Academia.eduAcademia.edu

DIS FINAL DOC.

AI-generated Abstract

The research explores the role of information technology in enhancing competitive advantage within the financial sector, emphasizing its significance in various operational aspects. It analyzes survey data from 49 participants regarding their perceptions of IT influence on competitiveness, human capacity, and ethical considerations, revealing widespread agreement on IT's critical role. The findings indicate that while a majority acknowledges IT's utility, there are contrasting opinions on its impact related to ethics, suggesting a complex dynamic that warrants further investigation.

CHAPTER ONE: INTRODUCTION 1.1 Introduction Information Technology (IT) has major role in the business environment and the banking sector is no exception (Mahmood, Mahdi and Marziyeh, 2010:158). Amongst the banks available in Swaziland is, First National Bank. First National Bank (FNB) through the use of information technology offers different products and services, for example it has, internet banking, electronic wallet, cellphone banking to mention but a few. In the modern economy, organisations are increasingly seen as knowledge based enterprises in which proactive knowledge management is vital for competitiveness (Mahmood et al., 2010: 158). Information Technology has continuously played an important role in the success of banking institutions and the services provided by them; safekeeping of public money, transfer of money, issuing drafts, exploring investment opportunities and lending drafts, exploring investment being provided. It allows for rapid information exchange and increased responsiveness (Williams and Catsro, 2010: 124). Information technology enables sophisticated product development, better market infrastructure, and implementation of reliable techniques for control of risks and assists the financial intermediaries to reach geographically distant and diversified markets (Laudon and Laudon, 2008:18). Research indicates that information technology is the key ingredient for organisational success (Nyasatu, 2012: 13). This study sets out to establish through a survey, the contribution of information technology towards the achievement and hindrance of competitive advantage in the banking sector in Swaziland especially at First National Bank at the Mbabane branch. 1 1.2 Background to the Problem Prior to FNB going fully automated every individual branch was operating independently without much integration. Branch controllers had to move on stipulated periods to report at the Head Office in Mbabane, depending on the urgency of matters (Chavan, 2013: 19). For example, if a customer has lost a bank book or card, customers were unable to make a transaction in another branch of the bank other than the branch he or she opened the account. Due to a lack of information sharing and unsatisfactory service customers were induced to stop using the banks facility and preferred keeping their money at home, thus leading to reduced profits (Skhosana, 2007: 2). Information technology is increasingly moving from a back office function to prime assistant in increasing the value of a bank over time (Ahmed and Jamal, 2006: 72). IT does so by maximizing pro-active measures such as strengthening and standardising banks infrastructure in respect of security, communication connectivity, moving and towards networking, real time achieving gross inter branch settlement (RTGS) environment the forecasting of liquidity by building real time databases, use of Magnetic Ink Character Recognition and Imaging technology for cheque clearing to name a few (Nyasatu, 2012: 17). According to Ozuru, Chikwe and Uduma (2010: 5) the introduction of information technology at FNB, has brought many benefits amongst which include: Ø there are no barrier limitations; Ø it is convenient; Ø services are offered at minimal costs; Ø it has transformed traditional practices in banking Ø it has high performance through faster delivery of information from the customer and service provider 2 FNB’s management view information technology as one of many tools managers uses to cope with change (Laudon et al., 2012: 52). Using information systems effectively requires understanding of organisation, management, and IT shaping the system. Information system (IS) creates value for the firm as an organisational and management solution to environmental challenges (Laudon et al., 2012: 50). Perhaps, one can safely say advances in information provision have led organisations to develop information technology strategies which interrelate with their corporate strategies (Rogerson, 2004: 13). Telecommunications, hardware and software based information technology includes e-mail, extranet, internet, intranet, Local Area Network (LAN), Wide Area Network (WAN), data mart, data warehouse, microprocessor, and semiconductor (Nyasatu, 2012: 17). These are some of the broader IT innovations and applications, along with the availability of high-powered computers to most workers in companies and of course the internet greatly enhances communication of more accurate and value-added information to workers, managers, executives, and consumers, thus reducing uncertainty and downtime in conducting all types of business. FNB uses IT as a corporate resource and competitive weapon and the focus is on exploiting it for the purposes of gaining competitive advantage (Dïez, 2009: 600). Being competitive in the 21st century will depend on the effective use and application of IT to manage the information resources. IT assists organisations in reshaping themselves according to the changing environment and in this role IT with its strategic perspective helps organisations to achieve internal as well as external advantage (Mahmood et al., 2010: 158). 1.3 Problem Statement The dynamics of new information technologies in the banking sector in Swaziland especially FNB Mbabane are enormous and their impact ranges 3 from information technology officers, employees and customers of the bank (Bayat, 2010:160). As a result of these changes, FNB is increasingly becoming effective and efficient in providing its products and services than ever before, thus creating new bases of competition. Despite cyber space challenges, FNB remains competitive (Marakas and O’Brien, 2011:51). Quick adaptation to new ideas in IT has proved to be an ideal way to go for FNB to penetrate the market in the banking sector. The increasing demand of IS and IT has made the management of it more complex and difficult (Mahmood et al, 2010: 158). This research study is set to investigate the impact of IT in its quest of achieving competitive advantage. It will assist the bank in alleviating challenges brought by the integration of IT. Literature reviewed states that there is a flip side of the technological boom, it comes with serious challenges (Chavan, 2013:23). 1.4 Aim of the Study The aim of the study is to investigate the impact of information technology towards attaining a competitive advantage in the banking sector, a case study at FNB, Swaziland, Mbabane branch. 1.5 The Objectives of The Study · To assess the current information technology process in place at FNB. · To assess the impact of information technology on the attainment of competitive advantage at FNB. · To provide recommendations to the management at FNB and the relevant stakeholders. 4 1.6 · Research Questions What are the components of IT that are contributing towards attaining competitive advantage? · What are the challenges of IT hindering the attainment of competitive advantage? · What recommendations can be offered to the management of FNB and relevant stakeholders? 1.7 Significance of the Study This study is significant in that it will provide valuable insight to the management and staff and present a detailed analysis on the contribution of IT towards the achievement of competitive advantage at FNB. The knowledge generated will assist the management of FNB and the management in the banking sector in gaining an understanding of the components, services and products that have a better chance of providing an edge in the business. This study will further be an asset for those in management as they engage in future planning regarding the provision of banking services and it will also provide information on how the sector has integrated itself globally in the IT sector. 1.8 Format of the Study Chapter one – Introduction. This chapter presents the research problem and its background. The aim, objectives, research questions, significance of the study are also discussed. Chapter two – Literature Review. This chapter provides a comprehensive review of the literature sources that were consulted. Chapter three – Research Methodology. This chapter provides a summary of the theory and concepts surrounding research methodology for this study. 5 Chapter four – Results, Discussion and Interpretation of the findings. This chapter presents the results, discussion and interpretations of findings. Chapter five – Recommendations and Conclusions. This chapter presents the conclusions of the research and recommendations made to the organisation. 1.9 Conclusion Successful firms and managers understand the milestone IT entails and how it works and they take an active role in shaping its use and measure its impact on revenues and profits. Information systems often change an organisation as well as its goods and services, driving it into a new behavioural pattern. However successfully using Information Systems to achieve competitive advantage is challenging and requires precise coordination of Technology, Organisation and Management (Laudon et al., 2008). This chapter provided the introduction and background to the study. The aims, objectives, research questions, and significance of the study. Chapter two will provide an overview of the literature that is available to this study. 6 CHAPTER TWO: LITERATURE REVIEW 2.1 Introduction A literature review discusses published information in a particular subject area, and sometimes information in a particular subject area within a certain time period (Boote and Beile, 2005: 4), or it might trace the intellectual progression of the field, including major debates. Depending on the situation, the literature review may evaluate the sources and advise the reader on the most pertinent or relevant information (Nyasatu, 2012: 18). Naidoo (2010: 8) states that the literature review is a very important part of the research process and make a very important contribution to almost every operational step involved. The literature review will cover information technology and information systems, the concept of competitive advantage in business, the components of IT with potential contribution to competitive advantage in banking and the contribution of products and services to competitive advantage in banking, the challenges brought by IT in organisations. Based on the literature review one may conclude that the banking industry has undergone a fundamental transformation through the expansion in IT (Charbaji, 2005: 229). 2.2 Information Technology Components and Competitive Advantage 2.2.1 Information Technology Developments in IT have caused a revolution in information distribution (Kotler and Keller, telecommunications, 2006:139). database IT consists management of hardware, and other software, information processing technologies used in computer-based information systems (Marakas et al., 2011: 678). IT plays a significant role in the growth of most industries. IT has given rise to new innovations in the product designing and their delivery in the banking and finance industries (Agrawal and Jain, 2012: 90). Its need in 7 consumer banking can be justified by the following consideration where only IT infrastructure can help handle these issues (Ahmed and Jamal, 2006: 71): Ø Fast application processing – by using IT, processing of customers’ application is fast. In this era of high competition, it is the better service that attracts customers towards doorstep. Ø Auditing and fraud detection – with IT framework, banks can closely monitor accounts for risk analysis. They are in a better position to identify fraudulent activities in time and prevent it, saving their money. Ø Reduce calculation errors and have efficient loan recovery – good consumer banking software reduces calculating time and error free. Efficient collection software is very useful to support the collections. Ø Mass consumer client record handling – at FNB the number of clients is very high and to keep records of all customers manually is hard to maintain, time consuming and resource intensive (Jamal et al., 2006: 4). 2.2.2 Information Systems Information system can be any combination of people, hardware, software, communications networks, data resources and policies and procedures that store, retrieve, transform and disseminate information in an organisation (McConnell and Brue, 2008: 312). It is a system that accepts data resources as input and processes them into information products (Marakas et al., 2011: 38). A potential usefulness of different kinds of Information Systems for environmental management is well recognised (Diez, 2009: 589). 2.2.3 Components of Information System (Development of Infrastructure and Human Capacity) 2.2.3.1 All information systems use people, hardware, software, data, and network resources to perform input, processing, output, storage, and control activities that transform data resources into 8 information products (Marakas et al., 2011:65-68). There is a requirement to develop infrastructure and human capacity in order to adapt to global technology (Chavan, 2013:22). 2.2.3.2 Hardware – this is the mechanical components of a computer system and is physical in nature (Fick, 2009: 4). O’Brien et al., (2011:67) says hardware consist of machines and media, physical devices and material that are used in information processing. These are computer systems and peripherals such as laptops, printers, and so forth. 2.2.3.3 Software – this refers to the instructions given to a computer in order to function in a certain way and these instructions consist of electronic data and one incorporeal in nature. Software resources include both software and procedures (Fick, 2009: 4). It is also important to note that computer components are used not only in computers, but also in various other devices such as cellular telephones (Fick, 2009:4). 2.2.3.4 People’s resources – this include the end users and IT specialist who uses information systems or the information it produces. These can be customers, salespersons, engineers, clerks, accountants or managers and are found at all levels of an organisation. 2.2.3.5 Network resources- the concept network resources emphasize that communications technologies and networks are fundamental resource components of all information systems. resources include communication media and Networks network infrastructure (Nyasatu, 2012:18). 9 2.2.3.6 Communication media – this included infrastructure like twisted pair, coaxial, fibre optic cables and wireless satellites which enables communication (Nyasatu, 2009: 18). 2.2.3.7 Network infrastructure – this is the generic category that emphasizes that many hardware, software and data technologies are needed to support the operation and use of a communication network. This includes processors such as modems and inter- network processors, and communications control software such as network operating systems and internet browser packages (Fick, 2009:28). 2.2.3.8 Data resources–data resources constitute valuable organisational resources. Examples can be smart cards. A smart card is a plastic card with a microchip embedded in it which enables it to store data and process information. The smart card has computer intelligence which performs various functions in respect of the stored data (Fick, 2009:4). 2.2.4 Types of Information Systems 2.2.4.1 Expert system – this is knowledge based system that provided expert advice and acts as a consultant to users. These can be credit application advisor or diagnostic maintenance system. 