henry matey - Academia.edu (original) (raw)

Papers by henry matey

Research paper thumbnail of I.T. Project Success: Practical Frameworks Based on Key Project Control Variables

International Journal of Software Engineering & Applications

The objectives of this study were to research into the interdependencies IT project control varia... more The objectives of this study were to research into the interdependencies IT project control variables, and also come out with frameworks to help IT project managers understand how to effectively control these variables to ensure the success of IT projects. The study employed six control variables: Cost, Time (Schedule), Scope, Quality, Risk, and Benefits. A qualitative approach was adopted, where selected IT program and project managers of the Telecom industry in Ghana were interviewed individually and in a group based on a set of questions. The findings, espoused in the frameworks, reiterated the theory of the dependence of one control variable on the other, and the fact that varying one affects the others positively or negatively in relation to IT project success, as is the case for the iron triangle. Again, key activities of the control variables necessary to ensure IT project success were discovered.

Research paper thumbnail of Understanding The Characteristics, Benefits And Challenges Of Agile IT Project Management: A Literature Based Perspective

The objectives of this study was to bring out the understanding of the concept of agile IT projec... more The objectives of this study was to bring out the understanding of the concept of agile IT project management; what it is and what it is not. It was also aimed at comparing the pros and cons of both agile and traditional methods of IT project management in a typical industry setting; the challenges of going purely agile, and so on. It is purely a review of literature of peer reviewed papers sourced mainly from Google Scholar. It was revealed that agile outweigh the traditional methods in terms of benefits, but its implementation poses a lot of challenges due to a number of issues, paramount among them being organizational culture and empowerment of the project team. This has resulted in a number of industries sticking to the traditional methods despite the overwhelming benefits of agile. In another school of thought, the combination of the two paradigms is the way forward.

Research paper thumbnail of I.T. Project Success: Practical Frameworks based on key Project Control Variables

The objectives of this study were to research into the interdependencies IT project control varia... more The objectives of this study were to research into the interdependencies IT project control variables, and also come out with frameworks to help IT project managers understand how to effectively control these variables to ensure the success of IT projects. The study employed six control variables: Cost, Time (Schedule), Scope, Quality, Risk, and Benefits. A qualitative approach was adopted, where selected IT program and project managers of the Telecom industry in Ghana were interviewed individually and in a group based on a set of questions. The findings, espoused in the frameworks, reiterated the theory of the dependence of one control variable on the other, and the fact that varying one affects the others positively or negatively in relation to IT project success, as is the case for the iron triangle. Again, key activities of the control variables necessary to ensure IT project success were discovered.

Research paper thumbnail of Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

International Journal of Advanced Computer Science and Applications

The increasing critical dependencies on Internetof-Things (IoT) have raised security concerns; it... more The increasing critical dependencies on Internetof-Things (IoT) have raised security concerns; its application on the critical infrastructures (CIs) for power generation has come under massive cyber-attack over the years. Prior research efforts to understand cybersecurity from Cyber Situational Awareness (CSA) perspective fail to critically consider the various Cyber Situational Awareness (CSA) security vulnerabilities from a human behavioural perspective in line with the CI. This study evaluates CSA elements to predict cyber-attacks in the power generation sector. Data for this research article was collected from IPPs using the survey method. The analysis method was employed through Partial Least Squares Structural Equation Modeling (PLS-SEM) to assess the proposed model. The results revealed negative effects on people and cyber-attack, but significant in predicting cyber-attacks. The study also indicated that information handling is significant and positively influences cyber-attack. The study also reveals no mediation effect between the association of People and Attack and Information and Attack. It could result from an effective cyber security control implemented by the IPPs. Finally, the study also shows no sign of network infrastructure cyber-attack predictions. The reasons could be because managers of IPPs had adequate access policies and security measures in place.

Research paper thumbnail of Critical Infrastructure Cybersecurity Challenges: IoT in Perspective

International Journal of Network Security & Its Applications

A technology platform that is gradually bridging the gap between object visibility and remote acc... more A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these securit...

