ArticlePDF Available

Leveraging Big Data Analytics for Competitiveness in South African Financial Institutions

Authors:

Abstract and Figures

Due to hundreds of millions of financial transactions that take place daily in the financial sector, Big Data has become a buzzword and a crucial component in financial business operations. Consequently, handling this data is becoming a major concern for many financial services. Much as this is so, the nature in which this data is generated makes it complex to analyse using traditional database management systems. Little empirical research has been done to inform financial organisations on how to analyse Big Data to improve business agility and competitiveness. More still, there is a lack of an appropriate model that could be used by financial organisations to carry out Big Data analytics. This paper sought to conceptualise a model for Big Data analytics to improve organisational competitiveness by taking the case of South African financial institutions. Collected data was analysed quantitatively and results indicated that technological, organisational, and environmental perspectives along with individual factors play a significant role in Big Data analytics improving financial institutions’ competitiveness. The identified factors were used to conceptualise a model that could be used to extend research in this direction. Results of the study revealed that as new trends in computing increase, traditional analytics currently used by many organisations gradually become obsolete hence it is recommended that the developed model be validated with a wide range of data from various organisations to identify the new factors that might be salient.
Content may be subject to copyright.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
This paper systematically reviews the literature on the adoption of blockchain technology in supply chain management (SCM) processes. Using the PRISMA (preferred reporting items for systematic reviews and meta-analysis) methodology, 53 peer-reviewed research publications from five different databases (IEEE Xplore, Science Direct, Scopus, Google Scholar, and EBSCOhost) were selected and analyzed using a classification coding framework. The findings reveal that agri-food traceability, blockchain security, smart contracts, and the internet of things (IoT) were the significant identified current trends in the use of blockchain in SCM processes. The key identified challenges include high costs of transactions and a lack of trust between stakeholders. Identified solutions were blockchain traceability systems and the use of smart contracts and IoTs. In addition, this paper identified gaps in the literature that need to be addressed in future studies.
Article
Full-text available
This research aims to investigate corporate performance results (financial performance, non-financial performance and operational performance) based on driving forces and contributing factors of supply chain integration (SCI), including three types of factors: corporate-level factors, internal factors-stimulus The organizational factors and environmental factors of SCI in Saudi industrial companies, the research objects include industrial companies operating in the eastern provinces of the Kingdom of Saudi Arabia (11 provinces). For the purposes of testing the hypotheses of the study and the validity of its model, Structural Equation Modeling (SEM) analysis was used based on the AMOS21 program. One of the most important contributions of the current study is that it gathered the drivers and enablers of SCI in its various aspects, as well as the dimensions of the SCI measurement and finally the outcomes of the firms' performance, while integrating all of these elements into one common topic. The study found that supply chain integration is always driven by drivers and enablers: firm-level factors, inter-organizational factors, and environmental factors that stimulate the SCI in firms, In addition, SCI and all its elements (9 sub-dimensions) affect the company's performance results (financial performance, non-financial performance and operational performance) in some way. In addition, the conclusion of this article International Journal of Innovation, Creativity and Change. www.ijicc.net Volume 14, Issue 12, 2020 75 is that integration plays an important role in improving performance through three different factors, but the maturity of integration may be directly related to performance. In addition, the study also found that people's desire for improvement and environmental factors prompted Saudi organizations to integrate with partners to achieve desired results. The study recommended working on raising the level of trust, honesty, commitment, and concern for the interest of each party from the supply chain to maintain a good level of SCI. The paper presented some recommendations as proposals for further study, while identifying some areas for future studies.
Conference Paper
Full-text available
The Fourth Industrial Revolution of (4IR) is associated with disruptions, it has caused organizations in various sectors, education included to change their way of operation as they embrace modern technologies. However, there is insufficient information about the integration and implications of 4IR in the education sector, especially in the private education sector of South Africa. The purpose of this research is to explore the integration of the Fourth Industrial Revolution (4IR) in Private Higher Education Institutions (HEI's) and Further Education and Training institutions (FET's) in South Africa. Data was gathered through virtual interviews with Chief Academic Officers (CAO's) from South Africa's private HEI's and FETs to understand the integration of 4IR in teaching and learning. Using thematic analysis and descriptive statistics of the data collected the findings indicated that there are still some challenges in implementing the 4IR in the private HEI's and FETs even though 4IR was already adopted by the South African private education sector. The results also pointed out that, the challenges associated with the integration of 4IR in the education sector are far outweighed by the opportunities and benefits. Therefore, the study recommends that institutions must invest in technology infrastructure and the training of educators to realize the benefits associated with 4IR in teaching and learning. This study's findings contribute to the theory and practice of technology in education and the limited literature on 4IR in South Africa's education sector, particularly the private sector.