2.2.4.2 Knowledge management system – supports the creation, organisation and dissemination of business knowledge within the organisation. An example of this system is intranet access to best business practices, sales proposal strategies and customer problem resolution systems. 2.2.4.3 Functional business system – support a different operational and managerial applications of the basic business functions of the company. An example of this would be information system that 10 supports applications in accounting, finance, marketing, operations management and human resource management. 2.2.4.4 Strategic information systems – supports operations and management processes that provide an organisation with strategic products, capabilities and services towards competitive advantage. An example of this is internet; buying online and shipment tracking. Advances in in information provision have led organisations to attempt to develop Information Systems or Information Technology strategies which interrelate with business strategies which support corporate missions (Ahlemann, 2009:22). 2.2.5 Information Technology as a Competitive Advantage Tool Gaining a competitive advantage over competitors requires the innovative application of IT (Marakas et al., 2011: 43). Business must be competitive to stay in business. When profits begin to decrease, the business must look for ways to improve its profits. Installing new equipment and systems that allow workers to be more efficient and provide better services in less time is always guaranteed a solution, (Eggland, Dlabay, Burrow, Ristan, 2002:18). Mahmood et al., (2010: 159) argues that competitive advantage in the digital economy is even more important than in the old economy. He believes IT enables companies to gain competitive advantage and to greatly benefit at the expense of those that are subject to competitive disadvantage. Management in its quest to improve service delivery through IT need to state a number of reasons as to why they have interest in inventing into it. The most common includes the need to sustain and improve their competitive position, to increase revenue or reduce costs or to improve flexibility and responsiveness. While these are important, many organisations are driven simply by the need to maintain their position in a highly competitive market place with no exception to the banking sector (Chavan, 2013: 19). For example, FNB has installed automated teller 11 machines (ATM) to increase customer service. This is a result of rapid technological progress and development in the financial market (Johnson, 2005: 69). The banking environment has become highly competitive today. Financial innovations lower costs of capital, reduce financial risk, improve financial intermediation and enhance societal welfare (Agrawal et al., 2012: 90). To be able to survive and grow in the changing market environment banks are going for the latest technologies, which is being perceived as an ‘enabling resource’ (Agrawal et al., 2012: 90). For instance, the internet, competitors are a click away. If clients are not happy with the products, prices or services offered by a particular bank, they are able to change their banking partner much more easily than in the physical real bank-client relationship (Chavan, 2013: 20). An example, is the value use of cellphone banking, customers can pay all their utility bills while at their comfort zone. From the bank’s point of view, the use of internet has significantly reduced the physical cost of banking operations. As discussed by Turner (2001), progress in IT has slashed the cost of processing information while the internet has facilitated its transmission, thus facilitating change in the essence of banking business (Mahmood et al., 2010:158). Innovation in IT has taken an important place in the future development of financial services, especially banking sector transitions are affected more than any other financial institutions (Chavan, 2013: 19) 2.2.6 Business and Information Technology Nyasatu (2012:17) assets that, technology has continuously played an important role in the success of banking institutions through the provision of these services; safekeeping of public money, transfer of money, issuing drafts, exploring investment opportunities and lending drafts, exploring investment being provided. Technology enables sophisticated product development, better market infrastructure, and implementation of reliable techniques for control of risks (Johnson, 2005: 70). IT helps the financial 12 intermediaries to reach geographically distant and diversified markets (Ozuru et al., 2010: 2). The internet has significantly influenced service delivery channels in the banking sector. The internet has emerged as an important medium for delivery of banking products and services and staying ahead of the rivals (Charbaji, 2005: 229). Through the use of internet, the bank is now well informed about their customer’s needs. The customers transact online; get account statements, transfer funds and pay bills by just punching a few keys on their gadgets (Chavan, 2013: 20). The smart card’s such as, cards with microprocessor chips have added new dimension to the scenario. Payments of electricity and telephone bills have become easier. The upgradeability and flexibility of internet technology offer unprecedented opportunities for the banks to reach out to its customer (Andreeson, Grillo and Wyatt, 2013: 1). IT is increasingly moving from a back office function to a prime assistant in increasing the value of a bank over time (Braga, de Freire Fuentes, Freitas, de Carvalho, de Sousa and Bastos (2005:78). IT maximizes banks proactive measures such as strengthening and standardising banks infrastructure in respect of security, communication and networking, achieving inter branch connectivity, moving towards Real Time Gross Settlement (RTGS) environment. The forecasting of liquidity by building real time databases, use of Magnetic Ink Character Recognition and Imaging technology for cheque clearing to name a few (Nyasatu, 2012: 22). The key driver to date has largely been the increasing sophistication in technology and the growing popularity of the internet. The shift from traditional banking to electronic banking is changing customer’s expectations (Agrawal et al., 2012: 90). Customers no longer wait in long queues and spend hours in banking transactions. This change in customer attitude has gone hand in hand with the development of ATM’s, Mobile phone and net banking along with availability of services right at customer’s door step (Agrawal et al., 2012: 90) 13 2.2.7 Competitive Advantage The term competitive advantage is often used when referring to a firm that is leading an industry in some identifiable was. This is when a firm sustains profits that exceed the average for its industry (O’Brien et al., 2011:87). Tompson, Peteraf, Gamble and Strickland (2012: 54) argues that competitive advantage comes from an ability to meet customer needs more efficiently, with products or services that customers value more highly or more efficiently at lower costs. Meeting customers’ need more cost effectively can translate into being able to charge lower prices and achieve higher sales volumes, thereby improving profits on the revenue side as well as the cost side. One of the major factors management in competitive environment is knowledge and companies for achieving the competitive advantage should concentrate in information system. Competitive advantage is the edge that a firm has over its competitors (Salehi, 2010:158). When a firm sustains profits that exceed the average for its industry, the firm is said to possess a competitive advantage over its rivals. FNB’s goal, like any firm is to achieve a sustainable competitive advantage (Turban, King, Kyu Lee and Viehland, D. 2006:18). Competitive advantage allows the firm to generate greater sales or margins and/or retain more customers than its competitors. The key to winning and keeping customers is to understand their need better than competitors do and deliver more value. (Kotler et al., 2005:270). He also says developing products and services, processes or capabilities that give a company a superior business position relative to its competitors and other competitive forces. There can be many types of competitive advantages, including the firm's cost structure, product offerings, distribution network and customer support. Competitive advantages provide a company with an ability to generate greater value for the firm and its shareholders. The more 14 sustainable the competitive advantage, the more difficult it is for competitors to neutralize the advantage. 2.2.8 Strategies for Competitive Advantage Mahmood et al., (2010:158) presented the following strategies as cited by Turban (2006): 2.2.8.1 Cost leadership strategy: Produce products and/or services at the lowest cost in the industry. A firm achieves cost leadership in its industry by thrifty buying practices, efficient business processes, forcing up the prices paid by competitors, and helping customers or suppliers reduce their costs. 2.2.8.2 Differentiation strategy: Offer different products, services, or product features. By offering different, “better” products companies can charge higher prices; sell more products, or both. 2.2.8.3 Niche strategy: Select a narrow-scope segment (niche market) and be the best in quality, speed, or cost in that market. 2.2.8.4 Growth strategy: Increase market share, acquire more customers, or sell more products. Such a strategy strengthens a company and increases profitability in the long run. 2.2.8.5 Alliance strategy: Work with business partners in partnerships, alliances, joint ventures, or virtual companies. This strategy creates synergy, allows companies to concentrate on their core business, and provides opportunities for growth. 2.2.8.6 Innovation strategy: Introduce new products and services, put new features in existing products and services, or develop new ways to produce them. Innovation is similar to differentiation except that the impact is much more dramatic. Differentiation “tweaks” existing products and services to offer the customer something 15 special and different. Innovation implies something so new and different that it changes the nature of the industry. 2.2.8.7 Operational effectiveness strategy: Improve the manner in which internal business processes are executed so that a firm performs similar activities better than rivals (Porter, 1996). Such improvements increase employee and customer satisfaction, quality, and productivity while decreasing time to market. Improved decision making and management activities also contribute to improved efficiency. 2.2.8.9 Customer-orientation strategy: Concentrate on making customers happy. Strong competition and the realization that the customer is king; is the basis of this strategy. Web-based systems that support customer relationship management are especially effective in this area because they can provide a personalized, one-to-one relationship with each customer. 2.2.8.10 Time strategy: recognise time as a resource, then manage it and use it to the firm’s advantage. “Time is money,” “Internet time” (that is, three months on the internet is like a year in real time), first-mover advantage, just-in-time delivery or manufacturing, competing in time (Keen, 1988), and other time-based competitive concepts emphasize the importance of time as an asset and a source of competitive advantage. One of the driving forces behind time as a competitive strategy is the need for firms to be immediately responsive to customers, markets, and changing market conditions. A second factor is the time-to-market race. By introducing innovative products or using IT to provide exceptional service, companies can create barriers to entry from new entrants. 2.2.8.11 Lock in customers or suppliers strategy: Encourage customers or suppliers to stay with you rather than going to competitors. 16 Locking in customers has the effect of reducing their bargaining power. 2.2.8.12 Increase switching costs strategy: Discourage customers or suppliers from going to competitors for economic reasons. 2.2.9 Michael Porter two types of Competitive Advantage Porter (2009:62-68), identified two types of competitive advantage as cost advantage and differentiation advantage which both are utilised by FNB. Cost and differentiation advantages are known as positional advantages since they describe the firms’ position in the industry as a leader in either cost or differentiation. 2.2.9.1 Cost Advantage A cost competitive advantage exists when the firm is able to deliver the same benefits as its competitors but at a lower cost. Cost leadership translates into above-average. 2.2.9.2 Differentiation Advantage -Differentiation advantage exists when a firm is able to deliver benefits that exceed those of competing products. 2.2.10 Competitive Advantage Sustainability. Turban et al. (2006) suggest some ways to accomplish competitive sustainability with the help of IT as follows: Ø Using inward systems that are not visible to the competitors. Ø If a company uses outward systems to sustain competitive advantage, one way to protect those systems is to patent them. Ø Developing a comprehensive, innovative, and expensive system that is very difficult to duplicate. Ø Using modified approach. 17 2.2.11 Impact of the internet in the Banking Industry The internet is globally widespread in use, becoming an integral of IT as well as many households. (Oluwagbemi, Joshua and Philip, 2011: 63) According to Turban et al. (2006), because the internet has changed the nature of doing business, it has also changed the nature of competition. Porter (2009) himself argues that the internet does not change the model, but that it is only another tool to be used in seeking competitive advantage. In his words, “The internet per se will rarely be a competitive advantage. Many of the companies that succeed will be the ones that use the Internet as a complement to traditional ways of competing, not those that set their Internet initiatives apart from their established operations” (Porter, 2001:64). Mahmood et al. (2010) again presents discussions by Porter (2001) and Harmon et al. (2001) where they presented some ways the internet influences competition in the five factors: Ø The threat of new entrants. Ø The bargaining power of suppliers. Ø The bargaining power of customers (buyers). Ø The threat of substitute products or services. Ø The rivalry among existing firms in the industry. Porter (2006) concludes by saying that the overall impact of the internet is to increase competition, which negatively impacts profitability. According to Porter, (2006: 66), “The great paradox of the internet is that it’s very benefits—making information widely available; reducing the difficulty of purchasing, marketing, and distribution; allowing buyers and sellers to find and transact business with one another more easily—also make it more difficult for companies to capture those benefits as profits”. The internet has also its own disadvantages; one of the major disadvantages is cybercrime – illegal activity committed on the internet 18 (Mahmood et al., 2010:165). The internet, along with its advantages, has also exposed the society to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, software piracy and so on, which invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise and FNB is not spared to these challenges (Chavan 2013:19). 