{"title":"Fintechs in South Africa: Impact on regulation, incumbents and consumers","authors":"Simphiwe K. Cele, N. Mlitwa","doi":"10.4102/sajim.v26i1.1766","DOIUrl":"https://doi.org/10.4102/sajim.v26i1.1766","url":null,"abstract":"Background: The financial services industry in South Africa has undergone many changes that have given birth to fintechs. Most of these changes are driven by the advent of technology and evolving customer expectations. Fintechs have led to process disruptions and business model transformations, yet their implications have yet to be sufficiently studied. Therefore, it is essential to close this knowledge gap by investigating the impact of fintechs on this industry.Objectives: This research aimed to investigate the impact of fintechs in the financial services industry in South Africa.Method: A qualitative study was conducted in which 18 industry experts were interviewed using semi-structured interviews. The interviews were audio-recorded and transcribed for data analysis. ATLAS.ti 22 was used to organise and analyse data.Results: Fintechs increase competition for the incumbents, reduce profits, expose the inability of the incumbents to be agile and introduce new regulatory risks in the financial services industry. In contrast, fintechs have also brought some positive changes into the industry: financial inclusion, new growth opportunities, increasing choices for consumers and making the industry more competitive, reducing costs, customising financial services, bringing convenience and forcing incumbents and regulators to become more innovative.Conclusion: This study uncovered the positive and negative effects of fintechs in financial services in South Africa.Contribution: The study will benefit academia by expanding the body of knowledge about fintech research and improving the holistic understanding of this field in emerging economies, which can inspire future research on fintech and its application.","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140244122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of library management systems on information provision in the Rustenburg municipality","authors":"Mpho S. Mamatlepa, J. Maluleka","doi":"10.4102/sajim.v26i1.1769","DOIUrl":"https://doi.org/10.4102/sajim.v26i1.1769","url":null,"abstract":"Background: The Library Management System (LMS) is crucial to the operations and performance of the library. Libraries around the world have automated their operations to provide relevant services to users and to move away from operating manually.Objectives: The purpose of the study was to examine the impact of LMS on the provision of information in libraries of the local municipality of Rustenburg.Method: This was a quantitative study that examined the impact of LMS on information provision in libraries of the Rustenburg local municipality. The survey research design was adopted and data was collected using questionnaires.Results: The findings revealed that Rustenburg libraries depend highly on manual systems, which is a sign that they do not have adequate information and communication technologies. The few libraries that have online systems used them for circulation and are not maximising the full functions of the library.Conclusion: The study concludes that the local municipality of Rustenburg should provide funding to acquire information and communication technologies. Furthermore, it should adopt a library system in all libraries and train staff in all modules.Contribution: The LMS’s are crucial in the operations and performance of the library. Similar studies focused on the type of management systems available for use and how they can be managed. Having said that, most third world countries are still using manual systems, therefore this study takes the discussion further by looking at the impact that the lack of systems in the third world countries have on information provision in libraries.","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140246968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Who’s who in the zoo? Clarifying the difference between the chief digital officer and chief information officer","authors":"Theunis Van Niekerk, C. Marnewick","doi":"10.4102/sajim.v26i1.1670","DOIUrl":"https://doi.org/10.4102/sajim.v26i1.1670","url":null,"abstract":"Background: The new chief digital officer (CDO) role within top management is shrouded with confusion and ambiguity.Objectives: The purpose of this study is to identify the differences between the traditional chief information officer (CIO) and more modern CDO role.Method: Being grounded within the paradigm of interpretivism, this study follows a qualitative research approach and adopts a narrative research strategy. This study explores the opinions of top management relating to both CIO and CDO roles through conducting in-depth interviews with open-ended questions. Insights into the data are gained through an analytical process of thematic content analysis.Results: This study shows that distinctions are emerging between the roles and responsibilities of the CDO and CIO roles within companies. Even though both roles are strategic, the