Paula Kotzé

Paula Kotzé
University of Pretoria | UP · Department of Informatics

PhD Computer Science (York,UK)

About

132
Publications
170,598
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,614
Citations
Additional affiliations
July 2008 - present
Nelson Mandela University
Position
  • Professor (Associate)
January 1980 - May 2008
University of South Africa
Position
  • Managing Director
Education
October 1992 - July 1997
The University of York
Field of study
  • Computer Science (Human Computer Interaction)

Publications

Publications (132)
Chapter
Full-text available
Both information systems outsourcing and knowledge management are well-established business phenomena. Regardless of organisational reasons for information systems (IS) outsourcing, knowledge remains the single most important resource for organisations to be managed. In an attempt to provide tactical mechanisms for creating and managing shared know...
Article
Full-text available
Both information systems outsourcing and knowledge management are well-established business phenomena. Regardless of organisational reasons for information systems (IS) outsourcing, knowledge remains the single most important resource for organisations to be managed. The integration of shared knowledge represents the blending of organisational skil...
Conference Paper
Copyright: 2017 SCITEPRESS. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, kindly consult the publisher's website.
Conference Paper
Full-text available
A key constraint for growing small and medium enterprises (SMEs) in South Africa is the business skills required to grow the enterprises through the stages of transformation. Business process management (BPM) is one of the skills that could add value during transformation. Understanding the stages of transformation during SME growth would assist to...
Article
The use of design science research (DSR) as a paradigm of choice among information systems (IS) researchers is growing. While there is an apparent increase in the number of DSR artefacts of the method form, very few research publications provide details of the process followed to create such method artefacts in and of itself. Even rarer is the use...
Conference Paper
Full-text available
Enterprise systems engineering (ESE) is a multidisciplinary approach that combines traditional systems engineering (TSE) and strategic management to address methods and approaches for aligning system architectures, system development and system implementation with enterprise business rules, enterprise strategic objectives and enterprise capabilitie...
Article
Full-text available
In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education inst...
Conference Paper
Enterprise architecture (EA) is an organisational strategy increasingly used to describe the integration of business and information management in complex enterprises. Organisations can prevent human -- related problems and promote acceptance of new organisational strategies, such as EA, if they know what behaviour to expect from stakeholders and w...
Conference Paper
Full-text available
The outsourcing of information systems has grown as an accepted business trend, with several reasons being cited for considering IS outsourcing. However, there is evidence that IS outsourcing threats may impact negatively on the initial intent to outsource, as well as the success of an IS outsourcing arrangement. Managing successful IS outsourcing...
Conference Paper
Full-text available
High levels of shared knowledge can positively influence outsourcing performance and the combination of processes designed to transfer explicit and tacit knowledge, has the most influence on the level of shared knowledge. Some organisations are unaware of the volume and value of knowledge it receives from various inter-organisational partnerships....
Chapter
Full-text available
Organisations have over time realised that leveraging their already-accumulated knowledge assets are the most cost effective way to increase their competitive standing and to harness innovation. In choosing to outsource their information systems (IS), they may unintentionally fragment their knowledge assets by missing critical learning opportunitie...
Chapter
Full-text available
Information systems (IS) outsourcing is a complex, multi-layered and a multifaceted concept. An organisation may gain access to knowledge it does not own in-house or be able to obtain it at a lower price by entering into an outsourcing relationship. At the same time, the organisation may risk losing key skills and capabilities unless the outsourcin...
Conference Paper
In scientific inquiry definitions serves the purpose of describing what something is in terms that are concise, precise and allows for clear communication. Since the start of the enterprise architecture (EA) research field the issue of the definition of terms and fundamental concepts has been continually debated. The ongoing debate is indicative of...
Conference Paper
The development and use of national guidelines for the exchange of patient-centric healthcare data from electronic medical record systems are essential for the consistent and efficient use and analysis of those data. These guidelines must be based on a core national data model. This paper proposes a basic conceptual data model for primary healthcar...
Conference Paper
Full-text available
There is growing concern over the fragmentation and inability of healthcare information systems (e-health systems) to exchange pertinent healthcare information that can empower healthcare professionals to make informed decisions regarding the care of their patients. Standardisation is increasingly being seen as a means to ensure the interoperabilit...