2.2.11.1 Internet Banking Reviewed literature defines internet banking as the use of internet to deliver banking activities such as fund transfer, paying bills, viewing current and savings account balances, paying mortgages and purchasing financial instruments and certificates of deposits (Ahasanul et al., 2009: 1877). Singhal (2008) states that internet banking is now used for new age banking system (Chavan, 2013:20). Internet banking or online banking refers to the performing of transaction and payments over the web through the bank. The customer are allowed to do the banking out banking hours and from anywhere through the internet (Awamleh, 2003). The use of internet banking has brought many benefits amongst which include: Ø No barrier limitations, Ø It is convenient to use; it saves time and makes it possible to access the use of innovative product or service at a low transaction fees, Ø It has transformed traditional practices in banking in that it encourages queue management which one of the important dimensions of e-banking service quality (Khan, Mahapatra and Sreekrumah, 2009: 33). Ø Through internet applications is the only way to stay connected to the customers at any time and any place. Ø It results in high performance in banking industry through faster delivery of information from the customer and service provider. 19 2.2.11.2 Automated Teller Machines Automated Teller Machines are computer controlled devises that dispenses cash, accept cash and provide and other customer services for customers who identify themselves with secret pin numbers of their ATM cards. They dispense cash at any time of the day anywhere, where there is an FNB ATM, inside and outside Swaziland. This is a migration from the traditional methods where customers were to queue for a long time in order to get cash or deposit cash (Chavan, 2013:22). ATMs became major revelations for customers, since it offered the facility to avoid long queues in front of the cashiers in banks (Chavan, 2013:22). 2.2.11.3 Cellphone and On-line Banking Cell phone banking is a mode of internet banking that allows customers to operate their accounts with the bank from mobile phones to a large extent as long as their phones and network support short messaging services. Oluwagbemi et al. (2011:63), assets that internet banking also known as ebanking uses Global System Mobile Communication (GSM). He argues that GSM has improved the operational efficiency of many banks. With the aid of information technology, on-line banking provides the ability to pay all their utility bills while at their comfort zone and also for balances (Nyasatu, 2012:42). 2.2.11.4 Electronic Mail Information technology has given rise to electronic mail which enables communication easily across employees, individuals external and across various geographical boundaries. This makes it possible to deliver enhanced customer centric services (Abah, 2011:67). 20 2.3 Information Technology Challenges Information technology especially the internet has given rise to new opportunities in every field society can think of – be it entertainment, business, sports or education (Braga, 2005:138). Innovation in IT has taken an important place in the future development of financial institution, especially in the banking sector (Chavan, 2013: 19). With the fast growing of internet, interest in computer crime, ethics and privacy has increased. These include identity theft, child pornography on websites and credit cards numbers posted on chat rooms (Cullom, 2001: 2). Andreesen et al. (2013:1), argues that there are significant challenges facing IT leaders in the financial sector. Andreesen et al., (2013:1) further mention some of the major challenges include mobile commerce, social media, the safeguarding of client and employee data, risk management, management classification of data, IT infrastructure planning, business continuity and employee retention with the IT field (Mohlala, Goldman and Goosen, 2012:1). There are several classes of activities which may also harm information technology such as viruses, worms, Trojan horse, time bomb logic bomb and trapdoors (Cullom, 2001: 4). “As information and communications technology become even more pervasive and aspects of electronic crime feature in all forms of criminal behaviour, even those matters currently regarded as ‘traditional’ offences (Gordon and Ford, 2006:14). The growth in information society is accompanied by new and serious threats, it involves drugs trafficking, people smuggling and money laundering (Etter, 2001: 23). Essential services such as water and electricity supply heavily rely on ICTs. Attacks against information infrastructure and internet are high and are causing enormous financial damage (Andreesen et al., 2013: 2). 2.3.1 Cybercrimes Cybercrime is a growing threat in a world where most individuals and organisations rely upon the internet and connected technologies, opening 21 themselves up to the attack risk from global criminals around the world (Sommer, 2011:3). Jiabao (2010:4) defines cybercrime as an economic crime committed using computers and internet. It includes distributing viruses, illegal downloading files, phishing and pharming, and stealing personal information like bank details. Criminal actions accomplished through the use of computer system, especially with internet to defraud, destroy or make authorised use of computer system resources (Marakas et al., 2011:672). BaFin, the German financial services regulator asserts that the risk arising from any abuse of the financial system for money laundering purposes apply equally if criminals seek to embroil it in the financing of terrorism or in acts of the fraud (Sommer, 2013: 3). It, is therefore especially important that financial institutions do their utmost best to combat and prevent cyber-crimes (Veter, Cho and Sidebottom, 2012: 6). Cyber-crime is becoming more intense as there is an increase in Net’s growth business. Criminals are doing everything from stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorism (Marakas et al., 2011:568). Thieves have at their fingertips a dozen tools form “scans” that ferret out weakness in website software programs to “sniffers” that snatch passwords (Marakas et al., 2011:569). Dlamini (2014) in a report adopted on Cybercrime in Commonwealth countries in Botswana stated that Cybercrime is estimated to cost the global economy US$200 billion (R2 trillion) and is regarded as a serious concern to both developing and non-developing countries. In endorsing the report, ministers recognised that Commonwealth is leading the way in developing mechanisms to combat cybercrime (Dlamini, 2014: 18). Criminals now use the internet for extortion, fraud, money laundering and theft because IT lets them carry out these crimes more efficiently and with less risk (Fick, 2009: 1). Internet provides criminals a way to move money rapidly among bank accounts and countries. This nature of internet makes 22 it difficult for police to follow transactions to gather evidence, and national laws differ enough to make prosecution difficult (Fick, 2009:1). Cybercrimes can be basically divided into 3 major categories (Williams, 2008:3) 2.3.1.1 Cybercrimes Against Persons Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important cybercrimes known today (Olusola, Samson, Semiu and Yinka, 2013:20). This is one cybercrime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled (Fick, 2009:7-8). 2.3.1.2 Cybercrimes Against Property Cybercrimes against all forms of property are crimes that include computer vandalism (destruction of others' property), transmission of harmful programmes such as virus or denial of the entire property (Olusola et al., 2013:20). An example of this is the Mumbai-based upstart engineering company lost a large amount of money in their business operation when their rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy. 2.3.1.3 Cybercrimes Against Government The category third of Cyber-crimes relate to Cybercrimes against Government. Cyber terrorism is the leveraging of organisations computers and information particularly via internet to cause physical hard or disruption of infrastructure (Marakas et al., 2011: 571). The growth of internet has shown that the medium of Cyberspace is being used by 23 individuals and groups to threaten the international governments as also to terrorise the citizens of a country (Olusola et al., 2013:20). This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website. 2.3.2 Card Skimming ‘Card skimming’ is the illegal copying of information from the magnetic strip of a credit or ATM card which FNB is also a victim of (Fick, 2009: 9). South African Banking industry has experienced a high volume of incidents of card skimming. Criminals when skimming they use devices which has a software program that is designed to overcome security measures on ATMs (Fick, 2009:9). Smart (2013), says card fraud has doubled over the year 2009. “Even we were surprised,” Pieter du Toit, CEO of FNB said, “We expected an increase—but a 100% increase is frightening.” This specifically relates to cheque and debit card fraud as credit card fraud has actually decreased by around 40% (Du Toit, 2010:8). Dube (2014) said the most common fraud in Swaziland is card skimming, whether at ATMs or points of sale. At ATMs, fraudsters tamper with the ATM so customers can’t insert their cards. The fraudster then “assists” the customer by “cleaning” the card and skimming it, unjamming the ATM in the process and “shoulder-surfing” to get the PIN. Another trick is to wait until a customer has completed a transaction, then calling the customer back and saying the transaction isn’t complete. The customer then has to put his card into the ATM once again, and enter his pin. Once again, the fraudster “shoulder-surfs” the PIN. The fraudsters can use a high-tech skimming device on a Saswitch machine. The ATMs are jammed, so customers are directed to the Saswitch, where the card is skimmed and the PIN is viewed by either camera or Bluetooth device (Du Toit, 2010 :8). 24 2.3.3 Macro-environmental Effects (Political, Ethical, Economic, Social Technological) 2.3.3.1 Ethical controversy Information technology has caused ethical controversy in the areas of intellectual property rights, customers and employees’ privacy, security of company information and workplace safety (Marakas et. al., 2011: 565). The legal, technical and institutional challenges posed by the issue of cybercrime are global and far-reaching. It can only be addressed through a coherent strategy taking in to account the role of different stakeholders and existing initiatives, within a framework of international cooperation (Andreesen et al., 2013:2). Confidentiality, integrity, and authentication are very important features of the banking sector and were successfully managed over the pre-internet times. Communications across an open and thus insecure channels such as internet might not be the best for bankclient relations as trust might partially be lost (Chavan, 2013: 24). 2.3.3.2 Cyber Law – Political and Legal This term describes law that intends to regulate activities over the internet via the use of electronic data communication. However, integration between technology and law is controversial. Cyber law encompasses a variety of legal and political issues related to the internet and other communication technologies, including intellectual property, privacy, freedom of expression and jurisdiction. Legal and regulatory compliance is inadequate (Chavan, 2013:22). The criminal abuse of information technology and the necessary legal responses are issues that still challenging in the constant technical development as well as the changing methods and ways in which offences are committee (Gercke, 2012:12). Technological boom is not only susceptible to, but may exacerbate some of risk, particularly governance, legal, operational and reputational which is inherent in traditional banking. This poses new challenges; however some economies have modified their regulations to achieve their main objective; 25 ensuring the safety and soundness of their banking systems (Fick, 2009:3). Law enforcement with regard to investigating crimes and handling evidence, dealing with offenders, and assisting victims, poses complex new challenges (Chavan, 2008:8). Chavan (2008) further argues that, there is an unprecedented need for international commitment, coordination and cooperation since cyber-crime is truly a global phenomenon. The legal concepts are hardly designed to cope with today’s advancing technology, nor the traditional methods of detection, investigation and prosecution of crime designed to bring cyber criminals in to book (Fick, 2009:3). 2.3.3.3 Economic Challenges This includes factors at the local, state, national, or international level that affect firms and industries. These include the rate of economic growth, unemployment rates, inflation rates, interest rates, trade deficits or surpluses, savings rates, and per capita domestic products (Skhosana, 2007:8). Some industries, such as banking, are particularly vulnerable to economic downturn but are positively affected by factors such as low interest rates. Others, such as discount retailing, may benefit when general economic conditions weaken, as consumers become more price – conscious (McConnell et al., 2008). Ø Inflation – this is continual rise in the general price level (Mohr, Philip and Associates, 2008: 140), inflation introduces uncertainly into decision making for Shoprite. Inflation can be demand pull or cost push. Demand pull occurs when the demand for goods and services is higher than the supply (too much money chasing a few goods) while cost push inflation occurs when costs of production continually increases, resulting to increasing the selling price. Inflation then reduces production which Shoprite is also not immune to do. 26 Ø Business cycle this is the pattern of expansion and contraction of economic activation around a long-term growth (Mohr, 2012). Shoprite and its customers must make certain value adjustment during the various phases of the business cycle in order to adapt to emerging economic realities. So in these phases Shoprite profit decline during recession and grow during business boom. Ø Interest rates – this is price paid for money (Mohr et al., 2008: 140). In times of recession or business boom the reserve bank uses interest rather to influence the money supply. For Shoprite to increase its production he has to increase capital or investment. Interest rates have an inverse relationship to investment (McConnell et al., 2008: 56). Mohr (2012), highlight the following implications of higher interest rates; Debt financing becomes more expensive and places Shoprite’s liquidity under pressure. High interest rates can dissuade the consumers from buying durables products like furniture, electrical and household appliances. Shoprite allows consumers to buy these items on hire- purchases basis and these higher interest rates discourages such purchases and thus leading to slow business for Shoprite. 2.3.3.4 Social Challenges This includes the societal values, altitude cultural factors and lifestyle that will or does impact on Shoprite business (Saunders, Lewis and Thornhill, 2009:151). Social forces vary by local and charge overtime. Innovations lower costs of capital, reduce financial risks, improve intermediation, and enhance welfare while on the other hand increase unemployment (Olugwabemi et al., 2011: 91). 2.3.3.5 Technological advancement challenges This increase in innovations are a regulations, globalization, result of number of government’s integrations with financial markets and 27 increasing risk in the domestic financial markets (Olugwabemi et al., 2011: 90). 2.3.3.5.1 Software Piracy Software piracy is theft of software from computers by thieves who illegally copy software on line (Marakas et al., 2011: 565). Some cyber criminals compel users to download certain software, while such software is presented as a antivirus, after some time it starts attacking the user’s system. Then the user has to pay the criminals to remove such viruses (Bajaj, 2008: 6). 2.3.3.5.2 Computer viruses and worms This is a major computer crime performed by thieves by creating computer viruses. (Marakas et al., 2011: 576). A virus is a program code that cannot work without being inserted into another program. It typically enters computer systems through emails or file attachments via internet and affects the storage devices of a computer or network, which then replicate information without the knowledge of the user (Bajaj, 2008:6). 