About the Author(s)


Kingston X.T. Lamola Email symbol
Department of Business Management, School of Economics and Management, Faculty of Management and Law, University of Limpopo, Polokwane, South Africa

Citation


Lamola, K.X.T., 2022, ‘Employees’ aptitudes and trepidations for the adoption of enterprise application architecture for supply chain management in small and medium enterprises: A case of Capricorn District Municipality’, Journal of Transport and Supply Chain Management 16(0), a708. https://doi.org/10.4102/jtscm.v16i0.708

Note: Sections of this manuscript are published in a thesis submitted in partial fulfilment of the requirements for the degree of Master of Commerce in the School of Business Management, Faculty of Management and Law, University of Limpopo, South Africa] entitled ‘Factors influencing the adoption of enterprise application architecture for supply and chain management in Small and Medium Enterprises within Capricorn District Municipality’. Supervisor: Prof. G.P.J. Pelsserand Prof. O.O. Fatoki, 2021. Refer: http://ulspace.ul.ac.za/handle/10386/3467.

Original Research

Employees’ aptitudes and trepidations for the adoption of enterprise application architecture for supply chain management in small and medium enterprises: A case of Capricorn District Municipality

Kingston X.T. Lamola

Received: 12 Nov. 2021; Accepted: 23 Feb. 2022; Published: 22 Sept. 2022

Copyright: © 2022. The Author(s). Licensee: AOSIS.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Background: This article inspects the internal constituents on employees’ aptitudes and trepidations (EATs) for the adoption of enterprise application architecture (EAA) for supply chain management (SCM) in small and medium enterprises (SMEs) within Capricorn District Municipality. EATs trait origins widespread destruction and inflict in the adoption of EAA if not managed amicably, unless, the enterprise accentuate the importance of the 4th Industrial revolution with careful planning to deal with the aftermath and mitigate the inspirations instinctively. Thus, the logistics of EAA adoption is one of the main activities in information technology (IT) that requires meticulous knowledge in algorithms for a successful SCM.

Objective: The principal objective of this study is to determine whether EATs affect the adoption of EAA for SCM in SMEs and to identify gaps and institute state of the art in research for future studies.

Method: This study adopts a descriptive research method with the use of 310 respondents targeted at both SME owners and managers, sculpted over quantitative research. Based on the analyses of data, the linear regression model is executed. As a result, the author realised that ‘EATs affect the adoption of EAA’ as a dominant research focus of these studies. In this study, the response EATs as a primary influencer of the adoption of EAA, considered on linear regression model for attainable SCM. In practice, SMEs should link EAA to new technologies, enterprise capabilities, objectives and strategies, as well as the existing culture and performance philosophies.

Results: The SMEs’ success in SCM activities is dependent on employees’ perceptions, attitudes, motivation and learning abilities that could ease the narratives on the adoption of EAA.

Conclusion: These results provide the following comprehensions for future research: applying simplicity by getting them on board, introducing EAA through different channels of learning, building a coalition of willing mindsets, motivating its purpose and celebrating small progress. The research provides a profound understanding relevant in the contextual background to SMEs to adopt EAA for SCM that depends on the enterprise resources (ERs) acquisition and\or availability.

Keywords: coding and programming; employees’ aptitudes and trepidations; enterprise application architecture; information technology; motivation; perceptions; small and medium enterprises; supply chain management; technologically accepted models.

Introduction

Employees’ aptitudes and trepidations (EAT) are one of the most rapidly diminishing internal factors in the adoption of enterprise application architecture (EAA) for supply chain management (SCM) in small and medium enterprises (SMEs). Several studies thus far have linked EATs with the adoption of EAA, as they allude that the (4IR) could elevate the level of coincidence, with massive mobility and a negative shift in the balance of power in SCM (Bolognese 2018; Merritt 2029; Juneja 2021). To do so, SMEs need to start with an architecture design, which will help them to drive consensus amongst all participants by supporting planning, facilitating changes and managing complexity, reducing risks and minimising technical debt, which is the end game of any inventive architecture (Menezez 2021). Enterprise application architecture represents a well-structured system that scales enterprise demands, meeting the intended business and user requirements whilst ensuring that all the concepts are correctly isolated and with comprehensive dependencies amongst each other (Menezez 2021). The 4IR encourages the adoption of EAA in all sectors (Anderson & Perrin 2017; Nickolaisen 2021), challenging the traditional modus operandi of enterprise operations encounter resistance because of formal requirements on loan securities for technological capacity (Suhadak & Mawardi 2017; Maverick 2021).

In essence, the competitive threats are embraced with technologically accepted models (TAM) (Escobar-Rodriguez & Bartual-Sopena 2015). Technical hitches might arise; however, when an effort is made to adhere to information technology (IT) policy for aligning SMEs’ goals, eliminating and minimising skills gaps, designing consistent job titles, encouraging clear career paths and incentive plans with up-to-date job descriptions and evaluations (Mitache 2021). The competitive threat to the adoption of EAA is unprecedented and suggests that SMEs are increasingly exposed to more competitive IT alternatives, not only in terms of the SCM activities being implemented but also from the number of innovative competitor inventiveness (Reichert & Zawislak 2014; Spacey 2015). The recurrence benefaction and trustworthiness exhibited by SMEs towards the SCM partnerships are therefore diminishing because of switching costs subsiding. This places severe pressure on SMEs on the adoption of EAA to proactively pursue strategies to retain their SCM activities. One such strategy is the provision for the demand-driven operating model, which integrates customers, processes and technology, for a better EAA system (Gemalto 2021; Oracle 2021).

Enterprise application architecture acts as ‘dynamic digital incentive schemes’ (Merritt 2019) and requires transformation’s role in security (Regalado 2021) as well as careful design in algorithms (Ray 2015). By providing a platform to continuously monitor EATs, the theory of planned behavior (TPB) could countenance SMEs the opportunity to assess the value embedded in the rewards structure that does not only improve durable lucrativeness. Likewise, the adoption of EAA increases psychological switching barriers established on Ajzen’s theory of reasoned action (TRA) in the Social Psychology software (Ajzen 1991; Hackman & Knowlden 2014; Dillon & Morris 2018b). For that purpose, at the very least, EATs are exposed to an effective platform that enables them to monitor and learn more about algorithms involved in the adoption of EAA for SCM (Walport & Rothwell 2013). This in turn SCM has important implications regarding the ability to customise and personalise convenient software systems for proper adoption of EAA (Jacobson 2018). This subject came up, for example, in the discussions of EATs on the following:

  • Enterprise integration and administration: draw a parallel relationship with TPB that take into account three user determinants, namely effort expectancy, social influence and facilitation conditions that influence EAA adoption (Hazen, Kung, Cegielski & Jones-Farmer, 2014).
  • Disbursing information resources or systems: The information resources could be intermarried with TRA that maintains that EATs are perplexed by personal beliefs that result in subsequent stimulus (Richards 2021). Moreover, TRA distinguishes two types of behavioural measures as the intentions on the acceptance or rejection of technology (Camadan, Reisoglu, Ursavas & Mcilroy 2018).
  • Adapting Enterprise resource planning: The combination of enterprise resources and diffusion theory of innovation (DTI) could provide some sustenance for the conceptual premise results that could illustrate a conceptual model explaining the diffusion of technological innovative systems (Beal 2021a; Green 2015).
  • Interpersonal skills: Sweeney (2011) maintains that the relative advantage of using technology allows SMEs to use alternate methods for incorporating its enterprise activities in SCM in EAA. Jones (2003) argues that the theory of relative advantage (TRA) has devastatingly analysed interpersonal skills in line with barriers that impede the integration of this technology within SMEs (Sweeney 2011).

All these theories, namely TPB, TRA, DTI and TRA go beyond typical rational value-driven considerations within the SCM context.

Likewise, the adoption of EAA considerations includes biometric technology authentication systems such as image detection, fingerprint detection, voice recognition and password encryption (Mayhew 2019; Naser 2021; Sanders et al. 2016). The extent to which employees validate TAM, affected by lack of financial resources, information systems components and working capital (Maverick 2021), thus, the construction of the underlying optimal control problem in a stochastic background in the adoption of EAA (Parise, Lygeros & Ruess 2015). Employees’ aptitudes and trepidations may have a vital role in bringing about and play an important role in affecting the SCM activities’ intensified (or not) relational state when using the application. Enterprise application architecture focuses on final output for rational-decision making centred on reasonable and sustainable variables included in that and EATs encountering technological challenges such as cybersecurity, cloud computing, perceptions surrounding automation, skill gaps and continuity and disaster planning (Dillon & Morris 1996a; Anderson & Perrin 2017).

These underlying drivers of value inherent to EATs on the adoption of EAA are the focal concentration of this study. More specifically, the study investigates the internal factors ‘highlighted as EATs towards the adoption of EAA for SCM in SMEs within Capricorn District Municipality’ and their impact on relational results that lead to augmented usage of the application. Even though the available literature on EATs, in general, is widespread in the South African context, it is, however, limited with specific reference to EAA. Supply chain management pays specific attention to ever-increasing competition, and service delivery demands are forcing SMEs to revisit the operational efficiencies of their supply chains (SC) facing barriers to the adoption of EAA. Whilst the study of Sewdass (2012) investigates the proposition of a competitive intelligence (CI) framework for public service departments to enhance service delivery, it does not make the distinction between the EATs when proposing CI and the ensuing behaviour of repeat patronage through increased usage for service delivery. Sewdass’s study (2012) also does not clearly make the distinction between effective and figurative value drivers of rewards on service delivery. Taking the discussion further, Lechesa, Seymour and Schuler (2012) investigate the ERP Software as a Service (SaaS) indicated that network limitations and security concerns are strongly impacting potential adoption in South Africa. Enterprise application architecture is receiving more focus from ERP vendors such as Saas and Systems, Applications and Products in Data Processing as a market leader. This, nevertheless, does not provide any confirmation of the relationship between specific factors affecting EAA software and the impact on continued usage of the application. For example, Nickolaisen (2021) investigates why EAA strategy is still needed and if the business environment is heterogeneous.

