JITBM VOLUME 16
Title | CHALLENGES OF RURAL ENTREPRENEURSHIP IN SOUTH AFRICA: INSIGHTS FROM NKONKOBE MUNICIPAL AREA IN THE EASTERN CAPE PROVINCE |
Author | G.P.K. Ngorora and S. Mago |
Source | International Journal of Information Technology and Business Management pp 001 – 011 Vol. 016. No. 1 — 2013 |
Abstract | The purpose of this paper is to identify the challenges of rural entrepreneurship in the Eastern Cape Province of South Africa. A quantitative research methodology was used while the survey research design was adopted for the collection of data. Questionnaires were administered to establish the perceptions of 53 rural entrepreneurs. Most respondents (83%) depended solely on entrepreneurship for income generation. This paper is significant in that it brings insights on challenges for rural entrepreneurship in developing countries, since most information available in literature is biased towards developed countries. Findings from the study suggest that lack of finance, small markets, lack of networking, distant markets, lack of electricity; poor transport system, lack of equipment, corruption and lack of marketing initiatives hinder rural entrepreneurship in Nkonkobe Municipal Area. The paper recommends that training and educational programs, capacitating as well as support from government should be improved for entrepreneurship growth in the area. It is further recommended that funding programmes and microfinance schemes will increase the prospects of rural entrepreneurship in Nkonkobe Municipal area. |
Keywords | Rural, rural entrepreneurship, challenges, South Africa. |
Title | PERFORMANCE ANALYSIS IEEE 802.11 BY TUNING PARAMETERS TO ENHANCEMENT NETWORK THROUGHPUT |
Author | Khalil I. Alsaif, Ekhlass A. Altaii |
Source | International Journal of Information Technology and Business Management pp 012 – 021 Vol. 016. No. 1 — 2013 |
Abstract | With the increased of wireless network many problems appears one of the most problems is the competing between stations to access medium, reduce transmission collisions and packet drop after number of retransmissions which reduce network performance. In this work, we are evaluating performance of 802.11 WLAN using Opnet Modeler 14.0. Throughput WLAN is evaluated in the presence of different number of stations and (high, medium, low) traffic. Results are shown in detail with the help of graphs. |
Keywords | IEEE802.11 Wireless LAN, Medium Access Control (MAC), DCF, throughput, access delay. |
Title | GRADUATE STUDENTS’ PROFICIENCY LEVEL FOR AN ENHANCED SKILLS TRAINING PROGRAM |
Author | Erlinda Abletes-Cayao |
Source | International Journal of Information Technology and Business Management pp 022 – 028 Vol. 016. No. 1 — 2013 |
Abstract | This descriptive-correlational study was conducted to evaluate the reading and writing proficiency level of selected graduate students who are presently enrolled in the program Master of Arts in Education majoring in Educational Administration or Educational Management in selected higher education institutions during second semester of academic year 2010-2011. The proponent made use of the following instruments to carry out the purpose of the study: reading and writing proficiency inventories, critical reading and writing tests and rubrics for evaluating composing skills of graduate students. Experts in the area of language education and communication served as validators of the instruments used and they also evaluated the writing prompt of the respondents. The focus of evaluation for reading area are identifying syntactic meaning of words, pointing out details, determining logical relationships, detecting evidences, predicting outcomes and making informed judgments. In the area of writing, the following are covered: establishing clear purpose, organizing ideas logically, demonstrating control over sentence structure and style and exhibiting mastery in mechanics. This study is anchored on the idea with that of Marzano’s proposed New Taxonomy of Educational Objectives (2001). It aimed to respond to the shortcomings of the widely used Bloom’s Taxonomy. |
Keywords | reading and writing proficiency in English, graduate students |
Title | |
Author | Runddy Ramilo and Mohamed Rashid Bin Embi |
Source | International Journal of Information Technology and Business Management pp 029 – 048 Vol. 016. No. 1 — 2013 |
