About the Author(s)


Kingston X.T. Lamola Email symbol
Department of Business Management, Faculty of Management and Law, University of Limpopo, Polokwane, South Africa

Citation


Lamola, K.X.T., 2022, ‘Moulding information systems components and agitations for the adoption of enterprise application architecture for supply chain management’, Journal of Transport and Supply Chain Management 16(0), a707. https://doi.org/10.4102/jtscm.v16i0.707

Original Research

Moulding information systems components and agitations for the adoption of enterprise application architecture for supply chain management

Kingston X.T. Lamola

Received: 11 Nov. 2021; Accepted: 02 May 2022; Published: 20 Oct. 2022

Copyright: © 2022. The Author(s). Licensee: AOSIS.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Background: The components of information systems (ISCs) have become a critical factor in the adoption of enterprise application architecture (EAA) for supply chain management (SCM) within small and medium enterprises (SMEs) when used reciprocally with competent capital formation, mainframe and personal computers, application software systems, and information technology expert. The current study examined information systems components (ISCs) as they were used in the adoption of EAA in SMEs, scrutinised the Theory of Planned Behavior, and systematic literature review.

Objective: This paper seeks to contribute to the fundamental aspects of ISCs that influence the adoption of EAA for SCM in small and medium enterprises (SMSs) in South Africa, located in Limpopo Province of Capricorn District Municipality.

Methodology: A quantitative survey presented both diagnostic tests and data analysis as that of the methodological modus operandi. Descriptive data analysis generated Pearson’s correlation and coefficient, along with analysis of variance (ANOVA) and linear regression. Data was collected through stratified random sampling of SME owners and managers.

Results: The most substantial results indicate that ISCs should be integrated with transactional support systems (TSSs), management information systems (MISs), information systems governance (ISG), decision support systems (DSSs), executive support systems (ESSs), knowledge management systems (KMSs), and web application architecture (WAA) to predict EAA acceptance.

Conclusion: This article described the greatest possible direction for considering ISCs when planning to integrate EAA adoption. Furthermore, the research results provide a preliminary overview and analysis of the results that support the alternative hypothesis that ISCs influence SCM adoption and implementation of EAA in SMEs.

Keywords: enterprise application architecture; transaction support system; management information system; decision support system; executive support system; knowledge management systems; web application architecture.

Introduction

Many businesses are finding it difficult to implement enterprise application architecture (EAA) for supply chain management (SCM) in Capricorn District Municipality, as they confront supply chain (SC) constraints and increased risks related with information security, as well as focusing on common resource constraints (Elworthy 2020). Supply chain management is an integral part of the enterprise’s success that needs to be assimilated with technological replicas, as most entities operate via Internet sources (Mutukura 2020). In the global economy, enterprises focus on competitive strategies which include engagement in real-time SC planning, developing a collaborative SC strategy, adopting innovative SC automation solutions, implementing agile process improvements and considering cost drivers and business impacts, thus small and medium enterprises (SMEs) counsel within Capricorn District Municipality (Andriole 2020; Monroy 2020). A recent study by Mabotja (2019) exhibits significant challenges faced by SMEs because of the low participation rate in the Fourth Industrial Revolution. The objectives of SCM include shaping the SC from strategic innovation,1 creating seamless SC operations by coordinating and integrating all activities and processes, implementing long-term relationships, managing SC information and evaluating the performance of the entire SC.

In this white paper, the introduction of EAA is considered as a multifunctional model based on multiple characteristics in SCM activities, company resources and characteristics. Because of the contradictory nature of the research hypothesis, an appropriate integrated regulation is required to effectively justify resistance to the adoption of the EAA. There is a link between information system components (ISCs) and the actual uptake of EAA for SCM in SMEs with relevant production sources, and some are addressing the challenge on an ad hoc basis (Wing 2007:149). Gibbs, Sequeira and White (2007) used the e-business adopter model, which emphasised a systematic flow of data sources, and additionally illustrated this distinction from SMEs in an examination of different categories of SMEs: (1) emails used for effective communication; (2) world market interactions (through the sites); (3) order or buy online via e-commerce; (4) e-business to integrate SCs; (5) affiliates that link open information to customers, suppliers and other partners and (6) digital ecosystem used for knowledge sharing in natural selection or evolution of services. In this regard, the study determined the adoption of EAA for SCM in SMEs that are advanced in interactive websites, intermediate static websites and beginners.

Strategic innovation

Whilst a variety of definitions of the term ‘strategic innovation’ were proposed, this article uses the definition as a mechanism used in product and service innovation that involves complexities in algorithms and legal protection of intellectual property with competitive factors in specific periods (Bessant & Tidd 2013) with loss or of Internet located in Capricorn District Municipality. It is therefore important to highlight that four subregions of Capricorn District were examined, namely, Blouberg (Bochum) Municipality, Molemole (Dendron) Municipality, Polokwane Municipality and Lepelle-Nkumpi (Lebowakgomo) (Administrative Divisions of South Africa 2018). Enterprise application architecture represents relationships and interactions between components such as user interfaces, transaction processing monitors, databases and others with the primary goal of ensuring that all elements work together and appropriately (Orekhova 2021). This article is organised into four sections covering theoretical review, conceptual review, research methodology (questionnaire development, actual answering of EAA questions, stability diagnostic tests, variable normality test and linear regression) and finally conclusion and recommendations, with future remarks peppered with a possible variety of future research opportunities.

Theoretical review: Theory of Planned Behaviour

In the new global economy, Fishbein and Ajzen developed the Theory of Planned Behaviour (TPB) in 1967 for determining organisational behaviour and human decision processes towards the adoption of technology (Fishbein, 1967; Ajzen, 1991). Theory of planned behaviour is regarded as a psychological theory that links beliefs to behavioural patterns of individuals related to a phenomenal subject. Different authors have measured TPB in a variety of ways: (1) Benade and Pretorius (2012) explicate the system architecture and enterprise architecture juxtaposition with high-level business process model of technology-based enterprise that illustrates, managing the enterprise strategically, performing core value chain, performing marketing management, performing technology management and developing new products, processes and technologies. (2) Hackman and Knowlden (2014) confirm that TPB indicates that intent directly predicts behaviour, providing considerable motivation to consider implementation purpose when adopting information technology (IT). (3) A key concern is in line with knowledge management systems (KMSs) and a class of algorithms that includes lattice-based systems for manipulating heterogeneous information sources (Andrade et al. 2003). Nonetheless, it needs to be determined whether SMEs might be able to exercise three user determinants on TPB, namely, effort expectancy, social impact and facilitation conditions, to engage in EAA adoption for SCM (Hazen et al. 2014). Theory of planned behaviour makes employee engagement suggestions based on specific behaviour patterns, merit and times (Escobar-Rodrguez & Bartual-Sopena 2015). This refers to the definition and evolution of thinking and ideas and a concerted attempt to develop ISCs that could eventually lead to the development of a planned, systematic framework and strategies for EAA deployment (Kelly 2018; Mkansi & Acheampong 2012). Figure 1 depicts the TPB with six components, a single determinant as actual behavioural control, and the objective to encourage SMEs to adopt EAA (Boston University 2019).

FIGURE 1: Theory of planned behaviour.

The adoption of EAA is based on the TPB considering the managerial roles performed within the enterprise (Ferreira, Erasmus & Groenewald 2013; Hellriegel et al. 2012). The behavioural belief intervention resulted in post-intervention changes in attitudes but did not affect intention or behaviour. In this research, the effort expectancy and facilitation conditions are used in the conceptual research model. Nevertheless, the social behavioural aspect is included as the study concentrates on the owner’s physiognomies and incitements (Coulson-Thomas 2012). Information systems are an integrated set of components for gathering, storing and transforming data into a usable format considered as information that could be used for taking rational decision-making (Zwass 2018). Theory of planned behaviour explains three user determinants, namely, effort expectancy, social influence and facilitation conditions, to engage in EAA adoption (Hazen et al. 2014). It emphasises conceptual actual adoption of EAA based on the thorough application of managerial roles, such as planning, organising, leading and controlling (Hellriegel et al. 2012). Tagler (2019) expresses how, in the past, research using TPB was mainly concerned with changing attitudes and subjective norms of employees rather than actual adoption. From an econometric perspective, ISCs could be considered, firstly, by identifying fundamental relationships when a dependent variable and its effect give rise to additional outcome of interest. We begin by clarifying the identification challenge (Dippel et al. 2018). The extended TPB model includes interpersonal and situational variables that may have an influence on the attitude towards intention to use for SCM in SMEs (Hackman & Knowlden 2014). The theory includes behavioural achievement that relies on motivation and ability, which are differentiated with three beliefs, namely, behavioural, normative and control for internal and external systems used in SCM. This shows a need to understand the motivational aspects of the owners’ characteristics. Theory of planned behaviour was generated using the same method that was detailed for the adoption of EAA, where attitudes, behavioural intention, subjective norms, social norms, perceived power and perceived behaviour were scrutinised. In the 1990s, firms adopted networking standards and software tools that could integrate disparate networks and applications for better enterprise-wide and competent infrastructure (Mkansi & Acheampong 2012). This theme came up, for example, in the discussions of database management as a prerequisite for the actual adoption of EAA (Ardley, Moss & Taylor 2016). Ownership on ISCs is crucial for enhancing SMEs’ privacy and information confidentiality (Accenture 2012; Sjögrén, Flainen & Syrjä 2017). It would be expedient for SMEs to develop a structure that involves testing different components and interactions which exonerate the adoption of EAA for SCM (Weber, Geneste & Connell 2015).

