A baseline for information security knowledge for end users
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
- Authors: Boshoff, Ryno
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9808 , http://hdl.handle.net/10948/d1013260
- Description: Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to protect their information as this will ensure that the organisation‟s information retains its confidentiality, integrity and availability. Information security controls, which are the means of managing information risks, rely heavily on the user‟s knowledge regarding the use of these controls for their effectiveness, and as such, users should be educated in order to maximise effectiveness of these controls. Current information security educational programmes are created without necessarily taking into account the target audience, who comprises of all employees, stakeholders, suppliers, third parties, customers or other external parties or third party that requires access to the organisation‟s information. This results in programmes that are not linguistically appropriate; or that present knowledge at an inappropriate level for the target audience. This could leave users bored or confused, without successfully changing their behaviour or improving knowledge. This dissertation identifies a baseline for information security knowledge targeted at end users. This was done by means of a Delphi Study, where a profile of “generic” end users comprised of information security topics and concepts were rated by experts from the field of information security education. This resulted in the elimination of inappropriate topics and concepts and retaining the relevant and appropriate aspects. This baseline for information security knowledge can be characterised as a minimum standard that everybody should be educated on as an introductory or refresher course. This can also serve as the foundation phase to educate end users with knowledge of the basic topics and concepts to enable them to fulfil their responsibilities in order to protect information. If needed, topics and concepts could be added to the baseline for information security knowledge for specialised target audiences (e.g. specialised End Users, ICT Staff or Top Management).
- Full Text:
- Date Issued: 2012
A brain-compatible approach to the presentation of cyber security educational material
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
- Authors: Reid, Rayne
- Date: 2012
- Subjects: Data protection -- Management , Computer security -- Management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9819 , http://hdl.handle.net/10948/d1019895
- Description: Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
- Full Text:
- Date Issued: 2012
A comparison of harvester productivity and stump volume waste in coppiced and planted eucalyptus grandis pulpwood compartments in the KwaZulu-Natal forestry region of South Africa
- Ramantswana, Mufhumudzi Muedanyi
- Authors: Ramantswana, Mufhumudzi Muedanyi
- Date: 2012
- Subjects: Forest productivity , Forest management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10744 , http://hdl.handle.net/10948/d1019844
- Description: Over the past decade the South African forestry industry has gradually experienced the ramifications of labour scarcity, increases in labour costs, the effect of HIV and AIDS and increasing timber demand. Consequently, this has led to an increase in the mechanisation rate, especially in timber harvesting operations. Due to the labour challenges in South Africa, mechanised forestry equipment has increasingly been required to operate in complex forest conditions, such as coppiced compartments, where they have not operated before. It therefore occurs that harvesters are either used in certain coppiced compartments with uncertain productivity expectations, or the harvesters are not used in these compartments due to a lack of productivity knowledge. The influence that certain factors have on harvester productivity and stump volume loss – factors such as coppice regeneration practices and stem form – is poorly understood and has not been quantified. No scientific research exists regarding the effects of coppice compartments on the productivity of a harvester and the amount of stump volume waste. This research aimed at determining the influence of tree volume, tree form, stem felled first and distance between stems on the productivity of an excavator based harvester in coppiced double, coppiced single and planted Eucalyptus grandis pulpwood compartments. Furthermore, the research determined whether there was any stump volume waste, and quantified how much of it was due to excessive stump heights by the harvester. Through regression analysis, productivity equations were derived to make productivity predictions in both coppiced and planted compartments. All stumps were evaluated for waste and the average stump volume waste in coppiced double, coppiced single and planted trees was determined. The research results showed that planted trees had the highest productivity across all tree sizes, followed by coppiced single trees and then coppiced double stems. When harvesting a 0.2 m3 tree, the mean harvester productivity was 8.7 m3 per PMH in coppiced double trees, 13.8 m3 per PMH in coppiced single trees and 16.1 m3 per PMH in planted trees. In coppiced double stems the productivity was not significantly influence by the distance between stems. However, the productivity was significantly influenced by the stem felled first. The regression results showed that if the smaller stem was felled first, the productivity would increase if the larger stem’s volume was less than 0.18 m3; however where the larger stem was greater than 0.18 m3, the relationship was reversed. In addition, the productivity for both coppiced single trees and coppiced double stems were significantly influenced by stem form. The poorly formed trees had low productivity compared to the trees with good form. The stump volume findings showed that coppiced double stems had the highest average stump volume waste per stump, with 0.00307 m3 waste, followed by coppiced single trees (0.001954 m3) and planted trees (0.001650 m3). The average stump volume waste per stump with waste for the planted trees was negligible. This research provides forestry companies and harvesting contractors with information on the effect of tree volume, tree form and stem felled first on harvester productivity in E. grandis coppiced double, coppiced single and planted compartments. This information will assist in making equipment and system selection decisions and improve operational management and control. In addition, they will also be aware of stump volume losses that will occur in the three scenarios.