CDO is responsible for digital strategy, while the CIO is responsible for the information technology (IT) strategy.Conclusion: This study illustrates that IT is becoming central to a company’s business model and this focus change requires specific skills and competencies within the company. Furthermore, the study shows that differences exist between the CIO and CDO roles within a company.Contribution: This study highlights key differences between the roles and responsibilities of the CDO and CIO. This study also identifies key contingency and institutional factors that influence a firm to introduce a CDO and clarifies the concept of digital transformation.","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140409548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors affecting Big Data adoption in a government organisation in the Western Cape","authors":"Andre N. Bruintjies, James Njenga","doi":"10.4102/sajim.v26i1.1690","DOIUrl":"https://doi.org/10.4102/sajim.v26i1.1690","url":null,"abstract":"Background: Government organisations have realised the potential to derive value from Big Data (BD) and need to adopt BD. Currently, South African governmental organisations have not fully committed to adopting BD because they are unsure if they are adequately equipped, and additional empirical research is required to understand the salient factors that influence BD adoption.Objectives: This research investigates the factors influencing the adoption of BD at a government organisation in the Western Cape, South Africa.Method: This study adopted a qualitative research approach, using semi-structured interviews and snowball sampling to collect data from 11 participants at a government organisation in the Western Cape. Participants provided informed consent and it uses a thematic analysis approach to analyse the data.Results: The technology-organisation-environment (TOE) framework was used to study the factors influencing BD adoption at government organisations. Seventeen factors were identified, the majority in the organisational context of TOE framework. The salient factors were identified as top management support, finance, and budget, skills and talent and organisational strategy.Conclusion: The study found 17 factors that influence the adoption of BD at this government organisation and provides recommendations on how to address those factors to ensure that BD is adopted successfully.Contribution: This study presents empirical evidence of the factors that influence BD adoption in government organisations. By considering these factors, government organisations can integrate and synergise IT and business to ensure that the core business of government, which is service delivery to the citizens, is achieved competently by harnessing the potential of BD.","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140422607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determinants of mobile application adoption among micro-entrepreneurs","authors":"Emmanuel I. Slinger, S. Pather, M. Du Plessis","doi":"10.4102/sajim.v26i1.1731","DOIUrl":"https://doi.org/10.4102/sajim.v26i1.1731","url":null,"abstract":"Background: Since the onset of the global pandemic, unemployment has increased to new levels. As a consequence, the need to stimulate economic growth through the development of the micro-enterprise sector has become a central vehicle to decrease unemployment and stimulate economic growth. The problem, however, is that despite the potential benefits of digitisation, the micro-enterprise sector has been unable to effectively integrate information and communication technologies (ICTs) into the fabric of their operations.Objectives: The objective of this study was to investigate the factors that influence the adoption and use of mobile applications for micro-enterprise operations in South Africa.Method: A quantitative methodology using a survey design was used to collect data from a sample of entrepreneurs, with 221 responses.Results: Performance expectancy (PE) and effort expectancy (EE) positively influence the micro-entrepreneurs’ behavioural intention (BI) to adopt and use mobile applications, while social influence (SI) has no impact on the same. Facilitating conditions (FC) and BI are the strongest determinants of mobile application adoption and use for micro-enterprise operations.Conclusion: All the constructs of the unified theory of acceptance and use of technology (UTAUT) model showed a satisfactory level of reliability and discriminant validity, which was confirmed by testing the measurement model against two competing models. The UTAUT model is a good predictor of the intention to adopt and use mobile applications for micro-enterprise operations.Contribution: The findings provide parameters to develop a focussed strategy to catalyse the adoption and subsequent use of mobile applications among micro-entrepreneurs. It further informs initiatives to close the gap of a known reluctance in using technology among micro-enterprises.","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140438248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors influencing the acceptance and use