Authors:Lucia Makwasha et al. Abstract: Blended learning is a combination of eLearning and traditional face-to-face learning. Since challenges have been identified related to blended learning that hinder effective teaching and learning, this study examined student opinions of this learning model. The aim was to get a deep understanding of its effectiveness given infrastructure deficiencies. Twelve in-depth interviews were conducted with students at a university in Zimbabwe that uses blended learning, and an interpretivist paradigm was adopted. The Zone of Proximal Development proposed by Vygotsky was utilized to conceptualize the cognitive development of the students, and third-generation activity theory (AT), developed by, was used for evaluating the home and university activity systems. Results indicate that asynchronous blended learning, supported by a learning management system, allows content to be downloaded for offline study and hence may be adopted in universities with limited information and communications technology (ICT) infrastructure. The study adds to the narratives on blended learning implementation in countries with developing economies. PubDate: Thu, 06 Feb 2025 02:02:38 PST
Authors:Philip Bazanye et al. Abstract: Internet of Things devices, such as those used in home automation, commercial and retail business, and smart cities, are vulnerable to attacks that affect all aspects of daily life. The upsurge in the use of IoT devices has increased the likelihood of cyber-attacks on end users. This research investigates the factors that influence IoT device users to adhere to privacy standards. This interpretivist exploratory research was guided by a three-phased approach. The interview questions were derived from the conceptual model and the constructs of Activity Theory, and themes were analyzed using deductive thematic analysis. The findings were elaborated with reference to three models of ethics. Key findings indicate that adherence is influenced mostly by consequentialism. Secondly, end-users strive to gain more knowledge about their IoT devices and to develop their confidence in the devices (virtue ethics). Lastly, compliance with policies and procedures (deontological) is the least likely influence of user adherence. PubDate: Thu, 06 Feb 2025 02:02:29 PST
Authors:John Mangundu Abstract: Academics and students alike can benefit from the use of artificial intelligence (AI) in education. AI governance lowers AI risks while ensuring that anticipated AI use objectives are achieved. However, research on AI governance has been lacking, especially in higher education in emerging economies such as South Africa. In light of this serious research gap, the current study presents the findings of a qualitative exploratory investigation of the maturity and preparedness of AI governance in South African higher education institutions. Informed by a combination of the TOE framework, the traditional IT governance model and the adapted IT governance maturity assessment model, semi-structured interviews were conducted with academic and ICT decision makers from two public and three private higher education institutions in South Africa to determine their insights on the state of readiness and maturity of AI governance. The results show that AI components are widely used in higher education information systems. However, the findings showed that these higher education institutions were not in any way prepared for AI governance. The report recommends that risks associated with AI and learning should be acknowledged and countered as is done by the developed world's established AI regulatory systems. PubDate: Thu, 06 Feb 2025 02:02:20 PST
Authors:Anna Kayanda et al. Abstract: It is not known whether the combination of two IS system implementation approaches, Design Science Research and eXtreme Programming, can help improve information systems success in the Tanzanian HEI context. To investigate this, this study evaluated a system that was implemented using both approaches. The evaluation used DeLone and McLean’s Information Systems Success Model(D&M) and a mixed research method. The results showed that while neither the system quality nor the information quality influenced the use of the system, service quality and user satisfaction both had an influence on system use (p PubDate: Wed, 05 Feb 2025 00:51:14 PST
Authors:Khathutshelo M. Makhitha et al. Abstract: South Africa lags behind other economies regarding online shopping adoption. Extant literature has focused on the influence of risk factors on consumers’ intention to shop online. However, few studies have considered the effect that mediating factors can have on relationships between other factors related to online shopping. It is particularly important to determine the mediation effect of perceived risk factors on the relationship between perceived website quality and intentions to shop online. A quantitative survey was used to collect data from 300 online shoppers who purchase clothing online and are located in the Soweto Township in Gauteng, South Africa. Perceived website quality was found to have an unexpected, direct positive influence on perceptions regarding perceived social risk, time risk, product risk and financial risk, as well as on intention to shop online. However, perceived website quality also had a direct negative impact on perceived security risk (as perceived website quality increased perceived security risk decreased). The perceived risk factors did not display statistically significant indirect effects (mediation) between perceived website quality and the intention to shop online. This paper contributes to the S-O-R theory in relation to website quality risk factors, perceived risk factors and the intention to shop online. The paper may help online retailers improve website quality by considering the impact of the perceived risk factors from a practical perspective. PubDate: Tue, 26 Nov 2024 04:34:52 PST
