During the COVID-19 pandemic, South African organisations were forced to provide suitable working conditions for its employees. The increased reliance on technology while working from home resulted in technostress. This paper considers how technostress experiences have evolved under the newly adopted hybrid working model. It investigates the underlying causes of technostress experiences and how employees are currently coping with technostress under the hybrid model. Semi-structured interviews were conducted and supplemented with secondary data provided by respondents who are currently working under a hybrid model and who use ICTs for work purposes. The findings reveal several hybrid working specific causes of technostress, including instances of stressful workstation setups, office disruptions and power outage issues as a result of loadshedding (rolling power blackouts). Stresses related to loadshedding appear to be a specific South African issue. To deal with technostress, employees adopted reactive and proactive coping behaviours driven by problem-focused and emotion-focused coping strategies respectively.
2
Dostęp do pełnego tekstu na zewnętrznej witrynie WWW
Corruption has had a detrimental impact on the South African economy. The use of Information Communication Technology (ICT) in combatting corruption is undervalued in e-government contexts, while insufficient empirical data exists to gauge the effectiveness of distributed digital technology in combatting malfeasance. This study explores perceptions on the use of ICT in the procurement corruption investigation sector. Legal and factual perspectives of ICTs, and specifically on Digital Ledger Technology (DLT)'s usefulness in combatting public sector procurement corruption in South Africa was found to be limited. This empirical study found that most respondents in the corruption investigation field had encounters with it in the Public Procurement field of the Supply Chain Management (SCM) function. Human interference in the ICT system appears to be the main contributing factor in corrupting the system. Monitoring of user activity logs is recommended as well as strict regulations to prevent ghost users from corrupting ICT systems.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.