Article
Full-text available
The ability of healthcare information systems to share and exchange information (interoperate) is essential to facilitate the quality and effectiveness of healthcare services. Although standardization is considered key to addressing the fragmentation currently challenging the healthcare environment, e-health standardization can be difficult for man...
Conference Paper
Full-text available
Although standardization is seen as the key to ensuring interoperability of healthcare information systems, the large numbers of standards available can make the selection decision difficult especially for a developing nation. This paper reports on a study of ehealth standards development and the level of African countries’ participation in the dev...
Book
Full-text available
The four-volume set LNCS 8117-8120 constitutes the refereed proceedings of the 14th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2013, held in Cape Town, South Africa, in September 2013. The fourth volume includes 38 regular papers organized in topical sections on supporting physical activity, supporting shred activiti...
Book
The four-volume set LNCS 8117-8120 constitutes the refereed proceedings of the 14th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2013, held in Cape Town, South Africa, in September 2013. The 53 papers included in the third volume are organized in topical sections on mobile usage and techniques, mobile UX and privacy co...
Book
The four-volume set LNCS 8117-8120 constitutes the refereed proceedings of the 14th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2013, held in Cape Town, South Africa, in September 2013. The 57 papers included in the first volume are organized in topical sections on 3D navigation, 3D technologies - 3D object manipulati...
Book
The four-volume set LNCS 8117-8120 constitutes the refereed proceedings of the 14th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2013, held in Cape Town, South Africa, in September 2013. The 55 papers included in the second volume are organized in topical sections on E-input/output devices (e-readers, whiteboards), fac...
Article
Full-text available
The Digital Doorway (DD) is a joint initiative between the South African Department of Science and Technology (DST) and the Meraka Institute of the Council for Scientific and Industrial Research (CSIR). The DD is a non-standard computer system deployed amongst underprivileged communities in South Africa with the objective to promote computer litera...
Chapter
The term enterprise architecture has been in use for almost thirty years if the seminal paper (published in 1987) by Zachman is taken as its starting point. As a scientific area of study this time span is relatively short but for the practitioner it could be a time long enough for the original interest to wane. Gartner's research reflects that the...
Chapter
Organisations have to adapt quickly to changes, continuously investigate innovations and be flexible in order to remain competitive. The information technology (IT) landscape has evolved to enable organisations competitive advantage and to meet targets such as reduced costs, scalability, flexibility, capacity utilisation, higher efficiencies and mo...
Article
The use of patterns and pattern languages in enterprise architecture (EA) is a relatively novel concept. Although both the concepts of patterns and EA are over 30 years old, the notion of design patterns is hardly applied to EA. There is a lack of pattern collections specifically devoted to EA: only a small number of patterns and pattern collection...
Article
Full-text available
Staying competitive in the 21st century requires enterprise unity and integration, allowing for agility to accommodate swift changes in strategy as markets evolve and new opportunities emerge. The foundation for execution approach acknowledges the volatility of strategy and suggests the use of an operating model (OM), which is a commitment to a way...
Article
Full-text available
Handcrafted beadwork produced by the BaNtwane people of South Africa is loaded with meaning. Communicating indigenous oral stories is important for passing on culture-specific traditions and community memory, such as the meaning of the handcrafted beadwork. Oral stories are told within the physical confines of the community. The community we focus...
Conference Paper
Full-text available
Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilising pools of often virtualized resources. Through these features, cloud computing has the potential to improve the way businesses and IT operate by offering fast star...
Conference Paper
Full-text available
A key constraint for growing small and medium enterprises (SMEs) is the business skills required to grow the enterprises through the stages of transformation. Criticism against growth stage models for SMEs is of concern, since these models contain the typical knowledge that appeals to managers of small enterprises as guidance in how to manage growt...
Conference Paper
Full-text available
ERP systems are widely used by large enterprises for managing functional areas of the enterprise. However, recently ERP systems have also been introduced to the small enterprise market. ERP systems are now considered an important small enterprise management aid that may contribute to the sustainability and growth of the small enterprise. Although t...
Article
Full-text available
The advent of the Internet and the World Wide Web has revolutionised practices in business, government, health, and education amongst others. In education, the Internet and World Wide Web opened new doors for teaching and learning, thereby affording educators an opportunity to deploy new teaching, learning and administration strategies and affordin...
Conference Paper
Full-text available
The usability and accessibility of interactive system interfaces, as well as their evaluation constitutes important focus areas of human-computer interaction (HCI). One of the families of evaluation methods that can be used to assess the usability and accessibility of a given interface is the heuristic evaluation method. Heuristic evaluation can be...