of a South African online bank","authors":"Lizandré Gertze, Fazlyn Petersen","doi":"10.4102/sajim.v26i1.1759","DOIUrl":"https://doi.org/10.4102/sajim.v26i1.1759","url":null,"abstract":"Background: Online banking gained prominence during the coronavirus disease 2019 (COVID-19) pandemic as an alternative to traditional banking. However, limited studies have explored online banking acceptance in South Africa.Objectives: This study investigates the factors that influence online banking acceptance among South Africans in a context where use is limited.Method: Thematic content analysis examined 113 Google user reviews from South Africans using an exclusive online bank. Unified Theory of Acceptance and Use of Technology 3 (UTAUT3) was used as a theoretical framework, analysing factors such as performance expectancy (PE), effort expectancy (EE), facilitating conditions (FC), hedonic motivation (HM), price value (PV), trust, perceived risk (PR), habit, and social influence.Results: Seven UTAUT3 constructs influenced online banking acceptance and use in South Africa during the pandemic: PE, EE, FC, HM, PV, trust, and PR. The influence of habit and social influence was not evident.Conclusion: Understanding factors influencing online banking acceptance in South Africa is crucial for policymakers and institutions. Addressing information communication technology challenges can enhance accessibility and benefits, promoting financial inclusion, and empowerment.Contribution: This research fills the gap by examining online banking acceptance in South Africa. Findings inform interventions and policies to improve access and adoption. Practical implications extend to institutions and policymakers, fostering financial inclusion.","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140444827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud leakage in higher education in South Africa: A case of University of Technology","authors":"Tshepiso Ntloedibe, T. Foko, M. A. Segooa","doi":"10.4102/sajim.v26i1.1783","DOIUrl":"https://doi.org/10.4102/sajim.v26i1.1783","url":null,"abstract":"Background: Users with knowledge of an organisation can pose risks to Cloud Computing, including current and past employees and external stakeholders with access to the organisation’s cloud. These insiders may engage in intentional or unintentional disruptive behaviors, causing significant harm to the organisation. A study focused on insider threats in South African higher education examined the tactics used by cybersecurity leaders to enforce cybersecurity policies.Objectives: The goal of this study was to develop a comprehensive insider mitigation framework for cloud leakage in a South African University.Method: The study employed qualitative methodologies and a case study approach. Open-ended interviews were conducted to collect data from the participants. The collected data was coded and analysed using ATLAS.ti 22.Results: The study’s findings revealed that some of the major sources of cloud leakage are a lack of effective training, ineffective information security (IS) policy regulation, and the implementation of information security awareness workshops that provided advice on how information security should be managed in the university.Conclusion: Insider threats pose a serious risk to organisations. To mitigate this threat, it is crucial for organisations to establish strong security policies and closely monitor employee activities. By conducting a thorough assessment of insider threats, organisations can enhance their understanding of this dynamic threat and strengthen their defenses.Contribution: Although every employee is ultimately responsible for an organisation’s security, the most effective IS programmes demonstrate strong top-level leadership by setting a ‘tone at the top’ and promoting the benefits of IS through careful policy and guidance.","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140455128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Citation Analysis of Doctoral Thesis in Mathematics, Kumaun University, Nainital","authors":"Hem Chandra, Yougal Joshi","doi":"10.5958/2348-1773.2023.00001.2","DOIUrl":"https://doi.org/10.5958/2348-1773.2023.00001.2","url":null,"abstract":"","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75764426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality Gauging: An Analytical Analysis of Tourism Websites using E-SQ","authors":"U. Saxena, Vijay Kumar","doi":"10.5958/2348-1773.2023.00006.1","DOIUrl":"https://doi.org/10.5958/2348-1773.2023.00006.1","url":null,"abstract":"","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88413361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the Problem Solving Approach Among College Students: Using Big Six Skills Model","authors":"S. Baba, Sofi Gh Mohiuddin Jeelani, S. A. Ganaie","doi":"10.5958/2348-1773.2023.00004.8","DOIUrl":"https://doi.org/10.5958/2348-1773.2023.00004.8","url":null,"abstract":"","PeriodicalId":44095,"journal":{"name":"South African Journal of Information Management","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78850095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}