Drawing from this, application architecture has countless ways to either design for development towards standardisation. However, none of these studies provided a comprehensive evaluation of the EAA adoption linked to SCM that SMEs have the zest to advance their routine with the positive influence on the 4IR. This study, therefore, contributes to the existing body of information by conducting a more comprehensive investigation into the adoption of EAA for SCM in SMEs that EATs impact the relational outcomes between the internal and external users. The results obtained from the preliminary analysis of EATs may be used to influence the employee perceptions on a structured approach to address problems in the adoption of EAA. Given that numerous EAA applications are consistently ranked in the top five software architecture patterns on how to make the right choice for the SMEs (Wayner 2019) and the digital transformation’s role in security (Merritt 2019). Nevertheless, critics have also argued that not only do surveys provide an inaccurate measure of EATs but given all facts; the study provides valuable insight for the adoption of EAA for SCM in SMEs.

Research objectives
  • The key objective is to examine whether the EAT influences the adoption of EAA in SMEs for SCM.
  • The secondary objective is to develop a conducive working model that orientates employees towards the adoption of EAA for SCM in SMEs.

Literature overview

Theoretical review: Technological acceptance model (TAM)

Technological acceptance model (TAM) is a theory that is used to analyse the adoption of new technologies by enterprises (Escobar-Rodriguez & Bartual-Sopena 2015). Technological acceptance model was developed by Davis, Bagozzi and Warshaw in 1989. Many analysts in this day and age argue that the approach on TAM has not been successful based on high level of criticisms. Firstly, Ajibade (2021) alludes that TAM could be considered for learning in electronic learning systems. Secondly, Salovaara and Tamminen (2008) allude that TAM is pursued by lack of credit leading to passive absorbers of technological applications with differences in SCM activities, or the features of interpersonal cooperation. Thirdly, incapability of observing other issues, such as cost and structural imperatives that push users to adopt an innovation in the form of EAA (Malatji, Van Eck & Zuva 2020). Technological acceptance model encounters some determinants of technology rejection (Ajibade 2021). Using the TAM for analysing the adoption of EAA for SCM in SMEs improves the low actual adoption (AA) of EAA (Shilman 2017). Technological acceptance model is a theory used to analyse the adoption of new technologies by organisations (Escobar-Rodriguez & Bartual-Sopena 2015). It concentrates on rational decision-making for technological implications that would bring substantial modifications and transformations within the enterprise (Anderson & Perrin 2017; Dillon & Morris 1996a). For SMEs to be more efficient and effective in SCM, enchanting calculated risk by disseminating capital structure in TAM could bring positive benefits for the entire enterprise. The intended AA of new technology is influenced by dual factors, namely, (1) perceived usefulness and (2) perceived ease of use for AA of EAA for SCM (Schnädelbach 2010; Travis 2017).

The speculative principle’s essential view about perceived usefulness as a component in TAM explicates to a degree in which an EAT believes that using a particular electronic device could improve their performance (Fenech 2021). On the contrary, perceived ease of use of computer systems refers to a degree to which employees use a computer system with the expectation that the target system be effortless (Davis 1989). In a modern study by Shields (2021), 15% of employees are frustrated on collaborative work schedule, nevertheless, automation with in-house solutions. Their daily work was surveyed to determine whether; when it comes to the digital tools employees use in their day-to-day jobs, that relationship status is best described as “it is complicated”? and if so, what kind of technological application could be adopted. A much more systematic approach would identify how TAM interacts with other variables that are believed to be linked to the AA of EAA for SCM in SMEs.

Conceptual review

Employees’ aptitudes and trepidations are sophisticated human traits (Hendricks 2018) as encoded in the dual-theory of Frederick Herzberg on two aspects: (1) Motivation that is replicated by achievement, recognition, the work itself, responsibility, advancement and growth and (2) hygiene factors that embrace company policy, supervision, relationships, work conditions, remuneration, salary and security (Herzberg 1968). Positive traits are achieved through the level of personal zest and enthusiasm. These goals are accomplished through the drivers of value embedded in the rewards they offer. They specifically include passion, independent thinking, optimism, self-confidence, resource, problem-solving, tenacity and ability to overcome hardship and action oriented with vision and focus (Duermyer 2017; Gao & Hafsi 2015). Employees’ aptitudes and trepidations rely on several mandatory factors that require a specific educational background and experience from an IT background (Jabbour et al. 2015; Knox & Haupt 2015). Assessing EATs includes using a variety of psychometric instruments, such as self-assessments and 360-degree assessments of the routine role and work situation (Metcalf 2015; Rees & Porter 2015). It is affirmed that formal education and training can enhance EATs (Esposito, Freda & Bosco 2015; Kubberød & Pettersen 2021; Robbins & DeCenzo 2014) (see Table 1). The value provided to the EATs is evident in SMEs’ performance and user satisfaction (Camadan et al. 2018). Thorough training for employees could close the gap for knowledge deficit as a tool for leading to EATs (Esposito et al. 2015; Kihn 2021). Identifying the drivers of enterprise resource planning and assessing its impacts on SC performances create a distinctive value proposition that is personalised per enterprise during the building-up and fundamental stage for adopting EAA (Hwang & Min 2015). Attitudes and behaviours could shape employees’ attitudes and their willingness to adopt new technologies. In this regard, two distinct incentives are postulated; this is improved efficiency and rewards that improve their status (Duarte, Sethi & Staley 2017). By embracing human-capital development, SMEs foster employees’ talent by developing blue-collar formation on technical talent (Lawrence 2017; Mlangeni 2017). The skills development courses enhance employees’ development and growth and link it with their level of specialisation (Zaugg & Warr 2018); this could build a long-term relationship that leads to employee retention (Duarte et al. 2017). In 2021, Price Water House Coopers published an article on its website reporting that employees’ attitudes and behaviours could be the primary motive for shaping people’s willingness to adopt new technologies that including motivation through two distinct incentives on improved efficiency and rewards that improve their status (Duarte, Sethi & Staley, 2017). Consequently, the possibility that TAM would be efficient in SMEs that are willing to invest more financial resources allows a roof for the learning, implementation and execution of EAA.

TABLE 1: Summary table.
Data mining collaboration with enterprise application architecture

Today’s SC activities are more aggressively competitive than ever before, because of technological encroachments that are intended to eliminate elements of patchiness in customer demand relations. Corporate industries and businesses use data mining as a sophisticated programme designed for categorisation of large data sets to identify patterns and relationships that could provide analytical solutions (Stedman 2016). Data mining techniques are the main non-intrusive method used for enabling enterprises to predict future trends and make more-informed business decisions on customer databases, transaction records and log files from web servers, mobile applications as well as sensors (Olavsrud 2020). It, therefore, includes computational algorithms that include all computer systems for the entire enterprise (Hiltbrand 2021). In some circumstances, parallel algorithms have been included for several reasons: parallelises each algorithm category, illustrates how to implement parallel algorithms on multithreaded parallel computers and further describes how to develop special purpose on parallel machines for effective adoption of EAA in SCM (Gebali 2011). Small and medium enterprises need their internal and external stakeholders to use effective and efficient technological standards that will improve customer relations. In addition, the adoption of EAA for SCM will compel SMEs to reinforcement learning in setting up a conducive environment when applying an appropriate algorithm or strategy (Becca 2019).

In some instances, data scientists could be appropriate personnel when working with machine learning depending on their knowledge revolving around emotional data, algorithmic composition and dataset creation (Ahmad 2020). Likewise, SMEs need to secure their data in cloud computing protected against unforeseen circumstances that include information security (Delony 2019; Sharma & Pendyal 2021), security architecture on cyber-hacking (Ritchot 2013) and biometric security on sensor networks (De Groot 2014). Cloud computing, a part of the remote server network connecting two peripheral hemispheres, ‘end-user and stored data’ for decrypting it, may be more or less extreme in unindustrialised SMEs (Sharma & Pendyal 2021). Data mining may have played a vital role in bringing about the practical application of statistical analysis and technologies on SMEs’ data management in SCM for gaining agility and efficiency in identifying trends and predicting SMEs’ productivity (Olavsrud 2020). Furthermore, Olavsrud (2020) maintains that so far, six roles have been identified as being potentially important: (1) Improving operational efficiency on a routine basis, (2) broadening the understanding of customers dynamic more precisely, (3) providing data visualisations for future projections, (4) providing insights in decision-making and for future planning, (5) measuring performance and driving growth and (6) discovering hidden trends by generating leads, which assist in scaling SMEs in the right direction. Georgiadis and Poels (2021) view database management as a collaborative measure of data that are harnessed by analytics to acquire and conjecture inside composed from online footprints, sensors and sensory systems, conspicuously without a pre-established goal, and are stored in dispersed databases thereby presenting an attractive target for assailants. Quantitative mechanisms could aid in redesigning SMEs’ approach to the adoption of EAA adhering to three design values (Anderson et al. 2013): (1) Adapting architecture that reallocates resources and assets to support the dynamic configuration for enterprise operating models, (2) developing creative methods to adopt best practices in innovation and (3) demonstrating resilience for maintaining operational effectiveness when facing disruptions, growth, rightsizing and downsizing (Sliwa 2021). Data governance prompts initiatives criteria that require SMEs to have experience in terms of manual record keeping and preventing error system that will depend on a well-integrated information hub that is complementary with SCM operations (Wisner, Tan & Leong 2012). The analysis of EAT undertaken here has extended the knowledge of data mining collaboration with EAA for SCM in SMEs.

