Economics. Often information science curricula also include Information Economics as a separate course or as a component of an Information Science course. Although Economics may be recommended as part of the degree programme, it is generally not a formal prerequisite for Information Science students in most educational institutions in South Africa. Therefore, many students do not have any formally acquired knowledge of Economics before studying Information Economics. Unless students receive instruction in the basics of Economics in order to understand the course material presented in Economics, the Economics course material needs to be adapted or course material must be developed specifically for Information Science students. In this article, content of an Information Economics course developed specifically for undergraduate students in the Department of Information Science at the University of Pretoria is descriptionbed. This elective course introduces students to information as an economic good, the role of information in a national economy, the pricing and packaging of information goods, the economics of intellectual property and the exchange of information to facilitate relationships between organizations in an information economy.
Author Y. WaghidSource: South African Journal of Information Management 6 (2004)More Less
Leadership has been on the corporate landscape ever since the earliest days of management developing as a discipline. Despite this, little agreement has been reached on what constitutes effective leadership. In addition, the changes brought about by the information age and the impact of technology on society in general, and management in particular, necessitate that leadership approaches be reconsidered. Traditional leadership styles and management methods based on command and control principles that once were perceived to increase the competitiveness of an organization have become a liability, as these methods have not been found to offer competitive advantages. Leadership has been identified as one of the primary barriers to organizational learning in the knowledge society. Leading authors argue that leadership and managerial influences in the knowledge organization should receive specific attention if knowledge management (KM) programmes are to be successfully implemented. Therefore, organizational leadership needs to change to reflect these new realities. The relevance and importance of 'emerging' leadership have been explored by diverse authors who all suggested new approaches to leadership development. This research critically examined these approaches to leadership to determine what new competencies leaders should develop to be successful in the knowledge society. Adopting a qualitative research approach making use of a focus group and correlation study, the author concludes firstly that managers have not yet made the transition to manage successfully in a knowledge society and, secondly, that action learning provides a suitable platform and framework for developing a next generation of leaders.