Research paper thumbnail of Analysis of the Effects of Information System on Service Delivery at Dvla

An Information System (IS) offers various benefits in managing transactions between an organizati... more An Information System (IS) offers various benefits in managing transactions between an organization and its customers. Lack of Information system purely oriented to customer satisfaction leads to long waiting lines by customers in service delivery. It will influence negatively on-expected revenue and profit to various establishments in the long term. With recent trends in specific IS applications, expectations are that if waiting lines are not eliminated, perhaps may be reduce drastically in service delivery. Several steps were taken in putting measures in place by expanding facilities, providing timely and periodic maintenance, yet waiting lines are observed in places like; Bank Automated Teller Machine(ATM) (as an extended banking services), Electricity Company pay points, Clinics and Hospitals etc. These reviews seek to focus on Driver and Vehicle Licensing Authority (DVLA) in Ghana since long waiting line is much associated with their service delivery. Using Convenience sampling...

Research paper thumbnail of I.T. Project Success: Practical Frameworks Based on Key Project Control Variables

International Journal of Software Engineering & Applications

Research paper thumbnail of Understanding the Characteristics, Benefits and Challenges of Agile it Project Management: A Literature Based Perspective

International Journal of Software Engineering & Applications

Research paper thumbnail of Adoption of Mobile Commerce Services Among Artisans in Developing Countries

Interdisciplinary Journal of Information, Knowledge, and Management

Aim/Purpose: This paper aims to analyze how artisans in Ghana are incorporating mobile commerce i... more Aim/Purpose: This paper aims to analyze how artisans in Ghana are incorporating mobile commerce into their everyday business and how perceived usefulness, perceived ease of use, subjective norms, age, gender, expertise, and educational level affected the adoption and usage of m-commerce. Background: This study integrates well-established theoretical models to create a new conceptual model that ensures a comprehensive mobile commerce adoption survey. Methodology: A cross-sectional survey was conducted to measure the constructs and their relations to test the research model. Contribution: The study’s findings confirmed previous results and produced a new conceptual model for mobile commerce adoption and usage. Findings: Except for gender, perceived ease of use, and subjective norms that did not have specific effects on mobile commerce adoption, age, educational level, perceived usefulness, expertise, attitude, and behavioral intention showed significant effects. Recommendations for Pr...

Research paper thumbnail of I.T. Project Success: Practical Frameworks Based on Key Project Control Variables

International Journal of Software Engineering & Applications

The objectives of this study were to research into the interdependencies IT project control varia... more The objectives of this study were to research into the interdependencies IT project control variables, and also come out with frameworks to help IT project managers understand how to effectively control these variables to ensure the success of IT projects. The study employed six control variables: Cost, Time (Schedule), Scope, Quality, Risk, and Benefits. A qualitative approach was adopted, where selected IT program and project managers of the Telecom industry in Ghana were interviewed individually and in a group based on a set of questions. The findings, espoused in the frameworks, reiterated the theory of the dependence of one control variable on the other, and the fact that varying one affects the others positively or negatively in relation to IT project success, as is the case for the iron triangle. Again, key activities of the control variables necessary to ensure IT project success were discovered.

Research paper thumbnail of Understanding The Characteristics, Benefits And Challenges Of Agile IT Project Management: A Literature Based Perspective

The objectives of this study was to bring out the understanding of the concept of agile IT projec... more The objectives of this study was to bring out the understanding of the concept of agile IT project management; what it is and what it is not. It was also aimed at comparing the pros and cons of both agile and traditional methods of IT project management in a typical industry setting; the challenges of going purely agile, and so on. It is purely a review of literature of peer reviewed papers sourced mainly from Google Scholar. It was revealed that agile outweigh the traditional methods in terms of benefits, but its implementation poses a lot of challenges due to a number of issues, paramount among them being organizational culture and empowerment of the project team. This has resulted in a number of industries sticking to the traditional methods despite the overwhelming benefits of agile. In another school of thought, the combination of the two paradigms is the way forward.