- Full Text:
- Date Issued: 2012
- Authors: Ramantswana, Mufhumudzi Muedanyi
- Date: 2012
- Subjects: Forest productivity , Forest management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10744 , http://hdl.handle.net/10948/d1019844
- Description: Over the past decade the South African forestry industry has gradually experienced the ramifications of labour scarcity, increases in labour costs, the effect of HIV and AIDS and increasing timber demand. Consequently, this has led to an increase in the mechanisation rate, especially in timber harvesting operations. Due to the labour challenges in South Africa, mechanised forestry equipment has increasingly been required to operate in complex forest conditions, such as coppiced compartments, where they have not operated before. It therefore occurs that harvesters are either used in certain coppiced compartments with uncertain productivity expectations, or the harvesters are not used in these compartments due to a lack of productivity knowledge. The influence that certain factors have on harvester productivity and stump volume loss – factors such as coppice regeneration practices and stem form – is poorly understood and has not been quantified. No scientific research exists regarding the effects of coppice compartments on the productivity of a harvester and the amount of stump volume waste. This research aimed at determining the influence of tree volume, tree form, stem felled first and distance between stems on the productivity of an excavator based harvester in coppiced double, coppiced single and planted Eucalyptus grandis pulpwood compartments. Furthermore, the research determined whether there was any stump volume waste, and quantified how much of it was due to excessive stump heights by the harvester. Through regression analysis, productivity equations were derived to make productivity predictions in both coppiced and planted compartments. All stumps were evaluated for waste and the average stump volume waste in coppiced double, coppiced single and planted trees was determined. The research results showed that planted trees had the highest productivity across all tree sizes, followed by coppiced single trees and then coppiced double stems. When harvesting a 0.2 m3 tree, the mean harvester productivity was 8.7 m3 per PMH in coppiced double trees, 13.8 m3 per PMH in coppiced single trees and 16.1 m3 per PMH in planted trees. In coppiced double stems the productivity was not significantly influence by the distance between stems. However, the productivity was significantly influenced by the stem felled first. The regression results showed that if the smaller stem was felled first, the productivity would increase if the larger stem’s volume was less than 0.18 m3; however where the larger stem was greater than 0.18 m3, the relationship was reversed. In addition, the productivity for both coppiced single trees and coppiced double stems were significantly influenced by stem form. The poorly formed trees had low productivity compared to the trees with good form. The stump volume findings showed that coppiced double stems had the highest average stump volume waste per stump, with 0.00307 m3 waste, followed by coppiced single trees (0.001954 m3) and planted trees (0.001650 m3). The average stump volume waste per stump with waste for the planted trees was negligible. This research provides forestry companies and harvesting contractors with information on the effect of tree volume, tree form and stem felled first on harvester productivity in E. grandis coppiced double, coppiced single and planted compartments. This information will assist in making equipment and system selection decisions and improve operational management and control. In addition, they will also be aware of stump volume losses that will occur in the three scenarios.