Abstract | The rapid development of digital technology has made architecture a succession of different evolutionary design methodologies. As a result, the rise of computationally driven processes has gain popularity in research and shows a great potential to dramatically improve the design process and productivity that evoke innovations in design practices wherein computer-based project plays a vital role. However, as these technologies rapidly develops and increasingly used in practice, there is a realization that substantial organizational and technological barriers exist that inhibit the effective adoption of these technologies in architectural practices wherein complex projects are being handled. Undeniably it happens in small architectural practices whereby resources are very limited. Relevant literature of the subject shows that research in innovations in manufacturing, product design, technology, construction and engineering practices is substantially conducted but research in digital innovation in design practices is very limited. This paper investigates the factors that impede the effective adoption of emerging digital technologies for the efficient delivery of design projects that are computationally and digitally driven. This involves evaluating digital technologies, technical, financial and organizational barriers when digital innovation is implemented. In order to gain insights of these issues, a pilot study was conducted from several small architectural organizations, and found out relevant attributes and pattern of variables that can be used in establishing a framework for digital innovation. |
Keywords | Digital Innovation, Architectural Practices, Technologies, Challenges, Barriers |
Title | RISK AVERSION AND ISLAMIC FINANCE: AN EXPERIMENTAL APPROACH |
Author | Suzanna El Massah, Ola Al-Sayed
|
Source | International Journal of Information Technology and Business Management pp 049 – 077 Vol. 016. No. 1 — 2013 |
Abstract | This article examines the effect of investor’s risk aversion on his choice between conventional contract and Islamic contract. The authors focused on the choice of profit loss sharing (PLS) contracts, and to what extent other factors affect choice, such as experience, religion and political factors. Lab experiment approach was applied to test the role of risk aversion, along with other factors, in affecting investor`s choice. The paper concluded that neither Islamic religion views nor risk behavior affect the choice of people with no experience in borrowing. However, inexperienced investors are affected by both political-religious orientation and risk behavior. Such finding, contradicts with the widely held belief that Islamic bank transactions are more suitable for risk-lover depositors and risk-averse borrowers. Furthermore, the paper`s results call for more unique and innovative Banks` marketing strategies specially designed for the pre-experienced investors. |
Keywords | Islamic finance, risk aversion, conventional credit, profit loss sharing (PLS), behavioral finance, Lab experimental Islamic banks. |
Title | WATER QUALITY AND POLLUTION SOURCES OF GULSHAN LAKE |
Author | Mafruha Ahmed |
Source | International Journal of Information Technology and Business Management pp 078 – 082 Vol. 016. No. 1 — 2013 |
Abstract | The study focuses on the monitoring of water quality of Gulshan Lake and identification of sources of pollution of the Lake through field observations and discuss with local people. |
Keywords | Organic Pollution, Wetland, Turbidity, Parameters of the Water, Seasonal Variation, Storm Runoff |
Title | STRENGTHS, WEAKNESSES, OPPORTUNITIES AND THREATS |
Author | Nura Abubakar and Garba Bala Bello, PHD |
Source | International Journal of Information Technology and Business Management pp 083 – 091 Vol. 016. No. 1 — 2013 |
Abstract | This paper is on applying SWOT analysis in the Nigerian Mobile Telecommunication Industry, which is one of the most competitive industries/markets in the world, using Globacom Limited as a case study, with a view to determining its competitive advantage. This study therefore presents a SWOT analysis from an independent observer’s view on a private organization in a very competitive industry. The data used for the analysis are secondary data. The data were collected from magazines, newspapers and the websites of the organization under study (Globacom), independent media organizations and the industry regulator – the Nigerian Communications Commission (NCC). In the analysis, some key factors were selected and the strengths, weakness, opportunities and threats of Globacom in relation to its competitors and environment were analysed. Among the findings are that Globacom is the second in terms of market share (Subscriber base). Also, having the most advanced network (technology), fast, robust and cheap excess bandwidth from Glo-1, being the financially strongest and most innovative telecom operator in Nigeria constitute its competitive advantage. Thus, some of the recommendations are that the company should continue with its network expansion towards achieving its vision of becoming the biggest and best network in Africa and that it should try to consolidate and further its success through continuous network upgrading, being innovative and always keeping abreast of relevant local and international developments. |
Keywords | SWOT Analysis, network expansion, Mobile telecommunication industry |
Title | A UNIFIED APPROACH TOWARDS E-COMMERCE ADOPTION BY SMMES IN SOUTH AFRICA |
Author | Patrick Ndayizigamiye |
Source | International Journal of Information Technology and Business Management pp 092 – 101 Vol. 016. No. 1 — 2013 |
