A critique of baroque performance practice with specific reference to the organ preludes and fugues by Johann Sebastian Bach
- Authors: Murphy, Liesel
- Date: 2009
- Subjects: Bach, Johann Sebastian, 1685-1750 -- Organ music , Bach, Johann Sebastian, 1685-1750 -- Keyboard music , Performance practice (Music) -- History -- 17th century , Organ music -- History and criticism , Music -- 17th century -- Performance
- Language: English
- Type: Thesis , Masters , MMus
- Identifier: vital:8509 , http://hdl.handle.net/10948/1023 , Bach, Johann Sebastian, 1685-1750 -- Organ music , Bach, Johann Sebastian, 1685-1750 -- Keyboard music , Performance practice (Music) -- History -- 17th century , Organ music -- History and criticism , Music -- 17th century -- Performance
- Description: This study aims to provide a critique of Baroque performance practice, with specific reference to the organ Preludes and Fugues of Johann Sebastian Bach. Drawing from the extensive body of literature pertaining to Bach’s keyboard music, a number of relevant issues are explored in so far as these may provide understanding of the manner in which the organ Preludes and Fugues should be performed today. These include: • The notion of Bach’s ‘generic’ keyboard works. Were the generic keyboard works as a whole intended to be performed on more than one keyboard instrument? The instrumental designations given by Bach in these works are a valuable source of information in answering this question. • The type of organ that was known to J.S. Bach and typical registration used in the Baroque, called the plenum. • Identification of the grey area that persists in the interpretation of Bach’s organ works with regard to registration, tempo, rhythm, articulation, phrasing, fingering and ornamentation. This study also engages with the current authenticity debate in musical performance as seen from the modernist and postmodernist points of view. The modernist ideal of authenticity is to “re-create” or “reconstruct” performances of Bach’s music with as much accuracy as the evidence of historical musicologists can provide. For the postmodernist, however, authenticity lies in embracing the human element of contingency in musical performance, along with a thorough grounding of such performance in historical evidence. In aligning itself with the postmodernist point of view, this study ultimately argues that we cannot learn everything there is to know about Baroque performance practice from books. Instead, in addition to historical evidence, we draw much of our understanding in this regard from our innate or tacit levels of knowing. In this regard the scholar of Bach’s organ works can draw valuable lessons from the levels of tacit knowledge of leading organ pedagogues and performers on the subject of Baroque performance practice.
- Full Text:
- Date Issued: 2009
- Authors: Murphy, Liesel
- Date: 2009
- Subjects: Bach, Johann Sebastian, 1685-1750 -- Organ music , Bach, Johann Sebastian, 1685-1750 -- Keyboard music , Performance practice (Music) -- History -- 17th century , Organ music -- History and criticism , Music -- 17th century -- Performance
- Language: English
- Type: Thesis , Masters , MMus
- Identifier: vital:8509 , http://hdl.handle.net/10948/1023 , Bach, Johann Sebastian, 1685-1750 -- Organ music , Bach, Johann Sebastian, 1685-1750 -- Keyboard music , Performance practice (Music) -- History -- 17th century , Organ music -- History and criticism , Music -- 17th century -- Performance
- Description: This study aims to provide a critique of Baroque performance practice, with specific reference to the organ Preludes and Fugues of Johann Sebastian Bach. Drawing from the extensive body of literature pertaining to Bach’s keyboard music, a number of relevant issues are explored in so far as these may provide understanding of the manner in which the organ Preludes and Fugues should be performed today. These include: • The notion of Bach’s ‘generic’ keyboard works. Were the generic keyboard works as a whole intended to be performed on more than one keyboard instrument? The instrumental designations given by Bach in these works are a valuable source of information in answering this question. • The type of organ that was known to J.S. Bach and typical registration used in the Baroque, called the plenum. • Identification of the grey area that persists in the interpretation of Bach’s organ works with regard to registration, tempo, rhythm, articulation, phrasing, fingering and ornamentation. This study also engages with the current authenticity debate in musical performance as seen from the modernist and postmodernist points of view. The modernist ideal of authenticity is to “re-create” or “reconstruct” performances of Bach’s music with as much accuracy as the evidence of historical musicologists can provide. For the postmodernist, however, authenticity lies in embracing the human element of contingency in musical performance, along with a thorough grounding of such performance in historical evidence. In aligning itself with the postmodernist point of view, this study ultimately argues that we cannot learn everything there is to know about Baroque performance practice from books. Instead, in addition to historical evidence, we draw much of our understanding in this regard from our innate or tacit levels of knowing. In this regard the scholar of Bach’s organ works can draw valuable lessons from the levels of tacit knowledge of leading organ pedagogues and performers on the subject of Baroque performance practice.
- Full Text:
- Date Issued: 2009
A descriptive study of conflict management strategies of the Johannesburg Central Methodist Church refugee community
- Authors: Burger, Christine-Maria
- Date: 2009
- Subjects: Conflict management , Central Methodist Church Refugee Community , Refugees -- Housing -- South Africa -- Johannesburg
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8199 , http://hdl.handle.net/10948/1301 , Conflict management , Central Methodist Church Refugee Community , Refugees -- Housing -- South Africa -- Johannesburg
- Description: The growth of forced migration populations - i.e. the movement of people within and across national boarders as a result of conflicts, disasters, and development policies and projects - has been a defining feature of the twentieth century and will no doubt remain with us well into the twenty-first century (Rutinwa, 2001: 13). Literature searches suggest that the ‘refugee’ constitutes the most powerful label within the forced migration discourse. Published calculations regarding the number of refugees in the world at the end of 2008, range between 15.2 million (UNHCR, 2009: 2) and 13.6 million (World Refugee Survey, 2009: 33). The refugee experience of a small representative population of these figures namely, the Zimbabwean refugees living within the Central Methodist Church (CMC) or Central Methodist Mission (CMM) refugee community, in Johannesburg city centre is the concern of this treatise. From the perspective of the conflict management scholar, the informal and formal conflict management strategies adopted among and between the CMM refugees, have been studied. Analysis of existing literature, interviews conducted with the refugees, as well as hours of experience within the refugee community, substantiate the descriptive study that follows. Guided by the grounded theory approach, research findings have emerged out of the descriptions. The research findings in turn have founded the development of the recommendations that appear in the conclusion to the treatise.
- Full Text:
- Date Issued: 2009
- Authors: Burger, Christine-Maria
- Date: 2009
- Subjects: Conflict management , Central Methodist Church Refugee Community , Refugees -- Housing -- South Africa -- Johannesburg
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8199 , http://hdl.handle.net/10948/1301 , Conflict management , Central Methodist Church Refugee Community , Refugees -- Housing -- South Africa -- Johannesburg
- Description: The growth of forced migration populations - i.e. the movement of people within and across national boarders as a result of conflicts, disasters, and development policies and projects - has been a defining feature of the twentieth century and will no doubt remain with us well into the twenty-first century (Rutinwa, 2001: 13). Literature searches suggest that the ‘refugee’ constitutes the most powerful label within the forced migration discourse. Published calculations regarding the number of refugees in the world at the end of 2008, range between 15.2 million (UNHCR, 2009: 2) and 13.6 million (World Refugee Survey, 2009: 33). The refugee experience of a small representative population of these figures namely, the Zimbabwean refugees living within the Central Methodist Church (CMC) or Central Methodist Mission (CMM) refugee community, in Johannesburg city centre is the concern of this treatise. From the perspective of the conflict management scholar, the informal and formal conflict management strategies adopted among and between the CMM refugees, have been studied. Analysis of existing literature, interviews conducted with the refugees, as well as hours of experience within the refugee community, substantiate the descriptive study that follows. Guided by the grounded theory approach, research findings have emerged out of the descriptions. The research findings in turn have founded the development of the recommendations that appear in the conclusion to the treatise.