2.3.4 Employee Retention within the Information Technology is a Challenge The IT industry in Southern African Banks is faced with a shrinking pool of skilled employees causing demand to increase for these employees (Mohlala et al., 2012: 1). This common dependency of IT employees could be devastating to a business if some of the key employees were to leave. The business impact may include loss of corporate memory, disrupted projects that may over-run on defined schedules and budgets and quality (Mohlala et al., 2012:1). In order to stay abreast of this decline, technologically advanced organisations are increasingly on the lookout for highly skilled workers, whilst the labour market is dominated by people with limited skills (DPRU, 2006:1). 28 2.3.4.2 Advancing Technology According to Gaylard, Sutherland and Viedge (2005:8) the life span of information technology knowledge is approximately 2.5 years, and is rapidly decreasing all the time. This decrease is the result of advancing technology that is now used to store, organise and easily retrieve existing information (Mohlala et al, 2012:2). Hira (2008:1) raised a concern that skills shortages must not be confused with the shortage of unique skills required to support the emerging technologies, because skills, by definition will always be short in supply. 2.3.4.3 High Employee Turn-over Employee turn-over has also been identified by information technology experts as one of the reasons that a retention strategy in needed. Fheili (2007:69) argues that employers need to focus on the causes of employee turnover in an attempt to eradicate the effects thereof. 2.3.4.4 Lack of employee development The lack of employee development has led to a major debated in the information technology industry. Experts who oppose the view of skills shortages state that the existing skills gap problem can be attributed to employees not being willing to train their employees (Mohlala et al., 2012:2). Dubie (2008) explains that one of the contributing factors to information technology skills shortages it that organisations are not willing to invest time and money to train their employees. 2.3.5 Bandwidth Problems (if network present) There are some banks where network already exists but they do not have enough bandwidth to bear the traffic load (Ahmed et al., 2006:73). When bandwidth is not enough there is usually a traffic jam and customers have 29 challenges of failed transactions when doing internet banking. This also poses the threat of hacking by criminals (Andreesen et al., 2013: 8). 2.4 Conclusion The twenty-first century has brought about an all-embracing convergence of computing, communications, information and knowledge information has emerged as an agent of integration and the enabler of new competitiveness for today’s enterprise in the global marketplace. Due to that strategic IS supports or shapes competitive strategies, the concepts of information system is so important. IT can be used to support a variety of strategic objectives, including creation of innovative applications, changes in business processes, links with business partners, reduction of costs, acquiring competitive intelligence, and others. According to above subject it can say one of the important factors in new challengeable business environment is emphasis on strategic IT and this is no ended research topic. The growth of high speed networks, coupled with the reducing cost of computing power, is making possible applications undreamed of in the past. Multimedia, and video are now easily transferred around the world in micro-seconds. This explosion of technology has changed the banking industry in Swaziland from traditional to digital and networking banking services has changed the internal accounting and management systems of banks. It is now fundamentally changing the delivery systems First National Bank use to interact with their customers. All over the world, banks are still struggling to find a technological solution to meet the challenges of a rapidly-changing environment. FNB with the ability to invest and integrate information technology has become competitive. This chapter reviewed literature relevant to the study. The next chapter discusses the research design and methodology adopted in this study. 30 CHAPTER THREE: RESEARCH METHODOLOGY 3.1 Introduction Research methodology is a way to systematically solve the research problem (Pearson, Wiechula, Court, and Lockwood, (2005: 10). Research is defined as a scientific and systematic search for pertinent information on a specific topic or an art of scientific investigation (Redman and Mory, 2009:10) while Abrahams (2011:1) assets that research is organised, structured and purposeful investigation aimed at discovering, interpreting, and revising human knowledge on different aspect of the world by someone first hand. This chapter outlines the research design adopted and the research methodology employed in the investigation. A description of the participants and the data gathering technique employed is provided, explaining how the data were gathered and analysed. The chapter concludes with details regarding ethical considerations and the measures employed to ensure the trustworthiness of the study (Nyasatu, 2012:2). 3.2 3.2.1 The Research Philosophy Quantitative Research According to Bennett (2003:97), quantitative research is the use of data which uses numbers and can be analysed by statistical techniques if drawn from a wide sample. Quantitative research is predominantly used as a synonym for any data collection technique such as questionnaires or data analysis procedure such as graphs or statistics that generates or uses numerical data (Saunders et al., 2009:151). 3.2.2 Qualitative Research Qualitative research is used predominantly as a synonym for the data collection technique such as interviews or data analysis procedure such as categorising data that generates non-numerical data (Saunders et al., 2009: 31 151). Qualitative research denotes the type of enquiry in which the characteristics, qualities and or properties of a phenomenon are examined for better understanding (Henning, Van, Rensburg and Smith, 2005: 5). For the purpose of this study, the quantitative research methodology was adopted. The use quantitative methodology is important to explore real organisational goals, processes, weaknesses and links (Gerhard, 2004:10). It is often assumed that quantitative research is precise and easy comparable to that it is based on hard evidence, which is usually acquired through questionnaires and surveys (Moodley, 2011:34). 3.3 Research Strategies A research strategy is a plan or blueprint for conducting the study that maximises control over factors that could interfere with the validity of the findings (Nyasatu, 2012:20) while Saunders et al. (2009:136), states that research strategy is the general plan of how a researcher go about answering research questions. Research strategy is the conceptual structure which research would be conducted and contains clear objectives derived from the research questions which are intended to collect data, considering constrains will be encountered and also discussing ethical issues (Kumar, 2005:19). According to Moodley (2011:32) there are five research designs as follows; exploratory, correctional, descriptive, explanatory and casual-comparative research design. He (2011), further assets that most researchers utilise three types of research design to achieve its objectives, namely; exploratory, descriptive and or explanatory research. Surveying involves gathering information from individuals using a structured or open-ended questionnaire or an interview (Nyasatu, 2012:24). 32 3.3.1 Exploratory Research Exploratory research refers to finding out what is happening to find new insights, ask questions and assess phenomena in the new light (Saunders et al., 2009:139). According to Copper and Schindler (2008), an exploratory research assists researchers in developing concepts more clearly, establishes priorities and developing operational definitions while improving final research designs. Exploratory is useful when a researcher wish to clarify an understanding of a problem (Kuvaas, 2008:2). The purpose of this type of research is to narrow the scope of the research topic progressively as the research progresses (Cant, Gerber-Nel, Nel and Kotze, 2005:18). There are three ways of conducting exploratory research, being; a search for literature; interviewing experts in the subject and conducting focus group interviews (Saunders et al., 2009: 140). 3.3.2 Explanatory Research Explanatory research studies the casual relationship between variables, it emphasises on studying the situation in order to explain the relationship between the variables (Saunders et al., 2009:141). Moodley (2011:33) argues that explanatory research attempts to go above and beyond exploratory and descriptive research to identify the actual reasons a phenomenon occurs. 3.3.3 Descriptive Research The objective of descriptive research is to portray an accurate profile of persons, events or situations. It may be an extension of, or a forerunner to, a piece of exploratory research or, more often, a piece of explanatory research (Robson, 2009:140). According to Kumar (2005:10), descriptive research attempts to systematically describe a situation, phenomenon, service or program, or describes attitudes towards an issue. Moodley (2011:32), asserts that there are two types of descriptive research methods; 33 qualitative and quantitative research. Both qualitative and quantitative methods may be used appropriately with any research paradigm. The study used the quantitative approach through questionnaires and surveys. 3.4 Target Population Target population is defined as the universe of units from which a sample or data is to be collected (Bryman, 2008:697). He (2008), further describes target population as the source of population or people from which cases and controls are selected, while Saunders et al. (2009:212) describe population as the full set of cases from which a sample to taken. This part of research involves analysis of data taken from a total population of three hundred and twenty four (324) employees from First National Bank Mbabane. 3.5 Sampling Sampling design is the procedure of selecting non-overlapping sample units to be included in a sample (Nyasatu, 2012:22) while Kumar (2005:24) describes a sample as a segment of the population selected to represent the population as a whole. Ideally, the sample should be representative and allow the researcher to make accurate estimates of the thoughts and behaviour of the larger population. Moodley (2011:35) argues that when conducting research it is not always possible to include the entire study population in the study, hence a representative sample must be chosen from the population. Small sample size may yield results that are not conclusive, while, large sample size usually yields more reliable results (Moodley, 2011:35). For this research a total of 50 respondents were chosen, with forty nine (49) questionnaires being administered to FNB employees from the ICT and service centre department and one (1) Police from Fraud and Commercial 34 Unit (CID). For the purpose of this study, the researcher used the probability sampling technique applying random sampling. Random sampling involves selecting the sample at random from the sampling frame using a number of tables, a computer or an online random number generator, such as research randomizer (Saunders et al., 2009:222). 3.6 The Research Instrument A questionnaire was designed and developed as shown in appendix A. The questionnaire was preferred because of the following advantages: Ø The questionnaire offers a great sense of anonymity to the respondents and at the same time the researcher getting an opportunity to collect the respondents’ thoughts and facts and to give consideration to their replies (Moodley, 2011:35). Ø The questionnaire has less pressure, feasibility and attainable means of collecting data (Pramal, 2004:102). However, there are disadvantages when using questionnaires (Pramal, 2004:102-103). Ø The organisations due to work pressure are often not able to utilise company time to complete questionnaires, The illiterate respondents will be unable to respond to the questionnaire Ø because of difficulties in reading and writing and the researcher is not having the opportunity to correct misunderstanding where the respondents may have. 3.7 i) Questionnaire Construction The likert scale is the most widely used questionnaire and most convenient when one wants to measure a construct (Maree, 2008:167). 35 ii) The questionnaire was presented using a Likert-scale with strongly agree forming one end of the continuum and strongly disagree at the other end. iii) The questionnaire used is divided into three sections, starting with the biographical followed by the contributing factors and lastly challenges hindering the attainment of competitive advantage. 3.8 Pilot Study A pilot study was conducted with six respondents from the Central Bank of Swaziland staff members who are FNB customers. Benefits of conducting a pilot study is that it may give warning on possible failure of the main research project, guidance on where protocols may not be flowed, or whether research instruments are inappropriate (Moodley, 2011:37). Piloting a questionnaire is crucial as the researcher needs to assess how long it will take to expose any items that will not generate usable data (Naidoo, 2010:35). Comments on representation and sustainability of the questions should be sought from experts by the researcher and also allowing suggestions on the structure of the questionnaire (Saunders et al., 2007:386). 3.9 Questionnaire Administration According to Saunders et al. (2007:389), administration of the questionnaire includes gaining access to the sample and attempting to increase the rate of response. Personally distributing the questionnaires to individuals helps in establishing rapport with respondents and utmost confidentiality assurance (Moodley, 2011:37). The questionnaire was personally distributed by the researcher to the respondents by hand delivery and through emails. Whilst personally handing out the questionnaire, the nature and objective of the study was explained to the 36 respondents and they were assured of confidentiality. The respondents were very enthusiastic afters realising that the questionnaire did not entail their identification. The researcher collected the questionnaire from respondents’ upon completion. 3.10 Data Analysis Data obtained through questionnaire, interviews and observations or through secondary sources need to be analysed for deductions (Thompson, et al., 2012:414). Data analysis can be referred to the conversation of a raw data into useful information that will provide most value to the organisation (Hanuman, 2006:63). The data obtained in this research was analysed using Statistical Package for Social Science (SPSS). Each questionnaire was given a unique identification number for entry and analysis in SPSS. 3.10 Validity and Reliability 3.11.1 Validity Validity is defined as the degree to which the researcher has measured what it set out to measure (Kumar, 2005:153). Saunders et al. (2009: 372) asserts that validity determines whether the research truly measures that which it was intended to measure or how truthful the research results are. Generally, validity is determined by asking a series of questions, and often looks for the answers in the research of others (Nyasatu, 2012: 28). Cooper and Schindler (2008: 154) mention three classifications of validity that are widely accepted being content validity; predictive validity and construct validity. Ø Content validity refers to the extent to which measurement device, in our case it is the questionnaire, provides adequate coverage of investigative questions (Cooper et al., 2008: 154). 