Abstract | E-commerce has been identified as an enabler of economic development/growth in developing countries. This is due to the preponderant role that e-commerce plays in developing world as a catalyst towards improved customer service [4]; expansion of market reach [11]; improved customer relationship and communications [15,16] and supply chain integration [9]. In the South African case, the currently installed undersea cable which promises faster and more reliable Internet connection and the current government efforts to increase SMMEs online visibility make e-commerce an attractive platform to conduct online business. It is in this context that this paper seeks to investigate factors that contribute to e-commerce adoption. Using theUnified Theory of Acceptance and Use of Technology (UTAUT) model, this paper investigates the adoption of e-commerce from 180 SMMEs in Pietermaritzburg area in South Africa. The findings reveal that although facilitating conditions have not influenced the decision to adopt e-commerce in the surveyed SMMEs, social influence, effort expectancy, performance expectancy are determinants of e-commerce within the selected SMMEs. Thus, this paper recommends a managerial approach towards the adoption of e-commerce focusing on making it easier for employees to execute their daily tasks. |
Keywords | E-commerce adoption, SMMEs, UTAUT, Pietermaritzburg |
Title | NEW TECHNIQUE FOR SKEW ANGLE DETECTION OF TEXT IN IMAGE DOCUMENT |
Author | Khalil Ibrahim Alsaif & Montaha Tariq Alsarraj |
Source | International Journal of Information Technology and Business Management pp 102 – 110 Vol. 016. No. 1 — 2013 |
Abstract | Image text document can be acquire via scanner or other type of machines which cause sometime a skew angle (alignment) on its horizontal direction so many techniques were developed to treat that skew . |
Keywords | Image processing, image documents processing, Fan filter, Directional filter, contourlet transformation. |
Title | STEGANOGRAPHY IN MOBILE PHONE OVER BLUETOOTH |
Author | Shatha A. Baker & Dr. Ahmed S. Nori |
Source | International Journal of Information Technology and Business Management pp 111 – 117 Vol. 016. No. 1 — 2013 |
Abstract | After expanding use of mobile phones, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is Steganography. |
Keywords | Steganography, J2ME, mobile phone, Bluetooth. |
Title | FORECASTING TECHNIQUES IN FAST MOVING CONSUMER GOODS SUPPLY CHAIN: A MODEL PROPOSAL |
Author | Ozalp Vayvay, Ozlem Dogan,Semih Ozel |
Source | International Journal of Information Technology and Business Management pp 118 – 128 Vol. 016. No. 1 — 2013 |
Abstract | This research contains supply chain analysis of Fast Moving Consumer Goods (FMCG) and it shows working styles, tools, organization structure, relations with other departments, procedures and all the processes in the supply chain management discipline. Furthermore, it focuses on the return/stale products that are date expired, damaged and then return from customer side to the company. “Return/Stale Products” has a big impact on the Profit & Loss Statement (P&L) of the company and also it is an important part of total sales volume. To solve this problem, with analysis of supply chain of the company was started with some key parameters, reviewed the return/stale process and updated account-based processes. After the analysis phase, the new concepts of the global world about return products were searched and in the design phase they were integrated into the alternative solution ways that were presented to the company. On the other hand, forecasting methodology was an important concept to search while the alternative solution was being designed. |
Keywords | supply chain analysis, return/stale products, forecasting methodology |
Title | VALUE AT RISK PERFORMANCE IN DEVELOPED AND EMERGING STOCK MARKETS |
Author | Ivica Terzić, Marko Milojević, Vladimir Džamić |
Source | International Journal of Information Technology and Business Management pp 129 – 136 Vol. 016. No. 1 — 2013 |
Abstract | The aim of this paper is to investigate stock returns stylized facts of both developed and emerging capital markets and to validate market risk measurement models in circumstances of global financial crisis. In order to analyze characteristics of stock returns we employ descriptive statistic, normality tests, white-noise and ARCH effect test. We present results on both VaR 1% and VaR 5% on a one-day horizon for the following indices: S&P 500, DAX, SAX, PX and Belex 15, which show us potential maximum expected losses that investors can suffer on daily basis. To examine the validity of VaR results we employ three backtest: unconditional coverage, independence and conditional coverage. Our results show that Historical Simulation and EWMA VaR methodology during the crisis period underestimate the true level of market risk, because both methodologies failed to satisfy unconditional coverage and independence properties of backtest at same time. We believe that our findings and contribution can help investors to make appropriate decisions when investing in emerging stock markets in volatile times. |
Keywords | Value at risk, backtesting, market risk, historical simulation, EWMA |