- Full Text:
- Date Issued: 2009
A difficult equilibrium: torture narratives and the ethics of reciprocity in apartheid South Africa and its aftermath
- Authors: Pett, Sarah
- Date: 2009
- Subjects: Apartheid -- South Africa -- History Torture -- South Africa Post-apartheid era -- South Africa Apartheid in literature Torture in literature
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:2194 , http://hdl.handle.net/10962/d1002236
- Description: This thesis takes the form of an enquiry into the development of the ―generic contours (Bakhtin 4) for the narration of torture in South Africa during apartheid and its aftermath. The enquiry focusses on the ethical determinations that underlie the conventions of this genre. My theoretical framework uses Adam Zachary Newton‘s conceptualization of narrative ethics to supplement Paul Ricoeur‘s writings on narrative identity and the ethical intention, thus facilitating the transfer of Ricoeur‘s abstract philosophy to the realm of literary criticism. Part I presents torture as a disruption of narrative identity and a defamiliarization of the intersubjective encounter. The existence of torture narratives thus attests to the critical role of narration in the reconstruction of the tortured person‘s identity and the re-establishment of benign frameworks of intersubjective communication. Literature‘s potential to act as a laboratory for the testing of the limitations of narrative identity and the resilience of ethical mores suggests that the fictional representation of torture also has an important role to play in this attempt at rehabilitation. Part II takes the form of a comparative analysis of non-fictional and fictional accounts of torture originating from apartheid South Africa. This shows that the ethical determinations underlying the narration of torture in South Africa range from intersubjective estrangement to a ―solicitude of reciprocity (Bourgeois 109). However, because the majority of these texts used the presentation of human rights abuses to galvanize international opposition to apartheid, the scope for experimentation was limited by the political exigencies of the time. Part III examines the stylistic and generic shifts in the narration of torture that accompanied South Africa‘s transition to democracy. It suggests that the discursive dominance of the Truth and Reconciliation Commission replaced the fruitful—in literary terms—dialogue between authoritarianism and resistance that characterized the apartheid era with a monologic grand narrative of emotional catharsis, reconciliation and nation building. It also suggests that the ―truth-and-reconciliation genre of writing (Quayson 754) that shaped the literary milieu of the post-TRC period be seen in terms of a resurgence of the apartheid–era paradigms for the narration of human rights abuses that were repressed during the initial phase of democratic transition. By framing the TRC as a catalyst for individual journeys of self-discovery, these novels raise important questions about what it means to be a part of the ―new South Africa. In contrast to the majority of apartheid era literature, the novels of the post-TRC period privilege the literary prerogative over the political, and thus bring to fruition the experimental potential of the previous paradigm. In doing so, they not only go beyond solicitude to achieve an ―authentic reciprocity in exchange (Ricoeur, Oneself 191), but also initiate a process of long-awaited literary expansion, in which authors look beyond the limits of apartheid and begin to critically engage with the region‘s pre-apartheid history and its post-apartheid present.
- Full Text:
- Date Issued: 2009
- Authors: Pett, Sarah
- Date: 2009
- Subjects: Apartheid -- South Africa -- History Torture -- South Africa Post-apartheid era -- South Africa Apartheid in literature Torture in literature
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:2194 , http://hdl.handle.net/10962/d1002236
- Description: This thesis takes the form of an enquiry into the development of the ―generic contours (Bakhtin 4) for the narration of torture in South Africa during apartheid and its aftermath. The enquiry focusses on the ethical determinations that underlie the conventions of this genre. My theoretical framework uses Adam Zachary Newton‘s conceptualization of narrative ethics to supplement Paul Ricoeur‘s writings on narrative identity and the ethical intention, thus facilitating the transfer of Ricoeur‘s abstract philosophy to the realm of literary criticism. Part I presents torture as a disruption of narrative identity and a defamiliarization of the intersubjective encounter. The existence of torture narratives thus attests to the critical role of narration in the reconstruction of the tortured person‘s identity and the re-establishment of benign frameworks of intersubjective communication. Literature‘s potential to act as a laboratory for the testing of the limitations of narrative identity and the resilience of ethical mores suggests that the fictional representation of torture also has an important role to play in this attempt at rehabilitation. Part II takes the form of a comparative analysis of non-fictional and fictional accounts of torture originating from apartheid South Africa. This shows that the ethical determinations underlying the narration of torture in South Africa range from intersubjective estrangement to a ―solicitude of reciprocity (Bourgeois 109). However, because the majority of these texts used the presentation of human rights abuses to galvanize international opposition to apartheid, the scope for experimentation was limited by the political exigencies of the time. Part III examines the stylistic and generic shifts in the narration of torture that accompanied South Africa‘s transition to democracy. It suggests that the discursive dominance of the Truth and Reconciliation Commission replaced the fruitful—in literary terms—dialogue between authoritarianism and resistance that characterized the apartheid era with a monologic grand narrative of emotional catharsis, reconciliation and nation building. It also suggests that the ―truth-and-reconciliation genre of writing (Quayson 754) that shaped the literary milieu of the post-TRC period be seen in terms of a resurgence of the apartheid–era paradigms for the narration of human rights abuses that were repressed during the initial phase of democratic transition. By framing the TRC as a catalyst for individual journeys of self-discovery, these novels raise important questions about what it means to be a part of the ―new South Africa. In contrast to the majority of apartheid era literature, the novels of the post-TRC period privilege the literary prerogative over the political, and thus bring to fruition the experimental potential of the previous paradigm. In doing so, they not only go beyond solicitude to achieve an ―authentic reciprocity in exchange (Ricoeur, Oneself 191), but also initiate a process of long-awaited literary expansion, in which authors look beyond the limits of apartheid and begin to critically engage with the region‘s pre-apartheid history and its post-apartheid present.
- Full Text:
- Date Issued: 2009
A far from passive record Anton van Wouw: The smaller works, AE Duffey: book review
- Authors: de Jager, Maureen
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147402 , vital:38633 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC38334
- Description: Anton van Wouw : the smaller works is, as its title implies, concerned with the generally lesser-known smaller works of Dutch-born sculptor, Anton van Wouw. Using the measure of "half life-size and smaller" as a guideline, author Alexander Duffey provides a comprehensive and well-illustrated overview of the many full-length small sculptures, busts, relief panels and maquettes produced by Van Wouw between 1881 (nine years prior to his arrival in South Africa at the age of 28) and 1940. Naturalistically sculpted and generally cast in bronze, these smaller works are wide-ranging in their subject matter, depicting innocuous, commonplace scenes alongside aspects of Afrikaner history, representations of Boer and British leaders, and so-called "native studies" (p 11).
- Full Text:
- Date Issued: 2009
- Authors: de Jager, Maureen
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147402 , vital:38633 , https://0-hdl.handle.net.wam.seals.ac.za/10520/EJC38334
- Description: Anton van Wouw : the smaller works is, as its title implies, concerned with the generally lesser-known smaller works of Dutch-born sculptor, Anton van Wouw. Using the measure of "half life-size and smaller" as a guideline, author Alexander Duffey provides a comprehensive and well-illustrated overview of the many full-length small sculptures, busts, relief panels and maquettes produced by Van Wouw between 1881 (nine years prior to his arrival in South Africa at the age of 28) and 1940. Naturalistically sculpted and generally cast in bronze, these smaller works are wide-ranging in their subject matter, depicting innocuous, commonplace scenes alongside aspects of Afrikaner history, representations of Boer and British leaders, and so-called "native studies" (p 11).
