A fibre utilisation comparison of two harvesting systems in eucalyptus grandis in the Kwa-Zulu natal forestry region of South Africa
- Authors: Nxumalo, Sikhumbuzo Khethukuthula , McEwan, Andrew
- Date: 2017
- Subjects: Eucalyptus grandis -- South Africa -- KwaZulu-Natal Harvesting -- South Africa -- KwaZulu-Natal
- Language: English
- Type: Thesis , Masters , Degree
- Identifier: http://hdl.handle.net/10948/20592 , vital:29331
- Description: Global timber demand is increasing as the level of technology continues to improve in many parts of the world. There needs to be more focus on renewable energy resources which will have a reduced negative impact on the environment. There is limited land area for timber plantations and this necessitates effective use of land from both an environmental and a commercial point of view. This research aimed at quantifying and comparing the fibre utilisation of two harvesting systems operating in Eucalyptus grandis pulpwood plantations. This was done using a general linear model, whereby the fibre loss areas were identified and used as the dependent variables, whilst diameter at breast height (DBH), site and harvesting systems were used as the independent variables. The research also aimed at determining the amount of fibre each system could recover, where fibre is lost or gained in each harvesting system and also whether one of the harvesting systems is able to recover more fibre than the other. The research investigated two harvesting systems in Eucalyptus grandis pulpwood plantations. These systems consisted of the full tree chain flail delimber debarker and chipper (FT CFDD&C) system and the cut-to-length (CTL) motor-manual system. These systems operated close to one another to ensure that the research was carried out on comparable paired plots. Two sites were identified to carry out research after a pilot study was done to test the feasibility. Using the FT CFDD&C system, trees were felled by means of a feller buncher. A grapple skidder was used for extraction to the landing, a chain flail delimber debarker (CFDD) for debarking and debranching and a roadside chipper for converting the boles into chips. The second CTL motor-manual system was modified into a tree length system to suit the conditions of the study due to infield chipping requiring longer lengths. Therefore, trees were felled with a chainsaw and debranched and topped infield before tree lengths were extracted to the landing site with the grapple skidder. The CFDD was used for debarking and the chipper converted boles into chips.
- Full Text:
- Date Issued: 2017
A framework for implementing bring your own device in higher education institutions in South Africa
- Authors: De Kock, Ryan
- Date: 2017
- Subjects: Educational technology -- South Africa , Universities and colleges -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7191 , vital:21300
- Description: Although the concept of Bring Your Own Device (BYOD) was only first introduced in 2009, organisations and higher education institutions have shown an increasing interest in and tolerance for employees and students using their own mobile devices for work and academic purposes, to such an extent that it is predicted that BYOD will become the leading practice for all educational environments by the year 2017. Although mobile device usage is increasing in higher education institutions, it has been found that currently no generally recognised framework exists to aid South African higher education institutions with the implementation of BYOD. The problem is further worsened as research suggests that the number of new mobile vulnerabilities reported each year has increased. The primary objective of this study is to develop a framework for implementing BYOD in higher education institutions in South Africa. This primary objective is divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to understand BYOD in organisations and the challenges it brings; to determine how BYOD challenges differ in higher education institutions; to determine the key components for implementing BYOD in higher education institutions; to determine the extent to which the BYOD key components relate to a higher education institution in South Africa; and to validate the proposed BYOD framework, verifying its quality, efficacy and utility. At first, a comprehensive literature study is used to determine and understand the benefits, challenges and key components for the implementation of BYOD in both organisations and higher education institutions. Thereafter, a case study is used to determine the extent to which the components, identified in the literature study, relate to an educational institution in South Africa. The findings from the case study, in combination with the key components, are then triangulated and a preliminary framework for implementing BYOD in higher education institutions in South Africa is argued. Furthermore, elite interviews are used to determine the quality, efficacy and utility of the proposed BYOD framework. To address the proposed problem, this research proposes a stepby- step holistic framework to aid South African higher education institutions with the implementation of BYOD. This framework adds a significant contribution to the work on this topic, as it provides a foundation upon which further such research can build. It is believed that such a framework would be useful for higher education institutions in South Africa and would result in the improved implementation of BYOD.