Authors:Dick Ng’ambi et al. Abstract: This paper proposes using a ChatGPT-generated algorithm for an indigenous game to mediate the acquisition of computational thinking skills. The paper seeks to answer the question: How can the ChatGPT-mediated algorithm for indigenous games foster the acquisition of computational thinking skills' Using a Participatory Action Research approach, 19 collaborators from 11 African countries gathered 185 indigenous games. The paper focuses on one of those games that is played in all 11 countries. The paper concludes that involving collaborators, who are indigenous members of their communities and have experiential knowledge of the game, led to their acquisition of computational thinking skills. PubDate: Tue, 12 Nov 2024 03:35:19 PST
Authors:Wilson Pholld et al. Abstract: Government reform implementations are often a catalyst for system implementation within public sectors. However, their influence on the information system design process in the public sectors have not been explained extensively in the literature. This study used actor network theory as the lens to examine the interactions of actors during the information systems design process in the reformed public sectors. The main research aims were to extend the understanding of how government reforms influence the information system design processes of local government authorities in Tanzania. The study employed the interpretive approach and the case study strategy when analyzing the phenomena. Qualitative data were collected from 33 interviews with 23 participants who were purposively selected from three local governments in Tanzania. The findings show that the implementations of reforms have triggered the formation of actor-networks during the IS design process. Also, these reforms were found to affect the structural information flow in the organizations, which in turn affects the requirement elicitation process in the local context. The study has made both theoretical and practical contributions that are of value to researchers, policy makers and those involved in the IS implementation process in local governments of Tanzania. PubDate: Wed, 30 Oct 2024 04:05:26 PDT
Authors:Kashmira Hansjee et al. Abstract: This study aimed to determine whether South African-listed companies use social media to engage with stakeholders. Emerging economies are experiencing rapid growth, which increases the need for transparent communication to build trust with investors to facilitate resource exchange. Social media has changed many aspects of communication by offering instant, interactive channels that can reach numerous stakeholders. However, there is limited research into the utilization of social media for stakeholder communication within emerging economies. This study aimed to address that topic and examined the social media practices of listed entities to determine whether companies use Facebook, Twitter, Instagram, and LinkedIn for stakeholder engagement. These findings provide a broad understanding of how companies utilize social media to engage with stakeholders. A content analysis of 19 253 posts made by companies on social media was performed. The findings confirm that companies use social media for stakeholder engagement and that most companies chose to use several social platforms as opposed to only one. However, Twitter (X) and LinkedIn were the two most popular platforms used, followed by Facebook and Instagram. On Facebook and LinkedIn approximately 90% of posts related to stakeholder engagement posts and thought leadership and corporate social responsibility (CSR) posts were favored by companies in terms of stakeholder engagement. PubDate: Wed, 18 Sep 2024 01:05:40 PDT
Authors:Phillip Nyoni et al. Abstract: Research shows that data breaches often occur when organizations fail to protect users’ personal data sufficiently well. Many devices are connected to the Internet such as mobile phones, smart cars, wearables and ‘Things’ which increase the number of potential entry points into data stores. This paper discusses the potential data privacy risks that users face online. The study used online content analysis and surveys to establish the privacy perceptions of users and trends of data breaches in South Africa. The findings reveal that users have a positive perception of data managers and view them as knowledgeable in data protection. Nevertheless, the results show that privacy risks do exist online, and the number of data breaches and abuses has increased over time. These breaches result in exposure and loss of personal data. The findings of this study are useful in developing strategies and policies to combat data breaches while improving security systems. PubDate: Tue, 13 Aug 2024 02:55:07 PDT