- Full Text:
- Date Issued: 2009
A feasibility study into the possibility of ionospheric propagation of low VHF (30-35 MHZ) signals between South Africa and Central Africa
- Authors: Coetzee, Petrus Johannes
- Date: 2009
- Subjects: Communications, Military -- South Africa , Communications, Military -- Africa, Central , Digital communications -- South Africa , Digital communications -- Africa, Central , Signals and signaling -- South Africa , Signals and signaling -- Africa, Central , Artificial satellites in telecommunication -- South Africa , Artificial satellites in telecommunication -- Africa, Central , Shortwave radio
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5465 , http://hdl.handle.net/10962/d1005250 , Communications, Military -- South Africa , Communications, Military -- Africa, Central , Digital communications -- South Africa , Digital communications -- Africa, Central , Signals and signaling -- South Africa , Signals and signaling -- Africa, Central , Artificial satellites in telecommunication -- South Africa , Artificial satellites in telecommunication -- Africa, Central , Shortwave radio
- Description: The role of the South African National Defence Force (SANDF) has changed considerably in the last decade. The emphasis has moved from protecting the country's borders to peacekeeping duties in Central Africa and even further North. Communications between the peacekeeping missions and the military bases back in South Africa is vital to ensure the success of these missions. Currently use is made of satellite as well as High Frequency (HF) communications. There are drawbacks associated with these technologies (high cost and low data rates/interference respectively). Successful long distance ionospheric propagation in the low Very High Frequency (VHF) range will complement the existing infrastructure and enhance the success rate of these missions. This thesis presents a feasibility study to determine under what ionospheric conditions such low VHF communications will be possible. The International Reference Ionosphere (IRI) was used to generate ionospheric data for the reflection point(s) of the signal. The peak height of the ionospheric F2 layer (hmF2) was used to calculate the required antenna elevation angle. Once the elevation angle is known it is possible to calculate the required F2 layer critical frequency (foF2). The required foF2 value was calculated by assuming a Maximum Useable Frequency (MUF) of 20% higher than the planned operational frequency. It was determined that single hop propagation is possible during the daytime if the smoothed sunspot number (SSN) exceeds 15. The most challenging requirement for successful single hop propagation is the need of an antenna height of 23 m. For rapid deployment and semi-mobile operations within a jungle environment it may prove to be a formidable obstacle.
- Full Text:
- Date Issued: 2009
- Authors: Coetzee, Petrus Johannes
- Date: 2009
- Subjects: Communications, Military -- South Africa , Communications, Military -- Africa, Central , Digital communications -- South Africa , Digital communications -- Africa, Central , Signals and signaling -- South Africa , Signals and signaling -- Africa, Central , Artificial satellites in telecommunication -- South Africa , Artificial satellites in telecommunication -- Africa, Central , Shortwave radio
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5465 , http://hdl.handle.net/10962/d1005250 , Communications, Military -- South Africa , Communications, Military -- Africa, Central , Digital communications -- South Africa , Digital communications -- Africa, Central , Signals and signaling -- South Africa , Signals and signaling -- Africa, Central , Artificial satellites in telecommunication -- South Africa , Artificial satellites in telecommunication -- Africa, Central , Shortwave radio
- Description: The role of the South African National Defence Force (SANDF) has changed considerably in the last decade. The emphasis has moved from protecting the country's borders to peacekeeping duties in Central Africa and even further North. Communications between the peacekeeping missions and the military bases back in South Africa is vital to ensure the success of these missions. Currently use is made of satellite as well as High Frequency (HF) communications. There are drawbacks associated with these technologies (high cost and low data rates/interference respectively). Successful long distance ionospheric propagation in the low Very High Frequency (VHF) range will complement the existing infrastructure and enhance the success rate of these missions. This thesis presents a feasibility study to determine under what ionospheric conditions such low VHF communications will be possible. The International Reference Ionosphere (IRI) was used to generate ionospheric data for the reflection point(s) of the signal. The peak height of the ionospheric F2 layer (hmF2) was used to calculate the required antenna elevation angle. Once the elevation angle is known it is possible to calculate the required F2 layer critical frequency (foF2). The required foF2 value was calculated by assuming a Maximum Useable Frequency (MUF) of 20% higher than the planned operational frequency. It was determined that single hop propagation is possible during the daytime if the smoothed sunspot number (SSN) exceeds 15. The most challenging requirement for successful single hop propagation is the need of an antenna height of 23 m. For rapid deployment and semi-mobile operations within a jungle environment it may prove to be a formidable obstacle.
- Full Text:
- Date Issued: 2009
A fluvial geomorphological study of river rehabilitation in the Kouga region, Eastern Cape
- Authors: Pietersen, Adrian
- Date: 2009
- Subjects: Fluvial geomorphology -- South Africa -- Eastern Cape , Alien plants -- South Africa -- Eastern Cape , Kouga Riparian Rehabilitation Project , Stream conservation -- South Africa -- Eastern Cape , Wattles (Plants) -- South Africa -- Eastern Cape , Riparian restoration -- South Africa -- Eastern Cape , Acacia mearnsii -- South Africa -- Eastern Cape , Kouga Region (South Africa) , Kouga River (South Africa)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4887 , http://hdl.handle.net/10962/d1015228
- Description: The Kouga Riparian Rehabilitation Project (KRRP) is seen as a pilot rehabilitation project in the Kouga region that is heavily invaded with Acacia mearnsii along the riparian zones of many mountain streams. Clearing of these black wattles and re-planting of indigenous vegetation are imperative to rehabilitation efforts. In this context, two invaded catchments were identified - the Baviaans and the Heuningnes. The aim of this research is to characterise the effects that the woody alien invasive Acacia mearnsii has had on the river channel morphology of the Baviaans and Heuningnes Rivers. A desktop and initial field analysis of the relevant study area catchments was completed. This was followed by a comparison of the channel morphology of the various study channel reaches using fixed channel transects. Ecological resource quality objectives (RQOs) for river rehabilitation from a fluvial geomorphological viewpoint were then established. A long-term monitoring protocol to assess whether or not these RQOs will be achieved was recommended. Follow-up channel transects were measured post wattle clearance in the Baviaans and short-term (<2yrs) changes in channel form were described. Differences in terms of the effect of Acacia mearnsii on channel form were then interpreted by direct comparison and through statistical analysis. Results indicate a number of significant differences between those channels impacted by black wattle infestation and those channels seen as unimpacted and natural. Short-term changes (<2yrs) that occurred within the study period post Baviaans wattle clearance were shown to be minimal for channel form as well as for bed material. The lack of any clear relationship or explanation between channel form and other channel controls suggests vegetation as the primary control. Vegetation, specifically the invasive alien vegetation, is the key controlling variable acting on channel form in the two study catchments.
- Full Text:
- Date Issued: 2009
- Authors: Pietersen, Adrian
- Date: 2009
- Subjects: Fluvial geomorphology -- South Africa -- Eastern Cape , Alien plants -- South Africa -- Eastern Cape , Kouga Riparian Rehabilitation Project , Stream conservation -- South Africa -- Eastern Cape , Wattles (Plants) -- South Africa -- Eastern Cape , Riparian restoration -- South Africa -- Eastern Cape , Acacia mearnsii -- South Africa -- Eastern Cape , Kouga Region (South Africa) , Kouga River (South Africa)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4887 , http://hdl.handle.net/10962/d1015228
- Description: The Kouga Riparian Rehabilitation Project (KRRP) is seen as a pilot rehabilitation project in the Kouga region that is heavily invaded with Acacia mearnsii along the riparian zones of many mountain streams. Clearing of these black wattles and re-planting of indigenous vegetation are imperative to rehabilitation efforts. In this context, two invaded catchments were identified - the Baviaans and the Heuningnes. The aim of this research is to characterise the effects that the woody alien invasive Acacia mearnsii has had on the river channel morphology of the Baviaans and Heuningnes Rivers. A desktop and initial field analysis of the relevant study area catchments was completed. This was followed by a comparison of the channel morphology of the various study channel reaches using fixed channel transects. Ecological resource quality objectives (RQOs) for river rehabilitation from a fluvial geomorphological viewpoint were then established. A long-term monitoring protocol to assess whether or not these RQOs will be achieved was recommended. Follow-up channel transects were measured post wattle clearance in the Baviaans and short-term (<2yrs) changes in channel form were described. Differences in terms of the effect of Acacia mearnsii on channel form were then interpreted by direct comparison and through statistical analysis. Results indicate a number of significant differences between those channels impacted by black wattle infestation and those channels seen as unimpacted and natural. Short-term changes (<2yrs) that occurred within the study period post Baviaans wattle clearance were shown to be minimal for channel form as well as for bed material. The lack of any clear relationship or explanation between channel form and other channel controls suggests vegetation as the primary control. Vegetation, specifically the invasive alien vegetation, is the key controlling variable acting on channel form in the two study catchments.