- Full Text:
- Date Issued: 2017
A framework for information security management in local government
- Authors: De Lange, Joshua
- Date: 2017
- Subjects: Computer security -- Management , Data protection
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7588 , vital:21932
- Description: Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
- Full Text:
- Date Issued: 2017
A framework for the corporate governance of ICT in local government
- Authors: Delport, Petrus Marthinus Jacobus
- Date: 2017
- Subjects: Information technology
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7015 , vital:21191
- Description: Information and Communication Technology (ICT) has become critical and pervasive in any well-run modern enterprise across all sectors, which include local government. As a result, ICT demands to be managed and governed in a sustainable manner. Therefore, local government should accept the responsibility of implementing good Corporate Governance of ICT (CGICT). Without sound CGICT, ICT is unable to support local government in the achievement of their strategic objectives. This will most likely result in local government not being able to serve the interests of the community. Even though local government is aware of their responsibility regarding CGICT, the Auditor-General reports that their attempts are unsatisfactory, in this regard. This is most probably due to the fact that ample information exists on guiding local government with `what' they should do towards good CGICT, but unfortunately a lack of guidance on `how' to achieve it. Thus, it is imperative for local government to adopt a CGICT framework which provides guidance not only on what they must do towards implementing good CGICT but also on how they should achieve it. In doing so, local government would most likely be able to properly manage and govern ICT and support the needs of the community. Therefore, the aim of this study is to report on research undertaken, in order to assist local government with a CGICT framework that is relevant to their unique environment. Accordingly, this CGICT framework aims to be usable and scallable to the needs of any sized local government entity. As a result, the CGICT framework aims to be simplistic in nature to promote self-implementation of sound CGICT in local government.
- Full Text:
- Date Issued: 2017
A genetic algorithm to obtain optimum parameters for a halcon vision system
- Authors: Fulton, Dale Meares
- Date: 2017
- Subjects: Genetic algorithms , Artificial intelligence , Automation , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MEng
- Identifier: http://hdl.handle.net/10948/29751 , vital:30774
- Description: This report discusses the optimisation of a HALCON vision system using artificial intelligence, specifically a genetic algorithm. Within industrial applications, vision systems are often used for automated part inspection and quality control. A number of vision system parameters are to be selected when setting up a vision system. Since each vision system application differs, there is no specific set of optimal parameters. Parameters are selected during installation using a trial and error method. As a result, there is a need for an automated process for obtaining suitable vision system parameters. Within this report, research was conducted on both vision systems, genetic algorithms and integration of the two. A physical vision system was designed and developed utilising HALCON vision software. A genetic algorithm was then developed and integrated with the vision system. After integration, experimental testing was performed on the genetic algorithm in order to determine the ideal genetic algorithm control parameters which yield ideal genetic algorithm performance. Once the ideal genetic algorithm was obtained, the genetic algorithm was applied to the vision system in order to obtain optimal vision system parameters. Results showed that applying the genetic algorithm to the vision system optimised the vision system performance well.
- Full Text:
- Date Issued: 2017
A hermeneutic phenominological study of the understanding and treatment of Amafufunyana by traditional healers
- Authors: Gqibitole, Camagwini
- Date: 2017
- Subjects: Traditional medicine Healers Mental illness -- Treatment
- Language: English
- Type: Thesis , Masters , MSoc
- Identifier: http://hdl.handle.net/10353/5521 , vital:29313
- Description: Traditional healers have a different understanding of psychological illnesses to the western paradigm as well as a different way of diagnosing and treating psychological illnesses. Aims and Objectives. This study’s aim is to examine how traditional healers understand the causes of mental illness mainly focusing on amafufunyana and how this understanding informs treatments methods. Method. This has been done based on hermeneutic phenomenology by drawing from the lived experience of traditional healers through a focus group interview. Results. Upon analysis of the data it becomes clear that traditional healers understand the aetiology of amafufunyana to be supernatural forces. Amafufunyana present in overt and covert symptoms and the diagnostic process entails connecting with the ancestors for their guidance and confirmation of diagnosis, as well as guidance on which imithi to use. The treatment process is congruent with the diagnostic process as it also entails guidance from the ancestors on which imithi to use. Other valuable aspects of traditional healing were brought forward while conducting this study. The aspect of protection from the ancestors was emphasised. It became evident in the analysis of this study that the rituals that are performed in order to appease the ancestors facilitate the connection to the ancestors and through maintaining this connect one can be protected from an array of illnesses and misfortunes. Recommendations. It is recommended that recommended that more studies are conducted with traditional healers in order to give them an opportunity to elaborate on their lived experience of healing, as it was observed that a majority of literature speak on behalf of traditional healers.