Conference Paper
Full-text available
There is growing efforts to narrow the digital divide both locally and internationally. One such effort is the Digital Doorway project driven by the Department of Science and Technology (DST) and the Meraka Institute of Council for Science and Industrial Research (CSIR). It involves a non-standard computer system housed in a rugged, custom-designed...
Article
Full-text available
Business process management (BPM) tools are categorised as enterprise software, which offers many layers of functionality in producing effective and optimised business processes. One of the most important components of successful business process management is the group of enterprise software users -those people who interact with the workflows at v...
Conference Paper
Full-text available
Information systems (IS) outsourcing is a serious commitment -- a formal relationship underpinned by a contractual agreement, with long-term consequences among two or more organisations. Many organisations end up frustrated as they learn that their attempts at IS outsourcing have failed. However, some failures could be avoided with knowledge of com...
Conference Paper
Full-text available
In this paper we are interested in determining if there is indeed an opportunity to use existing traditional African artefacts as tangible programming elements in computing systems. Research to date has focussed on the design of new artefacts for use in tangible environments. These artefacts are based on Western perceptions. Prior research has also...
Article
Full-text available
IADIS International Conference Information Systems 2010, Porto, Portugal, 18-20 March 2010. Organisations do not have unlimited resources and, by considering outsourcing, are balancing endless requirements with organisational assets. Outsourcing allows access to expertise, knowledge and capabilities outside of the organisation’s bounds. Information...
Conference Paper
Full-text available
Metamodels are abstractions that are used to specify characteristics of models. Such metamodels are gen- erally included in specifications or framework description s. A metamodel is for instance used to inform the generation of enterprise architecture content in the Open Group's TOGAF 9 Content Metamodeldescription. However. the description of meta...
Conference Paper
Full-text available
Organisations are faced with a number of challenges and issues in decentralised, multiple-server, physical, non-virtualized IT environments. Virtualization in recent years has had a significant impact on computing environments and has introduced benefits, including server consolidation, server and hardware utilization and reduced costs. Virtualizat...
Conference Paper
Full-text available
Usability, which is generally defined in terms of application effectiveness, efficiency and user satisfaction, is one of the focus areas of human-computer interaction (HCI). Accessibility is the design of systems that can be perceived, understood and used by people with varying abilities. Although accessibility concerns are aimed at making systems...
Article
Full-text available
Universities and technical institutes in a developing country like South Africa are faced with the challenge of adopting and embracing a course management system (CMS) to implement e-learning. Course management systems are interactive systems that enable educators, with minimal technology expertise to design, develop and deliver e-learning content...
Conference Paper
Full-text available
Knowledge assets are of far greater value than any tangible asset and provide organisations with the basis for creating a sustainable competitive advantage. The nature of knowledge and knowledge management have given rise to a range of different definitions of knowledge management systems that enable organisations to convert their knowledge into ac...
Conference Paper
Full-text available
Copyright: ACM 2009. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT) Conference, {978-1-60558-286-3, (2008)} http://doi.acm....
Conference Paper
Full-text available
Copyright: ACM 2009. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The existing knowledge base on child development offers a wealth of information that can be useful for the design of children’s technology. Furthermore, academic journals and conference proceedings pro...
Article
Full-text available
In this introductory chapter, we describe the key lessons from an earlier HCI Educators' conference, held in Limerick in 2006, the outcomes of which led to the theme of HCIEd 2007 —Creativity: Experiencing to Educate and Design. The paper discusses the lessons leant around four key questions: nature vs. nurture: can creative invention be taught; wh...
Book
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems mode...
Book
The two volume set LNCS 5726 and LNCS 5727 constitutes the refereed proceedings of the 12th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2009, held in Uppsala, Sweden, in August 2009. The 183 revised papers presented together with 7 interactive poster papers, 16 workshops, 11 tutorials, 2 special interest group papers,...
Article
Full-text available
The South African Computer Journal, better known as SACJ, has, for the last nineteen years, been one of the most pertinent publications for the computing discipline within the South African milieu. In this paper we reflect on the topics of research articles published in SACJ over its first 40 volumes of the journal using the ACM Computing Classific...
Article
Full-text available
Higher education in South Africa has been the scene for dramatic changes during the last fourteen years of the new democracy. The cleanly divided domains and roles of higher education institutions made way for a chaotic situation that was eventually resolved by the creation of three different kinds of universities. Universities of technology as pre...