Coding and programming in enterprise application architecture for supply chain management

Enterprise application architecture revolves around thorough coding and programming for the successful adoption of EAA for SCM within SMEs. The challenge in coding and programming are linked with the coordination of algorithms and enterprise activities in SCM (Kumar 2000). Borowski (2021) discusses the challenges and strategies for promoting coding and programming types that could be considered by SMEs in the adoption of EAA. This includes the following:

  • Top coder: The Top Coder’s frequent use is almost certainly because of a widespread of SCM activities that provides a list of algorithmic challenges that SMEs could not complete on their own directly online using their code editor. The SCM is increasingly recognised as a worldwide enterprise functional activity that involves dynamic algorithms for managing internal and external enterprise activities (Fish 2019; Pashaei & Olhager 2015; Stet 2014). Enterprise application architecture supports every activity involved at the strategic level for high-performing ratings for the enterprise (Lawrence 2017; Vetráková, Smerek & Seková 2017). Compatibility of technology entails the specific technical skills applied by software architects with the responsibility of executing proper system operational activities with ease in SCM (Desmet, Maerkedahl & Shi 2014). A primary concern for customers and distribution is in the SCM activities that provide agile services just-in-time (Crain 2018; Rouse 2021). Gross-functional activities lead to sustainable economic success for SMEs, depending on the marginalisation of economic and financial costs (Fotheringham & Saunders 2014; Jenner 2016; Mills, Purchase & Parry 2013). A natural progression of this top coder is an ease in SCM activities as well as the compatibility in EAA through coding and programming.
  • Coderbyte: The Coderbyte is almost assured that the more extreme for coding, it eases a collection of algorithms accessed through introductory videos and interview preparation courses as well as programming for SCM activities. The SCM activities are increasingly recognised as a worldwide enterprise functional motion that involves dynamic algorithms for managing internal and external enterprise activities (Fish 2019; Pashaei & Olhager 2015; Stet 2014). Algorithms are protocols to be followed in the execution of SCM activities, which include computer programming that is aligned with internal and external users and different enterprise activities (Riezebos 2017; Suhadak & Mawardi 2017; Walport & Rothwell 2013). Enterprises are operating in a digital age with hierarchies and different elements of administrative protocols and algorithms for SCM with quality assurance, timely delivery and adherence to responsible business practice (Chadwick 2018; Ingram 2018b). The precise mechanism of Coderbyte in the adoption of EAA remains to be elucidated in many ways as it focuses on a list of challenges such as bracket combinations on; min window substring, tree constructor, bracket matcher, code and username validation, finding intersection just to list a few.
  • Project Euler: Project Euler is likely that provide a large collection of challenges in the domain of computer science and mathematics that could compel SMEs to outsource their EAA project to software architects through work output. Factors found to be influencing SCMs have been explored in several studies, which include a broader SCMs framework coupled with risk analysis and management of product architectures for SCMs design, testing and implementation (Pashaei & Olhager 2015). A well-regulated computer system could design a flexible architecture model that is based on efficiency and effectiveness in all input requirements in SCM (Bawa et al. 2017). For enterprises to have a flexible working environment, reasonable computer systems should be in place with flexible work interchange (Sanders et al. 2016). Considerably more work needs to be done to determine challenges linked with Project Euler for the desired results in the adoption of EAA.
  • HackerRank: The HackerRank may be that HackerRank delivers encounters that SMEs could not solve; alternatively, they could detect them directly online for several different domains such as algorithms, mathematics, SQL, functional programming, artificial intelligence (AI) and more to have a compacted EAA, but this requires a deep capital injection in the adoption of EAA. Flexible technologies could ease the use of manual recordkeeping with the use of programmed order forms (Goldenberg & Dyson 2021). Also, EAA could legitimate workplace-based activities for SMEs through programming in SMEs (Chen 2017). By planning demand forecasting with programmed EAA, flexibility will be experienced as a key factor in enabling a low-cost structure in SCM. The subject of coding and programming is an intriguing one, which could be usefully explored further by considering some challenges such as Bayesian approximation, Hacker Rank admins decision and code plagiarism that will result in disqualification in the adoption of EAA.
  • CodeChef: The CodeChef as a coding and programming software might permit SMEs capable to write code in their online editor and view a collection of challenges that are separated into different categories based on their conceptual and technical skills level in the adoption of EAA. Information system components need to be purchased with a thorough understanding of their functionality, especially for computerised data on software systems (Claidio 2016; Sharma 2018b). During the EAA AA, SMEs can use mobile applications being linked with computer software from different software technologies and architecture (Filho et al. 2015). More broadly, some focus on CodeChef is needed to determine the actual impediments in the coding and programming, such as bacteria synthesis, Mathison and data warehouse, embedding a tree and servers, just listing a few.
  • Exercism.io: Exercism.io may resolve extreme EAA challenges for coding challenges on the website with several offers 3100+ challenges spanning 52 different programming languages could compel SMEs to mentor each challenge as it might differ from other challenges websites and enterprise preference with compatibility. Stochastic programming includes models with random settings with discrete realisation being capable to create a strong decision-making framework in SCM (Domenica, Mitra & Birbilis 2007). Well, in digital computers there is a positive strong indication that stochastic behaviour can be tolerated in the adoption of EAA where systems are in place to increase SCM performance (Vasilaki & Allwood 2021). It would be interesting to compare experiences of individuals with the same output, specialisation and credentials within SCM by using Z-critic for better statistical results.
  • Codewars: The Codewars possesses credible enlightenment, and it provides a large collection of coding challenges, submitted and edited by a programming specialist applying algorithms on behalf of EAA users. Perhaps the most serious advantage of Codewars is that it provides instantaneous online solutions with many language selections. Expert personnel is regarded as IT specialists with technical expertise in the use of EAA, particularly for the implementation, monitoring or maintenance of IT systems, whilst the IT specialists focus on a specific computer network, database or systems administration functions (Beal 2021b; Heakal 2021; Kocoglu & Kirmaci 2012). Large randomised controlled trials could provide more definitive evidence in understanding dynamics in Codewars such as alphabetic anagrams, all balanced parentheses, Huffman encoding, a chain adding function and duplicate encoder, amongst others.
  • LeetCode: The LeetCode is a depiction of an electromagnetic system that solves the challenges directly online in one of nine programming languages as they provide statistical results for SMEs solutions in SCM based on programmable users’ codes. If the debate is to be enthused forward, a better understanding of LeetCode needs to be developed. Small and medium enterprises could face appropriate approaches in SCM content for enhanced inert-changing systems with ease and comfort without tempering with the existing data or information (Szigligetius 2021). For example, SMEs could be considered for data collection concerning the new competing product as a case study on how parameters of a stochastic individual-based model can be acknowledged from existing data and how the experimental model can be used to solve an optimal control problem in a stochastic background (Parise et al. 2015). However, a critical appraisal of the importance of EAA in SCM is lacking (Zhou & Ning 2017). A reasonable approach to tackle this issue could be to consider challenges in LeetCode such as the importance of data structures and algorithms, planning for software development, using brute force and hash map, amongst all others.
  • CodinGame: A possible enlightenment on CodinGame is that it is based on a few elements such as level of experience using the websites, intercom Google searches and managing the software development lifecycle. Small and medium enterprises could deal with appropriate approaches in SCM content to have a better inert-changing system with ease and comfort without tempering with the existing data or information (Szigligetius 2021). This substance came up for instance in a discussion of parameters on stochastic capability on the individual-based model for solving optimal-control challenges (Parise et al. 2015). Enterprise application architecture is a description of the structure for the applications and software used crosswise the enterprise in which the systems are broken down into sub-systems and connected based on their ultimate relationships and functionalities (Benade & Pretorius 2012; Flower 2021; Sangam 2010). However, a critical valuation of the importance of EAA in SCM is lacking (Zhou & Ning 2017). Although this is the most comprehensive account of coding and programming produced so far, it does suffer from several flaws. CodinGame could be applied to develop targeted intermediations aimed at expediting all beginner, intermediate and advanced users within the confines of EAA linked in SCM during coding and programming.
  • Policy as Code: A probable description of ‘Policy as Code’ is that it is constructed upon the notion of infrastructure as code, which brings similar benefits to the architecture level with notable trends, that could assist the SMEs to arrange SCM activities as a structure around the desired system state (Bettes & Humble 2020). According to Marais (2021), South African SMEs are instituted with policy and regulatory measures on economic principles for full employment that narrow the scepticism towards the adoption of EAA. Consequently, these policies harm the TAM such as the adoption of EAA. The institutional conditions prohibit and hinder entrepreneurial skills development in education through science, technology, engineering and mathematics (Halabisky 2017). With the help of software architects, the adoption of EAA is anticipated with architectural design systems that are capable of supporting the SMEs’ concepts and processes incorporated with SCM activities (Menezes 2021). Nevertheless, difficulties arise when an attempt is made to implement the free-error application system on information governance and security, without the violation of the policy on coding and programming for EAA in SCM.
Research gap

To date, little is recognised about the adoption of EAA, and it is not clear what factors constitute resilience to the 4IR. Nevertheless, amid the resurgence of interest in such academic researcher, the literature review designates that:

  • Many scholarship readings have scrutinised the effects of EAA as well as the technical aspects on data mining collaboration and coding and programming in conjunction with SCM within SMEs. Conversely, little attention dedicated on the connexion between EAA physical characteristics to ease its adoption, specifically if SMEs that developed a mutual trust on the use of Internet on cyber security.
  • Even though exploration of investigations on both disciplines is chronicled in developed economies, it requires intensive skills and professional competencies in developing economies including South Africa.
  • The significant role of EAA in large firms and corporations has contributed noteworthy results that are evident in their financial statements projection over the epochs.
  • Even though the existing literature advocates that the adoption of EAA may imply unfathomable apprehension about the SMEs’ internal strength and weakness; however, there is no tangible evidence to encounter how technological standards affect SCM activities.
Research strategy
Research approach

To meet the objective of the study, a quantitative methodology was employed. An initial objective of the project was realised through the identification and perusal of a pragmatic literature review. The realistic research comprised three sub-divisions. Primary data used collected through questionnaire distribution for Master of Commerce between academic years’ 2018 and 2020 (Appendix A and Appendix B). The first sub-division indicated the empirical research consisted of pilot-study where SMEs’ owners and managers were presented with 310 questionnaires to respond to in Polokwane Municipality that sheltered; Blouberg (Bochum) Municipality, Molemole (Dendron) Municipality, Polokwane Municipality and Lepelle-Nkumbi (Lebowakgomo) Municipality to measure concentration in all enterprises. Stratification was based on the percentages of the SMEs in each area. Stratified sampling was used to ensure that each area was proportionally represented in the sample. In each area, the sample was drawn using random numbers to ensure that the results could be used as representative of the whole population in each area. In the SMEs, the researcher used stratified random sampling to draw. The sample size was calculated as 330 (Figure 1). Only 20 questionnaires were eliminated based on respondents’ errors. The municipalities are chosen with the objective of assembling certain presumptions with the SMEs in respect of making informed decisions, exploring and identifying some hidden factors restraining employees to adopt EAA and to strengthen their perceptions towards technological innovation. The second sub-division was regarded as a diagnostic test where the Cronbach’s alpha between EATs and the AA of EAA were accumulated at 0.867 and 0.873, respectively (see Table 2). The second sub-division utilised SPSS version 25 to conduct data analysis, where the following instruments were processed: Pearson coefficients, analysis of variance (ANOVA), Pearson correlations and linear regressions. The third sub-division focused on an evaluation of the data through a normality test of EATs and EAA.

FIGURE 1: Sample size.