Small and medium enterprises attempt to design or develop EAA that accommodates flexible enterprise interchange in line with technological adoption (Prasanna et al. 2017). However, no attempt was made to quantify the association between TPB and ISCs in such a way that none of the internal or external users will be affected, thus leading to SCM destructions. Information systems include the transaction support system (TSS), management information systems (MISs), decision support systems (DSSs), executive support systems (ESSs), data warehousing, data mining and KMSs (Sharma 2018). With successive increases within the intensity of the TPB, the adoption of EAA moved further to the extensive application denoted as thus; (a) attitude and subjective norm that account more for the variance in individuals’ desires than intentions or self-predictions, and in some instances intentions and self-predictions were absolute predictors of behaviour (Armitage & Conner, 2001). (b) A piece of precise information on employees’ perspectives hoped to accumulate more specific confirmation on the adoption of EAA, which may be accustomised prepare the intervention within the pre-post processes (Ajzen & Fishbein, 2005). This information may be accustomed develop targeted interventions geared toward easing employees’ attitudes and behaviours, and cognitive dissonances towards adopting EAA.

Evolution on the adoption of enterprise application architecture

The past decade has seen the rapid development of IT in many business organisations, industries and corporations around the globe. Representation on an extensive range of sources includes the number of authors that set out the different ways in which the evolution took place in various dimensions that includes; (a) evolution of punch cards in1880 to computer-tabulating-recording in 1911. (b) Information systems were first introduced in the 1960s to deal with accounting management issues (Mwendwa, 2017), emergence of management information systems (MIS) in 1940s and 1950s, MIS Developing beyond Accounting between 1970 and 1990 Weedmark (2019). Furthermore, Weedmark (2019) indicates the five Eras of MIS; (a) First Era (mid-1960s to mid-1970s focused on governance and needs of the management. (b) Second Era (mid-1970s to mid-1980s) focused on personal computers (PCs), minicomputers and mid-range computers (c) Third Era (mid-1980s to late 1990s) focused on centralisation and decentralisation of information (d) Fourth Era (late 1990s to today) focused on social media, search engines and ubiquitous computing. (e) Fifth Era (today forward) that focused on diverse information platforms that includes cloud computing. If the debate is to move forward, a better understanding of EAA for SCM activities in SMEs needs to be developed.

Systematic literature review

A systematic literature review serves to review the literature in order to determine or test the research hypothesis by answering structured and specific research questions (Danson & Arshad 2015; Onwuegbuzie & Frels 2016). The researcher whilst conducting a postgraduate dissertation study from 2018 to 2020 at the University of Limpopo conducted an efficient literature review of revisions that have sparked interest in ISCs. Information systems were the focus of a study by Wessels et al. (2005) in which the authors found that the existing ISCs can be efficient based on user requirements for all users from top, middle and bottom levels with relevant information. The types of ISCs discussed in the coming sections are incorporated with TRA. The TPB is a psychological theory that links beliefs to behaviour and asserts that three core components, namely, attitude, subjective norms and perceived behavioural control, together shape an individual’s behavioural intentions.

Transaction support systems

Transaction support systems are a type of data processing that breaks down work into discrete, indivisible operations called transactions. Naini, (2022) defines TSSs as an information processing system that captures and processes every single transaction that takes place within the enterprise that including multiple activities such as; collecting, retrieving, modifying, and all other sets of activities that trigger the retrieval of all transactions for a reliable, consistent, and efficient results. The TPB models the relationship between these two contingent online behaviours and their respective intentions, invoking consumer behaviour theories and implementation intention theory, respectively, and identifies a comprehensive set of salient beliefs for each behaviour. Information systems include the TSS, MISs, DSSs, ESSs, data warehousing, data mining and KMSs (Sharma 2018). Other researchers (Ajzen & Fishbein 2005; Armitage & Conner 2001) have extensively discussed TPBs as follows:

  1. Behavioural control: The behavioural control indicates a key piece of the sound philosophy on TPB that involves recognising an individual’s ability to respond to EAA adoption in a variety of ways without independence, with room for error and with less oversight. A consequence of this is that TPB may have a significant impact on employees’ behavioural control in essence for decision-making towards the adoption of integrated IT, with reference to EAA.

  2. Attitude towards the behaviour: Attitudes are important in human behaviour because they can be a subjective norm intended to motivate others to respond positively to the introduction of EAA. In this case, attitude towards a behaviour detects whether performance will produce positive or negative results, in this case for the adoption of EAA. Similarly, Kebba (1994) suggests that the expectancy theory, first proposed by Victor Vroom at the Yale School of Management, suggests that behaviour is motivated by anticipated outcomes or consequences. The analysis of TPB undertaken here has extended the knowledge of attitudes towards the behavioural pattern for employees as triggered by fear of change and unknown within certain parameters.

  3. Normative beliefs: When confronted with individual perceptions of social normative pressures or the beliefs of relevant others, ISCs are becoming increasingly important as the first component to adopting EAA-applied IT. Furthermore, normative beliefs are individuals’ beliefs about the extent to which important people in their lives believe they should or should not perform certain comportments. In general, therefore, it seems that normative beliefs are subjective probability that a given referent encourages performance of the behaviour, just like in hostile SME environment that failed to engage the employees, with low flexibility for integrating new application systems to existing hardware and poor service mindset.

  4. Control beliefs: The concept of locus of control is central to the entire IT discipline, indicating the individual’s opinions on any subject phenomenon in the presence of factors that may hinder performance in SCM in relation to their behavior in relation to the adoption of EAA. A greater feasibility study could neutralise the presence of factors that may facilitate or impede performance of the behaviour and making TPB more efficient in weakening the misconceptions that might contributes towards the perceived behavioral control along with perceived power.

  5. Perceived behavioural control: Perceived behavioural control has traditionally held the belief that an individual’s perceived ease or difficulty in performing a particular perceived behavioural control is conceptually related to self-efficacy and determined by the totality of accessible control beliefs towards ISCs within the organisation. The perception of the difficulty of enacting a behaviour is defined as perceived behavioural control. The critical difference between TPB and reasoned action is perceived behavioural control. An implication based on perceived behavioural control is that both ISCs and TPB should be taken into account when establishing the adoption of EAA.

  6. Behavioural intention: The behavioural intention towards the adoption of EAA could be perceived as an issue revolving ISCs that has received a considerable amount of critical attention. Theory of planned behaviour can also actually assist in assessing the behavioural intentions of practitioners who have a strong intention to implement EAA. This refers to the influencing entrepreneurial a specific behaviour; the stronger the intention to perform the behaviour, the more likely the behaviour will be performed. On the upper hand, subjective norms indicate the belief that perhaps the majority of the people approve behaving in a certain way. A key strategy should include TPB in all facets; priority should therefore be to plan for the long-term care of IT innovation strategy that could assist in embracing the intentions of employees towards the adoption of EAA.

  7. Behaviour: Behaviour is a key psychological reaction interpreted in actions that are acceptable or unacceptable based on certain merits that are guided by ethical conduct for the business organisation. The TPB model, which understands the assumption of EAA in relation to individual behaviour and modifies their interventions in a positive direction, is one of the most important current discussions in SCM and moral attitude (Ajzen & Fishbein 2005). Theory of planned behaviour proposes that an individual’s prospect of engaging in a healthy behavioural pattern is correlated with the strength of his or her intention to engage in the behaviour. A reasonable methodology to tackle this issue could be to apply psychological perspectives on technology that would shape an employee’s thoughts and feelings on cyberphobia (fear of using Internet) and to some extent even mechanophobia (fear of operating machinery). In the last decade, the Fourth Industrial Revolution has been developing rapidly in many countries, in which TSS is used to collect and process detailed information needed to update data on the fundamentals of SCM activities in companies (Zandbergen 2018a). The TSS oversees business operations and incorporates operational and financial management cycles (Chen et al. 2014). Notable examples in TSSs are accountants and auditors who know what and how these transactions are recorded and processed in order to obtain meaningful information. All of these events are called transactions and require a transaction processing system. Tracking of items such as collection, processing, storage, reporting, source documents, journals and registers, ledger and file summaries and printing is part of the TSSs.

