This article, a contribution to m-learning (mobile learning) research, centres on the motivation for, and development of, a suitable framework to analyse m-learning options for early childhood development (ECD) practitioners. Grounded in a sociocultural learning perspective, the framework was developed as part of a larger study into the feasibility of m-learning for ECD practitioners in the Penreach professional development programme in Mpumalanga Province, South Africa. Analysis of existing frameworks enabled the development of a new, modified framework to suit the Penreach context. Here we unpack the framework and explain its development. The new, modified framework aims to assist researchers, developers, and implementers by prompting consideration of five sociocultural learning features associated with m-learning in ECD, namely: device access, data affordability, authenticity, collaboration, and personalisation.
{"title":"A Sociocultural Framework to Analyse M-Learning Options for Early Childhood Development (ECD) Practitioner Training","authors":"S. Oosthuizen, Nicky Roberts","doi":"10.23962/10539/32209","DOIUrl":"https://doi.org/10.23962/10539/32209","url":null,"abstract":"This article, a contribution to m-learning (mobile learning) research, centres on the motivation for, and development of, a suitable framework to analyse m-learning options for early childhood development (ECD) practitioners. Grounded in a sociocultural learning perspective, the framework was developed as part of a larger study into the feasibility of m-learning for ECD practitioners in the Penreach professional development programme in Mpumalanga Province, South Africa. Analysis of existing frameworks enabled the development of a new, modified framework to suit the Penreach context. Here we unpack the framework and explain its development. The new, modified framework aims to assist researchers, developers, and implementers by prompting consideration of five sociocultural learning features associated with m-learning in ECD, namely: device access, data affordability, authenticity, collaboration, and personalisation.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47196926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nyamwaya Munthali, R. Lie, R. Van Lammeren, Annemarie van Paassen, R. Asare, C. Leeuwis
Information and communication technologies (ICTs), specifically those that are digital and interactive, present opportunities for enhanced intermediation between actors in Ghana’s agricultural extension system. To understand these opportunities, this study investigates the capabilities of ICTs in support of seven forms of intermediation in the context of agricultural extension: disseminating (information), retrieving (information), harvesting (information), matching (actors to services), networking (among actors), coordinating (actors), and co-creating (among actors). The study identifies the types of ICTs currently functioning in Ghana’s agricultural system, and applies a Delphi-inspired research design to determine the consensus and dissensus of researchers, scientists, and practitioners about the potential of these ICTs to support each of the seven intermediation capabilities. The findings reveal that experts reached consensus that interactive voice response (IVR) technologies currently have the highest potential to support disseminating, retrieving, harvesting, and matching. Meanwhile, social media messaging (SMM) technologies are currently seen as highly capable of supporting coordinating and, to a lesser extent, co-creating, but no consensus is reached on the potential of any of the technologies to support networking.
{"title":"Intermediation Capabilities of Information and Communication Technologies (ICTs) in Ghana’s Agricultural Extension System","authors":"Nyamwaya Munthali, R. Lie, R. Van Lammeren, Annemarie van Paassen, R. Asare, C. Leeuwis","doi":"10.23962/10539/32212","DOIUrl":"https://doi.org/10.23962/10539/32212","url":null,"abstract":"Information and communication technologies (ICTs), specifically those that are digital and interactive, present opportunities for enhanced intermediation between actors in Ghana’s agricultural extension system. To understand these opportunities, this study investigates the capabilities of ICTs in support of seven forms of intermediation in the context of agricultural extension: disseminating (information), retrieving (information), harvesting (information), matching (actors to services), networking (among actors), coordinating (actors), and co-creating (among actors). The study identifies the types of ICTs currently functioning in Ghana’s agricultural system, and applies a Delphi-inspired research design to determine the consensus and dissensus of researchers, scientists, and practitioners about the potential of these ICTs to support each of the seven intermediation capabilities. The findings reveal that experts reached consensus that interactive voice response (IVR) technologies currently have the highest potential to support disseminating, retrieving, harvesting, and matching. Meanwhile, social media messaging (SMM) technologies are currently seen as highly capable of supporting coordinating and, to a lesser extent, co-creating, but no consensus is reached on the potential of any of the technologies to support networking.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44292638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study contributes to transdisciplinary understanding of the COVID-19 pandemic through an examination of perceptions of public health messages as consumed primarily through social media by a purposively enlisted set of young adult Nigerians. The research used focus group discussions and in-depth interviews to elicit the views of 11 young adults, aged 21 to 24, resident in Ajegunle, a low-income community in Lagos, Nigeria’s commercial capital. The study identifies the centrality of social media platforms to the respondents’ processes of meaning-making, and draws on Hall’s (1980) encoding/decoding model in order to bring to the fore their oppositional interpretations of public health messages. The study also identifies respondents’ varying levels of disbelief about the realities of COVID-19, their mistrust of the government officials conveying and enforcing decisions to combat the pandemic, and the propensity for the social media messages they consume and propagate to serve as channels of misinformation.