TABLE 2: Cronbach’s Alpha per construct.
Questionnaire development

A more systematic approach identified how EATs interact with each other and have all been believed to be linked to EAA adoption. All such variables include enterprise integration and administration, information resource management, enterprise resource planning, spreadsheet use as well as document merging, communications skills, interpersonal skills, using the internet (Microsoft Windows), enterprise integration and administration, standardization and web-interface, and asset management.

Data reliability

The degree to which items in a questionnaire exhibit consistency on the phenomenon they are measuring is referred to as reliability (Pallant 2013). Cronbach’s alpha was used as a measure of the reliability of research hypotheses due to its flexibility; it was calculated by using software and software systems, and it only required one sample to estimate the internal consistency (Koushik 2013).

A reliable factor analysis was made based on the sample size of 310 (Costello & Osborne 2011). Both EAT and adoption of EAA are at 0.867 and 0.873, chronologically.

Stability diagnostics test

The current statistical analysis on EATs contributed positive annotations for further statistical examination of the Linear Regression Model on the AA of EAA for SCM in SMEs. The sample distribution for EATs produced a distribution curve with a * of 40.95 and σ of 6.211 (Figure 2). The results indicate that the model is the best fit for homoscedasticity that fulfils three assumptions: the relationships between variables should be linear, the responses (AA of EAA) and descriptive (EATs) should have a normal distribution, and the standard deviations for both Y and X should be equal. Employees’ aptitudes and trepidations produced a negative skewness at –0.695 and Kurtosis at 0.178. A ‘peak’ distribution has a positive Kurtosis whereas a ‘peak’ distribution has a negative Kurtosis. The Kurtosis percentage should be near 0, and the 178% indicates that it is a normal distribution, which is slightly peaking and slightly skewed to the left. The distribution is symmetric because the * is 40.95 and the median is 0.430.

FIGURE 2: Normal distribution indicates an asymmetric distribution with acquiescent tails. The mean, median and mode are all equivalent @ 40.95. σ = 6.211. N = 310.

Research findings

Pearson correlations employees’ aptitudes and trepidations and actual adoption of enterprise application architecture

Table 3 shows the results on correlations between EATs and AA of EAA. The p-value is near zero at ‘˂.001’ with the requisite value set at 0.05. The statistical technique ‘ANOVA’ was used to test the hypotheses between the dependent variable, namely AA of EAA, and the independent variable.

TABLE 3: Pearson correlations.

Employees’ aptitudes and trepidations and AA of EAA are positively correlated with Pearson correlation coefficients of 0.346, indicating a positive relationship. Based on the change in sign, the findings suggest a positive correlation between EATs and the adoption of EAAs.

Analysis of variance on employees’ aptitudes and trepidations and actual adoption of enterprise application architecture

Table 4 indicates that the ANOVA results attained for scores on EATs as independent variables and AA of EAA as the dependent variable. The general F-statistic is significant (F = 41.936, p ˂ 0.001), thus signifying that, overall, the model accounts for a significant proportion of the variation in the adoption of EAA for SCM in SMEs. Because of the exact significance level of 0.001 ˂ α at 0.05, the results are statistically significant. Employees’ aptitudes and trepidations play a role in the adoption of EAA for SCM in SMEs according to alternative sub-Ha1, whereas the sub-H01 ‘EATs do not play a role in the adoption of EAA for SCM in SMEs’, is rejected. Pearson Coefficient on EATs and AA of EAA.

TABLE 4: Analysis of variancea.

Table 5 presents the coefficients result for EATs and AA of EAA. The t-test is considered for testing as both samples have similar values in the mean.

TABLE 5: Pearson coefficients.

In conditions where the estimated Ý consists of Perceived Attitudes towards the Adoption of EAA and EATs with the score = 16.120 + 0.190*, then the t-test shows that the Ý constant a = 16.120 and the Ý constant b = 0.190 are significantly different from zero. The independent t-test could be used to determine the confidence interval of the coefficient, in case the 95% confidence interval for the t-test is [13.278, 6.551]. The results on coefficient exhibit a positive correlation between EATs and the AA of EAA.

Linear regression on employees’ aptitudes and trepidations and actual adoption of enterprise application architecture

As established, summaries on different typescripts, where Ӯ = AA of EAA, a = y-axis intercept as AA of EAA, b = + slope and x-axis intercept as EATs (Figure 3). The R2 value is 0.120 of the variances that are being accounted for this scatter plot from the independent variable, EATs. The positive linear regression satisfies three assumptions on a model for best fit (Figure 2). The linear regression where Ӯ = 16.12 + 0.19*x. The slope of +0.19 will bring the same intensification in Ӯ. The R2 = 0.120 indicates that the level of variation in the prognostic variable could be termed by variation in the independent variable. Moreover, the R2 is adapted to r as thus √0.120 = 0.346, which is established in Table 5 for Pearson coefficients. This approves that the model is adequate with a positive slope and the model is of a positive fit.

FIGURE 3: Linear regression model on employees’ aptitudes and trepidations and actual adoption of enterprise application architecture slope (+0.19) of good results. Given the average change in the y-variable (in this case: Actual adoption of enterprise application architecture) for a change in the x-variable (employees’ aptitudes and trepidations) on one unit.

Discussions

Findings
Employees’ aptitudes and trepidations findings

With reverence to the adoption of EAA Knox and Haupt (2015), EAT reacted here; a notch of association was, found to be evident in the trinity of dimensional diagnosis as a set of; analytical skills, transferringinformational skills and proficiency skills needed for the adoption of EAA in SCM. However, unlike any other internal factors, EAT is considered the most primitive although acted as an element of buffer in calibrating algorithms in SCM (Tolstoshev 2017). Moreover, the EAT classification could be well thought out even less eye-catching from TAM theory, with these SMEs having given up on any opportunity of evolution and accomplishment.

Enterprise application architecture findings

Centred on the findings obtainable at present, it is anticipated that taking into account the perceived attitudes and perceived usefulness of IT in the future descriptive study that may propose a better framework in the adopting EAA rather than focusing on EAT single handedly. The intended AA of new technology is influenced by dual factors, namely (1) perceived usefulness and (2) perceived ease of use for AA of EAA for SCM (Schnädelbach 2010; Travis 2017). Perceived usefulness and perceived ease of use were conventionally used as uncorrelated concepts, responsible for eliminating any uncertainties between EATs that seek exceptional attention as a way of adopting EAA (Schnädelbach 2010; Travis 2017). The intention to adopt EAA by SMEs, who rely on traditional systems for conducting SCM activities. Where SMEs want to support the adoption of EAA, the perceived usefulness and the perceived ease of use might be the correct means of identifying some negative elements in employees. To end with, more ground research is needed to test the hypotheses whether there is any relationship between EATs, information systems components and enterprise resources are evident in the adoption of EAA for SCM.

Empirical literature
Employees’ aptitudes and trepidations

In its contemporary evolution as with TAM, EATs are being technologically advanced through off-the-job training (that includes role-playing, in-basket training and syndicate training) and on-the-job training (that includes coaching, job rotation, junior boards, job instruction training, mentoring, learner-controlled instructions, behavioural modelling and vestibule training) (Nel, Werner, Haasbroek, Poisat, Sono & Schults, 2009). Although literature indicates its originality from data processing, creating, spreadsheets utilisation, using email and the creation of business value (Lee & Rhim 2014; Svärd 2013) but these were few. The modern developments point towards the development of enterprise application integration, anticipated to integrate the sustainability information in switching to the Cloud, shifting to data centricity and runtime analytics see, for example (Smith 2021). However, there is no literature that incorporated EATs into a sustainable perspective with EAA shown to enhance SMEs’ SCM and cost-effective meaner. Therefore, the employees have to attempt to adventure in technological modernisation to add more value in the sustainability measurement through the adoption of EAA.

Enterprise application architecture

The framework on EAA is based on a comprehensive analysis of the relevant literature and identification of major theories that are incorporated in SCM activities. This is in connection with the global use of theoretical models built from conceptions as proposed by Davis, Bagozzi and Warshaw (1989). Consequently, we learn the benefits of EAA, as noted by Nair (2010) and Stet (2014). The EAA adoption goes in hand with the regulatory acquiescence from the state in relation to socio-economic, environmental sustainability linked to the ecosystem (exercised in corporate social responsibility). Such considerations and compassions would great motivation to SMEs to invest in justifiable EAA with simplicity. The general methodology taken was to study the EATs in SCM towards the adoption of EAA within the Capricorn District Municipality. Such study was not explored before within the context of South Africa, and this study is likely to bring more impact on theory and practice in other municipalities, with the country and in the global arena.

Empirical contributions
Employees’ aptitudes and trepidations

Employees’ aptitudes and trepidations are considered as a success and mandatory factor that requires a specific and contextual educational instrument that yield experience towards EATs from diverse prominences (Jabbour et al. 2015). Assessing EATs includes using a variety of psychometric instruments, such as self-assessments and 360-degree assessments of the routine role and work situation of employees (Metcalf 2015; Rees & Porter 2015). Formal education and training can enhance EATs (Esposito et al. 2015; Kubberød & Pettersen 2021; Robbins & DeCenzo 2014). Thorough formal training the knowledge gap, in SCM, could be marginalised leading to a greater realisation of financial returns in SMEs. The value provided to the ECs is evident in SMEs’ performance and user satisfaction (Camadan et al. 2018; Jiang & Liu 2015). The development and management activities central to professional and productive activities that are embodied in intellectual gratification (Filson 2021). These validate a need to be unambiguous about exactly what is meant by the word EATs.

Enterprise application architecture

The extensive adoption of EAA perceived as an essential dynamic factor for SMEs that yean a paramount gain from the 4IR. To archive all-encompassing use, the study suggests that SMEs that adopt EAA should consider off-the-job training and on-the-job training programmes (Nel et al. 2009). Enterprise application architecture is defined as the degree to which the organisation structures its software applications in a scalable and reliable process, under a single component to fulfil enterprise requirements (Ferguson 2022). In this study, a set of drives on a degree of SME acceptance of EAA is examined. The TAM and TPB literature suggest multiple enterprise interventions that may play a vital role in building the relationship between the past records, such as EAA, and acceptance. Some of the key encounters in programming include algorithmic challenges (Borowski 2021) policy regulations (Walport & Rothwell 2013) and enterprise security programme (Ritchot 2013). Programming has been perceived as a way of synthesising business activities (Abraham, Burnett & Erwig 2008). For that reason, in this research exertion, the mediating factor on programming needs a scarce skills application that would ease EAA adoption. Essentially, the purpose of the study is to determine whether EATs affect the adoption of EAA for SCM in SMEs and to identify gaps and institute state-of-the-art in research for future studies. The study also contributes to the literature regarding post-adoption innovation diffusion by demonstrating the efficacy of SMEs’ training in promoting a widespread practice of EAA.