The basic operations of SMEs are linked to transaction processing systems that capture and process the detailed information needed to update the data and create detailed information (Zandbergen 2018b). Taken together, these literature reviews suggest that it would be advisable for SMEs to have systems that can easily manage both in order to effectively implement the EAA for SCM. For successful TSS, data must be systematically processed and analysed with algorithms (Smallcombe 2020). After the conformational analysis of TSSs, it is deemed necessary to consider two methods, batch and online processing for all transactions that need to be prepared before actual processing (Adams 2021). TSS can be classified in terms of three main purposes: to maintain accounts across the enterprise, update transactions in a timely manner and generate meaningful results in SCM (Smallcombe 2021). The debate over TSS has taken on new meaning as many argue that it has the ability to control, manage and monitor multiple transactions to determine which has higher priority than the other and gain credibility as a dimensional standard true (Sam 2021). A much more systematic approach would identify how TSSs interact with other variables thought to be related to the successful adoption of EAA for SCM.

Management information systems

Management information systems are an ISC used for decision-making and for the coordination, control, analysis and visualisation of information in an organisation. It incorporates people, processes and technology into an organisational context. Theory of planned behaviour in relation to the use of the MISs is also influenced by behavioural control and perceptions of user behaviour when using the system. Several studies thus far have linked with MIS as a set of systems and algorithms that collect and transmit data from a range of sources that compile information and present it in a readable format for SCM activities (Hamlett 2018; Ingram 2018; Ray 2015). For the primary use of the term MISs to explore different systems use transactional algorithms that have been integrated into advanced and commercially viable organisations (Walport & Rothwell, 2013; Hamlett, 2018). Management information system is considered to be a master’s degree in information management that includes both architect experts and software developers (Portugal 2016). In their article published in 2014, entitled, ‘Performance Expectancy and Use of Enterprise Architecture: Training as an Intervention’, Lee and Rhim (2014) proposed that a greater degree of training within the enterprises will enhance the adoption of EAA. They further suggested that service response time measures how quickly MISs respond to errors that occur in the communication lines, mainframe computers and software programs (Lee & Rhim 2014). The history of modern MISs parallels the evolution of computer hardware and software (Boykin 2017). With the parallel conversion, the current and the new systems are operated together for some time. At some point the current system will be completely decommissioned and all users and participants will only interact with the new system.

Karim (2011) identifies several benefits that MISs have for SCM, some of which include leveraging intellectual capital, supporting tactical planning, maintaining competitive advantage and then improving the decision-making process. By supporting strategic planning and improving the decision-making process, leveraging MIS data leads to improved use of internal and external information (Porteous 2014; Segal 2018). Based on this, it is important that for the practical adoption of the EAA, some elements of MIS, such as computer hardware, computer software, telecommunications, databases, data warehouses, and people and processes, matter the most (Gregersen 2021). The present study confirms previous findings and provides additional evidence suggesting that MISs should be advocated for the adoption of EAA for SCM.

Information Systems Governance

Information Systems Governance (ISG) can be defined as a set of rules that enable executives and stakeholders to determine how they will make decisions about the management of ISCs. The TPB roughly clarifies compliance and violations of information security policies, as well as other behaviours. Information Systems Governance plays an important role in constructing a formidable EAA for SCM in SMEs. Lindros (2017) used the term ‘ISCs’ with reference to a formal framework that provides a structure for organisations to ensure that IT investment supports business objectives, in a classic process for the adoption of EAA. Information Systems Governances entail the specification of decision rights and an accountability framework to ensure appropriate behaviour in the valuation, creation, storage, use, archiving and deletion of information. One criticism by much of the literature on ISG is that it includes the processes, roles and policies, standards and metrics that ensure the effective and efficient use of information in enabling an organisation to achieve its goals (Schulz & Dankert 2016; Smallwood 2014). In some instances, ISG relates to decision-making authority, enterprise capabilities, structures, processes and relational mechanisms that result in an alignment between business and IT (Mohamed, Kaur & Singh 2012).

Information Systems Governance exposed SMEs that operate without correct measures in Internet security governance to theft of information, hacking and unauthorised users based on the complexity theory on information ISG (Grant 2011; Mishra 2015). Information Systems Governance strengthens the strategic aspects of IT risk and compliance as well as to have proper information governance (Hagmann 2013; Segal 2018). One feature of SMEs is that they are less likely to have formalised governance and management arrangements than larger firms (Gao & Hafsi 2015; Prasanna et al. 2017). The complexity of data storage, sharing, analysis and application integration reflects several challenges for any governance platform in SMEs (Little 2010; Truong & Dustdar 2012). Information Systems Governance can provide guidance and assurance to SMEs in terms of information security and enterprise modelling for SCM (Massana 2020). In general, it seems that an appropriate ISG could assist the SMEs in securing their classified information and confidential documents without any computer security bridge by using biometric technology and cloud computing.

Decision support systems

Decision support system is a computerised program used to support determinations, judgements and procedures in an organisation or business. The accuracy of the TPB game comes from the addition of perceived behavioural control, which takes into account whether a person truly believes they are in control of the behaviour they choose to perform. Decision support systems are increasing, recognised as a major concern in the adoption of EAA. In IT, DSSs can be demarcated as a computer program application that analyses enterprise data into accurate information presented to tactical managers for rational decision-making (Rouse, 2018; Sharma, 2015). Moreover, DSS helps managers to make sound decisions, encrypted in EAA (Beal 2018b). Enterprise application architecture uses different mechanisms such as spatial analyses and map-based output compared with the existing types of ISCs (Sewdass 2012; Sun 2011). Decision support system challenges include high cost of mechanisation, equipment and machinery break down, poor working conditions, ineffective procedures and forms, and disorganised file systems with resultant poor control (Ferreira et al. 2013; Karim 2011). In some occurrences, SMEs encounter conceptualising the essential components when addressing the needs of different departmental or cross-functional activities (Prasanna et al. 2017). Decision support systems incorporate retrieval components that seek to identify related instructions or operational functions that match user specifications (Gretzel, Hwang & Fesenmaier 2012). To date, this method has only been applied to ease different algorithms involved in DSSs and EAA incorporated for SCM (Ray 2015; Walport & Rothwell 2013). Each has its advantages and drawbacks as the DSSs have the capability of outlining or projecting information graphically with the inclusion of an expert system. In developed industries, models could also be used over a planned SCM to represent and explore new systems such as EAA (Rouse 2018).

Decision support systems are also part of MIS for the provision of detailed reports of activities as it also functions well as Management by Objectives tools (Hamlett 2018). As a well-structured and designed model, DSS provides the ability to create, maintain and manipulate statistical and mathematical models by using a capabilities encrypted in modelling packages (Sharma 2015). Enterprise application architecture requires additional systems to support internal arrangements for SCM (Montilva, Barrios & Besembel 2014; Ramlee & Berma 2013). Decision support systems are designed to help managers come up with solutions to problems on the basis of a database or knowledge base (Kruckhans 2020). Notwithstanding some confines, for simplicity for the adoption of EAA, it is encouraged that DSSs should be simplified throughout the managerial levels within the SMEs.

Executive support systems

Executive support systems are computerised systems that provide top managers with easy access to internal and external information relevant to strategic decision-making and other managerial tasks. A TPB indicates strong support for a decision-making process based on attitudes about perceived positive and negative impacts on SMEs, subjective norms about social expectations and perceived control over resources to overcome barriers related to EAA implementation. Executive support systems have traditionally believed that the EAA was designed to inject data about peripheral users, such as current tax regulations or competitors, but they also pull aggregated information from internal MIS and DSS (Free Essays 2018). The term ‘ESS’ refers to instances where companies employ specialised information technologies to provide accurate and timely data to senior management. Executive support systems are designed not only for senior management to make strategic decisions that would increase the company’s long-term success but also for middle management (McLaughlin 2016; Power 2008b). The concept of ESSs originated in four scientific domains (Cano 2020) and provides timely information with short response time and fast retrieval, resulting in accurate information through communication channels, office automation, analytical support and intelligence. By instilling pride in their work, kaizen aims to empower employees, increase employee satisfaction and encourage a sense of accomplishment. It is easy to see why kaizen is so difficult to implement, especially in non-Japanese companies, when many publications fail to portray the culture of kaizen effectively (Kamola 2019). According to some experts, the ESS concept is based on the kaizen philosophy, which consists of eight principles (Kos 2020):

  1. Discard conventional fixed ideas: This includes the mapping and structuring of the company’s knowledge resources in a grid by considering two filters for structured and unstructured structure configurations (Postolache 2019). In addition to mapping and structuring the knowledge resources, disseminating knowledge within SMEs, contextualising knowledge and discovering new knowledge, there is much more than technology to implement previous knowledge sharing policies and motivate employees.

  2. Detect the elements of failure: This includes technology consultations on variation governance to avoid technological nonsense from everywhere by considering the best architectures to align a perfect EAA for SMEs (Andriole 2020). The existing accounts do not resolve the contradiction between the ISCs and the adoption of the EAA.