- Full Text:
- Date Issued: 2017
A leadership transfer framework to improve the retention rate in the private hotel industry
- Authors: Gregersen, Peter Carl
- Date: 2017
- Subjects: Corporate culture -- South Africa , Employee retention -- South Africa , Hospitality industry -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/7160 , vital:21284
- Description: The transference of knowledge and the creation of a knowledge vault within operations of the Hospitality sector is the cornerstone to the success of this dynamic contributor to the economy, not only as a skills developer, but also as a collective group of experts that unknowingly build a community of expertise that transfer knowledge amongst themselves within an organisation. Leadership that share knowledge, whether tacit or implied, leads to the development and knowledge growth from members to those who are exposed to the intricacies of decision making and business practices. This leads then to the skills development and retention of the participants who feel nurtured and fulfilled in the employment within the organisation and view themselves as valued members. The finding of this research reveals a correlation between knowledge sharing and the desire for job security that leads to the feeling of being nurtured and finding the employment positive and enjoyable. The transference of knowledge allows the receiver of the knowledge to develop to where the point of the receiver becoming an expert in their chosen field is attained and the collective of the mangers are developed to the level of a community of experts in their various fields. However the academic qualifications of leadership is low, the significance of this highlights the level of networking amongst themselves as paramount to the success of this multi million rand industry.
- Full Text:
- Date Issued: 2017
A meteorological analysis of extreme flood events in the southern parts of the Eastern Cape, South Africa
- Authors: Jacobs, Tennielle Lindsay
- Date: 2017
- Subjects: Floods -- South Africa -- Eastern Cape , Floods -- South Africa -- Eastern Cape -- Cast studies , Lows (Meteorology) -- South Africa -- Eastern Cape , Rain and rainfall -- South Africa -- Eastern Cape , Rainfall anomalies -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/50525 , vital:25996
- Description: Extreme flood events have been found to occur in the Eastern Cape Province of South Africa. The southern and south-eastern coastal regions are particularly susceptible to floods with daily rainfall records of up to 490 mm having been recorded here. In order to gain a better understanding of these floods, historical floods in the southern parts of the Eastern Cape have been analysed in this study. This study aimed to investigate the most extreme flood events in the history of the area and to analyse the surface observational data during the heavy rainfall events found, to contribute to the understanding of these heavy rainfall events. Seven case studies were investigated using NCEP/NCAR Reanalysis 1 data and surface observational data, to analysis the synoptic circulation and surface data tendencies during heavy rainfall events. All of the case studies that had synoptic data available showed to have a COL system present with the upper air low lying westward of the flood area. The surface synoptic situation presented an intense high pressure system lying south west or south of the country in the Atlantic Ocean between 35-45°S. Another key factor was a surface trough over the interior of the country, due to the COL, extending southwards to protrude off of the south or south eastern coastline east of the flood areas. The combination of these three systems colloquially referred to as a “Black South-Easter”, produced dangerous rainfall intensities when the winds were perpendicular to the coast. The results of the surface observations revealed temperatures increasing at night (against diurnal cycles) with increasing relative humidity preceding the heavy rainfall events. The pressure showed both increasing and decreasing trends during heavy rainfall events however in five of six cases a tight pressure gradient was present producing an influx of moist air into the flood area. Onshore winds were found to be of high importance in heavy rainfall events to bring moist air into the area. Wind speeds greater than 5m/s occurred during times of high rainfall intensities.