Authors:Fazlyn Petersen et al. Abstract: In South Africa, data-intensive synchronous tutoring platforms like Zoom can be exclusionary due to limited internet access at home. Challenges in electronic tutoring include device scarcity, high data costs, network issues and low digital skills. To mitigate data costs, a data-free mobile instant messenger was tested for tutoring, guided by the technological pedagogical content knowledge framework (TPACK). The study included first-year accounting and third-year information systems courses at a historically disadvantaged institution. Qualitative data from tutors revealed that technology-related knowledge was crucial for effective electronic tutoring. Tutors with strong technology and content knowledge utilised the data-free application effectively and employed pedagogical expertise to offer flexible, after-hours support. These tutors demonstrated technological pedagogical and content knowledge by using features like voice notes and images to explain concepts, even without access to data. Students with Apple devices were excluded initially. The findings can inform the development of more inclusive electronic tutoring interventions in South Africa PubDate: Thu, 20 Jun 2024 01:34:37 PDT
Authors:Emmanuel Okoro Ajah Abstract: Digital technology has brought about the emergence of digital entrepreneurship, which has significantly disrupted existing products and services and the way that they are marketed. This new wave of entrepreneurship has piqued the interest of scholars from various disciplines, including Information Systems. However, in the literature, there are insufficient theoretical explanations of digital technology's role in the processes involved in digital entrepreneurship development. To address this, a systematic review was conducted to comprehensively explore digital technology affordances in digital entrepreneurship development. Such affordances are the factors that cause the digitalization of the events that characterize digital entrepreneurship development. The outcome of this review presents a conceptual framework that explains how certain affordances reshape the processes of entrepreneurship development. This framework can provide valuable insights enabling entrepreneurs and stakeholders to better understand the role of digital technology in reshaping entrepreneurship development and leveraging its affordances for profitable outcomes. PubDate: Tue, 28 May 2024 05:50:02 PDT
Authors:Ruthbetha Kateule et al. Abstract: The management of COVID-19 pandemic has revealed inefficiencies in coordinating global response, particularly in African countries. Therefore, creating an urgent need to examine the literature on Information and Communication Technologies (ICT) in crisis management to appreciate its contextual role. Employing a systematic review, using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA), this paper critically assessed the extent of the use of ICT in crisis management in Africa’s response to COVID-19 to reconstruct its resilience against future crises. Findings indicate that while countries with limited ICT infrastructure faced considerable challenges in utilizing ICT solutions in COVID-19 management, countries with established ICT infrastructure were able to use ICT solutions across the various phases, ranging from mitigation to recovery. Such ICT solutions include COVID-19 screening, contact tracing, surveillance, and resource prioritization and allocation. Therefore, to be effective, African countries should invest in ICT and proactively improve its application across all phases of crisis management. PubDate: Tue, 28 May 2024 03:25:00 PDT
Authors:Cynthia Augustine et al. Abstract: Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. A thematic analysis of their responses revealed two factors shaping the perception of HCI curriculum developers: HCI curriculum structural challenges and organizational challenges. These findings contribute to the HCI body of knowledge by explaining how the HCI field can be made more inclusive for the global south context. PubDate: Tue, 16 Apr 2024 05:29:19 PDT
Authors:Lesley Matshwane et al. Abstract: Although delivery of services in South Africa is the responsibility of all spheres of government, the provision of basic services lies at the doorstep of local municipalities. Local municipalities have, for many reasons, frequently been unable to live up to this mandate despite the fact that some of the challenges that they face can be addressed by using IT. This paper assesses factors enabling and inhibiting the efficient deployment and integration of IT in local municipalities. The technological, organizational and environmental (TOE) framework was deployed to assess the factors. A multiple case study in which semi-structured interviews were conducted produced qualitative data and thematic analysis was carried out. This paper suggests that effective deployment and integration of IT is not solely dependent on technological factors but that organizational and environmental factors also influence the outcomes to a significant extent. PubDate: Wed, 28 Feb 2024 00:34:38 PST
Authors:John Mangundu Abstract: Information technology governance (ITG) is an essential part of ensuring that information technology adds value to business. Despite the increased use of IT for academic, administrative, research and community engagement activities in universities, there is a dearth of studies on ITG in higher education specifically in Africa. The study reported on here combines the will-skill-tool model and the theory of planned behavior to assess the impact of individuals’ ITG will, ITG skill and the use of an ITG tool on ITG implementation maturity in the context of South African higher education institutions. A survey was conducted among 121 information technology and business decision makers from five higher education institutions and the data was analyzed using SmartPLS (Version 3). The findings reveal that ITG tools availability and access influence both ITG implementation maturity and ITG skills. In addition, the use of an ITG tool impacts on ITG skill, which in turn has an influence on ITG will. Furthermore, ITG skill mediates the relationship between the use of an ITG tool and ITG will. Interestingly, the results do not reveal a moderation of perceived ITG complexity. PubDate: Fri, 09 Feb 2024 03:40:08 PST