- Full Text:
- Date Issued: 2012
A conceptual model of an access-technology-agnostic delivery mechanism for ICT4D services
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
- Authors: Makitla, Mokone Ishmael
- Date: 2012
- Subjects: Technological innovations -- Developing countries , Information technology -- Developing countries
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9817 , http://hdl.handle.net/10948/d1019756
- Description: Information and Communication Technology for Development (ICT4D) is an emerging research area that is concerned with the beneficial applications of Information and Communications Technology (ICT) to achieve developmental goals. ICT4D is thus concerned with designing and developing innovative technologies for resource-constrained environments for applications in key areas of social development such as health, agriculture and education. The ICT4D initiatives, therefore, are driving three main tasks, namely developing the required infrastructure (connectivity, electricity and computing devices) sustainably, building the required ICT human capacity, and providing access to digital content and services. Each of these three main thrusts necessitates innovation. This study addresses the evident lack of delivery mechanisms to facilitate access to digital content and services to end-users through the technologies that these end-users already possess. This lack of innovative delivery mechanisms is both an impediment to achieving equitable access to digital content and service and an opportunity to innovate. Therefore, drawing from the theoretical background of ICT4D, this study develops a set of technical and socio-technical requirements that the missing delivery mechanisms should satisfy. The study also explores the Service Delivery Platform (SDP) concept as a technically viable basis for the required delivery mechanisms. The study then develops a conceptual model of an Access-Technology-Agnostic Delivery Mechanism as a possible delivery mechanism that facilitates equitable access to digital content and services within an ICT4D context. The relevance of the conceptual model is established and, through a prototype implementation, the technical feasibility and utility of the conceptual model is demonstrated. The conceptual model is demonstrated through a proof of concept implementation using standards-based open source technologies. The proof of concept clearly demonstrates that the access-technology-agnostic delivery of digital content and services is achievable, thus making the same service accessible through different access technologies. In developing the Access-Technology-Agnostic Delivery Mechanism, this study contributes through innovation to providing access to digital content and services in an access-technology-agnostic manner.
- Full Text:
- Date Issued: 2012
A framework for information security governance in SMMEs
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
- Authors: Coertze, Jacques Jacobus
- Date: 2012
- Subjects: Business -- Data processing -- Security measures , Management information systems -- Security measures , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9810 , http://hdl.handle.net/10948/d1014083
- Description: It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This results not only in SMMEs being exposed to security risks, but the larger organisations as well. In previous research an information security management framework and toolbox was developed to assist SMMEs in drafting information security policies. Although this research was of some help to SMMEs, further research has shown that an even greater problem exists with the governance of information security as a result of the advancements that have been identified in information security literature. The aim of this dissertation is therefore to establish an information security governance framework that requires minimal effort and little expertise to alleviate governance problems. It is believed that such a framework would be useful for SMMEs and would result in the improved implementation of information security governance.
- Full Text:
- Date Issued: 2012
A framework for parental control of mobile devices in South Africa
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
- Authors: Marais, Jacques
- Date: 2012
- Subjects: Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9759 , http://hdl.handle.net/10948/d1008404 , Cell phones -- Social aspects -- South Africa , Digital communications -- Social aspects -- South Africa
- Description: Future generations are built on the children of today. Thus, children's well- being and safety is of paramount importance. Children are making use of mobile devices, such as smart phones, to gain access to the Internet and other data driven mobile services. Children and parents alike are unaware of the risks they are exposed to when accessing such services. A clear lack of parental control over or awareness of this mobile use has been identified in South Africa. Without adequate awareness and successful use of a comprehensive mobile parental control solution, South African children may be at risk. This risk may include exposure to potentially harmful content and/or individuals. This dissertation presents a framework that supports the attainment of a comprehensive mobile parental control solution based on sound research.