- Full Text:
- Date Issued: 2017
A model for assessing and reporting network performance measurement in SANReN
- Authors: Draai, Kevin
- Date: 2017
- Subjects: Computer networks -- Evaluation Network performance (Telecommunication) , Computer networks -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/16131 , vital:28326
- Description: The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover and verify the solution to this problem. The phases are "Contextualisation", "Design",and "Verification". The "Contextualisation" phase includes the literature review. This provides the context for the problem area but also serves as a search function for the solution. This study adopts the design science research paradigm which requires the creation of an artefact. The "Design" phase involves the creation of the conceptual network performance measurement model. This is the artefact and a generalised model for determining the network performance metrics for an NREN. To prove the utility of the model it is implemented in the SANReN environment. This is done in the "Verification" phase. The network performance measurement model proposes a process to determine network performance metrics. This process includes getting NREN requirements and goals, defining the NRENs network design goals through these requirements, define network performance metrics from these goals, evaluating the NRENs monitoring capability, and measuring what is possible. This model provides a starting point for NRENs to determine network performance metrics tailored to its environment. This is done in the SANReN environment as a proof of concept. The utility of the model is shown through the implementation in the SANReN environment thus it can be said that it is generic.The tools that monitor the performance of the SANReN network are used to retrieve network performance data from. Through understanding the requirements, determining network design goals and performance metrics, and determining the gap the retrieving of results took place. These results are analysed and finally aggregated to provide information that feeds into SANReN reporting and planning processes. A template is provided to do the aggregation of metric results. This template provides the structure to enable metrics results aggregation but leaves the categories or labels for the reporting and planning sections blank. These categories are specific to each NREN. At this point SANReN has the aggregated information to use for planning and reporting. The model is verified and thus the study’s main research objective is satisfied.
- Full Text:
- Date Issued: 2017
A model to address factors that could influence the information security behaviour of computing graduates
- Authors: Mabece, Thandolwethu , Thomson, Kerry-Lynn
- Date: 2017
- Subjects: Information technology -- Security measures , Computer security , Cyber intelligence (Computer security)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/7355 , vital:21339
- Description: The fact that information is ubiquitous throughout most modern organisations cannot be denied. Information is not merely used as an enabler in modern organisations today, but is also used to gain a competitive advantage over competitors. Thus, information has become one of the most important business assets. It is, therefore, imperative that organisations protect information assets as they would protect other business assets. This is typically achieved through implementing various security measures.Technological and procedural security measures are largely dependent on humans. However, the incorrect behaviour of humans poses a significant threat to the protection of these information assets. Thus, it is vital to understand how human behaviour may impact the protection of information assets. While the focus of much literature is on organisations, the focus of this research is on higher education institutions and the factors of information security, with a specific focus on influencing the information security behaviour of computing graduates. Typically, computing graduates would be employed in organisations in various careers such as software developers, network administrators, database administrators and information systems analysts. Employment in these careers means that they would be closely interacting with information assets and information systems. A real problem, as identified by this research, is that currently, many higher education institutions are not consciously doing enough to positively influence the information security behaviour of their computing graduates. This research presents a model to address various factors that could influence the information security behaviour of computing graduates. The aim of this model is to assist computing educators in influencing computing graduates to adopt more secure behaviour, such as security assurance behaviour. A literature review was conducted to identify the research problem. A number of theories such as the Theory of Planned Behaviour, Protection Motivation Theory and Social Cognitive Theory were identified as being relevant for this research as they provided a theoretical foundation for factors that could influence the information security behaviour of computing graduates. Additionally, a survey was conducted to gather the opinions and perceptions of computing educators relating to information security education in higher education institutions. Results indicated that information security is not pervasively integrated within the higher education institutions surveyed. Furthermore, results revealed that most computing students were perceived to not be behaving in a secure manner with regard to information security. This could negatively influence their information security behaviour as computing graduates employed within organisations. Computing educators therefore require assistance in influencing the information security behaviour of these computing students. The proposed model to provide this assistance was developed through argumentation and modelling.
- Full Text:
- Date Issued: 2017
A normative study of the Raven's Coloured Progressive Matrices for South African children with cognitive barriers to learning
- Authors: August, Justin Oswin
- Date: 2017
- Subjects: Children -- Intelligence testing -- South Africa , Inclusive education -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/19419 , vital:28869
- Description: With the changing landscape in South Africa to a full democracy, increased research has been undertaken in the psychometric field on local and national normative studies regarding various assessment measures. The Raven’s Coloured Progressive Matrices (CPM) is one of the measures that have already been extensively normed throughout the world for various population groups. In South Africa, local norms for normal populations of children have been developed by groups of researchers in the Grahamstown (Eastern Cape) as well as the Bloemfontein (Free State) areas. With a South African school educational system that focuses on Inclusive Education, there is a growing need for mainstream schools to identify learners who are at risk for learning disabilities in order to develop appropriate supportive intervention plans. The research aimed to establish psychometric normative screening data based on the Raven’s CPM, and to compare these with the established and published international and local Raven’s CPM norms. In addition, the researcher developed pilot classification scores for the early screening and detection of at risk learners in order to encourage the potential role and use of the Raven’s CPM in the identification of cognitive learning barriers. The sample consisted of 388 primary school learners identified as having cognitive barriers to learning. Archival data was used that was gathered from a Psychological clinic that provided screening services to schools in the Nelson Mandela Metropolitan area. The results of the study indicated that there was a proportional relationship between age and test performance. Gender differences were found where the males in this study outperformed the females. There was a significant difference in the Raven’s CPM test performance with respect to the grade levels of the learners. The study developed a special set of norms with cognitive classification scores that will aid in the early identification of learning disabilities.
