{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:04:34Z","timestamp":1754157874690,"version":"3.41.2"},"reference-count":32,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T00:00:00Z","timestamp":1313452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8,16]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to investigate the development of a culturally sensitive and end\u2010user\u2010centric software architectural framework for the development of eService applications in information and communication technologies for development (ICTD) contexts. The research is undertaken within the Siyakhula Living Lab (SLL) in South Africa.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Action research is the approach undertaken in this research with an extensive literature review to inform the development of the architecture, which is later qualitatively and quantitavely validated.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Various factors have to be taken into consideration for technology solutions to be effective in their context of deployment. The authors have provided an architecture that intrinsically enables software solutions to be developed from the ground up with concern for flexibility for context sensitivity. The PIASK architecture separates the presentation, interaction, access, social networking and knowledge base components into five distinct functional layers. This architecture is validated for: technical viability through a development of a knowledge portal in SLL; cultural sensitivity through Dooyeweerd's theory of modal aspects; and user centricity using a SALUTA\u2010based evaluation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The successful evolution of any society towards a knowledge society is predicated on technology solutions that embrace and that are sensitive to the socio\u2010cultural diversity of that society. The PIASK architecture developed in this research is a tool that can be used in the realization of services and applications for ICTD contexts in South Africa and other third\u2010world countries.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The software architecture developed specifically for ICTD contexts to encapsulate context sensitivity and user centricity is the primary and novel contribution of this research.<\/jats:p><\/jats:sec>","DOI":"10.1108\/13287261111164880","type":"journal-article","created":{"date-parts":[[2011,8,20]],"date-time":"2011-08-20T07:08:30Z","timestamp":1313824110000},"page":"322-339","source":"Crossref","is-referenced-by-count":2,"title":["Dimensioning cultural diversity in eServices architectures"],"prefix":"10.1108","volume":"13","author":[{"given":"Mamello","family":"Thinyane","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"Terzoli","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012520232270600_b1","doi-asserted-by":"crossref","unstructured":"Aay, H. and Van Langevelde, A.B. (2005), \u201cA Dooyeweerd\u2010based approach to regional economic development\u201d, Tijdschrift voor Economische en Sociale Geografie, Vol. 96 No. 2, pp. 184\u201098.","DOI":"10.1111\/j.1467-9663.2005.00449.x"},{"key":"key2022012520232270600_b2","unstructured":"Basden, A. (2000), \u201cThe Dooyeweerd pages\u201d, available at: www.dooy.salford.ac.uk\/ (accessed 10 October 2010)."},{"key":"key2022012520232270600_b3","doi-asserted-by":"crossref","unstructured":"Basden, A. (2002), \u201cThe critical theory of Herman Dooyeweerd?\u201d, Journal of Information Technology, Vol. 17 No. 4, pp. 257\u201069.","DOI":"10.1080\/0268396022000017770"},{"key":"key2022012520232270600_b4","doi-asserted-by":"crossref","unstructured":"Basden, A. and Patrizia, L. (1997), \u201cEnvironmental sustainability and information systems: the similarity\u201d, Systemic Practise and Action Research, Vol. 10 No. 4, pp. 473\u201089.","DOI":"10.1007\/BF02557893"},{"key":"key2022012520232270600_b5","doi-asserted-by":"crossref","unstructured":"Bolt, R.A. (1980), \u201c\u2018Put\u2010that\u2010there\u2019: voice and gesture at the graphics interface\u201d, Proceedings of the 7th Annual Conference on Computer Graphics and Interactive Techniques, New York, NY, USA, Vol. 14 No. 3, pp. 262\u201070.","DOI":"10.1145\/965105.807503"},{"key":"key2022012520232270600_b6","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P. and Stal, M. (1996), Pattern\u2010Oriented Software Architecture: A System of Patterns, Wiley, New York, NY."