Chapter
Full-text available
This paper discusses a framework for design exercises for interaction design and HCI based on two theoretical frameworks and a set of knowledge transformers. The model scope design exercises on a continuum ranging from creativity to real-world use based on the argument that students must experience design to enable them to learn effectively.
Article
This paper explores the use of design patterns and anti-patterns in teaching human–computer interaction principles. Patterns are increasingly popular and are seen as an efficient knowledge transfer mechanism in many fields, including software development in the field of software engineering, and more recently in the field of human–computer interact...
Conference Paper
Full-text available
The majority of guidelines and principles for design of technology are aimed at products for adults. The limited guidelines available for design of young children's technology do not focus sufficiently on age-related requirements or they offer high-level advice that is only useful in the planning stages of design. This paper reports on research aim...
Conference Paper
Full-text available
Copyright: CHISIG & Author This paper concerns the impact of motivational factors on mobile phone use profiles and the influence thereof on the design of mobile phones. It aims to provide an alternative to the current feature driven design perspectives
Article
Full-text available
Copyright: 2008 J.UCS In human-computer interaction and computing, mobile phone usage is mostly addressed from a feature-driven perspective, i.e. which features do a certain user group use, and/or a usability perspective, i.e. how do they interact with these features. Although the feature driven and usability focus carry value, it is not the full p...
Chapter
There are various development methodologies that are used in developing ISs, some more conventional than others. On the conventional side, there are two major approaches to systems development methodologies that are used to develop IS applications: the traditional systems development methodology and the object-oriented (OO) development approach. Th...
Chapter
There are various development methodologies that are used in developing ISs, some more conventional than others. On the conventional side, there are two major approaches to systems development methodologies that are used to develop IS applications: the traditional systems development methodology and the object-oriented (OO) development approach. Th...
Conference Paper
Full-text available
This paper provides support for the use of motivational needs in identifying mobile phone uses and related features. Drawing on motivational human and usage space research, the findings of interviews and surveys, this paper proposes the Mobile phone Usage Space Model (MUSM). MUSM distinguishes between two groups of features by identifying necessary...
Article
Full-text available
2007:nternational Conference on interfaces and human computer interaction Disabled persons are experiencing additional difficulties when interacting with systems, applications or devices and also have their own unique requirements that enable them to use a system. If the design of the system does not support these requirements, people with disabili...
Article
Full-text available
This paper reports on the outcomes of the December 2006 CONVIVIO Faculty Forum and the proposed framework and guidelines for design exercises to stimulate creativity, developed at the Forum.
Conference Paper
Full-text available
It is important, for our credibility as user interface designers and educators, that we practice what we preach. Many system designers and programmers remain sceptical about the need for user-centred design. To win them over, we need to be absolutely clear about what they need to do. We, as a community, propose many different methods to support naï...
Conference Paper
Full-text available
New methods, methodologies and procedures are often introduced within information systems without discussing the effectiveness thereof. We investigate the effectiveness of a requirements elicitation procedure for deriving process model structures. There were three activities that 'rigged' this study before comments were possible on the effectivenes...
Conference Paper
Full-text available
The identification of process model structures is usually complex and costly. If these structures can be reused across boundaries, this could not only benefit the internal structure of one application domain, but could also benefit organizations where it is not feasible to initiate expensive process re-engineering innovations. Furthermore, a reusab...
Conference Paper
Full-text available
Technology adoption models specify a pathway of technology acceptance from external variables to beliefs, intentions, adoption and actual usage. Mobile phone adoption has been studied from a variety of perspectives, including sociology, computer-supported cooperative work and human-computer interaction. What is lacking is a model integrating all th...
Article
Full-text available
This paper discusses a framework for interaction design exercises for interaction design and HCI based on two theoretical frameworks and a set of knowledge transformers. The model scope design exercises on a continuum ranging from creativity to real-world use based on the argument that students must experience design to enable them to learn effecti...
Article
Full-text available
In this paper, we describe the key lessons from a an earlier HCI Educators' conference, held in Limerick in 2006, on 'inventivity' - a term coined to highlight the confluence of inventiveness and creativity. There is a distinction between being creative and being artistic. Hence, HCI education in creative inventiveness is not just about artisticall...