- Full Text:
- Date Issued: 2012
A framework for personal health records in online social networking
- Van der Westhuizen, Eldridge Werner
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
- Authors: Van der Westhuizen, Eldridge Werner
- Date: 2012
- Subjects: Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9804 , http://hdl.handle.net/10948/d1012382 , Medical care -- Data processing , Medical records -- Access control , Medical informatics , Information storage and retrieval systems -- Medicine
- Description: Since the early 20th century, the view has developed that high quality health care can be delivered only when all the pertinent data about the health of a patient is available to the clinician. Various types of health records have emerged to serve the needs of healthcare providers and more recently, patients or consumers. These health records include, but are not limited to, Personal Health Records, Electronic Heath Records, Electronic Medical Records and Payer-Based Health Records. Payer-Based Health Records emerged to serve the needs of medical aids or health care plans. Electronic Medical Records and Electronic Health Records were targeted at the healthcare provider market, whereas a gap developed in the patient market. Personal Health Records were developed to address the patient market, but adoption was slow at first. The success of online social networking reignited the flame that Personal Health Records needed and online consumer-based Personal Health Records were developed. Despite all the various types of health records, there still seems to be a lack of meaningful use of personal health records in modern society. The purpose of this dissertation is to propose a framework for Personal Health Records in online social networking, to address the issue of a lack of a central, accessible repository for health records. In order for a Personal Health Record to serve this need it has to be of meaningful use. The capability of a PHR to be of meaningful use is core to this research. In order to determine whether a Personal Health Record is of meaningful use, a tool is developed to evaluate Personal Health Records. This evaluation tool takes into account all the attributes that a Personal Health Record which is of meaningful use should comprise of. Suitable ratings are allocated to enable measuring of each attribute. A model is compiled to facilitate the selection of six Personal Health Records to be evaluated. One of these six Personal Health Records acts as a pilot site to test the evaluation tool in order to determine the tool’s utility and effect improvements. The other five Personal Health Records are then evaluated to measure their adherence to the attributes of meaningful use. These findings, together with a literature study on the various types of health records and the evaluation tool, inform the building blocks used to present the framework. It is hoped that the framework for Personal Health Records in online social networking proposed in this research, may be of benefit to provide clear guidance for the achievement of a central or integrated, accessible repository for health records through the meaningful use of Personal Health Records.
- Full Text:
- Date Issued: 2012
A framework to investigate risk management in commercial banks
- Authors: Fick, William
- Date: 2012
- Subjects: Banks and banking -- Risk management , Risk management , Asset-liability management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9288 , http://hdl.handle.net/10948/d1009429 , Banks and banking -- Risk management , Risk management , Asset-liability management
- Description: Businesses are continuously exposed to a changing business environment which may either exert positive or negative influences on profitability. The banking industry, in particular, is highly competitive and bank failures can have significant consequences for customers. Commercial banks, therefore, have a responsibility to protect their customers by implementing sound risk management strategies. In light of the recent financial crises (since 2007), risk management has once again become a popular topic of discussion since adequate risk management should have prevented or minimised the impact of the risks faced by failed banks. The primary objective of this study was to develop a framework that could be used by South African commercial banks to investigate risk management. Qualitative research was conducted in this regard. From this, findings and recommendations were derived in order to provide banks with a tool by which they could assess their exposure to risk. Various journals, websites, newspapers, bank reports and textbooks were consulted in support of the literature. The literature provided background information on the history and development of the risk management process. Considerable attention was given to the categories of risk that an adequate risk management framework should address. Furthermore, the current models used to manage risk in commercial bank were provided, as well as the specific reasons for bank failures. The main findings of this study were the identification of the most significant reasons for banking failures. These were identified as capital inadequacy, credit risk due to non-performing loans and a lack of banking supervision. In addition to these reasons, several other contributing principles were identified as important factors to be included in a risk management framework. A risk management framework was thus constructed in Table 5.1 based on the literature regarding global banking failures and the relevant conclusions made by the researcher.
- Full Text:
- Date Issued: 2012
- Authors: Fick, William
- Date: 2012
- Subjects: Banks and banking -- Risk management , Risk management , Asset-liability management
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9288 , http://hdl.handle.net/10948/d1009429 , Banks and banking -- Risk management , Risk management , Asset-liability management
- Description: Businesses are continuously exposed to a changing business environment which may either exert positive or negative influences on profitability. The banking industry, in particular, is highly competitive and bank failures can have significant consequences for customers. Commercial banks, therefore, have a responsibility to protect their customers by implementing sound risk management strategies. In light of the recent financial crises (since 2007), risk management has once again become a popular topic of discussion since adequate risk management should have prevented or minimised the impact of the risks faced by failed banks. The primary objective of this study was to develop a framework that could be used by South African commercial banks to investigate risk management. Qualitative research was conducted in this regard. From this, findings and recommendations were derived in order to provide banks with a tool by which they could assess their exposure to risk. Various journals, websites, newspapers, bank reports and textbooks were consulted in support of the literature. The literature provided background information on the history and development of the risk management process. Considerable attention was given to the categories of risk that an adequate risk management framework should address. Furthermore, the current models used to manage risk in commercial bank were provided, as well as the specific reasons for bank failures. The main findings of this study were the identification of the most significant reasons for banking failures. These were identified as capital inadequacy, credit risk due to non-performing loans and a lack of banking supervision. In addition to these reasons, several other contributing principles were identified as important factors to be included in a risk management framework. A risk management framework was thus constructed in Table 5.1 based on the literature regarding global banking failures and the relevant conclusions made by the researcher.