Theoretical contributions
Employees’ aptitudes and trepidations

The conclusions on this learning provided livelihood that EATs be eased with proper educational training programmes for understanding key objectives and goals set to encapsulate the SCM activities. Identifying relevant service providers in conjunction with programming would make the adoption of EAA more effective. They specialise and deliver core results, master different algorithms per product specification, minimise hidden cost on the system back up and system crush, identify errors by using codes, update the application through automation and identify new technologies. The magnified results indicated that end-users are more effective if presented with a well-atomised SCM. Prioritising modern tools for SCM in line with shipping status alarms (provide just-in-time information), order management implements (analyse order processing and process optimisation), warehousing organisational software (marginalise cost from different locations) and vendor management tools (use quantitative tools to analyse supplier transactions). The study provides authentic and bona fide knowledge in literature by discussing programming data mining collaboration.

Enterprise application architecture

The concept EAA will undoubtedly be much dissected, but there are some proximately dependable conclusions that are notable, for instance, four enterprise systems such as manufacturing and production, finance and accounting, human resources and sales and marketing. Contributions were intended at explicating the conception of EAA with proper data mining and coding and programming. In some SMEs, little is known about the adoption of EAA and how it will enhance SCM activities. Where it has revolutionised the routines is SCM in well-developed economies and created considerable benefits; minimising the level of complexity, increased efficiency in standardisation, marginalising costs and increased agility in change analysis, to name a few … Moreover, in the small business sector, EAA education and orientation, various aspects such as application portfolio management, that marginalise costs through application rationalisation, greater agility linked with leaner portfolio and reduce IT risk (Ziehr 2022). The study has made some guiding principles in the path of enhancing EATs for easy-going towards the adoption of EAA in SMEs.

Definition of SMEs

Whilst a diversity of definitions of the word SMEs, it is suggested, in this paper, that the concept concomitant with the adoption of EAA studies demonstrating ways in the South African perspectives. The Small Business Development describes SMEs in quantitative and qualitative approaches guided by the National Small Enterprise Act, 1996 (Act No. 102 of 1996), National Enterprise Amendment Act, 2003 (Act No. 26 of 2003) and the National Small Enterprises Act, 2004 (Act No. 29 of 2004) (Small Business Development 2019).

SMEs’ economic contribution

Gross domestic product (GDP) contribution: Small and medium enterprises’ contributions are significantly indicated on GDP growth, which is measured through contribution towards employment, wealth formation, poverty alleviation and innovation conception. The contributions are categorised into three spheres, namely economic, industrial and firm-based benefits with limited control over the market and macro business environment (Rees & Porter 2015; Schwab 2016; Singh 2018).

Contribution towards employment: The South African economy suffers a low employment rate because of an under-skilled population despite available job vacancies (Vuba 2019). Small and medium enterprises contribute towards employment at 15.4% to the South African economy (Small Enterprise Development Agency 2019). The AA of EAA could lead to scarce skills recruitment to manage systems configurations data mining collaboration coding and programming in SCM (Ronny 2017). Small and medium enterprises play a significant role in economic stimulation through employment (Weber, Geneste & Connell 2015). In a study by Ansara, Endres and Mothibatsela (2019), it was found that approximately 98% of registered small, medium, and micro enterprises (SMMEs) contribute less than 28% towards employment with the government’s aspirations to increase it to 90% in 2030.

Contribution to wealth formation: A growing turnover contributes towards increased profitability of SMEs that stimulate economic wealth (Blackburn et al. 2013). Weber et al. (2015) maintain that enterprise growth is determined by the level of growth in sales, market share, assets accumulation, profitability and the number of employees. In some instances, entrepreneurs find themselves in a detrimental position wherein they use their personal savings for the business (Sjögrén, Puumalainen & Syrjä 2011). Poverty alleviation: It could be regarded as an act of practising economic principles through full employment. Small and medium enterprises play a significant role in providing employment (Ardley et al. 2016). Tax compliance from SME perspective leads to a better distribution of income within the economy (Ardley et al. 2016).

Innovation conception: Innovation conception is demarcated as a modification to processes by adopting technological systems that bring a productive output (Sarri, Bakouros & Petridou 2010; Sun 2011). In a study by Blackburn et al. (2013), it was found that it is critical for SMEs to develop for successful adoption of EAA in SCM; SMEs as prospectors play an important role as major job creators, innovators and sources of growth in free market economies with long-term aspirations on modernisation of systems (Weber et al. 2015).

Limitations of the study

The discussion on the TAM revealed that the adoption of EAA for SCM in SMEs requires profound financial resources to architect expect costs and coding and programming that covers Top Coder, Coderbyte, Project Euler, HackerRank, CodeChef, Exercism.io, Codewars, LeetCode, CodinGame and Policy as Code. The questionnaire was developed in the form of Likert Scale and thus limited the respondents an opportunity to express their in-depth experiences about the adoption of EAA. The South African SMEs are instituted with policy and regulatory measures on economic principle for full employment that narrows the use of technology as a disadvantage to SMEs. Notwithstanding these limitations, the study demonstrates that South African policies governing IT for SMEs promote a slow development in entrepreneurial skill development in the education in science, technology, engineering and mathematics.

Recommendations

It is recommended that further investigation be undertaken in two areas: (1) the knowledge base, skills and experience of software architect should be prioritised in setting-up algorithms to avoid a number of errors in implemented solutions and (2) coding and programming should be edited directly in the integrated code editors within EAA being incorporated with SCM activities.

Conclusion

A much more systematic approach would identify how EATs would be eased towards the adoption of EAA for SCM in SMEs. As a matter of fact, the level of interactions amongst all other variables, just to list a few, information system components, enterprise resources, entrepreneurial characteristics and many other outliers could have a significant influence on the adoption of EAA. A thorough coding and programming during the adoption of EAA could ease the work procedure encrypted in the SCM domain. Finally, yet importantly, EAA is easily distorted by an EAA that is not free of errors. Errors such as runtime, logic, compilation, syntax, interface and arithmetic are beyond the end-users’ capability to resolve them. As such, an architect specialised would be recommended to configure automated solutions through EAA adoption for SCM within SMEs. Continuous modifications in the world of technology seem to have become the biggest encounter in the modern world, which emphasises the constant need to integrate the SMEs into its changing environment. Aiming at modifying the integration challenges, EAA is anticipated as a solution.

Acknowledgements

The author wishes to acknowledge both the Department of Business Management and the Department of Research Administration and Development at the University of Limpopo, for funding this study as well as the reviewers of the manuscript draft. Last but not least all SMEs in Blouberg (Bochum), Molemole (Dendron), Polokwane and Lepelle-Nkumbi (Lebowakgomo) municipalities that participated in the investigation.

Competing interests

The author makes a declaration that there are no financial or personal gains that may have improperly influenced him in writing this article, rather for providing insight into SMEs’ adoption of EAA for SCM, developing framework theory and links with appropriate methods used in research.

Author’s contribution

The manuscript is written solely by Kingston Xerxes Theophilus Lamola. The author used a formal structure that included abstract, introduction, literature review, theoretical review, methodology, questionnaire development, stability and diagnostic test. Last but not least, the research findings that included Pearson correlations, ANOVA, Pearson coefficient and linear regression.

Ethical considerations

Turfloop Research Ethics Committee (TREC) registered with National Health Research Ethics Council, approved this research study. Registration Number: REC-0310111-031. Prior to the collection of primary data, participants were requested to sign a consent form for their permission, stating that their participation is voluntary, and that their feedback will be treated with confidentiality and anonymity.

Funding information

This research received a funding publication fee from the University of Limpopo under the Department of Business Management and Research Department.

Data availability

The data that support the findings of this study are available on request from the corresponding author [K.X.T.L.]. The data are not publicly available because of restrictions on confidentiality stated in ethical considerations, as the questionnaire contains the personal information of the respondents that could compromise the privacy of research participants.

Disclaimer

K.X.T.L. accomplished this research article, in his personal capacity. The thoughts articulated in this article are the author’s own and do not reflect the views of the Turfloop Research Ethics Committee (TREC) registered with the National Health Research Ethics Council and the University of Limpopo.

References

Abraham, R., Burnett, M.M. & Erwig, M., 2008, ‘Spreadsheet programming’, Semantic Scholar 60(1), 2–15, viewed 14 February 2022, from https://www.semanticscholar.org/paper/Spreadsheet-Programming-Abraham-Burnett/e2b52b331a87762ae7f3e0cfeff8a7669281891b.

Ahmad, R., 2020, How to build machine learning algorithms that we can all trust?, viewed 19 August 2021, from https://towardsdatascience.com/how-to-build-machine-learning-algorithms-that-we-can-all-trust-cb00f1c055e1.

Ajibade, P., 2018, Technology acceptance model limitations and criticisms: Exploring the practical applications and use in technology-related studies, mixed method, and qualitative researches, University of Nebraska, Lincoln, viewed 15 September 2021, from https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=5294&context=libphilprac#:~:text=Furthermore%2C%20one%20of%20the%20argument,%26%20Alam%20Kazmi%2C%202015.

Ajzen, I., 1991, The theory of planned behaviour: Organisational behavior and human decision processes, viewed 10 September 2021, from https://www.jstor.org/stable/249008?seq=1#metadata_info_tab_contents.

Anderson, D.R., Sweeney, D.J., Williams, T.A., Camm, J.D. & Martin, K., 2013, Quantitative methods for business, 12th edn., South-Western Cengage Learning, University of New York–Baruch, London.

Anderson, M. & Perrin, A., 2017, Barriers to adoption and attitudes towards technology, viewed 26 February 2021, from http://www.pewinternet.org/2017/05/17/barriers-to-adoption-and-attitudes-towards-technology/.

Ansara, D., Endres, R. & Mothibatsela, B., 2019, OPINION: Open for business? How SMMEs in South Africa can thrive, viewed 04 July 2020, from www.news24.com/fin24/opinion/opinion-how-smmes-in-south-africa-can-thrive-20191118.

