Browsing by Author "Chigada, Joel"
Now showing 1 - 9 of 9
Results Per Page
Sort Options
Item Cyberattacks and threats during COVID-19: A systematic literature review(AOSIS, 2021) Chigada, Joel; Madzinga, RujekoThe novel Coronavirus Disease-2019 (COVID-19) pandemic, a deadly contagious disease has left the global village in disarray, driving people and firms, especially healthcare service providers to rely heavily on information communication technologies (ICTs) for administering telemedicine through digital tools. This study contributes to knowledge and information sharing and debates on cybersecurity.The objective was to analyse the impact of cybercrimes on the global economy at a time when the whole world is focused on fighting and minimising the spread of COVID-19. The study also analysed common cybersecurity threats, attacks and information systems security vulnerabilities during the period of the pandemic.Item Developing a cybersecurity framework for commercial banks in South Africa(University of the Western Cape, 2024) Mphahlele, Tlhologelo; Chigada, JoelCybersecurity has emerged as a significant concern for organisations and the Information Communication Technology (ICT) domain during recent decades. An increase in the number of cyber threats and cyber-attacks has been observed recently, and an even sharper increase was noticed during the worldwide coronavirus (COVID-19) pandemic outbreak. Simultaneously, the complexity of the cyber-attacks being executed by threat actors has increased, and the scope and geographical location of the targets of threat actors have also widened to include critical infrastructure in all corners of the world. Commercial banks in South Africa have not been spared. This is because financial institutions are seen as valuable targets by cybercriminals and communicators of advanced persistent threats (APT) due to the nature of their business and the vast amounts of data they store. The study proposed a conceptual Cybersecurity Framework for Commercial Banks in South Africa. It proposed this by identifying the factors impeding commercial banks from developing their frameworks due to the challenges faced by the banks regarding cybersecurity from a South African perspective. The factors were identified using a mixed methods approach, with qualitative data collection facilitated through interviews with professionals within the banking domain in South Africa and quantitative data collected using a survey distributed to IT, risk, compliance, and governance professionals in commercial banks. The study identified seven factors contributing to establishing a cybersecurity framework for commercial banks. By addressing these factors, some of the challenges experienced by commercial banks regarding cybersecurity in the country can be addressed, which will improve the security posture of the organisations, internally and externally.Item Developing a cybersecurity framework for commercial banks in South Africa(University of the Western Cape, 2024) Mphahlele, Tlhologelo; Chigada, JoelCybersecurity has emerged as a significant concern for organisations and the Information Communication Technology (ICT) domain during recent decades. An increase in the number of cyber threats and cyber-attacks has been observed recently, and an even sharper increase was noticed during the worldwide coronavirus (COVID-19) pandemic outbreak. Simultaneously, the complexity of the cyber-attacks being executed by threat actors has increased, and the scope and geographical location of the targets of threat actors have also widened to include critical infrastructure in all corners of the world. Commercial banks in South Africa have not been spared. This is because financial institutions are seen as valuable targets by cybercriminals and communicators of advanced persistent threats (APT) due to the nature of their business and the vast amounts of data they store. The study proposed a conceptual Cybersecurity Framework for Commercial Banks in South Africa. It proposed this by identifying the factors impeding commercial banks from developing their frameworks due to the challenges faced by the banks regarding cybersecurity from a South African perspective. The factors were identified using a mixed methods approach, with qualitative data collection facilitated through interviews with professionals within the banking domain in South Africa and quantitative data collected using a survey distributed to IT, risk, compliance, and governance professionals in commercial banks. The study identified seven factors contributing to establishing a cybersecurity framework for commercial banks. By addressing these factors, some of the challenges experienced by commercial banks regarding cybersecurity in the country can be addressed, which will improve the security posture of the organisations, internally and externally.Item Entrepreneurship and management of small enterprises: An overview of agricultural activities in the Mopani district municipality(University of Western Cape, 2021) Ramodumo, Aaron; Chigada, JoelThis study analysed entrepreneurial dynamics, activities and challenges confronting small agricultural businesses in the Mopani District Municipality in Limpopo, South Africa. Mopani is a rural district municipality and home to 1,2 million people of whom 77% live below the poverty line. Agriculture is a major income-generating sector for many disadvantaged communities in rural areas of South Africa, and it plays a significant role in the economy. The objectives of the study were to investigate the operational practices that contribute to the success/failure of emerging agricultural small enterprise owners in their agricultural activities within Mopani District – a district with large numbers