- Full Text:
- Date Issued: 2009
A foucaultian critique of the conception of individual subjectivity within contemporary environmental discourse
- Authors: Konik, Inge
- Date: 2009
- Subjects: Environmentalism , Environmental policy , Environmental management -- Social aspects
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8422 , http://hdl.handle.net/10948/d1016201
- Description: Certain prominent environmental theorists have accounted for and/or addressed our unmitigated environmentally damaging behavior in cognitive terms, related to a common (misplaced) belief that economic development and technological advancement, among other contemporary processes, will solve our environmental problems. However, I argue that they have not given due consideration to the complex (predominantly non-cognitive/non-conscious) discursive constitution of the individual, and thus seem to adhere to a Kantian notion of autonomy that overlooks such non-cognitive factors. Focusing on this non-cognitive aspect of discursive constitution, I ascribe our ecological apathy mainly to the fact that we have been discursively constituted as docile bodies and prostrate subjects. Further, I argue that, because this process of discursive constitution is primarily non-cognitive, any attempts to remedy our ecological apathy at a cognitive level alone will not be completely effective. Consequently, I propose that a more effective way of fostering pro-environmental dispositions may be for individuals to engage in an ethic/culture of the self that is not exclusively conceptual in orientation, and which is centered on the practice of a counter-discourse that does not constitute the individual as docile and prostrate nor negate the individual’s dependence on the environment. Alternatively, in order to engender pro-environmental civilizational change, it may be necessary to operate within the discursive parameters of dominant/popular institutions, in order to incrementally alter the discourses employed within, and disseminated through, these institutions, in a manner that would lead to the problematization, rather than the endorsement, of the ecologically deleterious technological, political and economic trajectories of our time.
- Full Text:
- Date Issued: 2009
- Authors: Konik, Inge
- Date: 2009
- Subjects: Environmentalism , Environmental policy , Environmental management -- Social aspects
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: vital:8422 , http://hdl.handle.net/10948/d1016201
- Description: Certain prominent environmental theorists have accounted for and/or addressed our unmitigated environmentally damaging behavior in cognitive terms, related to a common (misplaced) belief that economic development and technological advancement, among other contemporary processes, will solve our environmental problems. However, I argue that they have not given due consideration to the complex (predominantly non-cognitive/non-conscious) discursive constitution of the individual, and thus seem to adhere to a Kantian notion of autonomy that overlooks such non-cognitive factors. Focusing on this non-cognitive aspect of discursive constitution, I ascribe our ecological apathy mainly to the fact that we have been discursively constituted as docile bodies and prostrate subjects. Further, I argue that, because this process of discursive constitution is primarily non-cognitive, any attempts to remedy our ecological apathy at a cognitive level alone will not be completely effective. Consequently, I propose that a more effective way of fostering pro-environmental dispositions may be for individuals to engage in an ethic/culture of the self that is not exclusively conceptual in orientation, and which is centered on the practice of a counter-discourse that does not constitute the individual as docile and prostrate nor negate the individual’s dependence on the environment. Alternatively, in order to engender pro-environmental civilizational change, it may be necessary to operate within the discursive parameters of dominant/popular institutions, in order to incrementally alter the discourses employed within, and disseminated through, these institutions, in a manner that would lead to the problematization, rather than the endorsement, of the ecologically deleterious technological, political and economic trajectories of our time.
- Full Text:
- Date Issued: 2009
A framework for IT governance in small businesses
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
- Authors: Koornhof, Herman
- Date: 2009
- Subjects: Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9768 , http://hdl.handle.net/10948/994 , Corporate governance -- South Africa , Organizational effectiveness -- South Africa , Organisational Management
- Description: The primary objective of this treatise is to develop a framework that small businesses can use to implement IT governance. This framework for IT 6 Governance in Small Businesses, called ITGovSB, will be based primarily on the CobiT framework and the ISO/IEC 27002 information security controls. In order to achieve the primary objective, it is necessary to understand the differences between IT governance in small businesses and larger organisations. Consequently, one of the secondary objectives of the paper is to derive characteristics that define IT governance in small businesses. Another secondary objective is to implement the ITGovSB framework at a small business to evaluate its effectiveness.
- Full Text:
- Date Issued: 2009
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems
- Barnett, Richard J, Irwin, Barry V W
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
A framework for the secure use of portable storage devices : a South African higher education perspective
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
- Authors: Rothman, Jonathan Sean
- Date: 2009
- Subjects: Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9766 , http://hdl.handle.net/10948/1054 , Computer storage devices , Computer storage devices -- Management , Education, Higher -- Computer network resources
- Description: South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
- Full Text:
- Date Issued: 2009
A framework towards effective control in information security governance
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009
- Authors: Viljoen, Melanie
- Date: 2009
- Subjects: Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9773 , http://hdl.handle.net/10948/887 , Data protection , Computer networks -- Security measures , Electronic data processing departments -- Security measures
- Description: The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that aims to improve the visibility and contribute to better management of information security throughout an organization by enabling the provision of summarized, comprehensive information security management information to all managers in an affordable manner.
- Full Text:
- Date Issued: 2009
A GIS assessment of development and land use change in the coastal zone of the Ndlambe and Ngqushwa local municipalities, Eastern Cape, South Africa
- Authors: Palmer, Bronwyn Jane
- Date: 2009
- Subjects: Ndlambe Municipality , Ngqushwa Municipality , Local government -- South Africa -- Eastern Cape , Coastal zone management -- South Africa -- Eastern Cape , Geographic information systems -- South Africa -- Eastern Cape , Land use -- South Africa -- Eastern Cape , Rural development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4836 , http://hdl.handle.net/10962/d1005511 , Ndlambe Municipality , Ngqushwa Municipality , Local government -- South Africa -- Eastern Cape , Coastal zone management -- South Africa -- Eastern Cape , Geographic information systems -- South Africa -- Eastern Cape , Land use -- South Africa -- Eastern Cape , Rural development -- South Africa -- Eastern Cape
- Description: The coastal zone accommodates some of the most diverse ecosystems in the world and offers a wide range of ecosystem goods and services; consequently it has become a focal point of human development. People are attracted to the coast because of access to resources, favourable climate, aesthetic appeal and potential for recreational activities. As pressure for utilisation and development increases, so does the need to manage the coastal system more effectively. This research focuses on the coastal zone of the Ndlambe and Ngqushwa local municipalities in the Eastern Cape, South Africa, which are physically and environmentally similar, yet have distinct demographic and socio-economic differences. The research integrates information using GIS, from three time epochs, to determine where development and land use change is occurring. The Ndlambe Local Municipality displays high levels of formal development, while the Ngqushwa Local Municipality exhibits little formal development. These differences in development and land use are related to economic, social and legislative ‘drivers’ based on an adapted Driver-Pressure-State- Impact-Response model. The model identifies that development and land use changes lead to increased pressure on the natural system, which in turn leads to shifts in the natural state of the coastal zone, resulting in adverse impacts on the coastal zone. Changes in the natural functioning of the coastal zone highlight the need for a response in terms of changes in legislation governing coastal management and spatial planning. This research concludes that pressure for development in the coastal zone within the research site is beginning to increase and will adversely affect the coastal zone if not managed effectively. These two local municipalities have the opportunity to move forward and develop in such a way that allows for conservation and sound management of the coastal zone, which will ensure long-term sustainability within the coastal zones of the Ndlambe and Ngqushwa local municipalities