{"title":"Social Media Use, Disbelief and (Mis)information During a Pandemic: An Examination of Young Adult Nigerians’ Interactions with COVID-19 Public Health Messaging","authors":"Olutobi Akingbade","doi":"10.23962/10539/32215","DOIUrl":"https://doi.org/10.23962/10539/32215","url":null,"abstract":"This study contributes to transdisciplinary understanding of the COVID-19 pandemic through an examination of perceptions of public health messages as consumed primarily through social media by a purposively enlisted set of young adult Nigerians. The research used focus group discussions and in-depth interviews to elicit the views of 11 young adults, aged 21 to 24, resident in Ajegunle, a low-income community in Lagos, Nigeria’s commercial capital. The study identifies the centrality of social media platforms to the respondents’ processes of meaning-making, and draws on Hall’s (1980) encoding/decoding model in order to bring to the fore their oppositional interpretations of public health messages. The study also identifies respondents’ varying levels of disbelief about the realities of COVID-19, their mistrust of the government officials conveying and enforcing decisions to combat the pandemic, and the propensity for the social media messages they consume and propagate to serve as channels of misinformation.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43676432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The centralised architecture employed by electronic health records (EHRs) may constitute a single point of failure. From the perspective of availability, an alternative cloud-based EHR infrastructure is effective and efficient. However, this increased availability has created challenges related to the security and privacy of patients’ medical records. The sensitive nature of EHRs attracts the attention of cyber-criminals. There has been a rise in the number of data breaches related to EHRs. The infrastructure used by EHRs does not assure the privacy and security of patients’ medical records. Features of blockchain platforms, such as decentralisation, immutability, auditability, and transparency, may provide a viable means of augmenting or improving services related to the security of EHRs. This study presents a series of experimental data flow configurations to test the application of blockchain technology to aspects of EHRs. The insights gained from these experiments are founded on a theoretical base to provide recommendations for applying blockchain technology to services related to the security of EHR infrastructure. These recommendations may be employed by developers when redesigning existing EHR systems or deploying new EHR systems.
{"title":"Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure","authors":"Ryno Adlam, B. Haskins","doi":"10.23962/10539/32211","DOIUrl":"https://doi.org/10.23962/10539/32211","url":null,"abstract":"The centralised architecture employed by electronic health records (EHRs) may constitute a single point of failure. From the perspective of availability, an alternative cloud-based EHR infrastructure is effective and efficient. However, this increased availability has created challenges related to the security and privacy of patients’ medical records. The sensitive nature of EHRs attracts the attention of cyber-criminals. There has been a rise in the number of data breaches related to EHRs. The infrastructure used by EHRs does not assure the privacy and security of patients’ medical records. Features of blockchain platforms, such as decentralisation, immutability, auditability, and transparency, may provide a viable means of augmenting or improving services related to the security of EHRs. This study presents a series of experimental data flow configurations to test the application of blockchain technology to aspects of EHRs. The insights gained from these experiments are founded on a theoretical base to provide recommendations for applying blockchain technology to services related to the security of EHR infrastructure. These recommendations may be employed by developers when redesigning existing EHR systems or deploying new EHR systems.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46787644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-government information systems (IS) projects experience numerous challenges that can lead to total or partial failure. The project failure factors have been identified and studied by numerous researchers, but the root causes of such failures are not well-articulated. In this study, literature on e-government IS project failures in developing-world contexts is reviewed through the application of qualitative meta-synthesis, design–reality gap analysis, and root cause analysis. In the process, 18 causal factors and 181 root causes are identified as responsible for e-government IS project failures. The most prevalent of the 18 causal factors are found to be inadequate system requirements engineering (with 22 root causes), inadequate project management (19 root causes), and missing or incomplete features (16 root causes). These findings can be of use to future researchers, policymakers, and practitioners seeking to identify methods of avoiding e-government IS failures, particularly in developing-world contexts.
{"title":"E-Government Information Systems (IS) Project Failure in Developing Countries: Lessons from the Literature","authors":"Joseph B. Nyansiro, J. Mtebe, M. Kissaka","doi":"10.23962/10539/32210","DOIUrl":"https://doi.org/10.23962/10539/32210","url":null,"abstract":"E-government information systems (IS) projects experience numerous challenges that can lead to total or partial failure. The project failure factors have been identified and studied by numerous researchers, but the root causes of such failures are not well-articulated. In this study, literature on e-government IS project failures in developing-world contexts is reviewed through the application of qualitative meta-synthesis, design–reality gap analysis, and root cause analysis. In the process, 18 causal factors and 181 root causes are identified as responsible for e-government IS project failures. The most prevalent of the 18 causal factors are found to be inadequate system requirements engineering (with 22 root causes), inadequate project management (19 root causes), and missing or incomplete features (16 root causes). These findings can be of use to future researchers, policymakers, and practitioners seeking to identify methods of avoiding e-government IS failures, particularly in developing-world contexts.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49589114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the concluding statement of the 2021 BRICS Summit, the bloc’s five members—Brazil, Russia, India, China, and South Africa—pledged to pursue enhanced cooperation on cybersecurity issues, including by “establishing legal frameworks of cooperation among BRICS” and a BRICS intergovernmental agreement on cybersecurity. This piece briefly outlines the mounting relevance of cybersecurity for the BRICS countries, recent national policymaking in this area in the bloc, and the dynamics at play as the BRICS countries seek to further intensify and structure their cooperation on cybersecurity matters.