Ardley, B., Moss, P. & Taylor, N., 2016, ‘Strategies snarks and stories: SMES owner manager perceptions of business advisers’, Journal of Research in Marketing and Entrepreneurship 18(2), 211–231. https://doi.org/10.1108/JRME-07-2015-0037

Bawa, R., Buchholz, S., De Villiers, J., Corless, K. & Kaliner, E., 2017, Inevitable architecture: Complexity gives way to simplicity and flexibility, viewed 04 August 2021, from https://www2.deloitte.com/insights/us/en/focus/tech-trends/2017/simplifying-it-systems-architecture.html.

Beal, V., 2018a, ERP – Enterprise resource planning, viewed 12 October 2021, from https://www.webopedia.com/TERM/E/ERP.html.

Beal, V., 2018b, MIS-management information system, viewed 24 May 2021, from https://www.webopedia.com/TERM/M/MIS.html.

Becca, R., 2019, The fundamental algorithms of data science part 1: Linear regression, viewed 19 August 2021, from https://towardsdatascience.com/the-fundamental-algorithms-of-data-science-a00dbe2c953.

Benade, S.J. & Pretorius, L., 2012, System architecture and enterprise architecture: A juxtaposition?, viewed 26 August 2021, from http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S2224-78902012000200005.

Bettes, T. & Humble, C., 2020, Software architecture and design InfoQ trends report, April 2020, viewed 19 December 2021, from https://www.infoq.com/articles/architecture-trends-2020/.

Blackburn, R.A., Hart, M. & Wainwright, T., 2013, ‘Small business performance: Business, strategy and owner-manager characteristics’, Journal of Small Business and Enterprise Development 20(1), 8–27. https://doi.org/10.1108/14626001311298394

Bolognese, A.F., 2021, Employee resistance to organizational change, viewed 25 February 2021, from http://www.newfoundations.com/OrgTheory/Bolognese721.html.

Borowski, B., 2021, The 10 most popular coding challenge websites [updated for 2021], viewed 03 October 2021, from https://www.freecodecamp.org/news/the-10-most-popular-coding-challenge-websites-of-2016-fb8a5672d22f/.

Camadan, F., Reisoglu, I., Ursavas, Ö.F. & Mcilroy, D., 2018, ‘How teachers’ personality effect on their behavioural intention to use tablet PC’, The International Journal of Information and Learning Technology 35(1), 12–28. https://doi.org/10.1108/IJILT-06-2017-0055

Chadwick, K., 2018, ‘Supply chain organisation: Design for a digital future’, International Journal of Physical Distribution & Logistics Management 49(10), 945–955. https://doi.org/10.1108/IJPDLM-11-2019-399

Chai, W. & Casey, K., 2022, Software as a Service (SaaS), viewed 20 March 2022, from https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service.

Chen, B., 2014, The biggest tech failures and successes of 2017, viewed 04 August 2021, from https://www.wral.com/the-biggest-tech-failures-and-successes-of-2017/17183921/.

Christensen, L.B., Johnson, B. & Turner, L.A., 2011, Research methods, design, and analysis, 12th edn., Library of Congress Cataloguing-in-Publication Data, Delhi Mexico, NJ.

Claidio, D., 2016, Data communications and IT components or elements, viewed 01 October 2021, from http://www.tipsandarticles.com/data-communication-and-components/.

Crain, A., 2018, Cracking the SAFE: An expert’s take on the scaled agile framework, viewed 19 October 2021, from https://techbeacon.com/cracking-safe-experts-take-scaled-agile-framework.

Davis, F.D., 1989, ‘Perceived usefulness, perceived ease of use, and user acceptance of information technology’, MIS Quarterly 13(3), 319–339. https://doi.org/10.2307/249008

Davis, F.D., Bagozzi, R.P. & Warshaw, P., 1989, ‘User acceptance of computer technology: A comparison of the two theoretical models’, Journal of Management Science 35(8), 982–1003. https://doi.org/10.1287/mnsc.35.8.982

De Groot, J.A., 2014, Biometric security on body sensor networks, Eindhoven University of Technology, viewed 30 January 2021, from https://translate.google.co.za/translate?hl=en&sl=nl&u=https://research.tue.nl/en/publications/biometric-security-on-body-sensor-networks&prev=search.

Delony, D., 2019, What is information security? – Definition & best practices, viewed 12 June 2021, from https://study.com/academy/lesson/what-is-information-security-definition-best-practices.html.

Desmet, D., Maerkedahl, N. & Shi, P., 2014, Adopting an ecosystem view of business technology, viewed 19 February 2021, from https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/adopting-an-ecosystem-view-of-business-technology.

Dillon, A. & Morris, M., 1996, ‘User acceptance of new information technology: Theories and models’, Journal of Annual Review of Information Science and Technology 31(2), 3–32, viewed 17 July 2021, from https://www.researchgate.net/publication/277983543_User_Acceptance_of_Information_Technology_Theories_and_Models.

Dillon, A. & Morris, M.G., 2018, Acceptance of information technology: Theories and models, viewed 27 April 2021, from https://www.ischool.utexas.edu/~adillon/BookChapters/User%20acceptance.htmUser.

Domenica, N.D., Mitra, G. & Birbilis, G., 2007, Stochastic programming and scenario generation within a simulation framework: An information systems perspective, viewed 24 February 2021, from https://www.semanticscholar.org/paper/Stochastic-programming-and-scenario-generation-a-An-Domenica-Mitra/38f7a89db6650d392279bf94218c647a6f42ec2f.

Duarte, C., Sethi, B. & Staley, D., 2017, Our status with tech at work: It’s complicated: You want better results from tech investments and your people have an answer: Involve us more in the process, viewed 14 August 2021, from, https://www.pwc.com/us/en/services/consulting/library/consumer-intelligence-series/tech-at-work.html.

Duermyer, R., 2017, What is an entrepreneur? Definition and examples of an entrepreneur, viewed 02 November 2021, from https://www.thebalance.com/entrepreneur-what-is-an-entrepreneur-1794303/.

Escobar-Rodríguez, T. & Bartual-Sopena, L., 2015, Impact of cultural factors on attitude toward using ERP system in public hospital: Spanish Accounting Review (Universidad Autónoma del Estado de México), viewed 02 November 2021, from http://www.redalyc.org/html/3597/359741634002/.

Esposito, G., Freda, M.F. & Bosco, V., 2015, ‘Examining perception of competency through practicum competencies outline’, European Journal of Training and Development 39(8), 700–720. https://doi.org/10.1108/EJTD-05-2015-0037

Fenech, T., 2018, Using perceived ease-of-use and perceived usefulness to predict acceptance of the World Wide Web, viewed 17 March 2021, from http://www7.scu.edu.au/1839/com1839.htm.

Ferguson, K., 2022, Application architecture, viewed 13 February 2022, from https://www.techtarget.com/searchapparchitecture/definition/application-architecture.

Filson, C.K., 2018, ‘Comparative study of collection management practices of academic libraries’, Journal of Library Management 39(1/2), 66–77. https://doi.org/10.1108/LM-12-2016-0096

Fish, L.A., 2019, Open access peer-reviewed chapter: Supply chain quality management, viewed 16 June 2019, from https://www.intechopen.com/books/supply-chain-management-pathways-for-research-and-practice/supply-chain-quality-management.

Flower, M., 2018, Patterns of enterprise application architecture, 1st edn., viewed 10 March 2021, from https://www.amazon.com/Patterns-Enterprise-Application-Architecture-Martin/dp/0321127420.

Fotheringham, S. & Saunders, C., 2014, ‘Social enterprise as poverty reducing strategy for women’, Journal of Social Enterprise 10(3), 176–199, viewed 10 May 2021, from https://www.emerald.com/insight/content/doi/10.1108/SEJ-06-2013-0028/full/html?casa_token=OjrlqypG0oQAAAAA:JY9Pj7KwmfEZb73o_5H_KFGQNDwRT1_yzxf4Cdxl9JqDwRtIgV5rncu2nb_9rNCyDnkXlQYjlFvWBTkpIF9JIbrI6LD_9GIeISYrIrF3OZcJlB_R_CDk6A.

Gao, Y. & Hafsi, T., 2015, ‘R&D spending among Chinese SMESs: The role of business owners’ characteristics’, Management Decision 53(8), 1714–1735. https://doi.org/10.1108/MD-04-2014-0208

Gebali, F., 2011, Algorithms and parallel computing, 1st edn., viewed 01 October 2021, from https://www.amazon.com/Algorithms-Parallel-Computing-Fayez-Gebali/dp/0470902108.

Gemalto, 2018, Biometrics: Authentication and identification, viewed 18 January 2021, from https://www.gemalto.com/govt/inspired/biometrics.

Georgiadis, G. & Poels, G., 2021, ‘Enterprise architecture management as a solution for addressing general data protection regulation requirements in a big data context: A systematic mapping study’, Information Systems and e-Business Management 19, 313–362. https://doi.org/10.1007/s10257-020-00500-5

Goldenberg, C. & Dyson, D., 2021, Demand flexibility: The key to enabling a low-cost, low-carbon grid oligopolies in a fragmented industry, viewed 23 August 2021, from http://gerard-de-valence.blogspot.com/2017/08/market-structure-in-building-and.html.

Green, R., Agarwal, R. & Logue, D., 2015, Learn more about diffusion theory of technology: Innovation, viewed 15 April 2019, from https://www.sciencedirect.com/topics/social-sciences/diffusion-of-technology.

Hackman, L.C. & Knowlden, A.P., 2014, Theory of reasoned action and theory of planned behavior-based dietary interventions in adolescents and young adults: A systematic review, Dove Press, viewed 06 August 2021, from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4057331/.

Halabisky, D., 2017, 5 ways policy could close the gender gap in entrepreneurship, viewed 17 August 2021, from https://www.weforum.org/agenda/2017/10/five-ways-policy-could-close-the-gender-gap-in-entrepreneurship/.

Hazen, B.T., Kung, L., Cegielski, C.G. & Jones-Farmer, L.A., 2014, ‘Performance expectancy and use of enterprise architecture: Training as an intervention’, Journal of Enterprise Information Management 27(2), 180–196. https://doi.org/10.1108/JEIM-08-2012-0042

Heakal, R., 2018, What are economies of scale?, viewed 13 March 2021, from https://www.investopedia.com/insights/what-are-economies-of-scale/.

Hendricks, D., 2018, Being an entrepreneur can prove difficult, but understanding these 10 traits of other successful entrepreneurs should help, viewed 09 May 2021, from https://www.inc.com/drew-hendricks/10-habits-of-the-successful-entrepreneur.htm.

