Books/ Book Chapter (CSS)
Permanent URI for this collection
Browse
Browsing Books/ Book Chapter (CSS) by Author "Tossy, Titus"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item A comparative evaluation of e-learning adoption in private and public higher education institutions: A Tanzania survey(IGI Global, 2017) Mwamahusi, Mpe Paulo; Tossy, TitusThis paper examines e-learning adoption in Higher Education Institutions (HEIs). The paper examines whether there is a difference between the Private and public HEIs e-learning adoption. The rationale for the examination stands from the fact that scholars are of option that there is different between private and public HEIs e-learning adoption. From an empirical survey conducted in Tanzania, this paper evaluates both staffs and students on the current situations, factors affecting, similarities and differences of e-learning adoption between private and public HEIs. The research reveals that, despite of the government efforts to support e-learning initiative by introducing national ICT polices to boost the level of adoption; very few private HEIs have adopted e-learning compared to public HEIs. The limited initial investment, lack of expertize, lack of guaranteed electrical power, poor strategic change management plans, and lack of innovative ideas are the barriers to e-learning adoption.Item A set of principles for doing and evaluating classic grounded theory research in information systems(IGI Global, 2017) Lowe, Andy; Tossy, TitusGrounded Theory (GT) is a latent pattern recognition research method discovered by Glaser and Strauss (1967). Due to GTs power and transcendence many research papers across several academic disciplines including Information Systems claimed to have used GT when in fact they have used pseudo GT methods. It is argued in this paper that any other research method which adopts the GT label without following orthodoxy of the authentic GT research method should not be called GT. All of the pseudo GT methods make the false assumption that GT is a sub set of Qualitative Data Analysis. This is a false assumption because authentic GT can use either quantitative or qualitative data and it is a general research methodology and produces empirically grounded but modifiable propositions. Within the Information Systems (IS) research community it is therefore not surprising that many, who claim to use GT, have used different types of pseudo GT. They have adopted vocabulary of the GT without following its original tenets. This paper explains how authentic GT can be carried out in an information systems context by trusting in emergence rather than forcing the data.Item Collaborating partnerships: A project-based legitimizing strategy amongst east african e-learning providers(IGI Global, 2017) Tossy, Titus; Brown, IrwinThis chapter examines the phenomenon of e-learning in East Africa. The classic grounded theory methodology was used to carry out the study. Through multiple encounters with 24 e-learning providers, the investigation revealed legitimizing of e-learning projects to be a significant issue for these providers. Developing collaborating partnerships was a key strategy used by the providers to legitimize e-learning projects. The study identified two types of collaborating partnerships: Asymmetrical and Reciprocal. These findings are positioned within literature to highlight the contribution that this paper makes to the discourse on e-learning projects in developing countries.Item Cultivating recognition: a classic grounded theory of e-learning providers working in East Africa(IGI Global, 2017) Tossy, Titus; Brown, IrwinThe E-learning provision in East Africa including Tanzania, Kenya and Uganda is rapid gaining its way. E-learning providers are all groups tasked with e-learning activities including design, delivery, implementation and others. The e-learning providers are surrounded by issues and challenges (main concerns). The purposed of this study was to identify and examine the main concern amongst e-learning providers in East Africa (Tanzania, Kenya and Uganda). In this study the Classic Grounded Theory Research Methodology was used in order to identify the main concern of e-learning providers. In the course of repeated encounters with e-learning providers, this study found the concept of Cultivating Recognition to emerge as the main concern or core variable amongst these e-learning providers. The core variable within the Classic Grounded Theory research methodology is the main entity that accounts for most of the variation in the data. The core variable of the theory, the basic social psychological process of Cultivating Recognition is characterized by Legitimizing and Credentializing. The process of legitimizing involves convincing the e-learning stakeholders that the e-learning programs and projects will be delivered in a timely, valid and sustainable manner. Legitimizing process is achieved through Collaborating (reciprocal and asymmetric), Referral Networking and Strategic alliancing. Credentializing aims to enhance the stakeholders' belief in the e-learning providers' competence prior to the provision of the e-learning programs and projects. While Credentializing is achieved through Endorsementizing, Result Orienting and Prioritizing Duties, Result Orienting itself is achieved through Visualizing, Professionalizing, Focalizing and Role Delineating. This study will help e-learning providers and other groups to cultivate recognition and pave a way for their success in implementation of e-learning.Item Information technology integration for socio-economic development(IGI Global, 2016) Tossy, TitusAs the developed world continues to become more digitized, lesser developed areas are starting to see more technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Information Technology Integration for Socio-Economic Development features theoretical concepts and best practices in the implementation of new technologies within developing areas around the world. Highlighting empirical research on the application of information technologies to bridge the digital divide within different countries, the book is ideally suited for technology developers, managers, and policy makers.