{"title":"Cybersecurity Policymaking in the BRICS Countries: From Addressing National Priorities to Seeking International Cooperation","authors":"Luca Belli","doi":"10.23962/10539/32208","DOIUrl":"https://doi.org/10.23962/10539/32208","url":null,"abstract":"In the concluding statement of the 2021 BRICS Summit, the bloc’s five members—Brazil, Russia, India, China, and South Africa—pledged to pursue enhanced cooperation on cybersecurity issues, including by “establishing legal frameworks of cooperation among BRICS” and a BRICS intergovernmental agreement on cybersecurity. This piece briefly outlines the mounting relevance of cybersecurity for the BRICS countries, recent national policymaking in this area in the bloc, and the dynamics at play as the BRICS countries seek to further intensify and structure their cooperation on cybersecurity matters.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45835232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is not immune to the effects. The country’s fast-paced technological evolution continues to increase the attack surface within the cyber domain. The increased attack surface is confirmed by recent cyberattacks affecting well-known and established South African organisations. This article reviews findings from an evaluation of South Africa’s cyber threat landscape that analysed 74 cyber incidents identified as occurring between 2010 and 2020. The 74 incidents are categorised according to incident type, affected sector, perpetrator type, and motivation. It is found that the most common incident type is data exposure, the most-affected sector is the public sector, the most prevalent perpetrators are hackers, and the most common motivation is criminal. The article makes recommendations about how South Africa can reduce the risk factors in its cyber threat landscape.
{"title":"The Cyber Threat Landscape in South Africa: A 10-Year Review","authors":"H. Pieterse","doi":"10.23962/10539/32213","DOIUrl":"https://doi.org/10.23962/10539/32213","url":null,"abstract":"The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is not immune to the effects. The country’s fast-paced technological evolution continues to increase the attack surface within the cyber domain. The increased attack surface is confirmed by recent cyberattacks affecting well-known and established South African organisations. This article reviews findings from an evaluation of South Africa’s cyber threat landscape that analysed 74 cyber incidents identified as occurring between 2010 and 2020. The 74 incidents are categorised according to incident type, affected sector, perpetrator type, and motivation. It is found that the most common incident type is data exposure, the most-affected sector is the public sector, the most prevalent perpetrators are hackers, and the most common motivation is criminal. The article makes recommendations about how South Africa can reduce the risk factors in its cyber threat landscape.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48155638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Victor B. Nzomo, Jacquelene Mwangi, Louisa Matu-Mureithi, C. Muchiri, Isaac Rutenberg
This article sets out findings from research into the collaborative modalities present in the innovation practices of mobile tech start-ups in the Kenyan capital, Nairobi. Drawing on findings from qualitative data collection from respondents at 25 startups in the Nairobi mobile tech ecosystem, the study explores the start-ups’ participation in tech hubs, their internal collaborative activities, their external collaborations, their approaches to managing the knowledge and innovations they generate, and their approaches to the scaling of their enterprises. The study finds that three key drivers of the start-ups’ collaborative innovation practices are openness, networking, and informality.
{"title":"Drivers and Modalities of Collaborative Innovation among Nairobi’s Mobile\u0000Tech Start-ups","authors":"Victor B. Nzomo, Jacquelene Mwangi, Louisa Matu-Mureithi, C. Muchiri, Isaac Rutenberg","doi":"10.23962/10539/30359","DOIUrl":"https://doi.org/10.23962/10539/30359","url":null,"abstract":"This article sets out findings from research into the collaborative modalities present\u0000in the innovation practices of mobile tech start-ups in the Kenyan capital, Nairobi.\u0000Drawing on findings from qualitative data collection from respondents at 25 startups\u0000in the Nairobi mobile tech ecosystem, the study explores the start-ups’ participation\u0000in tech hubs, their internal collaborative activities, their external collaborations,\u0000their approaches to managing the knowledge and innovations they generate, and\u0000their approaches to the scaling of their enterprises. The study finds that three key\u0000drivers of the start-ups’ collaborative innovation practices are openness, networking,\u0000and informality.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42574918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}