- Full Text:
- Date Issued: 2012
A process model for e-voting in South Africa
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
- Authors: Swanepoel, Eranee
- Date: 2012
- Subjects: Electronic voting -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9805 , http://hdl.handle.net/10948/d1012588 , Electronic voting -- South Africa
- Description: An election is a core part of any global democracy. Elections provide citizens with the opportunity to voice their opinions. South Africa achieved democracy for the first time in 1994 and has had four successful national elections since then. All of these elections have been declared “free and fair” according to the Independent Electoral Commission (IEC). However, there have been various challenges facing the current South African electoral process. This research, therefore examines alternative methods to improve the current South African electoral process. This research firstly identifies the various challenges and characteristics associated with the current electoral process in South Africa. This research study proposes, to incorporate Information and Communication Technology (ICT) into the South African electoral process. Thus, arguing that utilizing ICT could potentially improve the process. Various countries worldwide have investigated different methods to improve their electoral processes. Countries such as India, Brazil, Estonia and the USA have incorporated ICT into their electoral processes, known as electronic voting (e-voting). Therefore, this research study investigates countries such as India, Brazil, Estonia and the USA which opted to implement e-voting into their electoral process. In addition, various e-voting technologies and their capabilities are explored in detail in this research study. The conclusions drawn from the examination of the electoral processes of countries that utilize e-voting, contributed to the achievement of the primary objective in this research. As a result, to address the various challenges facing the current electoral process in South Africa, a process model was developed called an E-voting Process Model, which depicts two electoral processes namely, an optical scan polling station voting process and an online voting process. This research argues that the E-voting Process Model could potentially improve the current electoral process in South Africa.
- Full Text:
- Date Issued: 2012
A study of the application of clinoptilolite as an ion exchange agent for selected metals in aqueous solution
- Authors: Dyeshana, Vuyokazi
- Date: 2012
- Subjects: Ion exchange , Clinoptilolite
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10419 , http://hdl.handle.net/10948/d1013257
- Description: The aim of this study was to establish whether samples of South African-mined clinoptilolite could be used to remove selected metal cations from aqueous solution. The clinoptilolite samples supplied, (by Pratley SA) were in four different particle sizes. Batch study results revealed a decrease in the initial metal concentration in samples that were in contact with clinoptilolite. The finer particle size clinoptilolite had a greater capacity to remove metal cations from aqueous solution. However, ion-exchange results from atomic absorption analysis showed that the larger particle sizes, removed more magnesium ions. Magnesium was the only ion investigated in this study that was present as an exchangeable ion in the Pratley clinoptilolite chemical formula, (MgCaNa2K2)2.5(AlO2)7(SiO2)30.21H2O. Results from the ion-exchange studies showed that the decreasing order of percentage metal removal at pH 3.00 was as follows: Pb > Ni > Cu > Fe > Mg. The mass of metal ions that accumulated on one gram of clinoptilolite as determined from the isotherms was calculated to be 6.16 mg/g for lead and 0.74 mg/g for copper. Data from the lead equilibrium studies were fitted into Langmuir and Freundlich equations and linear regression was used to calculate linearity coefficients for the isotherms. The results showed that the removal of lead ions by clinoptilolite is complex as both monolayer and multilayer adsorption occurs on a heterogeneous surface.