},{"key":"key2022012520232270600_b7","doi-asserted-by":"crossref","unstructured":"Conradie, D.P., Morris, C. and Jacobs, S.J. (2003), \u201cUsing information and communication technologies (ICTs) for deep rural development in South Africa\u201d, Communication, Vol. 29 No. 1, pp. 199\u2010217.","DOI":"10.1080\/02500160308538027"},{"key":"key2022012520232270600_b8","doi-asserted-by":"crossref","unstructured":"Coutaz, J. (1987), \u201cPAC: an implementation model for dialog design\u201d, Proceedings of the Interact'87 Conference, Stuttgart, Germany, September 1\u20104, Vol. 87, pp. 431\u20106.","DOI":"10.1016\/B978-0-444-70304-0.50074-1"},{"key":"key2022012520232270600_b9","unstructured":"Dooyeweerd, H. (1997), A New Critique of Theoretical Thought, Edwin Mellen Press, Lewiston, NY, February."},{"key":"key2022012520232270600_b10","doi-asserted-by":"crossref","unstructured":"Etzkowitz, H. (2003), \u201cInnovation in innovation: the triple helix of university\u2010industry\u2010government relations\u201d, Social Science Information, Vol. 42 No. 3, p. 293.","DOI":"10.1177\/05390184030423002"},{"key":"key2022012520232270600_b11","unstructured":"Flor, A. (2001), \u201cICT and poverty: the indisputable link\u201d, Proceedings of Third Asia Development Forum on Regional Economic Cooperation in Asia and the Pacific, Bangkok, Thailand, June, pp. 11\u201014."},{"key":"key2022012520232270600_b12","doi-asserted-by":"crossref","unstructured":"Folmer, E., van Gurp, J. and Bosch, J. (2005), \u201cSoftware architecture analysis of usability\u201d, Lecture Notes in Computer Science, Vol. 3425, Springer, Berlin, pp. 38\u201058, July.","DOI":"10.1007\/11431879_3"},{"key":"key2022012520232270600_b13","doi-asserted-by":"crossref","unstructured":"Garlan, D. and Shaw, M. (1993), \u201cAn introduction to software architecture\u201d, Advances in Software Engineering and Knowledge Engineering, Vol. 1, pp. 1\u201040.","DOI":"10.1142\/9789812798039_0001"},{"key":"key2022012520232270600_b14","unstructured":"Gush, K. (2008), \u201cTowards a more personalized user experience and better demographic data on the digital doorway public computer terminals\u201d, paper presented at the 5th Prato Community Informatics & Development Informatics Conference 2008: ICTs for Social Inclusion: What is the Reality?, Prato."},{"key":"key2022012520232270600_b15","unstructured":"Gush, K., Cambridge, G. and Smith, R. (2004), \u201cThe digital doorway \u2013 minimally invasive education in Africa\u201d, paper presented at the ICT in Education Conference, Cape Town."},{"key":"key2022012520232270600_b16","doi-asserted-by":"crossref","unstructured":"Inamdar, P. (2004), \u201cComputer skills development by children using \u2018hole in the wall\u2019 facilities in rural India\u201d, Australasian Journal of Educational Technology, Vol. 20 No. 3, pp. 337\u201050.","DOI":"10.14742\/ajet.1351"},{"key":"key2022012520232270600_b17","unstructured":"Pade, C., Palmer, R., Kavhai, M. and Gumbo, S. (2009), Baseline Study Report, Siyakhula Living Lab, Grahamstown, April."},{"key":"key2022012520232270600_b18","unstructured":"Palmer, R., Timmermans, H. and Fay, D. (2002), From Conflict to Negotiation: Nature\u2010based Development of South Africa's Wild Coast, Human Sciences Research Council, Pretoria."},{"key":"key2022012520232270600_b19","doi-asserted-by":"crossref","unstructured":"Pawson, R. and Matthews, R. (2001), \u201cNaked objects: a technique for designing more expressive systems\u201d, ACM SIGPLAN Notices, Vol. 36 No. 12, pp. 61\u20107.","DOI":"10.1145\/583960.583967"},{"key":"key2022012520232270600_b20","unstructured":"Potel, M. (1996), \u201cMVP: model view presenter, the taligent programming model for C++ and Java\u201d, avaliable at: www.wildcrest.com\/Potel\/Portfolio\/mvp.pdf (accessed 20 October 2010)."},{"key":"key2022012520232270600_b21","unstructured":"Reenskaug, T. (2003), MVC: Xerox Parc 1978\u201079, avaliable at: http:\/\/heim.ifi.uio.no\/trygver\/themes\/mvc\/mvc\u2010index.html (accessed 10 August 2010)."