  3. Failure justifications: Past experience helps apply the opposite principle, to do it yourself with robotic drowning and predictions, which are essential to eradicating entrepreneurial failure (Regalado 2018). Another delinquent with this approach is that if the SMEs do not take the ISCs into account, adopting the EAA becomes difficult.

  4. Error corrections on a spontaneous effect: This is common in TSSs where electronic funds are paid to the wrong suppliers and creditors (Eckler & Bolls 2011; Elworthy 2020). In this analysis, there are several sources that lead to errors. The main mistake is that SMEs fix system errors related to the EAA.

  5. Strive for perfection: Kaizen is a competitive strategy in which all employees work together to create a strong culture of continuous improvement, with little room for improvement at margin of error (Kos 2020). The model involves identifying opportunities in the process flow, planning how the current process can be improved, executing changes and reviewing how the adoption of EAA works for the entire SCM team. After completing the ISCs, the process of model specification and parameter estimation needs to be performed.

  6. Marginalise cost on the adoption of EAA: This includes Pareto principle that indicate 80% for production output versus 20% for production input in SCM with correct modus operandi that strives to marginalise cost, renewal or transformation of technology (Laoyan, 2021). Enterprise application architecture adoption might be better if not covering all other users (Goldenberg & Dyson 2018). There are two basic approaches currently used in adopting EAA. One is the multicloud approach used in cloud computing and the other is the traditional monolithic approach housed within the enterprise systems.

  7. Hardships trigger stimulus for wisdom: The common ISCs such as; computer hardware, computer software, telecommunications, database and data warehousing, human resources and procedures for collecting data and transforming it into a final output (Gregersen, 2022). Therefore, the operating resource and management challenges could be avoided by incorporating SCM ideas all enterprise specialty with realistic models that lower the level of assumptions and explore different channels to acquire wisdom rather than relying on one source (Hałabuda, 2020; Seghafi, 2021). Debate continues about the best strategies for the management of hardships through outsourcing challenging aspects that need the attention of Architect expert knowledge.

  8. Five-why method: The five-why method is know as the Ishikawa (fishbone) used for answering 5 why questions (Chai, 2022). This provide an overview on five questions, which could help identify the cause-effect of the problem or failure affecting SCM that requires a technical expectation to solve the problem. A number of limitations need to be noted regarding the present phenomena, covering the following “five why questions”. First: Why did the ISCs fail to maintain the algorithms in the adoption of EAA as planned? Probable answer: There was poor development and assembling of EAA. Second: Why were the SCM functions such as purchasing, operations, logistics, resource management, and information workflow was miscalculated? Probable answer: Advanced planning and scheduling (APS) software can help synchronise these five functions by providing systematic comprehensions of your manufacturing operations. Third: Was the EAA well configured for SCM? Probable answer: A bogus IT service provider was procured. Fourth: Why was a bogus IT service provider was procured? Probable answer: Corruption perpetuated the cheaper and bogus IT service provider. Fifth: Why was a cheap and bogus was awarded the deal? Probable answer: Procurement and purchasing processes were manipulated. Seiter (2018) supported the notion, writing that the benefit of using the fishbone is that hidden characteristics can be freely exposed through integrative algorithms with less bridging and manipulations.

Examining ISs infusion from a user commitment perspective, including IT infusion and end-users (Kim, Chan & Gupta, 2016; McLaughlin, 2016). ESSs are utilised in formulating, structuring, and facilitating all managerial tasks, particularly in SCM (Watson & Rainer, 1991; Nimsaj, 2016). ESSs focal point on operational activities, accumulating information from internal and exterior sources, and helping top administration with essential information for decision-making (Jennifer, 2017). As a comprehensive exercise, ESS goes beyond organisation facts structures by encompassing communications, office automation, analytics support, intelligence, flexibility, and ease of use that furnish timely data (Massana, 2020). After discussing how ESSs are constructed, the last area of this paper addresses how architect professionals have interaction with the executive crew and business strategists, as technological specialists. What one may take a look at is how comprehensible all of this is for non-technology leaders (Andriole, 2020). Executive Assistants provide high-level administrative aid to executives in a business enterprise or corporation.ww

However, executive systems perform duties that may additionally have an effect on a company’s success or profitability, such as: helping with market research, coaching staff, and scheduling important meetings (Kruckhans, 2020). Yeaman (2001), shares insights about postmodern and Poststructural theory on six aspects:

Authorisation in the progress-one moment - If an architect specialist asks questions about the EAA goals within the SMEs. Ultimately, Several questions will be answered at present, that includes; efficiency, competitive edge, remote work challenges, robust workflows, and positions for future growth (Rawal, 2021; Linton, 2022; Villanueva, 2022).

Toward an Anthropology of SMEs and the rules of understanding - They exist as relationships that are coherent to academic systems improvement for a positive IT adoption such as EAA. Applying academic communications and science in line with EAA adoption helps to improve the psychological perspectives and approaches based on SMEs.

Postmodern and Poststructural theory as criticism - Critical theorising in the perceptions’ of employees is a distinct method of accessing the intellectual vitality versus academic achievement in line with technological know-how within SMEs. The well worth of capital formation depends exactly on their academic achievements that could shape the adoption of EAA within SMEs for SCM. SMEs searching for apprehending postmodern and Poststructural machine that includes better learning strategies that are beyond individual-level.

Understanding the Postmodern - Modernism is trust in science of technology, and rationalisation of productive things to do for the virtuous of IT as a generic concept leading to distinct branches. This leads to modem descriptions of SMEs in terms of SCM challenges such as demand forecasting, digital transformation, material scarcity, etc…

The foundation of following post-structural studying was once employed based totally on the following; defining the phenomenon underneath study as a relation between SCM, SMEs and genuine adoption of EAA. Constructed and grouped variables with possible variations between these three relationships. Five discrete reasons emerged from this:

Firstly, automation and systematisation of workflows and processes: IT systems are key to delivering the information and intelligence needed by SMEs to improve innovation with the adoption of EAA. In developed economies, successful enterprises use application software for streamlining complex workflows and algorithms.

Secondly, information security: By investing in data storage systems and secure communication networks, EAA could give employees access to the information they require in SCM, such as data analytics to help predict and anticipate customer demand, process simplifications and structural savings.

Thirdly, cost reduction and time management: Cost marginalisation remains a priority for organisations in every sector of the economy. IT systems can reduce SMEs’ costs by automating business processes so that your employees can work more efficiently. Proper time management is one way to ensure that every internal stakeholder gets the most out of their daily routines.

Fourth, investing in IT systems and tools: Improving collaboration could assist in achieving ultimate growth and productivity targets. Latest productivity tools and applications are used to settle for better operational work efficiency.

Fifth, customer service and communication: A detailed and meticulous data warehousing create a complete database of all customer interactions that include purchasing, inquiries, complaints and service requests, providing customer service and information needed to respond just in time and efficiently to customer calls. A central repository for processes, such as data mining, allows end-users to share and manage information with high-security verification and validation.

Knowledge management systems

Knowledge management systems are a subset of organisation content material management software that includes a suite of software programme that specialises in the way data are collected, stored and/or retrieved. Jointly determined by way of knowledge sharing intent and perceived behavioural control, the TPB tasks the subjective norm around understanding sharing for profitable EAA adoption. In the history of the Fourth Industrial Revolution, KMSs are used to be considered a key factor in the introduction of EAA. The extensive use of the term KMSs is sometimes equated with applications designed to seize all information within the agency and make it without difficulty accessible to employees anytime, anywhere (Asif, Braytee & Hussain 2017; Birkett 2018). In other words, KMSs are a repository software system for safeguarding information. Most KMSs supply an ‘information hub’ where content can be created, organised and redistributed via search equipment and different points that let users discover answers shortly (Smith 2013). Knowledge management system supports the selection needs of senior executives (Zandbergen 2018b). Some of the tangible benefits of the usage of KMSs encompass accelerated distribution of knowledge, higher data accuracy and consistency, improved worker satisfaction, less time spent looking for solutions, getting new personnel quicker on-board and retention of knowledge when the user is logged off from the machine (Smith 2013). It uses distinctive software programme modules served through a central user interface, with personnel education and orientation through the provision or sharing of electronic archives (Birkett 2018).

However, in some instances, KMSs play a necessary role in the adoption of EAA, wherein it requires some stage of expertise, techniques, technologies and tools for SCM guide (Andrade et al. 2003). Classic examples of KMS encompass cross-training programmes, document administration systems, content management systems, social networking tools and chatbots (Greene 2021). Varieties of strategies are used to assess KMSs through SMEs, where each has its very own blessings and drawbacks (Becky 2017; Birkett 2018). Small and medium enterprises ought to plan an expertise administration application that brings necessary adjustments to utilise the available know-how correctly in terms of scalability across the technology and employees (Greene 2021; Postolache 2019). Conduct surveys and gauge metrics that furnish a unique description of end-user ride in creating, sharing and eating expertise (Raza 2020; Seghafi 2021; Smith 2013).