37 Ø Predictive validity, sometimes known as criterion-related validity, is concerned with the ability of the measure, in this case, it is the questionnaire to make accurate predictions (Cooper et al., 2008: 154). Ø Construct validity refers to the extent to which measurement questions actually measure the presence of those constructs you intend them to measure. Moodley (2011: 43) says construct validity refers to a measure that may be valid for one population or group but not another. Questionnaire biasness was minimised through extensive literature survey conducted to identify variables that should be included in the questionnaire. The design of the questionnaire and results of the pilot study were considered to ensure that the terms were non-leading and not ambiguous. Effort was made to get maximum response from respondents. 3.11.2 Reliability Reliability is the extent to which a test produces similar results under constant conditions on all occasions or scenarios (Sutherland, 2006: 47). Sutherland (2006) further defines it as the consistency in measurement. In a nutshell, reliability is the extent at which different administrations or experiments will give the same results. While, on the other hand Johansson (2010: 21) assets that reliability is determined when different threats to reliability are considered; which include participant bias and error, observer bias and error. Saunders et al. (2009: 373) defines reliability as the extent to which results are consistent over time and an accurate representation of the total population under study is referred to as reliability and if the results of a study can be reproduced under a similar methodology, then the research instrument is considered to be reliable. From the results obtained it was evident that respondents answered in the same consistent manner despite being from different branches. This showed the consistency and reliability of the research instrument design, content and administration. 38 3.12 Limitations of the research The research was only limited to information communication technology personnel and service centres not all at FNB staff in Mbabane. As such, even though the choice of longitudinal horizon could have added value to the findings of the study, it is not feasible in this context. However, the sample represented all the same level staff in all the FNB branches all over the country, as they all have similar experiences in similar work environments. 3.13 Elimination of Bias Saunders et al. (2007: 267) state that bias can be either internationally distorting data or change the way data is collected. Biasness was minimised through extensive literature survey conducted to identify variables that should be included in the questionnaire. The design of the questionnaire and results of the pilot study were considered to ensure that the terms were non-leading and not ambiguous. The organisation the which was chosen to research, is not the researchers’ work place, which means there is no conflict of interest which may lead to compromise to the study. In this case study, the sample included people of all ages, position levels, different educational background and both ladies and gentlemen. 3.14 Ethical Considerations According to Schindler (2008: 87), ethics is a standard of behaviour that guides moral choices about our behaviours and relationship with others. Saunders et al. (2007:104) further asserts that the ethics of a research design has very important implications for the negotiation of access to people and organisations and the collection of data. The study complied with ethical principles of beneficence, respect for persons and justice, protecting the right of the informants and the institution as well as scientific integrity of the research. The principle of beneficence means that 39 the study does not harm others intentionally through lack of knowledge or by negligence (Saunders et al., 2007: 268). The researcher is aware of the importance of minimising the subject’s level of anxiety or stress, and of the absolute requirement of not divulging any information obtained from interviews. Efforts were made to explain the purpose and significance of the study and to assure subjects about confidentiality of the information was sought. The names of respondents were not be sought or used in relation to the information provided. 3.15 Conclusion The research methodology for this research has been explained. The rational for the study as well as research strategy have been described. The research instrument and the sampling methods used have been specified, as well as the data collection process and data analysis was discussed. The elimination of biasness and ethical considerations were included in the chapter. The next chapter, presents the results, discussions and interpretations of the findings of the study. 40 CHAPTER FOUR: RESULTS, DISCUSSIONS AND INTERPRETATION OF FINDINGS 4.1 Introduction This chapter reports on the results of this study. According to Grosshans (1992), data analysis is more than number crunching, but it is an activity that permeates all stages of a study (Saunders et al., 2009:451). Each response has been graphically presented in accordance to the questionnaire. This allows identification of problem areas that require attention, starting with the biographical followed by demographics. Contributing factors and challenges hindering the attainment of competitive advantage were scrutinised in terms of their distribution and percentage responses, transforming the data into across range of its categories. The findings of the research study are linked to the literature review. The findings information, are presented components in three contributing main towards sections, demographic achieving competitive advantage and challenges thereof. 4.2 Response Rate Table 4.1 : Response Rate Details # of questionnaires Percentage represented Questionnaires distributed 50 100% Returned 49 98% Not returned 1 2% As reflected in Table 4.1 above, forty nine out of fifty (total sample) respondents took part in the survey. Questionnaires were delivered by hand to the respondents. A response rate of 98% was achieved. 41 4.3 Biographical Data 4.3.1 Ages of Respondents Figure 4.1 : Age 14% 6% 4% 27% Below 21 21-30 31 - 40 41 -50 50+ 49% Figure 4.1 above indicates that only 4% of the respondents represent the age group below 21 years; 27% represent the age group between 21 to 30 years. The figure shows that 49% of the respondents represent the middle age group ranging between 31 to 40 years; while 6% and 14% represent age group 41 to 50 and 51 and above respectively. Due to the difficulty of being able to retain IT personnel, it is crucial for employers to devise retention strategies in order to retain these skills (Mohlala et al., 2012:1). In order stay abreast of this challenge, technologically advanced organisations are increasingly on the lookout for highly skilled workers, whilst the labour market is dominated by individuals with limited skills (DPRU, 2006:1) 42 4.3.2 Gender of Respondents Figure 4.2 : Gender 60 57% 43% 40 20 0 MALE Gender FEMALE Figure 4.2 above indicates that 57% of respondents are males while only 43% are females. Women are needed on any organisational teams because of their coordination preference more than their male counterparts (Zoogah, Vora, Richard and Peng, 2008:11). 4.3.3 Positions of Respondents Figure 4.3: Positions Held 2% 10% 39% Supervisory Middle management Senior management Other 49% Figure 4.3 above indicates that 39% of the respondents are at supervisory level, 49% represents middle Management. The figure further shows that 43 10% of the respondents represent senior management while 2% represent the only interviewed police officer. A chain of command is an effective business tool to maintain order, enforces responsibility and accountability (McDonough, 2011: 3). 4.4 Demographics 4.4.1 Highest Education Level Figure 4.4: Educational Level 60% 41% 40% 20% 16% 29% 12% 0% 2% Matric Diploma Degree and below Post Graduate Other Figure 4.4 above indicates that 16% of respondents hold only matric and 2% represent other qualifications. The figure also shows that 41% of respondents represent diploma holders, 29% represents respondents with degrees while 12% represents respondents with post graduate qualification. Employees who pursue post- secondary education are perceived to be more ambitious, motivated, self-confident and trainable than those who are nondegree holders (Silman, 2011:1). Nadiadwala (2010:2) attests to that academic qualification are essential in order to gain good exam grades or a degree. The level of education affects the way people work and think in any organisation (Nyasatu, 2012 :18). 44 4.4.2 Which branch are you based in? Figure 4.5 : Branches 37% 33% 40% 24% 30% 20% 4% 10% 2% 0% Figure 4.5 above indicates that 33% of interviewed respondents are based at First National Bank Head Office, 37% of respondents represent employees based at Corporate Place branch while 24% and 4% are based at Swazi Plaza and the Mall respectively. The remaining 2% represents the only police officer questioned who is based at Mbabane Police Station. 4.5 Components of Information Technology that are Contributing towards Attaining Competitive Advantage. 4.5.1 Information Technology is a Competitive Tool Figure 4.6: Information Technology 4% Strongly Agree 20% 37% Agree Neutral Disagree Strongly Disagree 39% 45 Figure 4.6 above indicates that 37% of respondents strongly agree that Information Technology is a competitive tool in the financial sector and 39% agree to same. A further 20% of the respondents neither agree nor disagree to the statements while only 4% of respondents disagree that IT is a competitive tool in financial sector. IT is one of many tools managers use to cope with change (Laudon et al., 2012:52). Perhaps one can safely say advances in information provision have led organisations to develop IT strategies which interrelate with their corporate strategies (Nyasatu, 2012:4). 4.5.2 Business and Information Technology Play an Important Role Figure 4.7 : Business and Information Technology 18% Strongly agree 43% Agree Neutral Disagree Strongly disagree 39% Figure 4.7 above indicates that 43% of respondents strongly agree that business and IT play an important role in success of financial institutions, while 39% agree. Only 18% of respondents neither agree nor disagree while none of the respondents disagree. Gaining a competitive advantage over competitors requires the innovative application of IT (Marakas et al., 2011:43). This is evidenced by FNB being declared the winner by “The Banker, 2014” (Shongwe, 2014:21). 46 4.5.3 Well-developed Information Technology Infrastructure and Software impact positively to competitive advantage of the organisation. Figure 4. 8: Infrastructure and Software 70.0 59% 60.0 50.0 40.0 30.0 25% 20.0 12% 10.0 2% 2% Disagree Strongly disagree 0.0 Strongly agree Agree Neutral Figure 4.8 above indicates that 25% of interviewed respondents strongly agree that a well-developed IT infrastructure and software impacts positively to competitive advantage. The figure also shows that 59% of the respondents agree, 12% neither agree nor disagree while 2% strongly disagree and disagree respectively. Thomas (2014:18) asserts that to become effective in this new driven world, organisations must move to the next generation of automation, one that understands the requirement of business applications and responds to these requirements in real time. Old fashioned software often leads to ineffective, underutilised infrastructure and diminishes the ability of the IT to respond to the business needs effectively (Thomas, 2014:18). 47 4.5.4 Human Capacity Contributes Immensely to Competitive Advantage in the Banking Sector Figure 4.9: Human Capacity 4% 20% Strongly Agree 25% Agree Neutral Disagree Strongly disagree 51% Figure 4.9 above indicates that 20% and 51% of interviewed respondents strongly agree and agree respectively that human capacity contributes immensely to competitive advantage. The figure shows that 25% of the respondents neither agree nor disagree, while only 4% of respondents disagree that human capacity contributes to competitive advantage. Mohlala et al. (2012) argue that the IT personnel are crucial. Bogatsu (2014:11) applauds FNB staff members being the drivers of the various innovation that have been launched in the past, which qualified First National Bank to be the Banker of the year. 48 4.5.5 Internet has impacted positively on the success of the banking industry towards attaining competitive advantage. Figure 4.10: Internet positively impacting to competitive advantage 4% 4% 33% 20% Strongly Agree Agree Neutral 39% Disagree Strongly disagree Figure 4.10 above shows that 33% of the interviewed respondents strongly agree that internet has impacted positively on the success of the banking industry. 39% of the respondents agree, while 20% remain neutral. Only 4% of respondents both represent those who disagree and strongly disagree respectively. The internet has moved real banking behaviour closer to neoclassical economic theories of market functioning (Chavan, 2013:20). The ability of most modern organisations to use IT efficiently, significantly contributes to their success. (Mohlala et al., 2012:1). The financial products and services have become available over the internet which has thus become an important distribution channel for a number of banks (Chavan, 2013:21). 49 4.5.6 ATMs have become the major revelation for customers Figure 4.11: ATM’s 6% 2% 25% 18% Strongly Agree Agree Neutral 49% Disagree Strongly disagree Figure 4.11 above indicates that 25% of the respondents strongly agree that ATMs have become the major revelation for customer while 49% agree. The figure indicates that 18% of the respondents remain neutral while 6% and 2% of the respondents represent those who disagree and strongly disagree respectively. Known for its slogan “How can we help you”, FNB still maintains its benchmark as the bank that currently has the largest ATM network in Swaziland with 65 full ATMs countrywide (Shongwe, 2014:21). According to the country’s business year book (2014), the bank also boasts four mini ATMs in small towns like Bhunya, Mhlambanyatsi, Ezulwini, to name a few, and 35 slimline ATMs. Sourced from the FNB website, the Mini ATM is similar to a normal ATM, except instead of dispensing cash, it issues a voucher redeemable for cash in store where it was purchased for areas without ATM infrastructure. Meanwhile, the slimline ATM is an innovative touch screen ATM installed in retail spaces that allows you to perform a variety of transactions. The slimline ATMs do not dispense cash. Rather, a slip is issued and then cashed at the retailer’s till (Dlamini, 2014: 21). 50 4.5.7 Cellphone banking is widely accepted by customers. Figure 4.12 : Cellphone Banking 10% 12% Strongly Agree Agree 20% 31% Neutral Disagree Strongly disagree 27% Figure 4.12 above indicates that 12% of the respondents strongly agree that cell phone banking is widely accepted by customers, while 31% agree. The figure shows that 27% of the respondents remain neutral, while 20% and 10% disagree and strongly disagree respectively. According to FisherFrench, (2007) and Masocha et al., (2011), cellphone banking is considered the way of the future. 4.5.8 Electronic mail contributes to competitive advantage Figure 4.13 : Electronic Mail 43% 45.0 40.0 33% 35.0 30.0 25.0 20.0 15.0 14% 10% 10.0 5.0 0.0 Strongly Agree Agree Neutral Disagree Strongly disagree 51 Figure 4.13 above indicates that only 14% of the respondents strongly agree that electronic mail contributes to competitive advantage. The figure further indicates that 43% of the respondents agree, while 33% remain neutral. Only 10% of the respondents disagree. The availability of banker’s information provides bankers and customers with a powerful vehicle for research (Oluwuagbem et al., 2011:66). 