Strategies for sourcing IT skills for South African tertiary institutions
- Authors: Moller, Alison
- Date: 2004
- Subjects: Electronic data processing departments -- Contracting out -- South Africa , Universities and colleges -- Services for -- Contracting out -- South Africa
- Language: English
- Type: Thesis , Masters , MTech (Business Information Systems)
- Identifier: vital:10804 , http://hdl.handle.net/10948/263 , Electronic data processing departments -- Contracting out -- South Africa , Universities and colleges -- Services for -- Contracting out -- South Africa
- Description: Traditional methods of IT recruitment in tertiary institutions need to be reviewed and more modern approaches analysed. A lot of successes and failures have been reported for each type of sourcing strategy in the IT sector. Many organizations have been liquidated due to poorly planned mergers, takeovers, and total outsourcing strategic shifts. The primary objective is to review the current IT sourcing strategies in tertiary institutions and to analyse and discuss the benefits and limitations of employing permanent IT staff, contract workers or outsourced staff.
- Full Text:
- Date Issued: 2004
- Authors: Moller, Alison
- Date: 2004
- Subjects: Electronic data processing departments -- Contracting out -- South Africa , Universities and colleges -- Services for -- Contracting out -- South Africa
- Language: English
- Type: Thesis , Masters , MTech (Business Information Systems)
- Identifier: vital:10804 , http://hdl.handle.net/10948/263 , Electronic data processing departments -- Contracting out -- South Africa , Universities and colleges -- Services for -- Contracting out -- South Africa
- Description: Traditional methods of IT recruitment in tertiary institutions need to be reviewed and more modern approaches analysed. A lot of successes and failures have been reported for each type of sourcing strategy in the IT sector. Many organizations have been liquidated due to poorly planned mergers, takeovers, and total outsourcing strategic shifts. The primary objective is to review the current IT sourcing strategies in tertiary institutions and to analyse and discuss the benefits and limitations of employing permanent IT staff, contract workers or outsourced staff.
- Full Text:
- Date Issued: 2004
Cyber crime affecting some businesses in South Africa
- Authors: Herselman, Martha Elizabeth
- Date: 2003
- Subjects: Computer crimes , Business enterprises -- South Africa
- Language: English
- Type: Thesis , Masters , MTech (Business Information Systems)
- Identifier: vital:10793 , http://hdl.handle.net/10948/212 , Computer crimes , Business enterprises -- South Africa
- Description: This study shows that cyber crime is a recent addition to the list of crimes that can adversely affect businesses directly of indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to fully prosecute a hacker due to incompleteness. Any kind of commercially related crime can be duplicated as cyber crime. Therefore very little research appears or has been documented about cyber crime in South African companies before 2003.11.21 The motivation to do this study was that businesses often loose millions in cyber attacks, not necessarily through direct theft but by the loss of service and damage to the image of the company. Most of the companies that were approached for interviews on cyber crime were reluctant to share the fact that they were hacked or that cyber crime occurred at their company as it violates their security policies and may expose their fragile security platforms. The purpose of this study was to attempt to get an overall view on how South African businesses are affected by cyber crime in the banking and short term insurance sector of the South African industry and also to determine what legislation exist in this country to protect them. The case study approach was used to determine the affect of cyber crime on businesses like banks and insurance companies. Each case was interviewed, monitored and was observed over a period of a year. This study discloses the evaluation of the results of how cyber crime affected the cases, which were part of this study. The banks felt that they were at an increased risk both externally and internally, which is likely to increase as the migration towards electronic commerce occurs. The insurance industry felt that they are not yet affected by external cyber crime attacks in this country.
- Full Text:
- Date Issued: 2003
- Authors: Herselman, Martha Elizabeth
- Date: 2003
- Subjects: Computer crimes , Business enterprises -- South Africa
- Language: English
- Type: Thesis , Masters , MTech (Business Information Systems)
- Identifier: vital:10793 , http://hdl.handle.net/10948/212 , Computer crimes , Business enterprises -- South Africa
- Description: This study shows that cyber crime is a recent addition to the list of crimes that can adversely affect businesses directly of indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to fully prosecute a hacker due to incompleteness. Any kind of commercially related crime can be duplicated as cyber crime. Therefore very little research appears or has been documented about cyber crime in South African companies before 2003.11.21 The motivation to do this study was that businesses often loose millions in cyber attacks, not necessarily through direct theft but by the loss of service and damage to the image of the company. Most of the companies that were approached for interviews on cyber crime were reluctant to share the fact that they were hacked or that cyber crime occurred at their company as it violates their security policies and may expose their fragile security platforms. The purpose of this study was to attempt to get an overall view on how South African businesses are affected by cyber crime in the banking and short term insurance sector of the South African industry and also to determine what legislation exist in this country to protect them. The case study approach was used to determine the affect of cyber crime on businesses like banks and insurance companies. Each case was interviewed, monitored and was observed over a period of a year. This study discloses the evaluation of the results of how cyber crime affected the cases, which were part of this study. The banks felt that they were at an increased risk both externally and internally, which is likely to increase as the migration towards electronic commerce occurs. The insurance industry felt that they are not yet affected by external cyber crime attacks in this country.