Knowledge management systems can also be divided into four main classes: factual knowledge (measurable, observable and verifiable data), conceptual knowledge (relates to views and systems), expectation knowledge (knowledge rooted in expectations, hypotheses or judgements) and methodological knowledge (deals with decision-making and problem-solving). Becky (2017) discusses the challenges and strategies for using KMS which consist of growing a lifestyle of flexibility and collaboration, security, measuring knowledge, identifying an expert, document storage and management, disseminating knowledge in the course of an organisation, chronic improvement and figuring out where KMSs is in-housed. The proof introduced in this section suggests that KMSs could be used through SMEs to seize all customer and supplier facts through an ‘information hub’ where the content material can be created, organised and redistributed through search equipment and different elements that provide customers with agility.

Web application architecture

Recent traits in the subject of IT have led to a renewed interest in web application architecture (WAA) for the development of SMEs in adopting EAA, especially in SCM. Web application architecture is a blueprint of concurrent interactions between components, databases, middleware systems, user interfaces and servers in an application. It can additionally be described as the diagram that logically defines the connection between the server and client side for a higher web experience. The TPB states that by means of applying the relative mannequin to study competing products, exclusive dimensions and strengths can be captured to differentiate the effect on the preference of the choice introduction of EAA. There has been a wide variety of longitudinal randomised experiments. There have been a series of randomised longitudinal experiments that keep away from typical crashes, promote simplicity, agility and automation and facilitate compatibility with different software and hardware structures that contain WAA that had been suggested when EAA was introduced. One of the most good-sized cutting-edge discussions in IT and WAA in philosophy is to promote code quality, scalability, reliability performance and openness. Web application architecture refers to the operations of SCM activities, and EAA refers to the complete gadget that describes components of web applications, connections, relations and dependencies between them.

It further describes how back-end and front-end elements are organised, how they disseminate facts from inside and to exterior users and how they scale and construct a unified software product (Popovych 2021). In 2019, Mitchell validated that the substitute of manual information collaboration with the Fourth Industrial Revolution led to industrialised corporations that adopted networking standards and software equipment for well-suited enterprise-wide infrastructure (Mitchell 2019). Without network standards, it would be difficult, if not impossible, to develop networks that only share information in SMEs with other external users. For WAA to be accomplished, Internet and network connectivity are collective necessities used in collaboration with routers, optic fibres, switches and gateways linked together with computers, printers, machinery and equipment to produce digital information (Habraken 2001). The controversy over scientific evidence for components of ISCs has raged in the developed world of technology for over a century. The causes of ISCs have been the subject of intense debates within the scientific community, putting pressure on both existing and emerging SMEs. Models of web architecture components cover forecasted activities, implementation for algorithms, service arrangements, data storage and specification for data requirement (Deremuk 2021). Web application architecture facilitates the connection and interactions that include multiple components such as database and middleware so that numerous applications can function together with each other (Shrestha 2021). The benefits of the novel approach to developing WAA could be discussed under three headings: smooth app performance, high scalability and flexibility, and easy integration of new features and cost-effectiveness to attract the interest of small business owners. The geographic locations in terms of factors might also affect the Internet connectivity creating greater distortions in pathways via signal (Ahmed & Kawser 2021).

The SME infrastructure also requires software to link disparate applications and enable data to flow freely amongst different parts of the business. Information systems manufacturing techniques allow the development of advanced SCM (Ellis 2017; Michael & Mike 2014; Tamrin, Norman & Hamid 2017). As a result of EAA adoption, it appears that WAA alone is not the causative factor of SCM, resulting in a monolithic three-tier model that includes microservice architecture, cloud architecture and event-driven architecture. Based on architectural designs for SMEs the possibility to make decisions on the adoption of EAA depends solemnly on the value of their disposable income. Internet-related advice and increasing productivity across SMEs might depend on the type of Internet (Duffy 2017; Kim et al. 2016). Despite its exploratory nature, this study provides insights into the adoption of EAA, where WAA requires a reasonable Internet connection that could facilitate communication for both internal and external users.

Research strategy

Research approach

A quantitative methodology was considered for the study. A stratified random sample of SMEs, comprising owners and managers, was recruited from Polokwane Municipality, covering Blouberg Municipality (Bochum), Molemole Municipality (Dendron), Polokwane Municipality and Lepelle-Nkumpi Municipality (Lebowakgomo). By the end of the survey period, data had been collected from 310 SMEs who were considered as business owners and managers. A door-to-door data collection was done. The methodology was grouped into several divisions: questionnaire development (a pilot study was conducted to strengthen the feasibility for the questionnaire) and stability diagnostic tests (which included normal distribution, together with Cronbach’s alpha for data reliability).

During the distribution of the questionnaire, the researcher was clear that the respondents should be either the SME owner or the manager in order for the reliability, and 330 questionnaires were distributed, of which 12 were not returned and 8 were not completed. The results were then interpreted using 310 questionnaires.

Figure 2, indicates the initial sample size at 330, of which 12 were not returned, whereas the other 8 were not adequately completed. As such only 310 were processed for the results.

FIGURE 2: Sample size.

During the distribution of the questionnaire, the researcher was clear that the respondents should be either the SME owner or the manager in order for the reliability, and a 330 questionnaires were distributed, of which twelve were not returned and eight were not completed. The results were then interpreted using three hundred and ten questionnaires.

Stability diagnostic tests

Normal distribution on information systems components

The current statistical analysis on the ISCs might contribute positive remarks for further statistical examination on the linear regression model for utmost results on the actual adoption of EAA for SCM in SMEs. As indicated in Figure 3, the sample distribution for ISC components produced a distribution curve with a µ of 0.240 and σ of 3.761.

FIGURE 3: Normal distribution indicates an asymmetric distribution with acquiescent tails with a small number of outliers. The mean, median and mode are all equivalent at 24.06; σ = 3.761; N = 310.

Information systems produced a negative skewness at −0.595 and kurtosis at −0.035. A normal random number for distribution is processed. The standard normal distribution has a kurtosis of zero, indicating a ‘peaked’ distribution, and positive skewness ‘reflects the probability distribution with the high level of concentration on the right side’. The kurtosis figure should be near 0 and the figure of +0.035 indicates that it is a normal distribution, which is slightly peaking and slightly skewed to the left. The distribution is asymmetric as µ is 0.240 and the median is 0.290.

Research findings

Pearson correlations on information systems and actual adoption of enterprise application architecture

Table 1 demonstrates the results on correlations between ISCs and actual adoption of EAA. The p-value is near zero at ‘˂ 0.001’, with the required value set at 0.05. The statistical technique analysis of variance (ANOVA) is used to test the hypotheses between the dependent variable, namely, actual adoption of EAA, and independent variable, namely, ISC components.

TABLE 1: Pearson Correlations.

Pearson’s correlation coefficient is 0.260, thus indicating that there is a positive relationship between ISCs and the actual adoption of EAA. The findings on association suggest that, in general, there is a positive relationship between ISCs and actual adoption of EAA bearing the change of the sign in mind.

Analysis of variance on information systems and actual adoption of enterprise application architecture

Table 2 ANOVA results attained for scores on ISCs and actual adoption of EAA. The independent variable is regarded as ISCs and the dependent variable is considered as the actual adoption of EAA.

TABLE 2: ANOVA.†

General F-statistic is significant (F = 22.256, p ˂ 0.001), thus signifying that, overall, the model accounts for a significant proportion of the variation in the adoption of EAA for SCM in SMEs. As the exact significance level is 001 ˂ α at 0.05, the results are statistically significant. The alternative sub-Ha3 that ‘ISCs affect the adoption of EAA for SCM in SMEs’ is accepted, whilst the sub-H03 that ‘ISCs does not affect the adoption of EAA for SCM in SMEs’ is rejected.

Pearson coefficients on information systems and actual adoption of enterprise application architecture

Table 3 presents the coefficient results for ISCs and the actual adoption of EAA. The t-test is considered for testing as both samples have similar values in the mean.

TABLE 3: Pearson coefficients.

For n conditions where the predicted Ý consists of actual adoption of EAA and ISCs with the score = 18.235 + 0.235*, the t-test shows that the Ý constant a = 0.235 and the Ý constant b = 18.235 are significantly different from zero. The independent t-test could be used to determine the confidence interval of the coefficient, in case the 95% confidence interval for the t-test is [15.029, 4.718].

Linear regression on information systems and actual adoption of enterprise application architecture

Figure 4 summarises different characters on the results for Ӯ = actual adoption of EAA, where a = y-axis intercept, b = + slope and x-axis intercept as ISCs. The R2 value is 0.101 and the variances are being accounted for in this scatter plot from the independent variable, ISCs.

FIGURE 4: Linear regression model on information systems components and actual adoption of EAA slope (+0.24) of good results gives the average variation in the y variable (in this case, actual adoption of EAA) for a variation in the x variable (information systems components) on one unit, where R2 = 0.067.