Hersey, P. & Blanchard, K., 2017, Business dictionary, viewed 03 October 2021, from http://www.businessdictionary.com/definition/business-resources.html/.

Herzberg, F., 1968, Motivation hygiene theory – 2 factor theory, viewed 15 September 2021, from https://marcr.net/marcr-for-career-professionals/career-theory/career-theories-and-theorists/motivation-hygiene-theory-frederick-herzberg/.

Hiltbrand, T., 2021, 5 advanced analytics algorithms for your big data initiatives, viewed 19 August 2021, from https://tdwi.org/articles/2021/07/02/adv-all-5-algorithms-for-big-data.aspx.

Hon, A.H.Y. & Lui, S.S., 2016, ‘Employee creativity and innovation in enterprises: Review, integration, and future directions for hospitality research’, International Journal of Contemporary Hospitality Management 28(5), 862–885. https://doi.org/10.1108/IJCHM-09-2014-0454

Hwang, D. & Min, H., 2015, ‘Identifying the drivers of enterprise resource planning and assessing its impacts on supply chain performances’, Journal of Industrial Management and Data Systems 115(3), 541–569. https://doi.org/10.1108/IMDS-10-2014-0284

Ingram, D., 2018, About supply chain management systems, viewed 28 October 2021, from https://smallbusiness.chron.com/supply-chain-management-systems-43344.html.

Jabbour, C.J.T., De Sousa Jabbour, A.B.L., Filho, W.L. & Gunasekaran, A., 2015, ‘The Millennium development goals and production engineering training’, Journal of Industrial and Commercial Training 47(6), 293–301. https://doi.org/10.1108/ICT-03-2015-0025

Jacobson, L., 2018, Computer system components: Computer parts & functions, viewed 20 May 2021, from https://study.com/academy/lesson/computer-system-components-computer-parts-functions.html.

Jenner, P., 2016, Social enterprise sustainability revisited: An international perspective, viewed 13 September 2021, from https://www.emerald.com/insight/content/doi/10.1108/SEJ-12-2014-0042/full/html?casa_token=Kc3qJWWcsD0AAAAA:Rg-gFG_Op_ows3UKLw3QIgAXbxIbaG1IGh6tvxT7xP8V3MaaAXYPSO3fGn_hayWdnx3Iw3QuQGpWQ4gvfXh-1dzMVyrI8b2HjozkZlknm9OrkhY6GFqREw.

Jiang, J.Y. & Liu, C.W., 2015, Human resource management review, viewed 26 June 2021, from https://www.sciencedirect.com/science/article/pii/S1053482214000461.

Jones, G., 2003, Testing two cognitive theories of insight, viewed 17 July 2021, from https://www.researchgate.net/publication/5756000_Testing_Two_Cognitive_Theories_of_Insight.

Juneja, G., 2019, Importance of customer relationship management (CRM), viewed 05 November 2021, from https://www.managementstudyguide.com/importance-of-crm.htm.

Kaushik, A. & Kumar, A., 2013, ‘Application of cloud computing in libraries’, International Journal of Information Dissemination and Technology 3(4), 270–273, viewed 21 June 2021, from https://ijidt.com/index.php/ijidt/article/view/3.4.9/pdf.

Kihn, S., 2021, Common mistakes made when using email, viewed 10 May 2021, from http://careerminer.infomine.com/common-mistakes-made-when-using-email/.

Knox, C.C. & Haupt, B., 2015, ‘Incorporating cultural competency skills in emergency management education’, Journal of Disaster Prevention and Management 24(5), 619–634, viewed 12 March 2021, from https://www.emerald.com/insight/content/doi/10.1108/DPM-04-2015-0089/full/html?casa_token=XieDtO_4o6oAAAAA:Ma2pRdqpRIwgE9V3DiWLjnlwe8wHbaEoNqqIWgl-M1iHxPOig0E1RxqzGqViE4jpKI7kESVC0rzOJJb3z-3tPS5dFuZ7MCJ86tHy9kpUAlRBD25IJvKE5w.

Kocoglu, D. & Kirmaci, S.K., 2012, ‘Banking sector performance’, Journal of Research in Humanities & Social Sciences 3(2), 33–35.

Kubberød, E. & Pettersen, I.B., 2021, The role of peripherality in students’ entrepreneurial learning, education & training’, Education + Training 60(1), 2–15. https://doi.org/10.1108/ET-06-2016-0106

Kumar, C.C.S., 2000, ‘An application of a system analysis methodology to manage logistics in a textile supply chain’, Supply Chain Management 5(5), 234–245. https://doi.org/10.1108/13598540010350493

Kuntz, J., Connell, P. & Näswall, K., 2017, ‘Workplace resources and employee resilience: The role of regulatory profiles’, International Journal of Career Development 22(4), 419–435. https://doi.org/10.1108/CDI-11-2016-0208

Lawrence, B., 2017, Nine competencies for HR excellence emerge, viewed 20 May 2021, from https://www.hrci.org/community/blogs-and-announcements/hr-leads-business-blog/certification-matters/2017/04/04/nine-competencies-for-hr-excellence-emerge.

Lechesa, M., Seymour, L. & Schuler, J., 2012, ‘ERP Software as Service (SaaS): Factors affecting adoption in South Africa’, in C. Møller & S. Chaudhry (eds.), Re-conceptualizing enterprise information systems, lecture notes in business information processing, p. 105, Springer, Berlin, viewed 25 February 2021, from https://link.springer.com/chapter/10.1007/978-3-642-28827-2_11.

Lee, E. & Rhim, H., 2014, ‘An application of conjoint analysis to explore user perceptions on management information systems: A case study’, Journal of Management Research Review 37(1), 69–88. https://doi.org/10.1108/MRR-10-2012-0213

Leedy, P.D. & Ormrod, J.E., 2014, Practical research, planning and design, 10th edn., British Library Cataloging-in-Publication Data, New York, NY.

Livingstone, L., 2022, What is SAP? Meaning and definition of SAP ERP software, viewed 20 March 2022, from https://www.guru99.com/what-is-sap-definition-of-sap-erp-software.html.

Malatji, W.R., Van Eck, R. & Zuva, T., 2020, Understanding the usage, modifications, limitations and criticisms of technology acceptance model (TAM), viewed 15 September 2021, from https://astesj.com/v05/i06/p12/.

Marais, J., 2021, Policy and regulations: SA ‘completely out of step’ with global SME growth trends, viewed 29 July 2021, from https://www.businesslive.co.za/bd/business-and-economy/2021-07-25-sa-completely-out-of-step-with-global-sme-growth-trends/.

Maverick, 2021, Which types of industries have the largest capital expenditures?, viewed 04 June 2021, from https://www.investopedia.com/ask/answers/020915/which-types-industries-have-largest-capital-expenditures.asp.

Mayhew, S., 2019, What is fingerprint identification?, viewed 18 January 2021, from https://www.biometricupdate.com/201205/what-is-fingerprint-identification.

Menezes, F., 2021, ‘Application architecture: Best practices for future-proofing your apps’, Outsystems Blog, viewed 11 August 2021, from https://www.outsystems.com/blog/posts/application-architecture/.

Menezez, F., 2021, Application architecture: Best practices for future-proofing your apps, viewed 07 May 2021, from https://www.outsystems.com/blog/posts/application-architecture/.

Merritt, T., 2019, Top 5: Ways to end resistance to digital transformation, viewed 10 May 2021, from https://www.techrepublic.com/article/top-5-ways-to-end-resistance-to-digital-transformation/.

Metcalf, A., 2015, ‘Nationwide training limited were chosen by action for blind people to design an ILM Middle Manager Leadership and Management Programme’, Journal of Industrial and Commercial Training 47(6), 326–329. https://doi.org/10.1108/ICT-03-2015-0027

Mills, J., Purchase, V.C. & Parry, G., 2013, ‘Enterprise imaging: Representing complex multienterprise service enterprises’, International Journal of Operations & Production Management 33(2), 159–180. https://doi.org/10.1108/01443571311295617

Mitache, R., 2021, Architecture and talent: A path to fostering the right skills and expertise, viewed 12 August 2021, from https://bizzdesign.com/blog/architecture-and-talent-a-path-to-fostering-the-right-skills-and-expertise/.

Mlangeni, T., 2017, ‘Youth development strategy, an entrepreneurial programme launched in Mbombela: Minister Lindiwe Zulu says the youth needs to be clever, smart and educated to enter into the business world’, Mpumalanga News, viewed 15 August 2021, from https://mpumalanganews.co.za/308951/youth-development-strategy-entrepreneurial-programme-launched-mbombela.

Nair, P.R., 2010, Benefits of information technology implementations for supply chain management: An explorative study of progressive Indian companies, viewed 25 February 2021, from https://www.igi-global.com/chapter/benefits-information-technology-implementations-supply/42266.

Naser, D., 2021, Application-driven advances in multi-biometric fusion, viewed 20 June 2021, from http://tuprints.ulb.tu-darmstadt.de/7324/.

Nel, P.S., Werner, A., Haasbroek, G.D., Poisat, P., Sono, T. & Schults, B.B., 2009, Human resources management, 7th edn., Oxford University Press Southern Africa (Pty) Ltd, Cape Town.

Nickolaisen, N., 2021, Why an enterprise application architecture strategy is still needed, viewed 06 September 2021, from https://searchcio.techtarget.com/tip/Why-an-enterprise-application-architecture-strategy-is-still-needed.

Olavsrud, T., 2020, What is business analytics? Using data to predict business outcomes, viewed 09 September 2021, from https://www.cio.com/article/3601764/what-is-business-analytics-using-data-to-predict-business-outcomes.html.

Oracle, 2021, Supply chain management: What is a supply chain management system?, viewed 09 October 2021, from https://www.oracle.com/za/applications/supply-chain-management/what-is-supply-chain-management-system.html.

Pallant, J., 2013, SPSS survival manual, McGraw-Hill Education, London.

Parise, F., Lygeros, J. & Ruess, J., 2015, ‘Bayesian inference for stochastic individual-based models of ecological systems: A pest control simulation study’, Frontiers in Environmental Science 3, 42. https://doi.org/10.3389/fenvs.2015.00042

Pashaei, S. & Olhager, J., 2015, ‘Product architecture and supply chain design: A systematic review and research agenda’, Supply Chain Management 20(1), 98–112. https://doi.org/10.1108/SCM-12-2013-0487

Ray, S., 2015, Analytics Vidhya. Commonly used machine learning algorithms (with Python and R Codes), viewed 03 August 2021, from https://www.analyticsvidhya.com/blog/2017/09/common-machine-learning-algorithms/.