- Full Text:
- Date Issued: 2017
A participant-focused sociological analysis of Beedz, a Grahamstown skills training project for women
- Authors: Bobo, Azola Benita Dorothea
- Date: 2017
- Subjects: Beedz (Makhanda, South Africa) , Feminist theory -- Developing countries , Training -- South Africa -- Makhanda , Occupational training -- South Africa -- Makhanda , Women -- South Africa -- Makhanda -- Social conditions
- Language: English
- Type: Thesis , Masters , MSocSc
- Identifier: http://hdl.handle.net/10962/5686 , vital:20964
- Description: This research looked at a participant-focused sociological analysis of Beedz, a Grahamstown skills training project for women. Beedz is run by the River of Life Church and aims to equip women with the necessary skills to participate in the economy, either as entrepreneurs or as employees. Using third world feminist theory, this research explored the experiences of women who have participated in the Beedz programme, what they went through, and whether the programme benefited them or not. In particular, this research explored how the participants experienced Beedz as a programme for women without an exclusive focus on traditional feminist issues. This research was qualitative in nature; with in-depth, semi-structured interviews being used as a means of data collection. Data was analysed using key themes emerging from the interviews. The key findings of this research were that it is important to include women in training projects, as by including them you create spaces and enabling environments for women to empower themselves. Secondly, although Beedz does not deliberately work from the third world feminist theory, it could be argued that it fits in this framework as this programme facilitates skills training through looking at women as a whole, taking into account not only their gender, but also their class and race. Recommendations were made on how the Beedz programme may be improved, based on the information gathered from the participants from the interviews conducted during the research, with the key recommendation being that the organisers of the programme need to create a space for the participants’ voice to be heard, so that the programme can be relevant and beneficial to them.
- Full Text:
- Date Issued: 2017
A perfect end: a study of syllable codas in South African Sign Language
- Authors: Köhlo, Mikhaela Demitria Katebe
- Date: 2017
- Subjects: South African Sign Language , South African Sign Language Phonology , Linguistics , Grammar, Comparative and general Syllable
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/36127 , vital:24492
- Description: Coda constraints are common in spoken languages. German, for example, can only have voiceless obstruents in the coda position (Lombardi 1999). Most sign language research has been on other sign languages, most notably American Sign Language (ASL). This research serves to contribute to syllable theory and has a methodology that allows for cross-linguistic research, strengthening the understanding of sign languages in general, and enhancing the description of SASL in particular. It is well known that syllables in spoken languages require a vowel nucleus to be well-formed. Sandler and Lillo-Martin (2006) provide evidence of sign languages requiring movement to be considered well-formed: even seemingly stationary signs such as WHO, which occurs at the chin, will have finger wiggling as some form of movement. It is thus natural to assume that movement is akin to vowels in syllable theory (Brentari 1998). Thus, locations are similar to consonants. However, the visual nature of sign allows for simultaneity - holds do not occur by themselves. Next to location, handshapes are phonetically complex features that may impact the constraints at coda position. To my knowledge, there is no formal research on the coda constraints of sign language syllables. The data examined here comes from a video dictionary of approximately 175 words. From this dictionary, a database of coded locations and handshapes are recorded for both the onset and the coda. From this, a consonant inventory is made and patterns are identified. Each source of data is analysed individually based on Brentari’s (1998) Prosodic Model. Patterns that are noticed are then looked at using Brentari’s (1998) framework to account for what phonological rules are dictating constraints. However, as a hearing researcher cannot claim native knowledge of a sign language, the conclusions drawn from the data will be tested using native SASL signers for negative judgement. The preliminary findings of the research suggest that there are constraints on the coda location and handshape of a sign and that this may be a result of the natural classes of handshape and location prohibiting certain onset-coda combinations. The onset and coda on monosyllabic signs mirror each other’s location, while the handshape cannot change in repeated and many monosyllabic signs. These constraints provide more understanding into the rich phonological nature of sign languages.