of highly competitive and commercial farmers. In addition, the study suggested interventions that could help smallholder farmers to sustain their income-generating businesses.Item Factors affecting adoption of IoT technology in the supply chain: A case of a clothing retailer in the Western Cape(University of the Western Cape, 2023) Styer, Garth; Chigada, JoelThe retail industry in South Africa (SA) is very competitive and the Western Cape is no exception. In such a competitive retail environment, innovation is often key to a competitive advantage and growth in the business. To that end, the organisation may consider to leverage Internet of Things, or IoT technology to provide a competitive edge. A recurring problem that organisations experience when considering this type of technology adoption, is lack of understanding, and poor appreciation of the ways that IoT technology may be used in Supply Chain Management (SCM). Management’s lack of understanding of the factors that affect technology adoption (on the supply chain processes) may furthermore result in failure to harness the technology for a competitive advantage.Item Measuring Information Systems value against organisational performance: A case study of a South African retailer(University of the Western Cape, 2022) Julius, Clive; Chigada, JoelOrganisations’ increased dependency on technology in general and retailers in particular, is changing how businesses and people operate and communicate. This has amplified the need to make better choices to increase the benefits from information and communication technology investments. As such, the economic evaluation of the business value of information systems (BVIS) against organisational performance has become a business imperative but to do this effectively, organisations must be presented with an appropriate framework. Research shows that organisations have historically struggled to measure the BVIS because of the multiple challenges that hinder effective measurement.Item Remediating Sub-Saharan airline challenges and limitations(AOSIS, 2022) Leitch, Guy D.; Chigada, JoelAir transport connectivity to and within Africa is provided by both African and non-African airlines. These carriers are confronted by both intrinsic and extrinsic challenges, which constrain their ability to provide the level of air transport connectivity demanded to fully enable economic growth for the continent. In addition, since April 2020, the reduction in air connectivity resulting from the coronavirus disease 2019 (COVID-19) pandemic has further constrained the capacity of the air transport industry to meet the passenger and freight demand.Item Remedies to reduce user susceptibility to phishing attacks(University of the Western Cape, 2023) Maseko, Ashley Eventhia; Chigada, JoelOrganisations have been compelled to embrace digitisation, increasing their dependence on the internet and computer systems rather than on in-person interactions. These organisations have had to adjust to new societal norms of teleworking and social distancing. The new adjustments were because of the total nationwide lockdown enacted in response to the global Corona Virus disease (COVID-19) pandemic. Many organisations have adopted teleworking to become more agile, but in the face of escalating cybercrime, it has also exposed them to increased security vulnerabilities. The study's ultimate purpose was to report phishing attacks on financial institutions and offer remedial solutions that can be implemented to reduce user susceptibility. To answer the study's main objectives, a qualitative approach was adopted. Semi-structured interviews and interview schedules were used for data collection. The research discussed the two main theories governing the study: Routine activity and Rational choice theories. The rational choice theory describes the reasoning and motivations that underlie the choices made by offenders, whereas the routine activities theory explains the necessary conditions that must be present for a crime to happen. Thematic analysis was used to better understand the data by using codes to uncover commonalities or themes in the responses of the participants. Additionally, thematic data analysis enabled the researcher to report on solutions that met the objectives of the study. The patterns that emerged laid the groundwork for the discussion and allowed the researcher to make references and substantiate with literature from existing studies. The study revealed that users tend to disregard established protocols when engaging with systems, leading to an increased likelihood of organisations being successfully phished. Based on the findings, the recommendations focused on human centric approaches to effectively reducing the success rate of phishing attacks through coordinated efforts with close engagement between employees and Information Technology personnel.Item Secondary school teachers’ perceptions of BYOD among learners within the classroom(South African Institute of Computer Scientists and Information Technologists, 2022) Mawere, Talent; Manjeese, Caleb; Chigada, JoelThe use of personally owned devices among learners has remained a contentious issue in schools across the globe. While several studies have been devoted to explaining the importance of such initiatives, the debate has continued to rage on, with most school authorities imposing a blanket ban on the use of these devices within their premises. In this study, we seek to contribute by examining in-service teachers’ perceptions of the use of personally owned devices in schools within the global south context. The qualitative study explores teachers’ understanding of the usefulness of technology and associated devices such as smartphones in the classroom.