- Full Text:
- Date Issued: 2009
- Authors: Palmer, Bronwyn Jane
- Date: 2009
- Subjects: Ndlambe Municipality , Ngqushwa Municipality , Local government -- South Africa -- Eastern Cape , Coastal zone management -- South Africa -- Eastern Cape , Geographic information systems -- South Africa -- Eastern Cape , Land use -- South Africa -- Eastern Cape , Rural development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4836 , http://hdl.handle.net/10962/d1005511 , Ndlambe Municipality , Ngqushwa Municipality , Local government -- South Africa -- Eastern Cape , Coastal zone management -- South Africa -- Eastern Cape , Geographic information systems -- South Africa -- Eastern Cape , Land use -- South Africa -- Eastern Cape , Rural development -- South Africa -- Eastern Cape
- Description: The coastal zone accommodates some of the most diverse ecosystems in the world and offers a wide range of ecosystem goods and services; consequently it has become a focal point of human development. People are attracted to the coast because of access to resources, favourable climate, aesthetic appeal and potential for recreational activities. As pressure for utilisation and development increases, so does the need to manage the coastal system more effectively. This research focuses on the coastal zone of the Ndlambe and Ngqushwa local municipalities in the Eastern Cape, South Africa, which are physically and environmentally similar, yet have distinct demographic and socio-economic differences. The research integrates information using GIS, from three time epochs, to determine where development and land use change is occurring. The Ndlambe Local Municipality displays high levels of formal development, while the Ngqushwa Local Municipality exhibits little formal development. These differences in development and land use are related to economic, social and legislative ‘drivers’ based on an adapted Driver-Pressure-State- Impact-Response model. The model identifies that development and land use changes lead to increased pressure on the natural system, which in turn leads to shifts in the natural state of the coastal zone, resulting in adverse impacts on the coastal zone. Changes in the natural functioning of the coastal zone highlight the need for a response in terms of changes in legislation governing coastal management and spatial planning. This research concludes that pressure for development in the coastal zone within the research site is beginning to increase and will adversely affect the coastal zone if not managed effectively. These two local municipalities have the opportunity to move forward and develop in such a way that allows for conservation and sound management of the coastal zone, which will ensure long-term sustainability within the coastal zones of the Ndlambe and Ngqushwa local municipalities
- Full Text:
- Date Issued: 2009
A grid based approach for the control and recall of the properties of IEEE 1394 audio devices
- Authors: Foulkes, Philip James
- Date: 2009
- Subjects: IEEE 1394 (Standard) , Computer sound processing , Digital communications , Local area networks (Computer networks) , Sound -- Recording and reproducing -- Digital techniques , Computational grids (Computer systems)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4594 , http://hdl.handle.net/10962/d1004836 , IEEE 1394 (Standard) , Computer sound processing , Digital communications , Local area networks (Computer networks) , Sound -- Recording and reproducing -- Digital techniques , Computational grids (Computer systems)
- Description: The control of modern audio studios is complex. Audio mixing desks have grown to the point where they contain thousands of parameters. The control surfaces of these devices do not reflect the routing and signal processing capabilities that the devices are capable of. Software audio mixing desk editors have been developed that allow for the remote control of these devices, but their graphical user interfaces retain the complexities of the audio mixing desk that they represent. In this thesis, we propose a grid approach to audio mixing. The developed grid audio mixing desk editor represents an audio mixing desk as a series of graphical routing matrices. These routing matrices expose the various signal processing points and signal flows that exist within an audio mixing desk. The routing matrices allow for audio signals to be routed within the device, and allow for the device’s parameters to be adjusted by selecting the appropriate signal processing points. With the use of the programming interfaces that are defined as part of the Studio Connections – Total Recall SDK, the audio mixing desk editor was integrated with compatible DAW applications to provide persistence of audio mixing desk parameter states. Many audio studios currently use digital networks to connect audio devices together. Audio and control signals are patched between devices through the use of software patchbays that run on computers. We propose a double grid-based FireWire patchbay aimed to simplify the patching of signals between audio devices on a FireWire network. The FireWire patchbay was implemented in such a way such that it can host software device editors that are Studio Connections compatible. This has allowed software device editors to be associated with the devices that are represented on the FireWire patchbay, thus allowing for studio wide control from a single application. The double grid-based patchbay was implemented such that it can be hosted by compatible DAW applications. Through this, the double grid-based patchbay application is able to provide the DAW application with the state of the parameters of the devices in a studio, as well as the connections between them. The DAW application may save this state data to its native song files. This state data may be passed back to the double grid-based patchbay when the song file is reloaded at a later stage. This state data may then be used by the patchbay to restore the parameters of the patchbay and its device editors to a previous state. This restored state may then be transferred to the hardware devices being represented by the patchbay.
- Full Text:
- Date Issued: 2009
- Authors: Foulkes, Philip James
- Date: 2009
- Subjects: IEEE 1394 (Standard) , Computer sound processing , Digital communications , Local area networks (Computer networks) , Sound -- Recording and reproducing -- Digital techniques , Computational grids (Computer systems)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4594 , http://hdl.handle.net/10962/d1004836 , IEEE 1394 (Standard) , Computer sound processing , Digital communications , Local area networks (Computer networks) , Sound -- Recording and reproducing -- Digital techniques , Computational grids (Computer systems)
- Description: The control of modern audio studios is complex. Audio mixing desks have grown to the point where they contain thousands of parameters. The control surfaces of these devices do not reflect the routing and signal processing capabilities that the devices are capable of. Software audio mixing desk editors have been developed that allow for the remote control of these devices, but their graphical user interfaces retain the complexities of the audio mixing desk that they represent. In this thesis, we propose a grid approach to audio mixing. The developed grid audio mixing desk editor represents an audio mixing desk as a series of graphical routing matrices. These routing matrices expose the various signal processing points and signal flows that exist within an audio mixing desk. The routing matrices allow for audio signals to be routed within the device, and allow for the device’s parameters to be adjusted by selecting the appropriate signal processing points. With the use of the programming interfaces that are defined as part of the Studio Connections – Total Recall SDK, the audio mixing desk editor was integrated with compatible DAW applications to provide persistence of audio mixing desk parameter states. Many audio studios currently use digital networks to connect audio devices together. Audio and control signals are patched between devices through the use of software patchbays that run on computers. We propose a double grid-based FireWire patchbay aimed to simplify the patching of signals between audio devices on a FireWire network. The FireWire patchbay was implemented in such a way such that it can host software device editors that are Studio Connections compatible. This has allowed software device editors to be associated with the devices that are represented on the FireWire patchbay, thus allowing for studio wide control from a single application. The double grid-based patchbay was implemented such that it can be hosted by compatible DAW applications. Through this, the double grid-based patchbay application is able to provide the DAW application with the state of the parameters of the devices in a studio, as well as the connections between them. The DAW application may save this state data to its native song files. This state data may be passed back to the double grid-based patchbay when the song file is reloaded at a later stage. This state data may then be used by the patchbay to restore the parameters of the patchbay and its device editors to a previous state. This restored state may then be transferred to the hardware devices being represented by the patchbay.