Rees, W.D. & Porter, C., 2015, ‘Delegation: A crucial but sadly neglected management skill’, Journal of Industrial and Commercial Training 47(6), 320–325. https://doi.org/10.1108/ICT-04-2015-0030

Regalado, A., 2021, The biggest technology failures of 2017, viewed 04 August 2021, from https://www.technologyreview.com/s/609626/the-biggest-technology-failures-of-2017/.

Reichert, F.M. & Zawislak, P.A., 2014, ‘Technological capability and firm performance’, Journal of Technology Management & Innovation 9(4), 20–35. https://doi.org/10.4067/S0718-27242014000400002

Richards, L., 2021, What types of information resources does a business usually need?, viewed 05 June 2021, from http://smallbusiness.chron.com/types-information-resources-business-usually-need-4753.html.

Ritchot, B., 2013, An enterprise security program and architecture to support business drivers, viewed 06 February 2021, from https://timreview.ca/article/713r.

Robbins, S.P. & DeCenzo, D.A., 2014, Fundamentals of management: Essential concepts and applications, 6th edn., Pearson Publishers, NJ, viewed 17 August 2021, from https://www.amazon.com/Fundamentals-Management-7th-Stephen-Robbins/dp/0136109829.

Ronny, 2017, Biggest technological failures of 2017, viewed 04 August 2021, from http://techconnectmagazine.com/biggest-technological-failures-2017/.

Rouse, M., 2021, Decision support system (DSS), viewed 19 June 2021, from https://searchcio.techtarget.com/definition/decision-support-system.

Salovaara, A. & Tamminen, S., 2008, Acceptance or appropriation? A design-oriented critique of technology acceptance models, viewed 15 September 2021, from https://link.springer.com/chapter/10.1007/978-1-84800-385-9_8.

Sanders, M., Zeng, G., Hellicar, M. & Fagg, K., 2016, The power of flexibility: A key enabler to boost gender parity and employee engagement, viewed 04 August 2021, from https://www.bain.com/insights/the-power-of-flexibility/.

Sangam, V., 2010, Supply chain world: Supply chain optimization, viewed 16 June 2021, from https://vijaysangamworld.wordpress.com/2010/10/21/supply-chain-insourcing-vs-outsourcing/.

Sarri, K.K., Bakouros, I.L. & Petridou, E., 2010, ‘Entrepreneur training for creativity and innovation’, Journal of European Industrial Training 34(3), 270–288. https://doi.org/10.1108/03090591011031755

Schnädelbach, H., 2010, Adaptive architecture – A conceptual framework, viewed 06 November 2021, from https://www.quora.com/What-is-a-conceptual-framework-in-the-field-of-architecture.

Schwab, K., 2016, The Fourth Industrial Revolution: What it means, how to respond, World Economic Forum, viewed 08 April 2019, from https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/.

Sharma, K. & Pendyal, M., 2021, Information technology (Intermediary guidelines and digital media ethics code) rules, 2021 – Protection from malicious content or chilling free speech, viewed 19 February 2021, from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3967857.

Sharma, P., 2018, 6 main components of Decision Support System (DSS), viewed 25 March 2021, from http://www.yourarticlelibrary.com/management/decision-making-management/6-main-components-of-decision-support-system-dss/70302.

Shields, C., 2021, Three digital tools to boost employee productivity, viewed 22 February 2022, from https://www.information-age.com/three-digital-tools-to-boost-employee-productivity-123497789/.

Shilman, D., 2017, Solution architecture vs. Software architecture, viewed 12 November 2021, from https://dzone.com/articles/solution-architecture-vs-software-architecture.

Singh, J., 2018, Factors of production: Land, labour, capital and entrepreneur/national income, viewed 28 April 2021, from http://www.economicsdiscussion.net/production/factors-of-production-land-labour-capital-and-entrepreneur-national-income/54.

Sjögrén, H., Flainen, K. & Syrjä, P., 2011, ‘What does the owner-manager want and get out of the business?’, International Journal of Law and Management 53(5), 355–374. https://doi.org/10.1108/17542431111166340

Sliwa, C., 2021, Experts predict hot enterprise architecture trends for 2021: IT architecture trends to watch in 2021 include organizing business around components and expanding tools to focus on business outcomes, automation and analytics, viewed 19 August 2021, from https://searchcio.techtarget.com/feature/Experts-predict-hot-enterprise-architecture-trends.

Small Enterprise Development Agency, 2019, SEDA-eServices Portal, viewed 23 February 2020, from http://www.seda.org.za/.

Smith, J., 2021, The latest trends point towards the development of S-ERP, viewed 12 February 2022, from https://www.cioreview.com/news/3-major-trends-in-enterprise-application-integration-nid-32677-cid-240.html.

Spacey, J., 2015, ‘10 types of business constraint: Simplicable, viewed 10 June 2021, from https://simplicable.com/new/business-constraints.

Stedman, C., 2016, Data mining, viewed 21 March 2022, from https://searchsqlserver.techtarget.com/definition/data-mining.

Stet, M., 2014, Benefits and drawbacks of technology in supply chain management, viewed 25 August 2021, from https://ideas.repec.org/a/cmj/seapas/y2014i5p617-622.html.

Stydom, J., Nieuwenhuizen., C., Antonites, A., De Beer, A., Cant, M. & Jacobs., 2008, Entrepreneurship and how to establish your own business?, Juta & Company Ltd, Cape Town.

Suhadak, R.O. & Mawardi, K.M., 2017, Analysis of the influence of external and internal environmental factors on business performance: A study on micro small and medium enterprises (MSMEs) of food and beverage, viewed 27 January 2019, from https://cyberleninka.ru/article/n/analysis-of-the-influence-of-external-and-internal-environmental-factors-on-business-performance-a-study-on-micro-small-and-medium/viewer.

Sun, H., 2011, ‘The 3-3-3 framework and 7P model for teaching creativity, innovation and entrepreneurship’, Journal of Chinese Entrepreneurship 3(2), 159–166. https://doi.org/10.1108/17561391111144582

Svärd, P., 2013, ‘Enterprise content management and the records continuum model as strategies for long-term preservation of digital information’, Journal of Records Management 23(3), 159–176. https://doi.org/10.1108/RMJ-12-2012-0035

Sweeney, E., 2011, Towards a unified definition of supply chain management, viewed 21 October 2021, from https://arrow.tudublin.ie/nitlart/31/.

Szigligetius, G., 2019, Nonlinear dynamics and stochasticity: A piece on meromorphic anstochasticity, viewed 24 February 2021, from https://www.academia.edu/Documents/in/Nonlinear_Dynamics_and_Stochasticity.

Tolstoshev, N., 2017, Guide for writing functional competencies, viewed 29 December 2021, from https://community.spiceworks.com/howto/40913-assess-EC-competency-level/.

Tozzi, C., 2020, The diminishing role of operating systems, viewed 24 August 2021, from https://www.itprotoday.com/devops-and-software-development/diminishing-role-operating-systems.

Travis, D., 2017, The 8 competencies of user experience: A tool for assessing and developing UX practitioners, viewed 04 June 2021, from https://www.userfocus.co.uk/articles/8-competencies-of-user-experience.html.

Uka, K.K., 2020, ‘Analysis of blockchain architecture in file sharing management for tertiary institution’, Journal of Intelligent Information Management 12(2), 88–104. https://doi.org/10.4236/iim.2020.123007

Vasilaki, E. & Allwood, D.A., 2021, Details of grant, viewed 24 February 2021, from https://gow.epsrc.ukri.org/NGBOViewGrant.aspx?GrantRef=EP/S009647/1.

Vetráková, M., Smerek, L. & Seková, M., 2017, The importance of human resources management in business practice in Slovakia, viewed 20 May 2021, from http://ibima.org/accepted-paper/importance-human-resources-management-business-practice-slovakia/.

Vuba, S., 2019, The missed opportunity: SMMEs in the South African economy, viewed 29 July 2020, from https://mg.co.za/article/2019-04-12-00-the-missed-opportunity-smmes-in-the-south-african-economy.

Walport, M. & Rothwell, D.N., 2019, Council for Science and Technology, viewed 16 June 2021, from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/224953/13-923-age-of-algorithms-letter-to-prime-minister__1_.pdf.

Wayner, P., 2019, The top 5 Software architecture patterns: How to make the right choice, viewed 06 February 2021, from https://techbeacon.com/app-dev-testing/top-5-software-architecture-patterns-how-make-right-choice.

Weber, P., Geneste, L.A. & Connell, J., 2015, ‘Small business growth: Strategic goals and owner preparedness’, Journal of Business Strategy 36(3), 30–36. https://doi.org/10.1108/JBS-03-2014-0036

Wisner, J.D., Tan, K.C. & Leong, GK., 2012, Supply chain management: A balanced approach, South-Western Cengage Learning, Pretoria.

Zaugg, H. & Warr, M.C., 2018, ‘Integrating a creativity, innovation and design studio within an academic library’, Journal of Library Management 39(3/4), 172–187. https://doi.org/10.1108/LM-09-2017-0091

Zhou, J. & Ning, D., 2017, ‘Stochastic community assembly: Does it matter in microbial ecology?’, Microbiology and Molecular Biology Review 81(4), e00002–17. https://doi.org/10.1128/MMBR.00002-17

Ziehr, P., 2022, Enterprise architecture: Less is more… still, viewed 16 February 2021, from https://blog.softwareag.com/enterprise-architecture-less-is-more?utm_source=google&utm_medium=cpc&utm_campaign=bt_alfabet_itpm&utm_region=hq&utm_subcampaign=stg-1&utm_content=Blogpost_less-is-more-a-lesson-in-architecture_stage1&gclid=Cj0KCQiA3rKQBhCNARIsACUEW_YOuO5s6rXhiHnk6TPGO3hkdQUrd-S27_dEkgrdrsT8c4CtL0JOSMUaAjtbEALw_wcB.

Appendix A: Questionnaire

TABLE 1-A1: Employees’ competencies.

Appendix B: Questionnaire

TABLE 1-B1: Actual adoption of enterprise application architecture.


Crossref Citations

No related citations found.