
Rabelani DagadaUniversity of Johannesburg | uj · Institute of Intelligent Systems
Rabelani Dagada
PhD in Information Systems
About
66
Publications
45,994
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
232
Citations
Introduction
Publications
Publications (66)
The aim of this study was to investigate the benefits and challenges of moving information systems to the cloud infrastructure as part of phasing out legacy systems and preventing digital fraud. This study employed a qualitative research methodology and used interviews, observations and document analysis as data collection methods. It was confined...
In developed economies, the integration of technology into the labour force has largely led to massive job losses, and workers have met this with stiff resistance. This has changed the dynamics of industrial relations in this era of digital age. The purpose of this study was to investigate the ways in which digitalisation has been affecting human l...
This research explores cybersecurity awareness and implementation within Zambia’s small and medium-sized enterprises (SMEs), a sector increasingly targeted by cyberattacks that lead to substantial financial losses. The study’s primary aim was to enhance cyber awareness and develop actionable guidelines for SMEs in Zambia. Utilising an interpretivis...
The fourth industrial revolution (4IR) is an era characterised by accelerated technological progress. Even though access to 4IR technologies is not yet widespread, in the current era, 4IR technologies affect socioeconomic activities and digital business. The pace of digital transformation also has some implications for cybersecurity. The purpose of...
Research in Southern African Digital Business (Vol II ), edited by Gregory John Lee and Rabelani Dagada, is another unique collection of exciting new and original research in the topic of digital business, contextualized in Southern Africa. It includes three chapters presenting new theory in the topic of digital business or syntheses leading to new...
Research in Southern African Digital Business edited by Gregory John Lee and Rabelani Dagada is a unique collection of exciting new and original research in the topic of digital business, contextualized in Southern Africa. It includes four chapters presenting new theory in the topic of digital business, four chapters presenting the results of origi...
This research examines cybersecurity awareness and implementation within Zambia's small and medium-sized enterprises (SMEs), a sector increasingly targeted by cyberattacks that lead to substantial financial losses. The study’s primary aim was to enhance cyber awareness and develop actionable guidelines for SMEs in Zambia. Utilizing an interpretivis...
The process of implementing a Learning Management System (LMS), especially when this involves the replacement of a legacy LMS is usually risky, frustrating, and expensive. To address the risk involved, this article suggests a seamless framework that could be used by institutions which intend to implement a LMS. The framework is based on a case stud...
Most South African universities have been acquiring new technologies for teaching and learning. This paper aims at understanding the domestication of e-learning platforms. The authors want to understand the factors that affect the domestication of the platform to become an integral part of teaching and learning. A qualitative research approach was...
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain informa...
Information for individual organisations should always be secured. Organisations need to protect their information from attackers or competitors as these could lead to law suits or loss of business. With the more advanced network technology, information security risks and threats are believed to be on the increase and becoming even more sophisticat...
The process of implementing a Learning Management System (LMS), especially when this involves the replacement of a legacy LMS is usually risky, frustrating, and expensive. To address the risk involved, this article suggests a seamless framework that could be used by institutions which intend to implement a LMS. The framework is based on a case stud...
This paper addresses aspects of security in the following digital banking delivery channels: Internet, cellphone and Automated Teller Machine (ATM). South African banks use these delivery channels to reduce operational costs and enable customers to conduct banking transactions conveniently. This study found that the adoption of digital banking serv...
The widespread presence of industrial espionage in South Africa could be an indicator that domestic corporate security frameworks have so far failed to neutralize the threat. It is nevertheless unfortunate that South Africa's firms do not have adequate security frameworks in place to protect themselves from industrial espionage. It is therefore, th...
Rubrics are sometimes viewed to only focus on
generating good grades rather than “on making sense of ideas”
[1]. This proposition usually seeks to ban the use of rubrics.
However, this study seems to identify a gap that could have led
to this proposition. Learning aims at creation of knowledge
and thus, each purpose and objective leads to the...
Rubrics are sometimes viewed to only focus on generating good grades rather than “on making sense of ideas” [1]. This proposition usually seeks to ban the use of rubrics. However, this study seems to identify a gap that could have led to this proposition. Learning aims at creation of knowledge and thus, each purpose and objective leads to the creat...
S outh Africa is a constitutional state and thus the Constitution of the Republic is the supreme law of the country. All laws in South Africa should derive from this legal construct and be coherent with the constitutional frame-work. In South Africa, there are three major organs of state – Executive, Parlia-ment and Judiciary. The Executive (cabine...
Tertiary institutions in the developing countries are investing a lot in equipping their institutions with Information Communication Technologies (ICT) for teaching and learning. However, there is still a low adoption rate in the use of the new technologies among many academics in these countries. This chapter aims at analysing the factors that imp...
One of the main solutions to the abject poverty and inequality in South Africa is the massive deployment of quality education and training interventions. A key argument of this paper is that ICT can contribute in advancing educational endeavours. The study on which this paper is based sought to investigate how the South African policy for universal...
For the purpose of this paper, the public sector refers to the provincial governments, municipalities, and traditional authorities in the South African context. There are several telecommunications initiatives in South African's public sector. These initiatives need the support of the broadband infrastructure. Gauteng Provincial Government has take...
This case study provides an account on how the Royal Bafokeng Administration (RBA) implemented a web-based Records and Document Management System to improve service delivery in the community. Prior to the implementation of the aforesaid system, RBA was losing lot of critical business information and knowledge due to the lack of a proper centralized...
Computer-integrated education (CIE)is poised to become the new training paradigm, taking its place alongside traditional contact situation training and changing the face of training generally.
This book focuses on CIE within the South African corporate environment, while its findings are also transferable to other countries, institutions of higher...
This case study provides an account on how the Royal Bafokeng Administration (RBA) implemented a web-based Contracts Management System to improve service delivery in the community. RBA is a traditional authority (traditional local government). Managing the information contained in a contract and the overall contract life cycle are critical to meeti...
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? We could get our employees to write a test afterwards to determine how well they understand the policies, but this does not show how it affects the employee's on the job be...
Computer-based training is now widely recognised as a viable approach for education in institutions of higher learning, as evidenced by the number of institutions that offer courses (Van der Westhuizen, 1999:1). Corporate South Africa has embarked on a similar course of action. The researcher used a qualitative research design in this study, with p...
This article reflects the findings of a study conducted to assess educators' perception of their competence in integrating computers for teaching and learning purposes at a selected primary school. This school — situated in Soweto, Gauteng, South Africa — was the first school to receive computers as part of the GautengOnline project. As the Gauteng...
of the Witwatersrand ________________________________________________________________________________________________ Online learning (also known as e-learning) will ultimately become the new training paradigm, taking its place alongside traditional contact situation training and changing the face of training generally. A num ber of trends, which i...
This article reports on the findings of a research study that was conducted to explore the types of Information and Communication Technology (ICT) in use in higher education in South Africa. Specifically, the goal of the study was to explore how e-learning is being used for teaching and learning purposes. Data were collected from interviews with ed...