- Full Text:
- Date Issued: 2017
A phenomenological study of problematic internet use with massively multiplayer online games
- Authors: Bopp, Stacey-Lee
- Date: 2017
- Subjects: Computer games -- Psychological aspects , Internet games -- Psychological aspects Internet addiction
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/13757 , vital:27305
- Description: Massively multiplayer online games (MMOG’s) are a specific form of online computer games that allow for millions of people to simultaneously play online at any time. This form of online gaming has become a huge phenomenon worldwide both as a popular past time and a business endeavour for many individuals. There are more than 16 million people worldwide who subscribe to fantasy role-playing online games. Although such games can provide entertainment for many people, they can also lead to problematic Internet use (PIU). PIU has also been referred to as Internet addiction, and can cause significant problems in an individual’s functioning. The study aimed to enhance a greater understanding of the phenomenon of male adults’ experiences PIU with MMOG’s. More specifically the study aims to identify if PIU with MMOG’s can be considered a form of Internet addiction within South Africa. Furthermore, assisting in the further development of online addiction diagnosis and treatment strategies. The study utilised an interpretive phenomenological approach (IPA) and participants were purposively sampled. The data was collected using semi-structured individual interviews. Furthermore, Braun and Clarks thematic analysis was used during data analysis while incorporating the four major processes in phenomenological research, namely 1) epoche, 2) phenomenological reduction, 3) imaginative variation and, 4) synthesis. Themes that emerged from the analysis of the participants’ experiences included, initial description of use, motives for continued use of MMOG’s, consequences of PIU with MMOG’s, perceptions of PIU with MMOG’s, and treatment considerations. This study provided a thick description of South African and international literature and combines the literature with the themes that emerged from the participants experiences in order to produce discussions based on the findings of this qualitative study. Conclusions, recommendations, and limitations of this study informed future research on cyber citizenship by providing a detailed understanding of the context of South African male adults’ experiences of PIU with MMOG’s.
- Full Text:
- Date Issued: 2017
A poverty alleviation strategy of Vukuzenzele gardening project in Motherwell township
- Authors: Zitho, Andiswa
- Date: 2017
- Subjects: Economic development projects -- South Africa -- Port Elizabeth , Economic development -- South Africa -- Port Elizabeth Community development -- South Africa -- Port Elizabeth Poor -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10948/13724 , vital:27302
- Description: Poverty is one of the issues that affects the development in our country. the strategies that are used differ from one to person to another. development is said to be measured through a lot of things but mostly through economic growth which influenced by poverty. the purpose of this study was to investigate the effectiveness of the strategies being used to alleviate poverty in the Motherwell township, in Port Elizabeth. The study focused mainly on Vukuzenzele gardening project, where a sample of 15 participants were purposovely selected to be part of the study. Furthermore, the aim of the study was to contribute towards community development by investigating the social issues that directly influence poverty eradication.
- Full Text:
- Date Issued: 2017
A privacy management framework for mobile personal electronic health records in South Africa
- Authors: Els, Floyd Nathaniel
- Date: 2017
- Subjects: Medical records -- Data processing Medical records -- Access control Electronic records -- Security measures
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10353/12733 , vital:39316
- Description: South Africa’s health status is in constant dismay, especially while under the strain of the quadruple burden of disease. The adoption of personal electronic health records (PEHRs) can be seen as a means to improve this status by empowering patients to manage their health and lifestyle better. While from the healthcare provider’s perspective, PEHRs has the ability to reduce medical errors; provide better communication channels and enhance the monitoring of patients. Despite these benefits for both healthcare providers and patients, there are three distinct information security threats relating to PEHRs. These threats refer to the individual, data in transit, and at rest. South Africa is still considered to be inexperienced with PEHRs, and consider it a relatively new concept to the healthcare system. The National e-Health Strategy and Protection of Personal Information Bill were discussed and compared to international standards in order to ascertain South Africa’s current standing on mobile healthcare privacy. However, there are no specific privacy and security controls in place to protect patients that access personal electronic health records through mobile devices. Therefore, the aim of this study is the development of a privacy management framework (PMF) to mitigate these privacy concerns. Following an interpretivistic approach to research, qualitative data was analysed from literature, and the privacy framework evaluated through expert reviews. The proposed PMF consists of 3 tiers, beginning with the top tier. The first tier relates to an organisations interpretation and understanding of data privacy laws and regulations, and in ensuring compliance with these laws. The second tier refers to two support pillars to maintain the first tier. These pillars are based on elements of operational privacy, as well as auditing and reviewing. The third tier serves as the basic foundation upon which the PMF was developed. It is mainly focused with creating privacy awareness amongst healthcare providers and patients by creating: training regimes on security and privacy threats, efficient communication standards, and constant ongoing support from top level management.