4.5.9 More customers prefer using over the counter services than ATMs and Internet Banking Figure 4.14: Over the Counter Service 12% 25% Strongly agree Agree 27% Neutral Disagree Strongly disagree 20% 16% Figure 4.14 above indicates that 12% of the respondents strongly agree that more customers prefer using over the counter services than internet services. A further 27% of the respondents agree, while 16% remained neutral. The remaining 20% and 25% of the respondents respectively disagree and strongly disagree. Some facilities lack user friendliness or lack of the online facility in the current bank they are using (Brodie, Winkjofer, Coviello and Johnston, 2007:23). Agrawal et al. (2012) argues that many customers still prefer to have a personal touch with their branches. A study by IAMAI (2013), it was found that the people that are not doing financial transactions on the bank’s internet sites because of reasons such 52 as security concerns (43%), preference for face-to-face transacting (39%), lack of knowledge about transferring online (22%), lack of user friendliness (10%) and lack of facility in the current bank (2%) (Chavan, 2013: 22). 4.5.10 Expenditure on development of Information Technology and immense training contribute to attaining competitive advantage Figure 4.15 : Expenditure on Information Technology 8% 8 16% Strongly agree Agree Neutral 19% Disagree Strongly disagree 49% Figure 4.15 above indicates that 16% of the interviewed respondents strongly agree that expenditure on information technology development and immense training contribute to competitive advantage. A further 49% of the respondents agree while 19% remain neutral. The figure further shows that 8% of the respondents both disagree and strongly disagree respectively. Thomas (2014:18) asserts that you cannot shift to software defined data centre overnight, neither sticking to old labour intensive ways. Thomas (2014), further says infrastructure within data centres has become increasingly heterogeneous and complex to manage, but that must not stop organisations to invest in the development of infrastructure and software. 53 4.6 Challenges Hindering the Attainment of Competitive Advantage 4.6.1 Information Technology through internet has given rise to cybercrime Figure 4.16: Cybercrime Increase 8% 22% Strongly Agree Agree 27% Neutral Disagree Strongly disagree 43% Figure 4.16 above indicates that 22% of the interviewed respondents strongly agree that IT has given rise to cybercrime. 43% of the respondents agree, while 27 % remain neutral. Only 8% of the respondents disagree. Cybercrime has become a global phenomenon and has a serious potential for severe impact on our lives, society and economy because our society is becoming information society where communication takes place in cyber space (Olusola et al., 2013:19). It is therefore especially important that the management of FNB do their best to combat and prevent cyber-crimes (Veter et al., 2012: 6). 54 4.6.2 Information Technology through internet has led to card skimming Figure 4.17: Card Skimming 8% 6% 19% Strngly Agree Agree 16% Neutral Disagree 51% Strongly Disagree Figure 4.17 above indicates that 19% of the respondents strongly agree to that information technology leads to an increase in card skimming. From the above figure, it further shows that 51% of the respondents agree, while 16% remain neutral. Only 6% and 8% of the respondents disagree and strongly disagree respectively. This is a course of concern for the management of FNB to keep their customers safe from criminals. Standard Bank Swaziland Managing Director informed the public that card skimming was rife towards the end of the year, giving an example of one customer lost an amount of E27,200 to card skimming (Motau, 2014 : 5). For the financial year 2013/14 the Swaziland Royal Police annual report revealed that there were 40 cases of card skimming reported only on the Hhohho Region, where FNB Mbabane lies. Out of these 40 cases, only 3 were successfully prosecuted and arrest was made (Dube, 2014:8), 55 4.6.3 Information Technology has caused ethical controversy in the security of company information and workplace safety Figure 4.18: Ethics 27% 37% Strongly Agree Agree Neutral Disagree Strongly Disagree 37% Figure 4.18 above indicates that 37% of the respondents strongly agree that information technology has caused ethical controversy and 37% agree, while only 26% respondents remain neutral. Information technology has caused ethical controversy in the areas of intellectual property rights, customers and employees’ privacy, security of company information and workplace safety (Marakas et al., 2011:565). Chavan (2013), asserts that confidentiality, integrity, and authentication are very important features of the banking sector and need to be successfully managed over the preinternet times. Communications across websites and thus insecure channels such as internet might not be the best for bank-client relations as trust might partially be lost (Chavan, 2013: 24). 56 4.6.4 Law enforcement with regard to investigating crimes and handling evidence, dealing with offenders, and assisting victims is complex and challenging Figure 4.19: Law enforcement 4% 20% Strongly agree 31% Agree Neutral Disagree Strongly Disagree 45% Figure 4.19 above indicates that 20% of the respondents strongly agree that law enforcement is a complex and challenging phenomenon with the use of information technology. The figure further indicates that, 45% of the respondents agree while 31% remain neutral. Only 4% of the respondents disagree with the statement. Fick (2009:1) on McFee Virtual Criminology Report assets that, “the successes of cyber criminals pose new and difficult challenges for law enforcement. The online engagement of criminals reduces the risk of capture and prosecution and makes the job of law enforcement that much harder. Some sources estimate 5% of cyber criminals are ever caught and convicted (Fick, 2009:1). He further argues that it is difficult for police to follow up transactions in order to gather evidence and national laws differ enough to make prosecution more difficult. Alusola et al. (2013: 24) strongly believes that the following are contributing factors to the challenges of law enforcement and prosecution of cyber criminals: 57 Ø Reliance on terrestrial laws is an untested approach. Most countries still rely on standard terrestrial law to prosecute cybercrimes. Ø Global patchwork of laws creates little certainty. Little consensus exist among countries regarding exactly which crimes need to be legislated against. Across jurisdictions without coordinated efforts by law enforcement officials to combat cybercrime, it will remain complicated. 4.6.5 Retention of Information Technology Personnel is a challenge Figure 4.20: Staff Retention 4% 31% 22% Strongly agree Agree Neutral Disagree Strongly disagree 43% Figure 4.20 above indicates that 31% of the respondents strongly agree that retention of information technology personnel is a challenge and 43% agree. Only 22% remain neutral while 4% disagree. Information technology employees are regarded as a strategic resource (McConnell et al., 2007:1). In McGee’s (2005) interview with companies, Gagne reports that 53% of respondents companies were experiencing a shortage of information technology employees (Mohlala et al., 2012:1). Mohlala et al. (2012) further asserts that the increasing demand for skilled information technology employees has placed organisations under pressure to start devising retention strategies in order to retain the targeted employees (DPRU, 2006 58 :1). One of the contributing factors to leading skills shortage for ICT is organisations that are not willing to invest time and money to train their employees (Mohlala et al., 2012:2). 4.6.6 Bandwidth Problems (if network present) pose a challenge of hacking by criminals Figure 4.21: Bandwidth 2% 6% 23% 22% Strongly agree Agree Neutral Disagree Strongly disagree 47% Figure 4.21 above indicates that 23% strongly agree that bandwidth poses a challenge of system hacking by criminals. 47% of the respondents agree while 22% remain neutral. Only 6% and 2% of the respondents disagree and strongly disagree respectively. There are some banks that have the networks already but they do not have enough bandwidth. When bandwidth is not enough there is usually a traffic jam and customers have challenges of failed transactions while undertaking internet banking which pose the threat of hacking by criminals (Andreesen et al., 2013: 8). This is also a cause of concern for the management of FNB to ensure sufficient bandwidth to avoid chances of systems hacking. 59 Conclusion This chapter presented the analysis of the data collected through the self – administered questionnaires that were distributed to staff. The responses were presented using figures and charts. The results of the study indicated that information technology is indeed a competitive tool in the banking sector. Whilst, some strengths were identified, there is a concern that in most questionnaires a plus minus 25% of respondents are neither agreeing or disagreeing. This shows that there is little team cohesiveness prevalent and must be a cause of concern for the management of FNB to ascertain the reasons for these staff members remaining neutral. The next chapter presents the conclusions, recommendations and scope for further research. 60 CHAPTER FIVE: CONCLUSIONS AND RECOMMENDATIONS 5.1 Introduction This chapter summarises the findings of the study and offers recommendations to the management of FNB and employees. The key to this chapter is the evaluation of the linkages between the literatures reviewed and study findings, in order to offer recommendations. Areas of the future research related to the study is identified and proposed. In this chapter conclusions and recommendations are linked to the research objectives. 5.2 The Objectives of the Study · To assess the current information technology process in place at FNB. · To assess the impact of information technology on the attainment of competitive advantage at FNB. · To provide recommendations to the management at FNB and the relevant stakeholders. 5.3 Findings from the Study The findings from this study are discussed under two headings; key findings from literature review and findings from primary research. 5.3.1 Key Findings from the Literature Review The use of internet banking has brought many benefits amongst which include: Ø No barrier limitations, it is convenient to use; it saves time and makes it possible to access the use of innovative product or service at a low transaction fees (Chavan, 2013 : 21). 61 Ø Information Technology has transformed traditional practices in banking in that it encourages queue management which one of the important dimensions of e-banking service quality (Khan et al., 2009: 33). Ø Utilising internet applications is the only way to stay connected to the customers at any time and any place (Shingal et al.,2008 :102). Ø Information technology results in high performance in banking industry through faster delivery of information from the customer and service provider (Oluwagbemi et al., 2011: 63). Ø Development in information technology has caused a revolution in information distribution (Kotler et al., 2006:139). Ø Information technology has given rise to new innovations in product designing and their delivery in the banking and finance industry (Agrawal et al., 2012:90). Ø Information technology is a competitive tool which has made the banking industry highly competitive today (Nyasatu, 2012:6). Ø Business and Information Technology has been proven to assist financial institutions to reach geographically distant and diversified markets (Ozuru et al., 2010:2). Ø It is proven that the use of internet makes it possible to access the use of innovative products and services at low costs (Chavan, 2013:22). Ø ATMs have become a major revelation for customers since it offers facility to avoid long queues in banks (Chavan, 2013:22). Ø Vast growth of information technology fast growing has increased interest in computer crimes, ethics and privacy challenges. Ø It is proven that through the increased use of information technology, there is an increase in cybercrimes scandals (Fick, 2009:4). Ø It is proven that cyberspace criminals skills are ahead of information security measures and makes organisations vulnerable (Charney, 2009: 20). 62 Ø It is proven that there are challenges in relation to laws (Fick, 2009:1). 5.3.2 Key Findings from the Primary Research Ø A collective 80% age group is less than 40 years which is a cause of concern as labour force around this age group is highly mobile and FNB may face a challenge of staff turnover. This is an indication that the bank has to develop a staff retention strategy. Ø Research shows that 57% of the respondents are male and 43% of the respondents are female. Ø A collective 84% of the FNB staff members’ possess a tertiary level qualification which affords the institution ambitions, motivated and self-confident staff members. Ø Research indicates collectively, 61% of respondents disagree that customers prefer using over the counter services than ATMs. A collective 74% of respondents agreed that ATM’s are the most favoured facility. Ø A collective 65% of respondents agree that a well-developed information technology together with immense training contributes to competitive advantage. Training is very important because it assists employees to conceptualise. Ø A collective 65% of the respondents agree that information technology has given rise to cybercrime, which is a cause of concern to FNB as it hinders competitive advantage. Ø A collective 70% of the respondents agree that information technology leads to an increase in card skimming, which is a cause of concern to the management of FNB to be embraced with the pace of the criminals. Ø A collective of 73% of the respondents agree that information technology has caused ethical controversy in the security of company information and workplace safety. Ø A collective 65% of the respondents agree that with information technology has caused challenges for law enforcement. This is also 63 agreed by Fick (2009), on McFee Virtual Criminology Report when he says “the success of cyber criminals pose new and difficult challenges for law enforcement”. Ø A collective 74% of the respondents agree that retention of Information Technology personnel is a challenge. Ø One of the contributing factors to Information Technology skills shortage is that organisations are not willing to invest time and money to train their employees (Mohlala et al., 2012: 2). Ø A collective of 69% of the respondents agree that bandwidth poses a challenge of systems hacking by criminals. When bandwidth is not enough there is usually a traffic jam and customers have challenges of failed transactions when doing internet banking which pose the threat of hacking by criminals (Andreesen et al., 2013: 8). 5.4 Areas for Future Research The direction for future research in this area of study is wide. Many other institutions in the financial sector rely heavily on information technology to carry out their everyday functions. Therefore, this study can be carried out with other commercial banks based in Mbabane, including Standard Bank Swaziland, Nedbank Swaziland, Swazi bank as well as Swaziland Building Society. 5.5 Conclusion to the study This chapter highlights the overall conclusions obtained from the study and highlights the research questions and objectives. The primary findings assisted in answering the questions that were formulated for this study. The study concluded that despite challenges, it is proven that IT is a tool that benefits banks towards attaining competitive advantage. It is evident from both the primary and secondary findings that information technology impacts significantly on survival of organisations. Information technology enables the interaction between customers, bank and products of FNB. 64 The overall disagreements propel an urgent need for management to do more research and development in order to map out new and effective strategies to stay at a competitive edge. 5.6 Recommendations The recommendations include the following: 5.6.1 Staff Retention It is important for the management to maintain the right balance between young and older employees. The finding revealed that only 20% of staff are in the group of 41 – 60. From this age group staff are closer to their retirement and will take with them a strong work ethic, absolute dependability and stability, as well as continuity, vast knowledge, expertise, experience , and invaluable ability as couches to upcoming talent (Mohlala, et al., 2012: 3). Therefore, it is important for the management to focus on the future growth and deployment of the 21 – 40 age groups in order to avoid major disruptions to the current teams. Findings indicate that in most organisations there is an inability to retain the type of employees with skills that are essential to the organisation (DPRU, 2006: 1). FNB should develop a retention strategy as it faces a difficulty in the information technology environment to retain (younger) staff. Younger staff want a challenge, they want to work on new technology and if given that opportunity, the company again must bring in newer person to train and after few years they want to leave (Mohlala et al., 2012: 8). 