Authors:Brenda M. Scholtz et al. Abstract: This paper investigates factors influencing the adoption of social media analytics (SMA) for citizen relationship management (CzRM). Three real-world cases of government departments, two in South Africa and one in Germany, were investigated, and focus group discussions were conducted. The technological, organizational, and environmental (TOE) theory and qualitative content analysis guided the data analysis. The findings revealed that in all cases, staff usually conducted a manual analysis of social media and SMA had not been implemented sufficiently to realize its full potential. Insights were obtained from TOE and factors were identified that should be considered for improving the planning of SMA adoption in government. Data quality, methods and tools for SMA, and resources (e.g., skills and budget) were the most important factors identified for achieving success in SMA projects in government. The contribution is an improved understanding of the adoption of SMA for CzRM and can lead to effective monitoring of social media posts by citizens to improve service delivery and, hence, lead to more citizen-centric government. PubDate: Thu, 23 Nov 2023 03:24:08 PST
Authors:Tejumade F. Anthony et al. Abstract: Traditional energy meters have suffered from a lack of automated analysis and inaccuracy in reading energy consumption, which has brought about smart metering systems. Developing economies such as in Africa. still experience a setback in electricity monitoring and load distribution because of existing traditional meter systems in use. Communication technologies play an important role to improve the monitoring of energy consumption and ensure a road map toward a smart grid. This paper reviews communication technologies used for Advanced Metering Infrastructure (AMI) emphasizing Wi-Fi and Cellular technologies. Metrics used to evaluate their performance include cost, energy efficiency, coverage, deployment, latency, payload, and scalability. The review presents a benchmark for research on AMI communication technologies in developing economies. When adopted, the expected AMI benefits are reduced energy theft, cost efficiency, real-time analysis, security, and safety of energy supply in developing economies. PubDate: Fri, 10 Nov 2023 01:14:04 PST
Authors:Peter N. Muturi et al. Abstract: Identity disclosure risk is an essential consideration in data anonymization aimed at preserving privacy and utility. The risk is regionally dependent. Therefore, there is a need for a regional empirical approach in addition to a theoretical approach in modeling disclosure risk estimation. Reviewed literature pointed to three influencers of the risk. However, we did not find literature on the combined effects of the three influencers and their predictive power. To fill the gap, this study modeled the risk estimation predicated on the combined effect of the three predictors using the Kenyan situation. The study validated the model by conducting an actual re-identification quasi-experiment. The adversary’s analytical competence, distinguishing power of the anonymized datasets, and linkage mapping of the identified datasets are presented as the predictors of the risk estimation. For each predictor, manifest variables are presented. Our presented model extends previous models and is capable of producing a realistic risk estimation. PubDate: Fri, 10 Nov 2023 00:55:14 PST
Authors:Norshima Humaidi et al. Abstract: Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation to the extent of their work experience and their previous encounters with cybersecurity threats. These findings hold valuable implications for the field of information security management, offering insights into how the industry can refine its strategic planning for information security. This can positively affect cybersecurity attitudes among employees within organizations. PubDate: Mon, 23 Oct 2023 04:53:44 PDT
Authors:Maria M. Ausiku et al. Abstract: Several professional development programs have been designed to train in-service teachers on a computational thinking (CT) curriculum, but few researchers have examined how these affect primary school teachers' self-efficacy and knowledge of CT in emerging economies. This study's objective was to create a framework for the professional development of primary school in-service teachers for the teaching of CT (referred to as professional development for primary computational thinking - PD4PCT) to be integrated into teachers' professional development programs. An initial framework was refined after implementing it at a Namibian school with a group of 14 teachers from five different disciplines (social studies, English, natural science, mathematics, and Afrikaans). Literature reviews, pre- and post-intervention questionnaires, semi-structured interviews, and self-reporting diaries were used to collect data. The framework was evaluated by experts via an online questionnaire. The findings show that teachers who participated in the professional development program improved their perceived CT knowledge, beliefs, and confidence to teach CT. PubDate: Mon, 23 Oct 2023 04:39:13 PDT