- Full Text:
- Date Issued: 2009
A knowledge-oriented, context-sensitive architectural framework for service deployment in marginalized rural communities
- Authors: Thinyane, Mamello P
- Date: 2009
- Subjects: Information technology Expert systems (Computer science) Software architecture User interfaces (Computer systems) Ethnoscience Social networks Rural development Technical assistance -- Developing countries Information networks -- Developing countries
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4599 , http://hdl.handle.net/10962/d1004843
- Description: The notion of a global knowledge society is somewhat of a misnomer due to the fact that large portions of the global community are not participants in this global knowledge society which is driven, shaped by and socio-technically biased towards a small fraction of the global population. Information and Communication Technology (ICT) is culture-sensitive and this is a dynamic that is largely ignored in the majority of ICT for Development (ICT4D) interventions, leading to the technological determinism flaw and ultimately a failure of the undertaken projects. The deployment of ICT solutions, in particular in the context of ICT4D, must be informed by the cultural and socio-technical profile of the deployment environments and solutions themselves must be developed with a focus towards context-sensitivity and ethnocentricity. In this thesis, we investigate the viability of a software architectural framework for the development of ICT solutions that are context-sensitive and ethnocentric1, and so aligned with the cultural and social dynamics within the environment of deployment. The conceptual framework, named PIASK, defines five tiers (presentation, interaction, access, social networking, and knowledge base) which allow for: behavioural completeness of the layer components; a modular and functionally decoupled architecture; and the flexibility to situate and contextualize the developed applications along the dimensions of the User Interface (UI), interaction modalities, usage metaphors, underlying Indigenous Knowledge (IK), and access protocols. We have developed a proof-of-concept service platform, called KnowNet, based on the PIASK architecture. KnowNet is built around the knowledge base layer, which consists of domain ontologies that encapsulate the knowledge in the platform, with an intrinsic flexibility to access secondary knowledge repositories. The domain ontologies constructed (as examples) are for the provisioning of eServices to support societal activities (e.g. commerce, health, agriculture, medicine) within a rural and marginalized area of Dwesa, in the Eastern Cape province of South Africa. The social networking layer allows for situating the platform within the local social systems. Heterogeneity of user profiles and multiplicity of end-user devices are handled through the access and the presentation components, and the service logic is implemented by the interaction components. This services platform validates the PIASK architecture for end-to-end provisioning of multi-modal, heterogeneous, ontology-based services. The development of KnowNet was informed on one hand by the latest trends within service architectures, semantic web technologies and social applications, and on the other hand by the context consideration based on the profile (IK systems dynamics, infrastructure, usability requirements) of the Dwesa community. The realization of the service platform is based on the JADE Multi-Agent System (MAS), and this shows the applicability and adequacy of MAS’s for service deployment in a rural context, at the same time providing key advantages such as platform fault-tolerance, robustness and flexibility. While the context of conceptualization of PIASK and the implementation of KnowNet is that of rurality and of ICT4D, the applicability of the architecture extends to other similarly heterogeneous and context-sensitive domains. KnowNet has been validated for functional and technical adequacy, and we have also undertaken an initial prevalidation for social context sensitivity. We observe that the five tier PIASK architecture provides an adequate framework for developing context-sensitive and ethnocentric software: by functionally separating and making explicit the social networking and access tier components, while still maintaining the traditional separation of presentation, business logic and data components.
- Full Text:
- Date Issued: 2009
- Authors: Thinyane, Mamello P
- Date: 2009
- Subjects: Information technology Expert systems (Computer science) Software architecture User interfaces (Computer systems) Ethnoscience Social networks Rural development Technical assistance -- Developing countries Information networks -- Developing countries
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4599 , http://hdl.handle.net/10962/d1004843
- Description: The notion of a global knowledge society is somewhat of a misnomer due to the fact that large portions of the global community are not participants in this global knowledge society which is driven, shaped by and socio-technically biased towards a small fraction of the global population. Information and Communication Technology (ICT) is culture-sensitive and this is a dynamic that is largely ignored in the majority of ICT for Development (ICT4D) interventions, leading to the technological determinism flaw and ultimately a failure of the undertaken projects. The deployment of ICT solutions, in particular in the context of ICT4D, must be informed by the cultural and socio-technical profile of the deployment environments and solutions themselves must be developed with a focus towards context-sensitivity and ethnocentricity. In this thesis, we investigate the viability of a software architectural framework for the development of ICT solutions that are context-sensitive and ethnocentric1, and so aligned with the cultural and social dynamics within the environment of deployment. The conceptual framework, named PIASK, defines five tiers (presentation, interaction, access, social networking, and knowledge base) which allow for: behavioural completeness of the layer components; a modular and functionally decoupled architecture; and the flexibility to situate and contextualize the developed applications along the dimensions of the User Interface (UI), interaction modalities, usage metaphors, underlying Indigenous Knowledge (IK), and access protocols. We have developed a proof-of-concept service platform, called KnowNet, based on the PIASK architecture. KnowNet is built around the knowledge base layer, which consists of domain ontologies that encapsulate the knowledge in the platform, with an intrinsic flexibility to access secondary knowledge repositories. The domain ontologies constructed (as examples) are for the provisioning of eServices to support societal activities (e.g. commerce, health, agriculture, medicine) within a rural and marginalized area of Dwesa, in the Eastern Cape province of South Africa. The social networking layer allows for situating the platform within the local social systems. Heterogeneity of user profiles and multiplicity of end-user devices are handled through the access and the presentation components, and the service logic is implemented by the interaction components. This services platform validates the PIASK architecture for end-to-end provisioning of multi-modal, heterogeneous, ontology-based services. The development of KnowNet was informed on one hand by the latest trends within service architectures, semantic web technologies and social applications, and on the other hand by the context consideration based on the profile (IK systems dynamics, infrastructure, usability requirements) of the Dwesa community. The realization of the service platform is based on the JADE Multi-Agent System (MAS), and this shows the applicability and adequacy of MAS’s for service deployment in a rural context, at the same time providing key advantages such as platform fault-tolerance, robustness and flexibility. While the context of conceptualization of PIASK and the implementation of KnowNet is that of rurality and of ICT4D, the applicability of the architecture extends to other similarly heterogeneous and context-sensitive domains. KnowNet has been validated for functional and technical adequacy, and we have also undertaken an initial prevalidation for social context sensitivity. We observe that the five tier PIASK architecture provides an adequate framework for developing context-sensitive and ethnocentric software: by functionally separating and making explicit the social networking and access tier components, while still maintaining the traditional separation of presentation, business logic and data components.
- Full Text:
- Date Issued: 2009
A living theory to facilitate the improvement of teacher morale
- Hendricks, Charlotte Augusta
- Authors: Hendricks, Charlotte Augusta
- Date: 2009
- Subjects: Teacher morale -- South Africa -- Eastern Cape , Teachers -- Job stress , Teachers -- Workload -- South Africa , Teachers -- Job satisfaction , Teachers -- Self-rating of -- South Africa -- Eastern Cape Province , Teachers -- Attitudes
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:9569 , http://hdl.handle.net/10948/d1016152
- Description: This dissertation is a narrative account of a self-study undertaken with the primary aim of positively influencing the morale of colleagues in my school department. It addresses an area of personal and professional concern where my values were being denied in my practice. As a Head of Department, I was worried that the low morale of my colleagues would negatively impact on the quality of teaching and learning at school, and on their own mental health. Situated within self-efficacy theory, my study reflects the values I attach to human dignity, respect, fairness, honesty perseverance and caring. These values were applied as the living standard by which I judged the quality of my leadership practice. I describe how I used an Action Research methodology as a living transformational process to reflect on my own leadership in terms of how I could influence the development of positive morale in the department. My findings offer new conceptualisations about how teachers can take action to improve the emotional climate of the school. I am claiming that the significance of my research is grounded in my ability to facilitate an improvement in the low morale of myself and my colleagues in order for us to ultimately contribute to self and school improvement.
- Full Text:
- Date Issued: 2009
- Authors: Hendricks, Charlotte Augusta
- Date: 2009
- Subjects: Teacher morale -- South Africa -- Eastern Cape , Teachers -- Job stress , Teachers -- Workload -- South Africa , Teachers -- Job satisfaction , Teachers -- Self-rating of -- South Africa -- Eastern Cape Province , Teachers -- Attitudes
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:9569 , http://hdl.handle.net/10948/d1016152
- Description: This dissertation is a narrative account of a self-study undertaken with the primary aim of positively influencing the morale of colleagues in my school department. It addresses an area of personal and professional concern where my values were being denied in my practice. As a Head of Department, I was worried that the low morale of my colleagues would negatively impact on the quality of teaching and learning at school, and on their own mental health. Situated within self-efficacy theory, my study reflects the values I attach to human dignity, respect, fairness, honesty perseverance and caring. These values were applied as the living standard by which I judged the quality of my leadership practice. I describe how I used an Action Research methodology as a living transformational process to reflect on my own leadership in terms of how I could influence the development of positive morale in the department. My findings offer new conceptualisations about how teachers can take action to improve the emotional climate of the school. I am claiming that the significance of my research is grounded in my ability to facilitate an improvement in the low morale of myself and my colleagues in order for us to ultimately contribute to self and school improvement.