Article
Full-text available
Adoption of artificial intelligence (AI) has risen sharply in recent years but many firms are not successful in realising the expected benefits or even terminate projects before completion. While there are a number of previous studies that highlight challenges in AI projects, critical factors that lead to project failure are mostly unknown. The aim of this study is therefore to identify distinct factors that are critical for failure of AI projects. To address this, interviews with experts in the field of AI from different industries are conducted and the results are analyzed using qualitative analysis methods. The results show that both, organizational and technological issues can cause project failure. Our study contributes to knowledge by reviewing previously identified challenges in terms of their criticality for project failure based on new empirical data, as well as, by identifying previously unknown factors.
Article
Full-text available
The current world facing unpredictable problems with different variants of COVID-19; SARS-COV-19 is a significant lung infection caused by a coronavirus. Each type has one or more alterations to distinguish from each other. The viruses, including SARS-COV-19, continuously change the genetic code (mutations) during their genome replication. WHO labelled two variants in that we are experienced with delta (B.1.617.2) variant, now recently the omicron came (B.1.1.529) with highly mutatable strikes on it. So WHO predicted it is more dangerous than previous variants because of its mutatable capability. The mutatable strikes play an essential role in transmissibility. So there is a need to evaluate threatens raised with the new variant, so scientists are working on it. Till now, South Africa noticed major cases positive for the Omicron variant. Based on recent reports, the current paper summarized different properties of the omicron variant with others, including protein structure, diagnosis, spreadability, treatment, and potency of vaccines. Doi: 10.28991/SciMedJ-2021-0304-10 Full Text: PDF
Article
Full-text available
Blockchain presents a novel technology for improving existing paradigms in a wide span of domains, including project management. In this paper, we first review the state of the art blockchain use cases in project management to reveal the current status of blockchain research and to identify the blockchain application domains in project management. We then present a framework based on the review results, to guide implementers and researchers on blockchain design decisions about privacy, transparency, decentralization, blockchain type, and platform decisions, which are unique for a particular project management domain. The review results indicate that blockchain includes a variety of unique properties simultaneously, and presents multiple contributions for management of projects. However, technical blockchain design decisions are crucial for maximizing the benefits of the blockchain systems. The proposed novel framework enables a structured methodology for resolving crucial technical design decisions for maximizing the benefits of blockchain systems in project management and the review provides directions to the new blockchain research.
Article
Assessing the information security awareness (ISA) of users is crucial for protecting systems and organizations from social engineering attacks. Current methods do not consider the context of use when assessing users’ ISA, and therefore they cannot accurately reflect users’ actual behavior, which often depends on that context. In this study, we propose a novel context-based, data-driven, approach for assessing the ISA of users. In this approach, different behavioral and contextual factors, such as spatio-temporal information and browsing habits, are used to assess users’ ISA. Since defining each context explicitly is impractical for a large context space, we utilize a deep neural network to represent users’ contexts implicitly from contextual factors. We evaluate our approach empirically using a real-world dataset of users’ activities collected from 120 smartphone users. The results show that the proposed method and context information improve ISA assessment accuracy significantly.
Article
Objective The use of personal devices for work purposes (BYOD) is in high demand among healthcare professionals as it improves productivity. However, it can also lead to an increased risk of leaking sensitive patient information, being a major challenge for hospital management. The authors identified a dearth of empirical studies concerning BYOD security practices in hospitals. Hence, the aim of the paper was to report BYOD security practices in Australian hospitals through a national survey, first of its kind. Methods Online survey was conducted among hospital IT personnel, enquiring about BYOD security practices. 28 responses were collected (21 hospital groups; 7 standalone hospitals), representing approximately 100 public hospitals. Descriptive statistical analysis and cross-tabulation were carried out on survey data. Results BYOD was generally allowed across most device types (smartphone:100%; tablet:70%; laptop:70%) and operating systems (apple:100%; android:96%; windows:74%), but generally for the use of basic services such as email (100%). Majority of hospitals use generic security technologies (firewall:87%, two-factor authentication:70%, VPN:65%), whereas BYOD specific technologies (MDM:43%, containerisation:39%, UEM:4%) haven't been widely adopted. Less than half of the surveyed hospitals have a BYOD policy (45%). Staff education though provided in majority of surveyed hospitals (60%), is not comprehensive and regular. Lack of engagement with clinical staff for BYOD strategy development was also found (23%). Conclusion This research provided a comprehensive view of socio-technical BYOD security practices in Australian hospitals, highlighting its strengths, weaknesses, and the consequential implications, which can therefore provide useful insights for hospital IT executives and health departments.