- Full Text:
- Date Issued: 2003
Email security policy implementation in multinational organisations with special reference to privacy laws
- Authors: Dixon, Henry George
- Date: 2003
- Subjects: Electronic mail systems -- Security measures , Privacy, Right of , Electronic mail systems -- Management , Electronic mail systems -- Law and legislation
- Language: English
- Type: Thesis , Masters , MTech (Business Information Systems)
- Identifier: vital:10790 , http://hdl.handle.net/10948/229 , Electronic mail systems -- Security measures , Privacy, Right of , Electronic mail systems -- Management , Electronic mail systems -- Law and legislation
- Description: In 1971, scientist Ray Tomlinson sent what is now considered the first email message. It was considered as “nothing short of revolutionary … deserv[ing] a spot in the list of great communication inventions such as the printing press, telegraph and telephone” (Festa, 2001). Whereas email was first used exclusively in the military (Arpanet) and in academic circles, it has now become almost ubiquitous, used widely for private, as well as for business correspondence. According to a Berkeley study (Berkeley, 2000), there were approximately 440 million corporate and personal [e-] mailboxes worldwide in 2001, of which more than a third was corporate mailboxes. As a result of the extensive use of email in the corporate environment, Information Officers have to ensure that the use of email adds business value. In an “always on” market place, the efficiency, immediacy and cost effectiveness of email communication are immediately evident. A study by Ferris Research, quoted by Nchor (2001), shows that there is “an overall productivity gain of US$9000 per employee as they send and receive emails to get projects done.” However, the use of email in the corporate envi-ronment also poses business risks that need to be uniquely addressed. Among these “key business risks” (Surfcontrol, 2001) are security risks, viruses, legal liability, pro-ductivity loss and bandwidth abuse. To address the risks mentioned above and to protect the business value of email, spe-cific policies have to be implemented that address email usage. Information Security Policies are defined in most corporate environments. In a study done by Elron Soft-ware (2001), 83% of respondents who have abused email have company policies regu-lating email usage. There appears to be a gap between policy conception and policy implementation. Various factors inhibit effective policy implementation – ethical, legal and cultural. The implementation of corporate policy becomes especially complex in multinational environments where differing information law Email usage is ubiquitous in the modern business environment, but few companies adequately manage the risks associated with email.
- Full Text:
- Date Issued: 2003
- Authors: Dixon, Henry George
- Date: 2003
- Subjects: Electronic mail systems -- Security measures , Privacy, Right of , Electronic mail systems -- Management , Electronic mail systems -- Law and legislation
- Language: English
- Type: Thesis , Masters , MTech (Business Information Systems)
- Identifier: vital:10790 , http://hdl.handle.net/10948/229 , Electronic mail systems -- Security measures , Privacy, Right of , Electronic mail systems -- Management , Electronic mail systems -- Law and legislation
- Description: In 1971, scientist Ray Tomlinson sent what is now considered the first email message. It was considered as “nothing short of revolutionary … deserv[ing] a spot in the list of great communication inventions such as the printing press, telegraph and telephone” (Festa, 2001). Whereas email was first used exclusively in the military (Arpanet) and in academic circles, it has now become almost ubiquitous, used widely for private, as well as for business correspondence. According to a Berkeley study (Berkeley, 2000), there were approximately 440 million corporate and personal [e-] mailboxes worldwide in 2001, of which more than a third was corporate mailboxes. As a result of the extensive use of email in the corporate environment, Information Officers have to ensure that the use of email adds business value. In an “always on” market place, the efficiency, immediacy and cost effectiveness of email communication are immediately evident. A study by Ferris Research, quoted by Nchor (2001), shows that there is “an overall productivity gain of US$9000 per employee as they send and receive emails to get projects done.” However, the use of email in the corporate envi-ronment also poses business risks that need to be uniquely addressed. Among these “key business risks” (Surfcontrol, 2001) are security risks, viruses, legal liability, pro-ductivity loss and bandwidth abuse. To address the risks mentioned above and to protect the business value of email, spe-cific policies have to be implemented that address email usage. Information Security Policies are defined in most corporate environments. In a study done by Elron Soft-ware (2001), 83% of respondents who have abused email have company policies regu-lating email usage. There appears to be a gap between policy conception and policy implementation. Various factors inhibit effective policy implementation – ethical, legal and cultural. The implementation of corporate policy becomes especially complex in multinational environments where differing information law Email usage is ubiquitous in the modern business environment, but few companies adequately manage the risks associated with email.
- Full Text:
- Date Issued: 2003
- «
- ‹
- 1
- ›
- »