- Full Text:
- Date Issued: 2009
A longitudinal study of the occupational aspirations and perceptions of twelve to fourteen year-old South African children
- Authors: Hunter, Carrie
- Date: 2009
- Subjects: Vocational interests -- Research -- South Africa , Children -- South Africa -- Attitudes , Personality and occupation
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9906 , http://hdl.handle.net/10948/968 , Vocational interests -- Research -- South Africa , Children -- South Africa -- Attitudes , Personality and occupation
- Description: While career development has been acknowledged as a lifelong process, little research attention has been given to the developmental stage of childhood. In addition, there has been a lack of longitudinal research into career development despite consistent calls for research of this nature. The lack of research and theory pertaining to childhood career development prompted the initiation of the current longitudinal project of which the present study forms a part. The longitudinal project was designed to provide information about the occupational aspirations and perceptions of a cohort of South African children from six years of age onwards, with the present studying examining the occupational aspiration development of 12 to 14 year old South African children. South African career research to date has focused primarily on adolescent and adult career development. The present longitudinal study aimed to explore and describe possible changes over a three year period in the interest typology, occupational status level and occupational gender stereotypes of the 44 participants. In addition, the study aimed to explore and describe the sample’s reflections on their own occupational aspiration development. The results of this study will provide much needed baseline information on the development of South African children’s occupational aspirations and will provide useful recommendations for the development of career education programmes. The present study was contextualised within both child and career development theories. This study was quantitative in nature as it made use of semi-structured interviews and biographical questionnaires to record verbal data which was transposed into nominal data for analysis. The semi-structured interview consisted of four broad areas that included the participants’ occupational aspirations, how many occupations they knew about, how much they knew about the identified occupations xiii and the extent to which they held gender stereotypes regarding fourteen different occupations. The data captured was coded according to Holland’s (1985) classification system of interest types. The occupational aspirations identified by participants were also coded according to their status levels. The coded data was then analysed using descriptive statistics in the form of frequency counts and percentages. In addition, content analysis was performed on the participants’ reflections on their own career development in order to elicit themes. Results from the study supported child and career development theories, emphasising childhood as a critical phase of career development. The study found that the majority of children aspired to Social type occupations across all three years of the study and most children consistently aspired to high status occupations. Furthermore, occupational gender stereotyping decreased over time. Lastly, it was found that most children were able to reflect on their career development with the majority attributing changes in their occupational aspirations to changes in their interests. The present study has provided valuable insight into the occupational aspiration development of a group of South African children, which can be used as a foundation on which to base further research and on which to develop career education programmes.
- Full Text:
- Date Issued: 2009
- Authors: Hunter, Carrie
- Date: 2009
- Subjects: Vocational interests -- Research -- South Africa , Children -- South Africa -- Attitudes , Personality and occupation
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9906 , http://hdl.handle.net/10948/968 , Vocational interests -- Research -- South Africa , Children -- South Africa -- Attitudes , Personality and occupation
- Description: While career development has been acknowledged as a lifelong process, little research attention has been given to the developmental stage of childhood. In addition, there has been a lack of longitudinal research into career development despite consistent calls for research of this nature. The lack of research and theory pertaining to childhood career development prompted the initiation of the current longitudinal project of which the present study forms a part. The longitudinal project was designed to provide information about the occupational aspirations and perceptions of a cohort of South African children from six years of age onwards, with the present studying examining the occupational aspiration development of 12 to 14 year old South African children. South African career research to date has focused primarily on adolescent and adult career development. The present longitudinal study aimed to explore and describe possible changes over a three year period in the interest typology, occupational status level and occupational gender stereotypes of the 44 participants. In addition, the study aimed to explore and describe the sample’s reflections on their own occupational aspiration development. The results of this study will provide much needed baseline information on the development of South African children’s occupational aspirations and will provide useful recommendations for the development of career education programmes. The present study was contextualised within both child and career development theories. This study was quantitative in nature as it made use of semi-structured interviews and biographical questionnaires to record verbal data which was transposed into nominal data for analysis. The semi-structured interview consisted of four broad areas that included the participants’ occupational aspirations, how many occupations they knew about, how much they knew about the identified occupations xiii and the extent to which they held gender stereotypes regarding fourteen different occupations. The data captured was coded according to Holland’s (1985) classification system of interest types. The occupational aspirations identified by participants were also coded according to their status levels. The coded data was then analysed using descriptive statistics in the form of frequency counts and percentages. In addition, content analysis was performed on the participants’ reflections on their own career development in order to elicit themes. Results from the study supported child and career development theories, emphasising childhood as a critical phase of career development. The study found that the majority of children aspired to Social type occupations across all three years of the study and most children consistently aspired to high status occupations. Furthermore, occupational gender stereotyping decreased over time. Lastly, it was found that most children were able to reflect on their career development with the majority attributing changes in their occupational aspirations to changes in their interests. The present study has provided valuable insight into the occupational aspiration development of a group of South African children, which can be used as a foundation on which to base further research and on which to develop career education programmes.
- Full Text:
- Date Issued: 2009
A method for automatically creating 3d animated scenes from annotated fiction text
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432699 , vital:72893 , https://www.iadisportal.org/ijcsis/papers/2009110208.pdf
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2009
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432699 , vital:72893 , https://www.iadisportal.org/ijcsis/papers/2009110208.pdf
- Description: This paper describes a strategy for automatically converting fiction text into 3D animations. It assumes the existence of fiction text annotated with avatar, object, setting, transition and relation annotations, and presents a transformation process that converts annotated text into quantified constraint systems, the solutions to which are used in the population of 3D environments. Constraint solutions are valid over temporal intervals, ensuring that consistent dynamic behaviour is produced. A substantial level of automation is achieved, while providing opportunities for creative manual intervention in animation process. The process is demonstrated using annotated examples drawn from popular fiction text that are converted into animation sequences, confirming that the desired results can be achieved with only high-level human direction.
- Full Text:
- Date Issued: 2009
A model for enhancing presence handling in instant messaging
- Authors: Victor, Rudi
- Date: 2009
- Subjects: Instant messaging , Mobile communication systems , Data transmission systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9774 , http://hdl.handle.net/10948/877 , Instant messaging , Mobile communication systems , Data transmission systems
- Description: Instant Messaging (IM) is becoming increasingly popular in social as well as workplace environments. In fact, many employees use the same IM client to communicate with both colleagues and social contacts. Thus, there are valid concerns about the impact of IM on employee productivity. One of the major advantages of IM over other workplace communication tools such as e-mail and the telephone is the implementation of presence information. In particular, presence awareness is used to determine the avail- ability and willingness of a contact to engage in communication. A current problem with IM is the one-for-all approach to presence: all contacts receive the same set of presence information. However, presence is rooted in social psychology where it is known that the awareness of another person changes the behavior of oneself. Therefore the identity of a contact affects the availability and willingness directed towards that contact. In order for presence information to be provided to contacts, it must be represented in some type of data format. The Internet Engineering Task Force (IETF) has done much work in standardizing IM and presence systems. In particular their data format for presence describes a rich set of presence information including, but not limited to, location, activity, awareness, and mood information. Such information may be sensitive and access to it needs to be controlled to ensure privacy. As with access control policies, managing the information as the number of contacts increases becomes cumbersome and complex. This dissertation draws on the theoretical foundations of presence, current standards in the domain of IM, and lessons from access control to present an enhanced presence handling model for IM. The model is developed in stages, with each stage providing a specific improvement. The first stage of the model is grounded on the current work of the IETF. As such it distributes presence on a per-watcher basis. In the second stage of the model watchers fulfill a specific role and based on this role they receive only the entrusted presence information. In practice, it implies that a "friend" may get more (or less) information than a "colleague". The third stage of the model introduces the concept of availability profiles by drawing on social awareness principles. Availability profiles add the ability to transform presence and change the presentity's behavior to incoming messages according to the provided presence information. Finally the dissertation reports on the development of the RoBIM (Role- Based Instant Messenger) prototype. RoBIM is a standards-based IM system that conforms to the IETF SIMPLE protocol and provides various standard IM features. Here, RoBIM serves as a proof-of-concept for the proposed model. This study contributed to the domain of IM and presence by addressing some of the current presence handling issues. Most importantly, the proposed model takes into account the interpersonal effects of individualizing presence information for different contacts. Thus, the model challenges conventional thought and implementation of presence in IM.