The data reported here seem to encourage speculation related to a linear regression model: (1) the linearity projecting the relationship between ISCs and the mean of actual acceptability of EAA is linear; (2) homoscedasticity indicates that the variance of the residual is the same for each significance of ISCs; (3) independent projects in the observations that are independent of each other; (4) normality representing a fixed value as ISCs, the actual assumption of linear regression is normally distributed. In linear regression, Y = 18.23 + 0.24*x. The slope of +0.24 brings the same increase in Ӯ. The R2 = 0.067 indicates that the level of variation in the prognostic variable could be described by variation in the independent variables. Moreover, the R2 is converted to r as √0.067 = 0.258, which is ≈ 0.260, as confirmed in Table 1 for Pearson’s correlation coefficients. This endorses that the model is adequate with a positive slope and the model is of a positive fit.

Limitations

Whilst this article delivers much-needed realistic evidence and analysis, the adoption of EAA in SMEs for SCM has some limitations. Firstly, the article relies on primary data collection, which is costly and time-consuming. In some instances, there were increased chances of distortions and high standard deviations, which could jeopardise the reliability of data, which in turn limit the depth of the analysis. Secondly, given the irregular nature of SMEs’ growth, online could be a perfect determent on whether SMEs are using basic technology. Thirdly, no technological SMEs are eliminated in the scope of EAA adoption. Indeed, the results indicated differences according to the particular measurements of ISCs availability (i.e., TSSs, MISs, ISG, DSSs, ESSs, KMSs and WAA), and scholars are encouraged to consider imitations as singular measures. How to advocate for the adoption of EAA might respond to the complexity of challenges that are directly linked with the design, algorithms, and implementations of EAA for SCM in SMEs.

Conclusions and recommendations

This article explored one of the most popular sanctuary concepts for adopting EAA for SCM in SMEs. The development of the introduction of EAA is guided by the theory of TPB (Fishbein 1967). In addition, the conceptual review conducted exploration across TSSs, MISs, ISGs, DSSs, ESSs, KMSs and WAA. According to the researcher, the main determinants for the adoption of EAA will be the concept of dynamic possibilities, infrastructure as a service, platform as a service and software as a service. To summarise the analysis of the results, the assumption of EAA for SCM was performed using a linear regression, testing the dependent variable (actual assumption of EAA) and the independent variable (ISCs). An implication of these results is that both ISCs and the adoption of EAA could be considered when it comes to a successful SCM within SMEs. There is no doubt that the underlying foundation for successful EAA adoption rests on three dimensions: (1) WAA, which defines whether the application meets technical and business requirements; (2) scaling, rebuilding and optimising the product for better performance and security; and (3) architectural design, which requires a thorough understanding of the product and close collaboration between business and engineering departments.

Acknowledgements

The author wishes to thank both the Department of Business Management and the Department of Research Office at the University of Limpopo for funding this study as well as the reviewers of the manuscript draft. Last but not least, the author also thanks all SMEs in Blouberg (Bochum), Molemole (Dendron), Polokwane and Lepelle-Nkumpi (Lebowakgomo) municipalities that participated in the investigation.

Competing interests

The author declares that there are no financial or personal gains that may have improperly influenced him in writing this article, rather for providing insight into SMEs’ adoption of EAA for SCM, developing framework theory and linking with appropriate methods used in research.

Author’s contributions

The manuscript is written solely by the author. The author used a formal structure that included abstract, introduction, literature review, theoretical review, methodology, questionnaire development, stability and diagnostic test. Last but not least, the research findings included Pearson’s correlations, ANOVA, Pearson’s coefficient and linear regression.

Ethical considerations

Turfloop Research Ethics Committee (TREC) registered with the National Health Research Ethics Council approved this research study (clearance no. REC-0310111-031). Prior to the collection of primary data, participants were requested to sign a consent form for their permission, stating that their participation is voluntary and that their feedback will be treated with confidentiality and anonymity

Funding information

This research received a funding publication fee from the University of Limpopo under the Department of Business Management and Research Department.

Data availability

The data that support the findings of this study are available from the author upon on reasonable request (K.X.T.). The data are not publicly available because of restrictions on confidentiality stated in ethical considerations, as the questionnaire contains the personal information of the respondents and that could compromise the privacy of research participants.

Disclaimer

The author accomplished this research article in his personal capacity. The thoughts articulated in this article are the author’s own and do not reflect the views of the Turfloop Research Ethics Committee (TREC) registered with the National Health Research Ethics Council and the University of Limpopo.

References

Accenture, 2012, Biometrics and privacy: A positive match. How organisations can use biometrics technologies and protect individuals’ privacy in the journey to high performance, viewed 22 January 2019, from https://www.google.co.za/search?q=Biometrics+and+privacy:+A+positive+match.+How+Organisations+can+use+biometrics+technologies+and+protect+individuals%E2%80%99+privacy+in+the+journey+to+high+performance.&ei=VzFHXM_aOoOE1fAP2YCq0Ac&start=10&sa=N&ved=0ahUKEwiP4rGF1YHgAhUDQhUIHVmACnoQ8tMDCIQB&biw=1455&bih=667.

Adams, K., 2021, Transaction processing systems, viewed 04 August 2021, from https://www.mbaknol.com/information-systems-management/transaction-processing-systems/

Administrative Divisions of South Africa, 2018, List of municipalities in Limpopo, viewed 15 November 2018, from https://en.wikipedia.org/wiki/List_of_municipalities_in_Limpopo.

Ahmed, Z.N. & Kawser, M.T., 2021, Internet connectivity in building interiors: Architecture and sustainability considerations, viewed 30 July 2021, from https://www.intechopen.com/chapters/74994.

Ajzen, I., 1991, ‘The theory of planned behavior’, Organisational Behavior and Human Decision Processes 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T

Andrade, J., Ares, J., García, R., Rodríguez, A., Silva, A. & Suárez, S., 2003, Knowledge management systems development: A roadmap, viewed 21 September 2021, from https://link.springer.com/chapter/10.1007/978-3-540-45224-9_134.

Andriole, S., 2020, Why no one understands enterprise architecture & why technology abstractions always fail, viewed 30 July 2021, from https://www.forbes.com/sites/steveandriole/2020/09/18/why-no-one-understands-enterprise-architecture--why-technology-abstractions-always-fail/?sh=47691a097eb5.

Ardley, B., Moss, P. & Taylor, N., 2016, ‘Strategies snarks and stories: SMES owner manager perceptions of business advisers’, Journal of Research in Marketing and Entrepreneurship 18(2), 211–231. https://doi.org/10.1108/JRME-07-2015-0037

Asif, Q.G., Braytee, A. & Hussain, F.K., 2017, ‘Adaptive service e-contract information management reference architecture: VINE’, Journal of Information and Knowledge Management Systems 47(3), 395–410. https://doi.org/10.1108/VJIKMS-10-2016-0058

Becky, S., 2017, ‘Knowledge management 101: Knowledge management cycle, processes, strategies, and best practices business owners’ characteristics’, Management Decision 53(8), 1714–1735.

Benade, S.J. & Pretorius, L., 2012, System architecture and enterprise architecture: A juxtaposition?, viewed 24 July 2021, from http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S2224-78902012000200005.

Bessant, J. & Tidd, J., 2013, Managing innovation, viewed 07 April 2022, from https://www.researchgate.net/publication/285052130_Managing_Innovation.

Birkett, A., 2018, Knowledge management systems: The ultimate guide, viewed 21 July 2021, from https://www.hubspot.com/knowledge-management-systems.

Boston University, 2019, The theory of planned behavior, viewed 12 October 2022, from https://sphweb.bumc.bu.edu/otlt/mph-modules/sb/behavioralchangetheories/BehavioralChangeTheories3.html.

Cano, G.G., 2020, What are the functions of executive support system?, viewed 28 July 2021, from https://findanyanswer.com/what-are-the-functions-of-executive-support-system.

Chen, H.C., Sheu, L., O’Sculliavan, P., Cate, O.T. & Teherani, A., 2014, Workplace-based learning: Legitimate workplace roles and activities for early learners, viewed 21 March 2021, from https://onlinelibrary.wiley.com/doi/abs/10.1111/medu.12316.

Coulson-Thomas, C., 2012, ‘Talent management and building high performance organisations’, Industrial and Commercial Training 44(7), 429–436. https://doi.org/10.1108/00197851211268027

Deremuk, I., 2021, Modern web application architecture explained: Components, best practices and more, viewed 30 July 2021, from https://litslink.com/blog/web-application-architecture.

Dippel, C., Gold, R., Heblich, S. & Pinto, R., 2018, Instrumental variables and causal mechanisms: Unpacking the effect of trade on workers and voters, viewed 24 April 2022, from https://www.nber.org/system/files/working_papers/w23209/w23209.pdf.