Conference Paper
Full-text available
Defining process model structures for reuse in different activities, such as re-engineering, may seem to be an innovative idea. There is, however, a danger that these models are created with no proof that they are useful in practice. In this paper, we give an overview of a re-engineering procedure developed from existing re-engineering procedures c...
Chapter
An experiment conducted to determine the effects of subjective culture on the usability of computerized systems did not provide sufficient evidence that any of the tested cultural dimensions affected the usability of the product. Analysis indicated that the differences in scores could have been attributed to variables other than those tested and co...
Conference Paper
Full-text available
There are as many arguments against as supporting the accommodation of culture into user interface design. One argument suggests that it is necessary to match the subjective cultural profile of the interface to the cultural profile of the users in order to enhance usability and performance. In contrast, we argue that the interface design characteri...
Article
Full-text available
The Established Strategy for drawing up a Z specification document focuses on a more abstract activity of specification, namely, how to combine schemas but is largely silent about how to construct a schema. Schema construction may benefit from the application of certain heuristics for establishing its content. While formal specification can be seen...
Article
Full-text available
Research to establish what aspects of subjective culture influence usability, and to what extent, requires the use of a valid and relevant cultural model. The use of cultural dimension models in general, and Hofstede's model in particular, has been widely criticized as being stereotypical and rigid, resulting in the rejection of this model as the b...
Article
Full-text available
Although various application domains use requirements elicitation procedures to gather information and model the application domain, only a few guidelines mention the important characteristics that are essential for such procedures. This paper reports on identifying a set of character-istics for a functional requirements elicitation procedure withi...
Article
This paper provides an example that illustrates parts of the software life cycle processes of specification, refinement and implementation for the use of inheritance in an object-oriented environment. Some background on UML, Object-Z, Java and inheritance is provided, as well as short descriptions of the refinement process comprising data refinemen...
Article
Full-text available
A condensed specification of a multi-level marketing (MLM) enterprise which can be modelled by mathematical forests and trees is presented in Z. We thereafter identify a number of proof obligations that result from operations on the state space. Z is based on first-order logic and a strongly-typed fragment of Zermelo-Fraenkel set theory, hence the...
Article
Full-text available
In this paper the tenability of anti-patterns in Human-Computer Interaction is explored. Patterns have been accepted as being useful in software development and more recently also in Human-Computer Interaction. A concerted effort is being made in Software Engineering to identify and document anti-patterns. Patterns and anti-patterns are essentially...
Article
A reduced specification of a multi-level marketing business modelled by mathematical forests and trees is presented in the Z specification language. A number of proof obligations arising from operations on the state is identified. Since Z is based on first-order logic and a strongly typed fragment of Zermelo-Fraenkel set theory, the utility of a nu...
Article
Component-Based Software (CBS) engineering is envisioned to address the issues related to the increasing size and complexity of software systems. In CBS development, the designer designs systems by using readily available (possibly third party) software components without needing the source code for the components. Lack of source code, in general,...
Article
Over the past few years while e-learning has been gaining momentum, the user profile of instructional authoring tools has also evolved. It seems that commercial authoring products have not yet been adapted to address all user groups, which impedes lecturers in their working environment while preparing e-learning materials, with the materials not ac...
Article
Usability in developing countries presents special challenges. Using her own South Africa as an example, Diane Norton examines the issues of diversity in "rainbow nations" and questions whether designing to accommodate the associated differences in understanding ...
Article
Full-text available
A formal specification of a multi-level marketing (MLM) business is presented. Specifying a MLM business boils down to specifying properties of and operations on mathematical forests and trees. The usefulness of the model-based specification language, Z, is investigated as a vehicle for a formal specification of these recursive structures. The spec...
Article
Full-text available
________________________________________________________________________________________________ Systems development methodologies have been developed with the purpose of designing and developing effective information systems. This paper looks at different types of systems development methodologies with particular emphasis being placed on how the h...
Article
In user interface engineering, scenarios are stories that capture information about users and their tasks, including the context of use. Scenarios are generally documented using natural languages in order to understand, validate and use them effectively and efficiently throughout the development lifecycle. Stakeholders and software developers need...
Article
Full-text available
Subject disciplines often have distinguishable educational methods depending on the nature of the subject and the target audience. Some of these methods are seen as unique or unconventional, but can also add value to other disciplines when applied. The main theme of this workshop is on a critical comparison of educational methods of a variety of di...

Network

Cited By