- Full Text:
- Date Issued: 2009
- Authors: Victor, Rudi
- Date: 2009
- Subjects: Instant messaging , Mobile communication systems , Data transmission systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9774 , http://hdl.handle.net/10948/877 , Instant messaging , Mobile communication systems , Data transmission systems
- Description: Instant Messaging (IM) is becoming increasingly popular in social as well as workplace environments. In fact, many employees use the same IM client to communicate with both colleagues and social contacts. Thus, there are valid concerns about the impact of IM on employee productivity. One of the major advantages of IM over other workplace communication tools such as e-mail and the telephone is the implementation of presence information. In particular, presence awareness is used to determine the avail- ability and willingness of a contact to engage in communication. A current problem with IM is the one-for-all approach to presence: all contacts receive the same set of presence information. However, presence is rooted in social psychology where it is known that the awareness of another person changes the behavior of oneself. Therefore the identity of a contact affects the availability and willingness directed towards that contact. In order for presence information to be provided to contacts, it must be represented in some type of data format. The Internet Engineering Task Force (IETF) has done much work in standardizing IM and presence systems. In particular their data format for presence describes a rich set of presence information including, but not limited to, location, activity, awareness, and mood information. Such information may be sensitive and access to it needs to be controlled to ensure privacy. As with access control policies, managing the information as the number of contacts increases becomes cumbersome and complex. This dissertation draws on the theoretical foundations of presence, current standards in the domain of IM, and lessons from access control to present an enhanced presence handling model for IM. The model is developed in stages, with each stage providing a specific improvement. The first stage of the model is grounded on the current work of the IETF. As such it distributes presence on a per-watcher basis. In the second stage of the model watchers fulfill a specific role and based on this role they receive only the entrusted presence information. In practice, it implies that a "friend" may get more (or less) information than a "colleague". The third stage of the model introduces the concept of availability profiles by drawing on social awareness principles. Availability profiles add the ability to transform presence and change the presentity's behavior to incoming messages according to the provided presence information. Finally the dissertation reports on the development of the RoBIM (Role- Based Instant Messenger) prototype. RoBIM is a standards-based IM system that conforms to the IETF SIMPLE protocol and provides various standard IM features. Here, RoBIM serves as a proof-of-concept for the proposed model. This study contributed to the domain of IM and presence by addressing some of the current presence handling issues. Most importantly, the proposed model takes into account the interpersonal effects of individualizing presence information for different contacts. Thus, the model challenges conventional thought and implementation of presence in IM.
- Full Text:
- Date Issued: 2009
A model for evaluating training and development initiatives in the Botswana public service
- Tshukudu, Theophilus Tebetso
- Authors: Tshukudu, Theophilus Tebetso
- Date: 2009
- Subjects: Civil service -- Personnel management -- Botswana , Civil service -- Labor productivity -- Botswana , Civil service -- Botswana -- Evaluation , Employees -- Training of , Public administration
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9384 , http://hdl.handle.net/10948/879 , Civil service -- Personnel management -- Botswana , Civil service -- Labor productivity -- Botswana , Civil service -- Botswana -- Evaluation , Employees -- Training of , Public administration
- Description: The purpose of this study was to develop an integrated model for evaluating training and development initiatives used by the Botswana public service. To achieve this goal, the following actions were taken: A literature study was conducted to identify the scope and impact of an effective training and development initiative and its evaluation; A literature study was conducted to identify strategies for evaluating training and development initiatives. The theoretical study focused on effective training and development strategies and their evaluation and critical organisational factors that contribute to successful training evaluation; The findings from the literature study were integrated into a model for evaluating training and development initiatives to be used by the Botswana public service; and This model was used as the basis for the development of a survey questionnaire to determine whether trainers, training managers and supervisors who were responsible for training and development in the public service agreed with the effective strategies for evaluating training and development developed in the study. The survey was conducted in ministries and departments in the south east district of Botswana, mainly in Gaborone, where ministries and government departments are located. The empirical results from the study showed that the majority of respondents’ training and development activities were not evaluated and that there is no link between training and development and performance management. In particular, disagreements were shown with regard to ten strategies and critical organisational factors. Evaluation of training and development in general, is an issue that organisations are challenged with on a daily basis. Lack of skills by trainers on how to evaluate training and development is one major contributing factor to this problem. An integrated and strategic approach towards the evaluation of training and development is required to effectively and constructively train and development employees according to strategic organisational goals, rather than according to individual trainee’s goals.
- Full Text:
- Date Issued: 2009
- Authors: Tshukudu, Theophilus Tebetso
- Date: 2009
- Subjects: Civil service -- Personnel management -- Botswana , Civil service -- Labor productivity -- Botswana , Civil service -- Botswana -- Evaluation , Employees -- Training of , Public administration
- Language: English
- Type: Thesis , Doctoral , DTech
- Identifier: vital:9384 , http://hdl.handle.net/10948/879 , Civil service -- Personnel management -- Botswana , Civil service -- Labor productivity -- Botswana , Civil service -- Botswana -- Evaluation , Employees -- Training of , Public administration
- Description: The purpose of this study was to develop an integrated model for evaluating training and development initiatives used by the Botswana public service. To achieve this goal, the following actions were taken: A literature study was conducted to identify the scope and impact of an effective training and development initiative and its evaluation; A literature study was conducted to identify strategies for evaluating training and development initiatives. The theoretical study focused on effective training and development strategies and their evaluation and critical organisational factors that contribute to successful training evaluation; The findings from the literature study were integrated into a model for evaluating training and development initiatives to be used by the Botswana public service; and This model was used as the basis for the development of a survey questionnaire to determine whether trainers, training managers and supervisors who were responsible for training and development in the public service agreed with the effective strategies for evaluating training and development developed in the study. The survey was conducted in ministries and departments in the south east district of Botswana, mainly in Gaborone, where ministries and government departments are located. The empirical results from the study showed that the majority of respondents’ training and development activities were not evaluated and that there is no link between training and development and performance management. In particular, disagreements were shown with regard to ten strategies and critical organisational factors. Evaluation of training and development in general, is an issue that organisations are challenged with on a daily basis. Lack of skills by trainers on how to evaluate training and development is one major contributing factor to this problem. An integrated and strategic approach towards the evaluation of training and development is required to effectively and constructively train and development employees according to strategic organisational goals, rather than according to individual trainee’s goals.
- Full Text:
- Date Issued: 2009
A model for information security control audit for small to mid-sized organisations
- Authors: Deysel, Natasha
- Date: 2009
- Subjects: Data protection , Computer networks -- Information technology
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9760 , http://hdl.handle.net/10948/940 , Data protection , Computer networks -- Information technology
- Description: Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively manage the information technology environment. It has become very clear that if a company is serious about information security governance, it needs to apply the COBIT framework that deals with information security. The problem in some medium-sized organisations is that they do not realise the importance of information security governance and are either unaware of the risks or choose to ignore these risks as they do not have the expertise or resources available to provide them with assurance that they have the right information security controls in place to protect their organisation against threats.
- Full Text:
- Date Issued: 2009
- Authors: Deysel, Natasha
- Date: 2009
- Subjects: Data protection , Computer networks -- Information technology
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:9760 , http://hdl.handle.net/10948/940 , Data protection , Computer networks -- Information technology
- Description: Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively manage the information technology environment. It has become very clear that if a company is serious about information security governance, it needs to apply the COBIT framework that deals with information security. The problem in some medium-sized organisations is that they do not realise the importance of information security governance and are either unaware of the risks or choose to ignore these risks as they do not have the expertise or resources available to provide them with assurance that they have the right information security controls in place to protect their organisation against threats.
- Full Text:
- Date Issued: 2009