Duffy, J., 2017, The best productivity apps of 2018, viewed 21 July 2021, from https://www.pcmag.com/article2/0,2817,2395938,00.asp.

Eckler, P. & Bolls, P., 2011, ‘Spreading the virus: Emotional tone of viral advertising and its effect on forwarding intentions and attitudes’, Journal of Interactive Advertising 11(2), 1–11. https://doi.org/10.1080/15252019.2011.10722180

Ellis, C., 2017, The best free software 2017, viewed 21 August 2021, from https://www.techradar.com/news/software/applications/the-best-free-software-for-your-pc-1221029.

Elworthy, E., 2020, How small businesses can manage supply chain disruptions challenges abound, but interruptions may present openings, viewed 19 July 2021, from https://www.thebalancesmb.com/your-small-business-supply-chain-survival-kit-4058575.

Escobar-Rodríguez, T. & Bartual-Sopena, L., 2015, Impact of cultural factors on attitude toward using ERP system in public hospital: Spanish accounting review (Universidad Autónoma del Estado de México), viewed 21 September 2021, from http://www.redalyc.org/html/3597/359741634002/.

Ferreira, E.J., Erasmus, A.W & Groenewald, D., 2013, Administrative management, 3rd edn., Juta Academic, Lansdowne.

Fishbein, M., 1967, ‘A behavior theory approach to the relations between beliefs about an object and the attitude toward the object’, in M. Fishbein (ed.), Readings in attitude theory and measurement, pp. 389–400, John Wiley & Sons, New York, NY.

Free Essays – PhDessay.com., 2018, Business report on executive support systems, viewed 02 August 2021, from https://phdessay.com/business-report-on-executive-support-systems/.

Gao, Y. & Hafsi, T., 2015, R & D spending among Chinese SMEs: The role of business owner’s characteristics, viewed 12 March 2021, from https://www.semanticscholar.org/paper/R-%26-D-spending-among-Chinese-SMEs%3A-the-role-of-Gao-Hafsi/5ee68c1f751f640f51794fdece0b50075c9d8346.

Gibbs, S., Sequeira J. & White M.M., 2007, ‘Social networks and technology adoption in small business’, International Journal of Globalisation and Small Business 2(1), 66–87. https://doi.org/10.1504/IJGSB.2007.014188

Goldenberg, C. & Dyson, D., 2018, Demand flexibility: The key to enabling a low-cost, low-carbon grid, viewed 04 August 2020, from https://www.ee.co.za/article/demand-flexibility-key-enabling-low-cost-low-carbon-grid.html.

Grant, B., 2011, Top 10 ways to expand your customer base, viewed 12 September 2021, from https://www.theglobeandmail.com/report-on-business/small-business/sb-managing/top-10-ways-to-expand-your-customer-base/article4180970/.

Greene, J., 2021, What is knowledge management, and why is it important?, viewed 30 July 2021, from https://www.atspoke.com/blog/knowledge-management/knowledge-management-importance/.

Gregersen, K., 2021, 5 Components of information systems, viewed 01 August 2021, from https://www.britannica.com/list/5-components-of-information-systems.

Gretzel, U., Hwang, Y.H. & Fesenmaier, D.R., 2012, ‘Informing destination recommender systems design and evaluation through quantitative research’, International Journal of Culture, Tourism and Hospitality Research 6(4), 297–315. https://doi.org/10.1108/17506181211265040

Habraken, J., 2001, Informit. Networking hardware: Working with network connectivity, viewed 21 September 2021, from http://www.informit.com/articles/article.aspx?p=131119&seqNum=3.

Hackman, L.C. & Knowlden, A.P., 2014, Theory of reasoned action and theory of planned behavior-based dietary interventions in adolescents and young adults: A systematic review, Dove Press, viewed 06 August 2019, from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4057331/.

Hagmann, J., 2013, ‘Information governance beyond the Buzz’, Journal of Records management 23(3), 228–240. https://doi.org/10.1108/RMJ-04-2013-0008

Hałabuda, P., 2020, Common resource management challenges and how to overcome them, viewed 28 May 2021, from https://teamdeck.io/project-management/resource-management-challenges/.

Hamlett, K., 2018, About management information systems, viewed 24 May 2021, from http://smallbusiness.chron.com/management-information-systems-3957.html.

Hazen, B.T., Kung, L., Cegielski, C.G. & Jones-Farmer, L.A., 2014, ‘Performance expectancy and use of enterprise architecture: Training as an intervention’, Journal of Enterprise Information Management 27(2), 180–196. https://doi.org/10.1108/JEIM-08-2012-0042

Hellriegel, D., Slocum, J.W., Jackson, S.E, Staude, L.L.G., Amos, T., Klopper, H.B. et al., 2012, Management, 4th edn., Oxford University Press Southern Africa (Pty) Ltd, Cape Town.

Hoque, F., 2016, E-enterprise: Business models, architecture, and components: Breakthroughs in application development, 1st edn., viewed 24 July 2018, from https://www.amazon.com/Enterprise-Architecture-Breakthroughs-Application-Development/dp/052177487X.

Ingram, D., 2018, About supply chain management systems, viewed 28 October 2018, from https://smallbusiness.chron.com/supply-chain-management-systems-43344.html.

Jennifer, D., 2017, Executive support systems, viewed 30 July 2021, from https://studymoose.com/executive-support-system-essay.

Karim, A.J., 2011, ‘The significance of management information systems for enhancing strategic and tactical planning’, Journal of Information Systems and Technology Management 8(2), 459–470. https://doi.org/10.4301/S1807-17752011000200011

Kebba, D., 1994, An empirical study of the social correlates of job satisfaction among plant science graduates of a midwestern university: A test of Victor H. Vroom’s (1964) expectancy theory, viewed 27 April 2022, from https://www.proquest.com/openview/928cd226db562d2f4733095e431ca758/1?pq-origsite=gscholar&cbl=18750&diss=y.

Kelly, K., 2018, How to combine word documents & maintain different headers, viewed 19 September 2021, from http://smallbusiness.chron.com/combine-word-documents-maintain-different-headers-54802.html.

Kim, H.W., Chan, H.C. & Gupta, S., 2016, ‘Examining information systems infusion from a user commitment perspective’, Information Technology & People 29(1), 173–199. https://doi.org/10.1108/ITP-09-2014-0197

Kos, B., 2020, Kaizen method and philosophy – Why is constant improvement the winning strategy, blog b, viewed 2 August 2021, from https://www.spica.com/blog/kaizen-method.

Kruckhans, D., 2020, Who uses executive support system?, viewed 30 July 2021, from https://askinglot.com/who-uses-executive-support-system.

Lee, E. & Rhim, H., 2014, ‘An application of conjoint analysis to explore user perceptions on management information systems: A case study’, Journal of Management Research Review 37(1), 69–88. https://doi.org/10.1108/MRR-10-2012-0213

Leedy, P.D. & Ormrod, J.E., 2014, Practical Research, Planning and Design, 10th edn., British Library Cataloguing-in-publication data, United States of America, viewed 13 November 2021, from https://cirt.gcu.edu/research/developmentresources/researchready/quantresearch/sample_meth.

Lindros, K., 2017, What is IT governance? A formal way to align IT & business strategy, viewed 01 August 2021, from https://www.cio.com/article/2438931/governanceit-governance-definition-and-solutions.html.

Linton, I., 2022, Five reasons organizations develop IT systems, viewed 30 April 2022, from https://smallbusiness.chron.com/five-reasons-organizations-develop-systems-23853.html.

Little, L., 2010, ‘Talent management and its technological partners’, Journal of Industrial and Commercial Training 42(7), 389–393. https://doi.org/10.1108/00197851011080360

Mabotja, L.L., 2019, Is South African manufacturing SMMEs ready for the fourth industrial revolution?, viewed 23 July 2021, from https://ideas.repec.org/a/rnd/arjevr/v9y2019i2p20-26.html.

Massana, J., 2020, What are the characteristics of executive information system?, viewed 19 September 2021, from https://www.techopedia.com/definition/1016/executive-information-system-eis

McLaughlin, L., 2016, How to work with executive recruiters, viewed 19 September 2021, from http://www.businessdictionary.com/article/1266/work-executive-recruiters-wsj1604/.

Michael, M. & Mike, P., 2014, Refurbished IBM mainframes, viewed 20 May 2021, from https://simonsys.com/?gclid=EAIaIQobChMI3tuyuIWU2wIVloXVCh1auwPJEAMYASAAEgL05_D_BwE.

Mitchell, B., 2019, What is a Wide Area Network (WAN)? What is a wan and how does it work? Lifewire, viewed 09 August 2019, from https://www.lifewire.com/wide-area-network-816383.

Mkansi, M. & Acheampong, E.A., 2012, ‘Research philosophy debates and classifications: Students’ dilemma’, Journal of Business Research Methods 10(2), 132–140, viewed 28 September 2019, from http://www.ejbrm.com/front/search/index.html.