- Full Text:
- Date Issued: 2017
A profile of selected enterprises and their adopted cost allocation systems in Nelson Mandela Bay
- Authors: Vellem, Masixole
- Date: 2017
- Subjects: Cost accounting , Budget Business enterprises
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/13568 , vital:27239
- Description: Activity-based costing is a cost allocation method which appears to have many benefits when compared to traditional costing systems. However, there is limited academic research demonstrating this superiority. There is thus a need to investigate and profile the characteristics of selected enterprises and their adopted cost allocation systems. The main objective of this study was to profile and compare the characteristics of companies in Nelson Mandela Bay that use the activity-based costing system, versus those using traditional costing methods. The research methodology used for this research study is descriptive and quantitative, using various techniques for data analysis. An electronic internet based questionnaire was distributed to companies and the response automatically recorded for analysis with the help of Nelson Mandela University statistics department. The findings of the empirical study revealed that most (38%) of the respondents use a combination of both activity-based costing and traditional costing methods, followed by traditional costing methods (35%), and purely activity-based costing (27%). Data analysis revealed that companies in construction and manufacturing seemed to prefer activity-based costing over traditional costing methods. The findings raise the question as to whether the preference in cost allocation methods is based solely on the benefits of cost allocation, lack of new knowledge, adaptability within companies, or cost of change versus the benefit.
- Full Text:
- Date Issued: 2017
A proposed model for enterprise resource planning benefits for SMEs
- Authors: De Matos, Paulo
- Date: 2017
- Subjects: Small business -- South Africa Enterprise resource planning -- South Africa , Economic development -- South Africa
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/14971 , vital:28107
- Description: Small to medium sized enterprises (SMEs) play a significant role in global and national economies, both in developed and developing countries, contributing significantly to economic growth and job creation. Yet, SMEs face ongoing survival issues as their limited access to resources often constrains their ability to compete and realise their potential. Enterprise Resource Planning (ERP) systems are known to be a crucial component in realising benefits for any organisation and are seen as significant contributors to an organisation’s performance. However, only a portion of SMEs report that their value expectations have been met in adopting an ERP system. SMEs require a better understanding of how to extract value from ERP adoption in order to remain competitive. An on-going SME problem is a lack of low-level awareness of the benefits that an ERP system is capable of providing them. The problem is stated as “SMEs do not understand the benefits derived from the adoption of an ERP system”. The purpose of this treatise was to determine a clearer understanding of how ERP systems can be considered a technological innovation that may be exploited by an SME to deliver business value by increasing the performance of the SME and thereby increasing the SME’s competitive advantage. A literature review was conducted on ERP and SMEs which identified benefit models grounded in the theories of Diffusion of Innovation (DOI) and Resource Based View (RBV). DOI explains the benefits derived from ERP use as the technology diffuses throughout the social organisation and RBV measures the business value extracted from ERP adoption and use. A model for ERP benefits for SMEs was proposed based on the extant literature and empirical evaluation on a sample of 107 SYSPRO ERP users in South Africa. The model was statistically assessed as to the relationships between the independent variables of ease of use, collaboration, capabilities, efficiencies, analytics, industry sector and maturity against the dependent variable of ERP business value. The variables of analytics, capabilities and ease of use together explain 68.9% of the variance of ERP business value, while analytics and capabilities explain 53.8%. No significant relationship was found for efficiencies, collaboration, industry or maturity, being a measure of length of years’ experience in ERP use. The results indicate that SMEs perceive analytics to be a valuable determinant of ERP value contributing to the competitiveness of SMEs. The higher the SME focuses on analytics, the greater the organisation’s performance increases due to the enhancement of analytical-based decisions aiding in a better decision-making process. Capabilities are the degree to which an ERP system caters for the functional needs of the SME. This treatise argues that SMEs should pay particular focus on their operational requirements and whether the ERP system is capable of providing them as customisation of the ERP is costly. Organisational personnel utilising ERP must be comfortable utilising it. Perceptions as to an ERP’s complexity and usefulness define the ease-of-use. SMEs should consider the inherent aspects of a given ERP system that support the adoption rate of their personnel of an ERP system. Practically, SMEs should assess the degree of system intuitiveness both during ERP selection and during the adoption lifecycle phases. ERP providers should focus on the provisioning of aspects both in the software and during the implementation of an ERP system at an SME in ensuring the system is intuitive, useful, easy to use, functionally addresses the SME requirements simply and surfaces meaningful analytics in support of decision-making process.