},{"key":"key2022012520232270600_b22","doi-asserted-by":"crossref","unstructured":"Sangal, N., Jordan, E., Sinha, V. and Jackson, D. (2005), \u201cUsing dependency models to manage complex software architecture\u201d, Proceedings of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, ACM, New York, NY, pp. 167\u201076.","DOI":"10.1145\/1103845.1094824"},{"key":"key2022012520232270600_b23","doi-asserted-by":"crossref","unstructured":"Slay, H., Wentworth, P. and Locke, J. (2006), \u201cBingbee, an information kiosk for social enablement in marginalized communities\u201d, Proceedings of the ACM South African Institute of Computer Scientists and Information Technologists Conference (SAICSIT), New York, NY, USA, October, pp. 107\u201016.","DOI":"10.1145\/1216262.1216274"},{"key":"key2022012520232270600_b24","doi-asserted-by":"crossref","unstructured":"Snyder, A. (1986), \u201cEncapsulation and inheritance in object\u2010oriented programming languages\u201d, Conference on Object Oriented Programming Systems Languages and Applications, ACM, New York, NY, pp. 38\u201045.","DOI":"10.1145\/960112.28702"},{"key":"key2022012520232270600_b25","unstructured":"Stillman, L. (2008), \u201cIs there an ideal type? Developing planning and evaluation models for a digital social inclusion project: digital doorways, South Africa\u201d, paper presented at the 5th Prato Community Informatics & Development Informatics Conference 2008: ICTs for Social Inclusion: What is the Reality?, Prato."},{"key":"key2022012520232270600_b26","doi-asserted-by":"crossref","unstructured":"Tedre, M., Sutinen, E., Kahkonen, E. and Kommers, P. (2003), \u201cAppreciating the knowledge of students in computer science education in developing countries\u201d, Proceedings of International Conference on Information Technology Research and Education (ITRE2003), Newark, NJ, USA, August, pp. 174\u20108.","DOI":"10.1109\/ITRE.2003.1270597"},{"key":"key2022012520232270600_b27","doi-asserted-by":"crossref","unstructured":"Tedre, M., Sutinen, E., K\u00e4hk\u00f6nen, E. and Kommers, P. (2006), \u201cEthnocomputing: ICT in cultural and social context\u201d, Communications of the ACM, Vol. 49 No. 1, pp. 126\u201030.","DOI":"10.1145\/1107458.1107466"},{"key":"key2022012520232270600_b29","doi-asserted-by":"crossref","unstructured":"Thinyane, M., Terzoli, A. and Clayton, P. (2008a), \u201cTransitions towards a knowledge society: aspectual pre\u2010evaluation of a culture\u2010sensitive implementation framework\u201d, Learning of Live in the Knowledge Society, Vol. 281, Springer IFIP, Boston, MA, pp. 271\u20108.","DOI":"10.1007\/978-0-387-09729-9_41"},{"key":"key2022012520232270600_b30","doi-asserted-by":"crossref","unstructured":"Thinyane, M., Terzoli, A. and Clayton, P. (2009), \u201ceServices provisioning in a community development context through a JADE MAS platform\u201d, Proceedings of the 3rd International Conference on Information and Communication Technologies and Development, IEEE Press, Piscataway, NJ, pp. 320\u20107.","DOI":"10.1109\/ICTD.2009.5426697"},{"key":"key2022012520232270600_b28","unstructured":"Thinyane, M., Dalvit, L., Terzoli, A. and Clayton, P. (2008b), \u201cThe internet in rural communities: unrestricted and contextualized\u201d, Proceedings of ICT Africa Conference, Addis Ababa, Ethiopia, February."},{"key":"key2022012520232270600_b31","unstructured":"Tucker, W., Blake, W, Marsden, G., Pearson, M. and Westerveld, R. (2007), \u201cReflection on three years of rural wireless internet protocol communication research and fieldwork\u201d, paper presented at the South African Telecommunications Networks & Applications Conference, Mauritius."},{"key":"key2022012520232270600_b32","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A. (1984), \u201cCoping with the imprecision of the real world\u201d, Communications of the ACM, Vol. 27 No. 4, pp. 304\u201011.","DOI":"10.1145\/358027.358032"}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/13287261111164880","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13287261111164880\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13287261111164880\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:24:22Z","timestamp":1753403062000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/13\/3\/322-339\/252101"}},"subtitle":[],"editor":[{"given":"Michael","family":"Kyobe","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2011,8,16]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,8,16]]}},"alternative-id":["10.1108\/13287261111164880"],"URL":"https:\/\/doi.org\/10.1108\/13287261111164880","relation":{},"ISSN":["1328-7265"],"issn-type":[{"type":"print","value":"1328-7265"}],"subject":[],"published":{"date-parts":[[2011,8,16]]}}}