5.6.2 Coaching of young staff Newly qualified younger graduates bring to teams a ‘cutting edge’ in terms of technology and other “current” practices, which enhances team 65 effectiveness, but need the guidance of the older group. The younger staff members still needs coaching from the group who have vast experience. Older staff can coach using the GROW model that was developed by Graham Alexander and John Whitmore (2008). The name is an acronym, with each letter standing for a different phase of the model. GROW stands for: G – Goal R – Reality O – Options W – Way Forward · Goal refers to the object or target for the team member. This is not just a list of goals given but a mutually agreed upon vision for the team member. · Reality refers to taking an inventory of where the team member is in relation to the goals that have been identified. This helps ascertain what is needed to complete the journey. · Options refer to the various ways that there are to move from vision to reality. The team member can assist by discussing what options are available and which ones are most effective. · Way forward refers to when the coach and team member come up with an action plan for exactly how the chosen options will be implemented. During this process agreement will have to be reached on specific timelines and deadlines, details deliverables and expectations, resources that will be provided or made available, what level of help the coach will provide and when and how communication will be provided. 5.6.3 Addressing the Gender Imbalance The staff compliment comprises of 43% females. The 57% male compliment was hired during the era when gender parity was not in existence. The 66 gender equity plan has to be gradual implemented as the long serving male staff exit the bank on retirement. The researcher recommends selective hiring during natural attrition. 5.6.4 Secure Networked Information. It is recommended that the management of FNB should strive to ensure secure network and information. Laws to enforce property rights work only when property owners take reasonable steps to protect their property at first place (Olusola et al., 2013:24). Olusola et al. (2013) further assets that even where laws are adequate, firm depending on the network must make their own information and systems secure. FNB management should work cooperatively to strengthen legal frame works for cyber security. National government remain the dominant authority for regulating criminal behaviour in most places in the world (Olusola et al., 2013:24). The government should ensure that the laws are composed in a technologically neutral manner that would not exclude the prosecution of cyber criminals. FNB should ensure that much of population as possible is banked for financial inclusion, as currently the economy still have millions of savers and investors who still do not use a bank (Agrawal et al., 2012:95). This would also address the financials inclusion problems of using electronic products and enhance launching of more products that will ensure that wherever one is in Swaziland will be able to access FNB products without necessity travelling hundreds of kilometres to their nearest branches (Shongwe, 2014: 21). 5.6.5 Develop Regulatory Compliance Plan Ø It is important that the management of FNB design and execute a plan to move towards heightened standards. The plan must articulate responsibilities accountabilities, goals, and milestone with 67 specific dates, potential results and steps to deal with contingencies. The plan must be developed in consultation with line – of business executive, risk manager and assurance function and there must be consensus for the defined plan from the board and executive management on down. Ø FNB should embank on both public and private police partnership in the market place and the emergence of civil society on the internet combined with public awareness. In particular, government and private sector, with information technology companies in a leading role should work together to ensure the development of strong criminal laws and capability to enforce them, to share information that will enhance security and also support the security education and training of citizens (Charney, 2009: 20). 5.6.6 Reward Recognition The annual recognition is imperative because it recognises the innovative spirit that they put in place in order to ensure customers are served with consistent superiority (Mohlala et al., 2012: 9). 5.7 Conclusion The primary and secondary findings assisted in answering the research questions that were formulated to the study. The study aimed at evaluating the impact of information technology towards attaining competitive advantage in the banking sector in Swaziland. It is clear from both primary and secondary findings that regardless of the challenges that come with it, information technology impacts advantage in the financial sector. positively in attaining competitive The growth of high speed networks, coupled with the reducing cost of computing power, is making possible applications undreamed of in the past. It is now fundamentally changing 68 the delivery systems FNB use to interact with their customers. The study also revealed that all over the world, banks are still struggling to find a technological solution to meet the challenges of a rapidly-changing environment. FNB with the ability to invest and integrate information technology has become competitive. 69 Bibliography Abah, J. (2011). The Impact of Information Technology in Nigeria’s Banking Industry. Journal of Computer Science and Engineering, 7 (2), 63 -79. Agrawal, S. and Jain, A. (2012). Technological Advancement in Banking Sector in Indian: Challenges Ahead. National Monthly Referred in Commerce and Management, No.2 (vol.1), 89-96. Ahasanul, H. A. (2009). Issues of E-banking transactions: an Empirical Investigation on Malaysian Customer perception. Journal of Applied Sciences, 1870-1879. Ahlemann, F. (2009). management Towards a conceptual reference model for project information system. International Journal of Project Management, 19-30. Ahmed I. and Jamal, K. (2006). Information Technology Need in Consumer Banking as a Case study of CAMS. Ubiquitous Computing and Communication Journal, 71-75. Andreesen, T. and Grillo, R. (2013). IT Challenges: What is next for the financial services industry. Financial Services Industrial Newsletter, Vol. 14, Issue 2. p.1-8. Bajaj, K. D. (2008). Evolving Security Architecture in Banks. Cybercrime: A Journal of Financial Sector View, 5-8. Bayat, M. H. (2010). Competitive Advantage and Strategic Information System. International Journal of Business and Management, 158-169. Bennet, J. (2003). Evaluation Methods in Research. London: Continuum. Bhatnagar, A. (2006). Strategic Information Systems Planning: Alignment of IS/IT Planning and Business Planning. New Zealand. 70 Bogatsu, S. (2014). “The Banker” Declares FNB Swaziland Bank of the year 2014: Bank of the Year Awards, published by “The Times of Swaziland”, p.11 Boote, D. and Beile, N. (2005). Scholars before Researchers on the centrality of the dissertation literature review in research preparation. Educational Researcher, Vol.34 (No.6), 3-5. Braga, C. V. de P., Freire Fuentes, M., Freitas, E. R., de Carvalho, L. E., de Sousa, F. M. and Bastos, S. C. (2005). Effect of inclusion of coconut meal in diets for laying hens. Rev. Bras. Zootec., 34 (1): 76-80 Brodie, R. Winkjofer, Coviello and Johnston, R. J. (2007). Is E-Marketing coming of age and examination of penetration of e-commerce and firm performance preparation? Journal of Interactive Marketing, 21, 221 Bryman, A. (2008). Integrating quantitative and qualitative research: how is done? International Journal of Social Research Methodology, 10 (1), 5-20. Bryman, A. (2008). Social Research Methods. New York: Oxford University Press. Cant, M. C., Geber-Nel, C. Nel, D. and Kotz, T. (2005). Marketing Research. User Contributes reviews. Van Schaik Publishers. Charbaji, R. (2005, July). What New Challenges are Facing the local Banks in Lebanon? The International Arab Journal of information Technology, Vol.2 (No.3)228 – 233. Chaffey, D. M. (2006). Internet Marketing: Strategy Implementation and Practice (3rd Edition), Financial Times: Harlow, Essex, U K. Prentice Hall. Charney, S. (2009). Combating Cybercrime. A Public-Private Strategy in the Digital Environment. Charney, S. (2009). Cybercrime in South Africa. Trustworthy Computing Microsoft Corporation. 71 Chavan, J (2013). Internet Banking – Benefits and Challenges in Emerging Economy. International Journal of Research in Business Management, 1925. Chavan, S. P (2008). IT in Banking, Managing the Present by Looking to the future. Cybercrimes: A Journal of the Financial Sector View 4-8. Cresswell, J. W. (2009). Research Design: Qualitative, and Mixed Methods Approaches. Thousand Oaks, California: Sage Publications. Christopher, G. M. (2006). A Legit Analysis of Electronic Banking in NewZealand. International Journal of Bank Marketing, 360-383. Copper, D. and Schindler, R. (2008). Business Research Methods. Boston, MA and Bur Ridge: McGraw-Hill. Cronje, D. D. (2011). Introduction to Business Management. Cape Town: Oxford University Press. Cullom C. P. (2001). Computer Crime, Vulnerabilities of Information Systems, and Managing Risks of Technology Vulnerabilities. Ridge top Information Solutions LCC, 1-4 Cummings, T. G. (2005). Organisation Development and Change (8th Edition) Thomson, Ohio, South/Western Dlamini, Z. (2014). How FNB Qualified to be “Bank of the year 2014”: The Banker Awards 2014, published by “The Times of Swaziland”, p. 21 DPRU. (2006). Graduate unemployment in the face of skills shortage: A labour market paradox. Retrieved April 28, 2006. DPRU Conference 2006/Papers/KPauw_Graduate_Unemployment, p.1-3. Capetown Dube, S. W, (2014). Royal Swaziland Police Annual Report. Dubie, D. (2008). Tales of skills shortages untrue say unemployed IT professionals. 72 Du Toit, A.S.A. and Strauss, A.C. (2010). Skills shortages and competitiveness in South Africa: the need for competitive intelligence skills. Journal of contemporary managers of South Africa. Eggland, S., Dlabay, A., Burrow, D. and Ristan, L. (2000). Introduction to Business. London International Etter, C. B (2001). The Challenge of Forensic Investigation of Computer Crime. Australia Centre for Policing Research. Evans, B. (2010). The Innovation Revolution and IT’s Indispensable Role. Information Week, 4 Fheili, M. (2007). Employee Turnover. An HR Risk with Firm Specific Context, 69-84 Fisher, F. (2007). The New Battle for your Bank. Mail and Guardian (online). Fick, J. (2009). Cyber Crime in South Africa:. Investigating and Prosecuting Cyber Crime and the Benefits of Public-Private Partnership Frederick, A. (2009). Towards a Conceptual Reference Model for Project Management Information Systems. International Journal of Project Management, Vol 27,11 p.19- 30 Gaylard, M., Sutherland, M., and Viedge, C. (2005). Employee retention within the Information Technology Division of a South African Bank. SA Journal of Human Resource Management Gehard, R. (2004). A life in Painting: Ritcher’s Betty – A conversation piece. Gercke, M. Prof. (2012). Understanding Cybercrime: Phenomena, Challenges and Legal Response. Gordon, D. and Ford, (2006). Definition and Classification of Cybercrime. Journal in Computer Virology, 13-20 Graham, A. and Whitmore, J. (2008). The Grow Model of Coaching. 73 Hanuman, M (2006). A Critical Evaluation of Bed Occupancy Rates at Public Hospitals in the eThekwini District and Recommendations for Addressing Critical Shortages. MBA Regent Business School Harvey, D. A. (2006). An experimental Approach to Organisations Development. Henning, E., Van Rensburg, W and Smit, B. (2005). Finding your Way in Qualitative Research. Pretoria: Van Schaik Publishers. Hussain, T and Oshiyoka, W. (2006). Information Technology and the Challenge of Economic Development in Africa: African Development Bank. Jaibo, P. W (2010). Fight Against Crime. Financial Services Report-Global Economic Crime Survey, p.1-4 Johansson, R., Leander, T and Nilsson, V. (2010). Are You The Leader You Think You Are? Bachelor Thesis within Business Administration. JONKOPING UNIVERSITY Johnson, P. (2005). Overview of Electronic Payment Systems in Nigeria. Strategic and Technical Issues. CBN, 29 (2), 68-71 Kamel, S. (2005). The Use of Information Technology to Transform the Banking Sector in Developing Nations. International Journal of Information Technology Development, p.305-312 Khan, J. A. (2008). Research Methodology. New Delhi: AP4 Publishing Corporation. Khan, M. S. (2009). Service Quality Evaluation in Internet Banking: an empirical Study in India. International Journal of Indian Culture and Business Management, Vol.2 (No.1), 30-46 Kotler, P., & Keller, K. (2005). Principles Marketing : search on eBay. World's leading marketplace Kotler, P. and Keller (2006). Marketing Management (12th Edition): Prentice Hall. 74 Kotler, P., & Keller, K. (2006). Framework for Marketing Management (3rd Edition). Paperback Kotler, P., & Keller, K. (2009). Marketing Management (13th Edition). Price comparison. Compare and save at FindersCheapers.com. Kotler, P., & Keller, K. (2014) Marketing Management Kotler Keller Goodman Keywords: Marketing Management Kotler Keller Goodman Created Date: 9/8/2014 Kumar, R. (2005). Research methodology: a step-by-step guide for beginners / Ranjit Kumar Pearson Longman French’s Forest, N.S.W. Kuvaas, B. (2008). An exploration of how the Employee-Organisation relationship affects the linkage between perception of developmental human resource practices and employee outcomes. Journal of Management Studies, 45(1), p.1-25 Lanfer, E. Imeson, M. and Pugh, G. (2014). The Banker. Awards for the Year. Lanfer, E. Imeson, M. and Pugh, G. (2012). Modernize or Fail. The Modernization Challenges Facing Banks and the Technology Implications: An Oracle Financial Service Thought Leadership Paper. Laudon K. and Laudon, P. (2008). Management Information Systems, Managing the Digital Firm (12th Edition). New Delhi: Prentice Hall Luftman, J. N. (2008). Key Issues for IT Executives. MIS Quarterly Executive, p. 12-20 Mahmood, H., Mahdi, S. and Marziyeh, M. (2010). Competitive Advantages and Strategic Information Systems. International Journal of Business Management, 5 (No.7), 158-169 Maindonald, J. H. (2008). Centre for Mathematics and it’s Applications: Australia National University. 