- Full Text:
- Date Issued: 2017
A proposed service quality framework for multi-national supply logistics providers in the South African automotive industry
- Authors: Van Aswegen, Dawid Titus
- Date: 2017
- Subjects: Business logistics -- South Africa -- Management , Purchasing -- South Africa -- Management , Automobile industry and trade -- South Africa , Industrial procurement -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/21307 , vital:29476
- Description: Managing a sustainable service business rests on two critical customer perceptions: Firstly, the perceived sufficiency of the value of the service, and secondly the level of value differentiation between the current service provider other service providers in the market. (DeSarbo, Ebbs, Fong & Snow, 2010; Parasuraman & Grewal, 2000) The direction for this study was prompted by the limited research available around service quality for Supply Logistics within the global automotive industry. The study identified the key factors that logistics service providers need to focus on when aligning their perceptions of service quality to that of their customers. The service gaps between customer and service provider perceptions are uncovered. Particular focus was given to: The definition gaps in service quality, The perceived level of service quality, and The size of service quality differentiation between service providers. The key finding of the study is that service differentiation is influenced by the ability of the Logistics Service Provider (LSP) to deliver a quality of service in line with the level of importance the various elements hold to the customer. The causal relationships offered a step wise understanding of improving the perceptions of customers. This perception forming process is outlined as follows: Firstly, create a common understanding of the definition of service quality and establish the comparative importance of the various elements. Having an understanding of how customers’ value service quality is a critical first step in delivering superior service. A proposed Service Quality Framework for multi-national Supply Logistics providers in the South African automotive industry Secondly, align efforts to achieve in accordance to the level of importance of the service elements. If this is achieved, LSP’s will retain positive differentiation to its competitors irrespective of the actions of those competitors. Lastly, LSP’s need to regularly review if their own perception of the service level (per element) is in line with that of the customer. The study created a service quality framework of 22 different service elements grouped in four service factors. The relative importance of these elements were uncovered. This offered insight for organizing the business around key service elements. Within Supply Logistics the operational-management-tools, engineering-skills, processes-stability and management-structure are typical elements around which customers form their perceptions. The quality of the direct staff holds the key to sustained customer satisfaction, much more so than the commercial arrangements, industry innovations and the prestige of the brand behind the service. This study laid a foundation from which future research can deeper explore the unique slant that geographical, organisational designation or customer brand lines hold on the service quality perception.
- Full Text:
- Date Issued: 2017
A proposed theoretical model for successful implementation of franchising in the South African chicken-based fast food industry
- Authors: Ekosse, Emmanuel Georges Ivo Ekosse
- Date: 2017
- Subjects: Franchises (Retail trade) -- South Africa , Fast food restaurants -- South Africa -- Management Chain restaurants -- South Africa -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/15567 , vital:28270
- Description: The purpose of this case study research effort was to develop and propose a theoretical model for the successful implementation of franchising in the South African chicken-based fast food industry. Design/Methodology/Approach - A single case with embedded units of a franchisor and a franchisee was initially adopted, but inaccessibility to respondents resulted in the adaptation of the study into a single holistic case. This is justified as the case serves a revelatory and explanatory purpose (Yin, 1994, p. 44). The case provided insight into the implementation processes of franchising in the South African chicken-based fast food industry; where franchised chicken-based concepts are leading the industry. The inaccessibility to original target respondents considered a limitation in the original research design. The limited contextual knowledge of the transcriber, and inexperience resulted in a sub-par transcript which slightly limited the interpretation of the data. Originality/Value – The case study examines the current implementation of franchising in the South African chicken-based fast food industry; with particular focus on the chicken-based fast food franchise systems which have consistently outperformed other types of fast food franchise systems. The proposed theoretical model can be applied in any industry or geographical location with an adjustment of the model‟s contextual considerations.
- Full Text:
- Date Issued: 2017