Research paper thumbnail of I.T. Project Success: Practical Frameworks based on key Project Control Variables

The objectives of this study were to research into the interdependencies IT project control varia... more The objectives of this study were to research into the interdependencies IT project control variables, and also come out with frameworks to help IT project managers understand how to effectively control these variables to ensure the success of IT projects. The study employed six control variables: Cost, Time (Schedule), Scope, Quality, Risk, and Benefits. A qualitative approach was adopted, where selected IT program and project managers of the Telecom industry in Ghana were interviewed individually and in a group based on a set of questions. The findings, espoused in the frameworks, reiterated the theory of the dependence of one control variable on the other, and the fact that varying one affects the others positively or negatively in relation to IT project success, as is the case for the iron triangle. Again, key activities of the control variables necessary to ensure IT project success were discovered.

Research paper thumbnail of Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

International Journal of Advanced Computer Science and Applications

The increasing critical dependencies on Internetof-Things (IoT) have raised security concerns; it... more The increasing critical dependencies on Internetof-Things (IoT) have raised security concerns; its application on the critical infrastructures (CIs) for power generation has come under massive cyber-attack over the years. Prior research efforts to understand cybersecurity from Cyber Situational Awareness (CSA) perspective fail to critically consider the various Cyber Situational Awareness (CSA) security vulnerabilities from a human behavioural perspective in line with the CI. This study evaluates CSA elements to predict cyber-attacks in the power generation sector. Data for this research article was collected from IPPs using the survey method. The analysis method was employed through Partial Least Squares Structural Equation Modeling (PLS-SEM) to assess the proposed model. The results revealed negative effects on people and cyber-attack, but significant in predicting cyber-attacks. The study also indicated that information handling is significant and positively influences cyber-attack. The study also reveals no mediation effect between the association of People and Attack and Information and Attack. It could result from an effective cyber security control implemented by the IPPs. Finally, the study also shows no sign of network infrastructure cyber-attack predictions. The reasons could be because managers of IPPs had adequate access policies and security measures in place.

Research paper thumbnail of Critical Infrastructure Cybersecurity Challenges: IoT in Perspective

International Journal of Network Security & Its Applications

A technology platform that is gradually bridging the gap between object visibility and remote acc... more A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these securit...

Research paper thumbnail of Analysis of the Effects of Information System on Service Delivery at Dvla

An Information System (IS) offers various benefits in managing transactions between an organizati... more An Information System (IS) offers various benefits in managing transactions between an organization and its customers. Lack of Information system purely oriented to customer satisfaction leads to long waiting lines by customers in service delivery. It will influence negatively on-expected revenue and profit to various establishments in the long term. With recent trends in specific IS applications, expectations are that if waiting lines are not eliminated, perhaps may be reduce drastically in service delivery. Several steps were taken in putting measures in place by expanding facilities, providing timely and periodic maintenance, yet waiting lines are observed in places like; Bank Automated Teller Machine(ATM) (as an extended banking services), Electricity Company pay points, Clinics and Hospitals etc. These reviews seek to focus on Driver and Vehicle Licensing Authority (DVLA) in Ghana since long waiting line is much associated with their service delivery. Using Convenience sampling...

Research paper thumbnail of I.T. Project Success: Practical Frameworks Based on Key Project Control Variables

International Journal of Software Engineering & Applications

Research paper thumbnail of Understanding the Characteristics, Benefits and Challenges of Agile it Project Management: A Literature Based Perspective

International Journal of Software Engineering & Applications

Research paper thumbnail of Adoption of Mobile Commerce Services Among Artisans in Developing Countries

Interdisciplinary Journal of Information, Knowledge, and Management

Aim/Purpose: This paper aims to analyze how artisans in Ghana are incorporating mobile commerce i... more Aim/Purpose: This paper aims to analyze how artisans in Ghana are incorporating mobile commerce into their everyday business and how perceived usefulness, perceived ease of use, subjective norms, age, gender, expertise, and educational level affected the adoption and usage of m-commerce. Background: This study integrates well-established theoretical models to create a new conceptual model that ensures a comprehensive mobile commerce adoption survey. Methodology: A cross-sectional survey was conducted to measure the constructs and their relations to test the research model. Contribution: The study’s findings confirmed previous results and produced a new conceptual model for mobile commerce adoption and usage. Findings: Except for gender, perceived ease of use, and subjective norms that did not have specific effects on mobile commerce adoption, age, educational level, perceived usefulness, expertise, attitude, and behavioral intention showed significant effects. Recommendations for Pr...