75 Marakas, J and O’Brien, A. (2011). Management Information Systems (10th Edition). New York: McGraw-Hill/Irwin Maree, K. (2008). First Steps in Research (2nd Edition). Pretoria: Van Schaik Publishers McConnell, R. L and Brue, S. A. (2008). Macroeconomics, Principles, Problems and Policies. New York: McGraw-Hill / Irwin McDonough, J. E. (2011). Inside National Health Reform. Milbank, California: University of California Press and Milbank McIntosh, E. D. (2009). A Review of the Factors which Influence the usefulness of Information Systems. Environmental Modelling and Software, Vol 24, No.5, 588-602 Mohlala, J. Goldman, G. A and Goosen, X. (2012). Employee Retention within the Information Technology Division of a South African Bank. South African Journal of Human Resource Management, p.1-11 Mohr, P. (2012). Understanding Macroeconomics. Van Schaik Mohr, P., Louis, F. and Associates (2008) Economics for South African Students. Fourth Edition. Moodley, G. (2011). An Investigation of Team Effectiveness Amongst Chemistry Technical Staff UKZN. MBA. Regent Business School. Nadiadwala, N (2010). Academic Qualification Ensures Success in Life? http://www.idebate.org.database/topic_details.php?topicID-885 Naidoo, N. (2010). An Evaluation of Customer Retention Strategies at a Retail Hearing Aid Company. MBA. Regent Business School Ndulu, B., Chakaborti, L., Lijane, L., Vijaya, R. and Wolgui, J. (2007). Challenges for African Growth: Opportunities, Constrains and Strategic Directions. The International Bank for Reconstruction and Development, The World Bank Journal 76 Nyasatu, N. (2012). The Contribution of Information Technology Towards Attainment of Competitive Advantage in the Banking Sector in Swaziland. MBA. Midlands States University Olusola, M., Samson, O. Seimu, A and Yinka, A. (2013). Cyber Crimes and Cyber Laws in Nigeria. The International Journal of Engineering and Science (IJES), 19-25 Oluwagbemi, O., Joshua, A and Philip, A. (2011). The Impact of Information Technology in Nigeria’s Banking Industry. Journal of Computer Science and Engineering, Vol, 7, Issue 2, 63-67 Ozuru, H. Chikwe, and Uduma, (2010). The Use of Traditional Payment and Electronic Payment Systems in Nigeria. A Discourse. Proceedings of the 11th Annual Conference of International Academy of Africa Business and Development, pp.1-4. Pearson, A., Wiechula, R., Court, A. and Lockwood, C. (2005), The JBI model of evidence-based healthcare. International Journal of EvidenceBased Health care. Vol3. Issue 8. Pedarpur, M., Zarrodi, K., Fatan, E., Afrancheh S. and Riazi, S. (2013). Management Information systems, functions, structure and its importance in Manager’s Decision Making, Vol 4, No 10. Popli, G.S. and Vadgama, C. (2012). New Face of Indian Banking Industry Emerging Challenges & Potential). Available at SSRN: http://ssrn.com/ abstract=2112949/http://dx.doi.org/10.2139/ssrn.2112949 Porter, M. (2006). Competitive Advantage: Creating and Sustaining Superior Performance. Porter, M. (2009). Perspective Health Care. A Strategy for Health Care Reform — Toward a Value-Based System. Michael E. Porter, Ph.D. N Engl J Med 2009; 361:109-112 July 9 Pramal, A. (2004). The Influence of Team Cohesiveness of Team Effectiveness. MBA. University of Kwa-Zulu Natal. 77 Redman, L. V and Mory, A.V.H. (2009) The Romance of Research Published by Williams and Wilkins Company, Baltimore, Maryland. Robson, S. (2009). Producing and using video data in the early years. Ethical questions and practical consequences. University of Roehampton. Rogerson, S. (2004). Strategic information systems planning: its adoption and sue. Information Management and Computer Security Journal, 21(2), 10 – 19. Salehi, M.L.(2010). Competitive Advantages and Strategic Information systems. International of Business Management Journal, 158 – 169. Saunders, M., Lewis, P. and Thornhill, A. (2007). Research Methods for Business Students. Harlow, England: Pearson Education Limited, England Saunders, M., Lewis, P. and Thornhill, A. (2009). Research Methods for Business Students. Harlow, England: Pearson Education Limited. Shongwe, S. (2014). The Banker Awards 2014. FNB Cuts Above the Rest, p.21. Silman, J. E. (2011). Employers Really Value education? Top Skill employers seek from applicants. http://www.maador.com/upload/doemployersvalueeducation_65350.pdf. Singhal, D.A. (2008). A study of customer perception towards internet banking: Identifying Major Contributing Factors. The Journey of Napalese Business Studies,1,101-111. Sommer, P. (2011). Fighting Economic Crime in the financial Services Sector. PriceWaterHouse. Skhosana. (2007). Economics Simplified. Central Bank of Swaziland News Letter. 78 Smart, A. (2013). A centerpiece of the conference, were presented at The Smart Conference 2013 Supply Chain Industry Dinner on Wednesday 27 May, 2013. Stan, B. (2006). Customers preference on internet Banking. 53. Stewart M, J. (2014). CompTia Security. Review Guide, 10. Sutherland, M.L. (2006). Conflict Management: A Union’s Approach at the Durban University of Technology (DUT). MBA. UKZN Thomas, D. (2014). The Business News, published by “The Times of Swaziland”, p. 12-42 Thompson, A. A., Peteraf, M.A., Gamble, J. E. and Strickland III, A. J. (2012). Crafting and Executing Strategy: The Quest for Competitive Advantages, Concepts and Cases (18th Edition). McGraw –Hill. Turban, E., King, D., Kyu Lee, J. and Viehland, D. (2006). A Management Perspective, 4th Edition. Turban, E., (2006). Information Systems at Rosenbluth – Defending Against business pressures and competition. Turban, E., (2006). Electronic Commerce Vater, D. Cho, Y. and Sidebottom P. (2012). The digital Challenge to Retail Banks. Financial Institutions that Apply digital Technologies will embrace deep strategic, operation and organisational changes. William, H. A. (2013). Reliability and Validity of Inference About Teachers Based on Student Test Scores: Memorial Lecture Series. 79 Williams, P. (2008). Organised Crime and Cyber-crime. Implications for business. Williams, E. A. and Castro, S. L. (2010). Individual Learning and Perceptions The Effects of Teamwork on of Team Performance. Team Performance Management, 16(3/4), p. 124-147 Williamson, D.G. (2009). Enhanced Authentication in Online Banking. Journal of Economic crime management,4(2). Wilson, P. and Kunz, M. (2004). Computer Crime and Computer Fraud: Report on Montgomery Country Criminal and Justice Coordination Commission. University of Maryland Zijad, P.C. (2008). Approaches and Methodologies for Strategic Information Systems Planning. An Empirical Study in Australia, 19th Australian conference on information systems (pp.3-5). Christchurch. Zoogah, D.B, Vora, D. Richard, O and Peng, M. W. (2008). Strategic Alliance Team Diversity, Coordination, and Effectiveness. University Of Texas) Unpublished. 80 ANNEXURE A : COVERING LETTER c/o Regent Business School Khangezile P. Mkhonta P. O. Box 296 Lobamba The Manager First National Bank Mbabane Swaziland Dear Sir MBA – DISSERTATION I am currently studying for a Master’s Degree in Business Administration at Regent Business School in Durban. My area of research is in the banking sector with particular focus on the impact/contribution of information technology towards attaining competitive advantage. I have chosen FNB as a bank with a mark to do the research on. I therefore request for your permission to do my investigation. All information gathered will be treated with confidentiality. Findings and recommendations will be forwarded to FNB by means of a copy of the dissertation. Thanking you in advance. Yours faithfully Khangezile P. Mkhonta MBA 81 ANNEXURE B : QUESTIONNAIRE Section A – Biographical Data This section aims to get your biographical information. Mark an “X” in the relevant box. 1. Gender : [ 2. Your age group ] Male [ ] 20 -30 [ ] Female [ ] 31 – 40 [ ] 41 -50 [ ] 51 -60 [ ] Over 60 Section B – Demographics This section aims to get your demographic information. Mark an “X” in the relevant box. 3. Level of position occupied [ ] Clerical [ ] Supervisory level [ ] Middle Management [ 4. ] Senior Management Others (Please specify): ___________________ Highest Level of Education [ [ 5. ] Matric ] Post Graduate [ ] Diploma [ ] Other (Please specify): ___________________ [ ] Degree Place of work (Branch) [ ] Head Office [ ] Corporate Place [ ] Swazi Plaza [ ] The Mall [ ] Other (Please specify): ___________________ Section C – Components of Information Technology towards achieving competitive advantage. This section aims to assess the components of Information Technology that are contributing towards competitive advantage. Kindly indicate your level of agreement or disagreement by marking an “X” in the relevant box. Questions Strongly Disagree 6. Information technology is a competitive tool in the financial sector 7. Business and important role institution. 8. Well-developed Information Technology infrastructure and Software impact positively to competitive advantage of the organization. Disagree Neutral Agree Information Technology play an in the success of financial the 82 Strongly Agree 9. Human Capacity contributes immensely to competitive advantage in the banking sector. 10. Internet has impacted positively on the success of the banking industry towards attaining competitive advantage. 11. ATMs have become the major revelation for customers. 12. Cellphone banking is widely accepted by customers. 13. Electronic mail contributes to competitive advantage. 14. More customers prefer using over the counter services than ATMs and Internet Banking. 15. Expenditure on development of Information Technology and immense training contribute to attaining competitive advantage Section D – IT Challenges This section aims to assess the components of Information Technology that are constrains towards competitive advantage. Kindly indicate your level of agreement or disagreement by marking an “X” in the relevant box. Questions Strongly disagree disagree neutral agree 16. Information Technology through internet has given rise to cybercrime 17. Information Technology through internet has led to card skimming. 18. Information technology has caused ethical controversy in the security of company information and workplace safety. 19. Law enforcement with regard to investigating crimes and handling evidence, dealing with offenders, and assisting victims is complex and challenging. 20. Retention of Information Technology Personnel is a challenge. 21. Bandwidth Problems (if network present) pose a challenge of hacking by criminals. 83 Strongly agree ANNEXURE : C – DATA OF RESPONDENTS 1. Age Frequency Percent Valid Percent Cumulative Percent Valid 0-21 2 4.1 4.1 4.1 22-30 13 26.5 26.5 30.6 31-40 24 49.0 49.0 79.6 41-50 3 6.1 6.1 85.7 7 14.3 14.3 100.0 49 100.0 100.0 51 and above Total 2. Gender Frequency Percent Valid Percent Cumulative Percent Valid Male 28 57.1 57.1 57.1 Female 21 42.9 42.9 100.0 Total 49 100.0 100.0 3. Level of Position occupied Frequency Percent Valid Percent Cumulative Percent Valid 4. Supervisory 19 38.8 38.8 38.8 Middle Management 24 49.0 49.0 87.8 Senior Management 5 10.2 10.2 98.0 Other 1 2.0 2.0 100.0 Total 49 100.0 100.0 Highest Level of Education Frequency Percent Valid Percent Cumulative Percent Matric 8 16.3 16.3 16.3 Diploma 20 40.8 40.8 57.1 Degree 14 28.6 28.6 85.7 Post Graduate 6 12.2 12.2 98.0 Other 1 2.0 2.0 100.0 Total 49 100.0 100.0 Valid 84 5. Branch Based in Frequency Percent Valid Percent Cumulative Percent Head Office 16 32.7 32.7 32.7 Corporate place 18 36.7 36.7 69.4 Swazi Plaza 12 24.5 24.5 93.9 The Mall 2 4.1 4.1 98.0 Other 1 2.0 2.0 100.0 Total 49 100.0 100.0 Valid 6. Information technology is a competitive tool in the financial sector Frequency Percent Valid Percent Cumulative Percent Valid 7. Strongly agree 18 36.7 36.7 36.7 agree 19 38.8 38.8 75.5 neutral 10 20.4 20.4 95.9 disagree 2 4.1 4.1 100.0 Total 49 100.0 100.0 Business and Information Technology plays an important role in the success of Financial institutions. Frequency Percent Valid Percent Cumulative Percent Strongly agree 21 42.9 42.9 42.9 agree 19 38.8 38.8 81.6 neutral 9 18.4 18.4 100.0 Total 49 100.0 100.0 Valid 8. Well-developed Information Technology infrastructure and Software impacts positively to competitive advantage. Frequency Percent Valid Percent Cumulative Percent Strongly agree 12 24.5 24.5 24.5 agree 29 59.2 59.2 83.7 neutral 6 12.2 12.2 95.9 disagree 1 2.0 2.0 98.0 Strongly disagree 1 2.0 2.0 100.0 Total 49 100.0 100.0 Valid 85 9. Human Capacity contributes immensely to competitive advantage in the banking sector Frequency Percent Valid Percent Cumulative Percent Valid Strongly agree 10 20.4 20.4 20.4 agree 25 51.0 51.0 71.4 neutral 12 24.5 24.5 95.9 disagree 2 4.1 4.1 100.0 Total 49 100.0 100.0 10. Internet has impacted positively on the success of the banking industry towards attaining competitive advantage Frequency Percent Valid Percent Cumulative Percent Strongly agree 16 32.7 32.7 32.7 agree 19 38.8 38.8 71.4 neutral 10 20.4 20.4 91.8 disagree 2 4.1 4.1 95.9 Strongly disagree 2 4.1 4.1 100.0 Total 49 100.0 100.0 Valid 11. ATMs have become the major revelation for customers Frequency Percent Valid Percent Cumulative Percent Strongly agree 12 24.5 24.5 24.5 agree 24 49.0 49.0 73.5 neutral 9 18.4 18.4 91.8 disagree 3 6.1 6.1 98.0 Strongly disagree 1 2.0 2.0 100.0 Total 49 100.0 100.0 Valid 86 12. Cellphone banking is widely accepted by customers Frequency Percent Valid Percent Cumulative Percent Strongly agree 6 12.2 12.2 12.2 agree 15 30.6 30.6 42.9 neutral 13 26.5 26.5 69.4 disagree 10 20.4 20.4 89.8 Strongly disagree 5 10.2 10.2 100.0 Total 49 100.0 100.0 Valid 13. Electronic mail contributes to competitive advantage Frequency Percent Valid Percent Cumulative Percent Valid Strongly agree 7 14.3 14.3 14.3 agree 21 42.9 42.9 57.1 neutral 16 32.7 32.7 89.8 disagree 5 10.2 10.2 100.0 Total 49 100.0 100.0 14. More customers prefer using over the counter services Frequency Percent Valid Percent Cumulative Percent Strongly agree 6 12.2 12.2 12.2 agree 13 26.5 26.5 38.8 neutral 8 16.3 16.3 55.1 disagree 10 20.4 20.4 75.5 Strongly disagree 12 24.5 24.5 100.0 Total 49 100.0 100.0 Valid 15. Expenditure in information technology development and immense training contributes in competitive advantage Frequency Percent Valid Percent Cumulative Percent Strongly agree 8 16.3 16.3 16.3 agree 24 49.0 49.0 65.3 neutral 9 18.4 18.4 83.7 disagree 4 8.2 8.2 91.8 Strongly disagree 4 8.2 8.2 100.0 Total 49 100.0 100.0 Valid 87 16. Information technology has given rise to cybercrime Frequency Percent Valid Percent Cumulative Percent Valid Strongly agree 11 22.4 22.4 22.4 agree 21 42.9 42.9 65.3 neutral 13 26.5 26.5 91.8 disagree 4 8.2 8.2 100.0 Total 49 100.0 100.0 17. Information Technology leads to increase in card skimming Frequency Percent Valid Percent Cumulative Percent Strongly agree 9 18.4 18.4 18.4 agree 25 51.0 51.0 69.4 neutral 8 16.3 16.3 85.7 disagree 3 6.1 6.1 91.8 Strongly disagree 4 8.2 8.2 100.0 Total 49 100.0 100.0 Valid 18. Information technology has caused ethical controversy Frequency Percent Valid Percent Cumulative Percent Strongly agree 18 36.7 36.7 36.7 agree 18 36.7 36.7 73.5 neutral 13 26.5 26.5 100.0 Total 49 100.0 100.0 Valid 19. Law enforcement is complex and challenging with the use of Information Technology Frequency Percent Valid Percent Cumulative Percent Valid Strongly agree 10 20.4 20.4 20.4 agree 22 44.9 44.9 65.3 neutral 15 30.6 30.6 95.9 disagree 2 4.1 4.1 100.0 Total 49 100.0 100.0 20. Retention of Information Technology Personnel is a challenge 88 Frequency Percent Valid Percent Cumulative Percent Valid Strongly agree 15 30.6 30.6 30.6 agree 21 42.9 42.9 73.5 neutral 11 22.4 22.4 95.9 disagree 2 4.1 4.1 100.0 Total 49 100.0 100.0 21. Bandwidth if network available) poses a challenge of system hacking by criminals Frequency Percent Valid Percent Cumulative Percent Strongly agree 11 22.4 22.4 22.4 agree 23 46.9 46.9 69.4 neutral 11 22.4 22.4 91.8 disagree 3 6.1 6.1 98.0 Strongly disagree 1 2.0 2.0 100.0 Total 49 100.0 100.0 Valid 89 ANNEXURE D - AUTHORITY LETTER First National Bank P. O. Box 261 Eveni, Mbabane Dear Ms Mkhonta Regent Business School First National Bank is hereby granting you permission to conduct research in its organisation towards your Master of Business Administration (MBA) qualification at Regent Business School in the following research area. Contribution of information technology towards competitive advantage in the banking sector: Case Study of First National Bank, Mbabane Swaziland. I trust all information will be treated with confidentiality. Eve Dunn 90 ANNEXURE E : ETHICAL FORM ETHICAL CLEARANCE FORM Section 1 : Personal Details 1.1 Full Name and Surname KHANGEZILE P. MKHONTA 1.2 Student Number MBA1120257F 1.3 Contact Details: · Telephone Number +268 25177035 · Cell Number +268 7802 4119 · Email: Khangezilem@centralbank.org.sz Supervisor’s Details: · Name: Ms Xolelwa Linganiso · Telephone Number +27313044626 · Email research3@regent.ac.za 91