Monroy, C., 2020, How to develop a competitive advantage through supply chain planning, viewed 19 July 2021, from https://6river.com/competitive-advantage-through-supply-chain-planning/.

Mutukura, T.T., 2020, Key 5 supply chain roles and responsibilities, viewed 19 July 2021, from https://aims.education/supply-chain-roles-and-responsibilities/.

Mwendwa, D., 2017, Information systems infrastructure: Evolution and trends, viewed 11 April 2022, from https://www.linkedin.com/pulse/information-systems-infrastructure-evolution-trends-david-mwendwa/.

Nimsaj, J., 2016, Executive support systems, viewed 24 May 2021, from https://prezi.com/wdnjhpiyinm9/executive-support-system/.

Onwuegbuzie, A.J. & Frels, R., 2016, Seven steps to a comprehensive literature review: A multimodal and cultural approach, Sage, Los Angeles, CA.

Orekhova, K., 2021, Web app architecture: Components, layers, and types, viewed 19 August 2021, from https://www.cleveroad.com/blog/web-application-architecture.

Popovych, A., 2021, Web application architecture: How web apps work, viewed 30 July 2021, from https://clockwise.software/blog/web-application-architecture/.

Porteous, E., 2014, 5 How to improve the perception of procurement, viewed 04 June 2018, from http://www.smartprocurement.co.za/archives/5_hows_to_improve_the_perception_of_procurement.php#sthash.JWzXViXY.dpbs.

Portugal, L., 2016, Information management: Information systems and technologies management, master, viewed 24 May 2021, from https://www.mastersportal.com/studies/43376/information-management-information-systems-and-technologies-management.html.

Postolache, A., 2019, 7 Knowledge management best practices to bring you success in 2019, viewed 30 July 2021, from https://www.quandora.com/7-knowledge-management-best-practices-bring-success-2019/.

Prasanna, R., Yang, L., King, M. & Huggins, T.J., 2017, ‘Information systems architecture for fire emergency response’, Journal of Enterprise Information Management 30(4), 605–624. https://doi.org/10.1108/JEIM-12-2015-0120

Ramlee, S. & Berma, B., 2013, Financing gap in Malaysian small-medium enterprises: A supply-side perspective, viewed 27 January 2019, from http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S222234362013000500012.

Rawal, Y., 2021, 5 reasons why adopting new technology is important for any business, viewed 30 April 2022, from https://medium.com/akeo-tech/5-reasons-why-adopting-new-technology-is-important-for-any-business-b0ac113d4019#:~:text=Adopting%20new%20technologies%20allows%20businesses,wider%20market%20and%20more%20investment.

Ray, S., 2015, Commonly used machine learning algorithms (with Python and R Codes), Analytics Vidhya, viewed 03 August 2019, from https://www.analyticsvidhya.com/blog/2017/09/common-machine-learning-algorithms/.

Raza, M., 2020, Knowledge management: Guidelines and best practices: Service management blog, viewed 30 July 2021, from https://www.bmc.com/blogs/knowledge-management-best-practices/.

Regalado, A., 2018, The biggest technology failures of 2017, viewed 04 August 2021, from https://www.technologyreview.com/s/609626/the-biggest-technology-failures-of-2017.

Rouse, M., 2018, Decision support system (DSS), viewed 19 June 2021, from https://searchcio.techtarget.com/definition/decision-support-system.

Sam, A., 2021, What is the advantage and disadvantage of transaction processing systems?, viewed 04 August 2021, from https://notesread.com/what-is-the-advantage-and-disadvantage-of-transaction-processing-systems/.

Schulz, W. & Dankert, D., 2016, Governance by things’ as a challenge to regulation by law, viewed 05 February 2021, from https://policyreview.info/articles/analysis/governance-things-challenge-regulation-law.

Segal, 2018, Information technology (IT), viewed 24 May 2021, from https://www.investopedia.com/ask/answers/040315/what-difference-between-mis-management-information-system-and-information-technology.asp.

Seghafi, M.R., 2021, Teaching strategies for linking knowledge acquisition and application in the architectural design studio, viewed 07 August 2021, from https://www.emerald.com/insight/content/doi/10.1108/ARCH-01-2020-0005/full/html.

Seiter, 2018, The 5 whys process we use to understand the root of any problem. Blog, viewed 07 September 2021, from https://buffer.com/resources/5-whys-process/.

Sharma, P., 2018, 6 Main components of decision support system (DSS), viewed 25 March 2022, from http://www.yourarticlelibrary.com/management/decision-making-management/6-main-components-of-decision-support-system-dss/70302.

Sharma, S., 2015, Supply chain management, Oxford University Press, New Delhi.

Shrestha, O., 2021, Web application architecture, viewed 30 July 2021, from https://www.c-sharpcorner.com/article/web-application-architecture/.

Sjögrén, H., Flainen, K. & Syrjä, P., 2011, ‘What does the owner-manager want and get out of the business?’, International Journal of Law and Management 53(5), 355–374. https://doi.org/10.1108/17542431111166340

Smallcombe, M., 2020, The 5 types of data processing, viewed 04 August 2021, from https://www.xplenty.com/blog/the-5-types-of-data-processing/.

Smallwood, R., 2014, Defining the differences between information governance, IT governance, & data governance, viewed 04 June 2021, from http://community.aiim.org/blogs/robert-smallwood/2014/08/18/defining-the-differences-between-information-governance-it-governance--data-governance.

Smith, C., 2013, What is a knowledge management system?, viewed 28 May 2021, from http://www.dzonesoftware.com/blog/what-is-knowledge-management.

Thomas, C.L. & Tagler, M.J., 2019, Predicting academic help-seeking intentions using the reasoned action model, viewed 24 April 2022, from https://www.frontiersin.org/articles/10.3389/feduc.2019.00059/full.

Tamrin, S.I., Norman, A.A. & Hamid, S., 2017, ‘Information systems security practices in social software applications: A systematic literature review, Aslib’, Journal of Information Management 69(2), 131–157. https://doi.org/10.1108/AJIM-08-2016-0124

Truong, H.L. & Dustdar, S., 2012, ‘A survey on cloud-based sustainability governance systems’, International Journal of Web Information Systems 8(3), 278–295. https://doi.org/10.1108/17440081211258178

Villanueva, M.S., 2022, 6 Ways technology increases productivity, viewed 30 April 2022, from https://www.itsasap.com/blog/6-ways-technology-increases-productivity#:~:text=Turning%20over%20recurring%20and%20monotonous,tasks%20and%20revenue%2Dgenerating%20activities.

Walport, M. & Rothwell, D.N., 2013, Council for science and technology, viewed 16 June 2021, from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/224953/13-923-age-of-algorithms-letter-to-prime-minister__1_.pdf.

Watson, H.J. & Rainer, Jr, R.K., 1991, A manager’s guide to executive support systems, viewed 24 May 2021, from https://www.sciencedirect.com/science/article/pii/000768139190065.

Weber, P., Geneste, L.A. & Connell, J., 2015, ‘Small business growth: Strategic goals and owner preparedness’, Journal of Business Strategy 36(3), 30–36. https://doi.org/10.1108/JBS-03-2014-0036

Weedmark, D., 2019, The history of management information systems, viewed 11 April 2022, from https://bizfluent.com/about-5444925-history-management-information-systems.html.

Wessels, P.L., Grobbelaar, E., Mc-Gee, A. & Prinsloo, G.T.M., 2005, Information systems in the South African Business Environment, Johannesburg.

Wing, L., 2007, Information systems integration and enterprise application integration (EAI) adoption: A case from financial services, viewed 21 September 2021, from https://eric.ed.gov/?id=EJ832844.

Yeaman, A.R.J., 2001, Postmodern and poststructional theory: Version, viewed 29 April 2022, from http://members.aect.org/edtech/ed1/10/10-05.html.

Zandbergen, J., 2018a, What is computer hardware? Components, definition & examples, viewed 20 May 2021, from https://study.com/academy/lesson/what-is-computer-hardware-components-definition-examples.html.

Zandbergen, P., 2018b, Executive information systems (EIS): Upper management decision-making tools, viewed 27 April 2021, from https://study.com/academy/lesson/executive-information-systems-eis-upper-management-decision-making-tools.html.

Zwass, V., 2018, Information systems, viewed 27 April 2021, from https://www.britannica.com/topic/information-system.

Appendix A: Questionnaire

The questionnaire is an excerpt from the MCom dissertation at the University of Limpopo, under the Faculty of Management and Law, School of Economics and the Department of Business Administration.

Information System Components

TABLE 1-A1: Please indicate your agreement with the following statements about the information System Components of your enterprise for new information systems such as Enterprise Application Architecture* (See bottom page).
Section E: Actual Adoption of Enterprise Application Architecture
TABLE 1-A2: Please indicate your agreement with the following statements for actual adoption of information systems such as Enterprise Application Architecture* (See bottom page).


Crossref Citations

No related citations found.