- Full Text:
- Date Issued: 2012
- Authors: Dyeshana, Vuyokazi
- Date: 2012
- Subjects: Ion exchange , Clinoptilolite
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10419 , http://hdl.handle.net/10948/d1013257
- Description: The aim of this study was to establish whether samples of South African-mined clinoptilolite could be used to remove selected metal cations from aqueous solution. The clinoptilolite samples supplied, (by Pratley SA) were in four different particle sizes. Batch study results revealed a decrease in the initial metal concentration in samples that were in contact with clinoptilolite. The finer particle size clinoptilolite had a greater capacity to remove metal cations from aqueous solution. However, ion-exchange results from atomic absorption analysis showed that the larger particle sizes, removed more magnesium ions. Magnesium was the only ion investigated in this study that was present as an exchangeable ion in the Pratley clinoptilolite chemical formula, (MgCaNa2K2)2.5(AlO2)7(SiO2)30.21H2O. Results from the ion-exchange studies showed that the decreasing order of percentage metal removal at pH 3.00 was as follows: Pb > Ni > Cu > Fe > Mg. The mass of metal ions that accumulated on one gram of clinoptilolite as determined from the isotherms was calculated to be 6.16 mg/g for lead and 0.74 mg/g for copper. Data from the lead equilibrium studies were fitted into Langmuir and Freundlich equations and linear regression was used to calculate linearity coefficients for the isotherms. The results showed that the removal of lead ions by clinoptilolite is complex as both monolayer and multilayer adsorption occurs on a heterogeneous surface.
- Full Text:
- Date Issued: 2012
An analysis of the liquidity positions of South African companies by means of traditional liquidity and cash flow ratios
- Authors: Kemp, Renier
- Date: 2012
- Subjects: Liquidity (Economics) , Cash flow -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8942 , http://hdl.handle.net/10948/d1010599 , Liquidity (Economics) , Cash flow -- South Africa
- Description: The first objective of the study is to determine the differences that exist between the two classes of ratios used to measure liquidity of a business entity. A comparison will then be made between these liquidity ratios. The second objective is to illustrate that cash flow ratios are a better indication of liquidity of an entity than the traditional ratios. The traditional and cash flow ratios will illustrate the position of liquidity with information utilised from the various bankrupt companies’ financial statements, including the statement of financial position and statement of cash flows. Four years’ financial statement data will be used to illustrate the deteriorating liquidity positions of the companies.
- Full Text:
- Date Issued: 2012
- Authors: Kemp, Renier
- Date: 2012
- Subjects: Liquidity (Economics) , Cash flow -- South Africa
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8942 , http://hdl.handle.net/10948/d1010599 , Liquidity (Economics) , Cash flow -- South Africa
- Description: The first objective of the study is to determine the differences that exist between the two classes of ratios used to measure liquidity of a business entity. A comparison will then be made between these liquidity ratios. The second objective is to illustrate that cash flow ratios are a better indication of liquidity of an entity than the traditional ratios. The traditional and cash flow ratios will illustrate the position of liquidity with information utilised from the various bankrupt companies’ financial statements, including the statement of financial position and statement of cash flows. Four years’ financial statement data will be used to illustrate the deteriorating liquidity positions of the companies.
- Full Text:
- Date Issued: 2012
An integrated management system for quality and information security in healthcare
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control.
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9745 , http://hdl.handle.net/10948/d1006670 , Health services administration -- Quality control.
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control.
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9745 , http://hdl.handle.net/10948/d1006670 , Health services administration -- Quality control.
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
An integrated management system for quality and information security in healthcare
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9800 , http://hdl.handle.net/10948/d1012134 , Health services administration -- Quality control
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
- Authors: Tyali, Sinovuyo
- Date: 2012
- Subjects: Health services administration -- Quality control
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9800 , http://hdl.handle.net/10948/d1012134 , Health services administration -- Quality control
- Description: Health service organizations are increasingly required to deliver quality healthcare services without increasing costs. The adoption of health information technologies can assist these organizations to deliver a quality service; however, this again exposes the health information to threats. The protection of personal health information is critical to ensure the privacy of patients in the care of health service organizations. Therefore both quality and information security are of importance in healthcare. Organisations commonly use management system standards to assist them to improve a particular function (e.g. quality or security) through structured organizational processes to establish, maintain and optimise a management system for the particular function. In the healthcare sector, the ISO 9001, ISO 9004 and IWA 1 standards may be used for the purpose of improving quality management through the establishment of a quality management system. Similarly, the ISO 27001 and ISO 27799 standards may be used to improve information security management through the establishment of an information security management system. However, the concurrent implementation of multiple standards brings confusion and complexity within organisations. A possible solution to the confusion is to introduce an integrated management system that addresses the requirements of multiple management systems. In this research, various standards relevant to the establishment of management systems for quality and security are studied. Additionally, literature on integrated management systems is reviewed to determine a possible approach to establishing an IMS for quality and information security in healthcare. It will be shown that the quality management and information security management standards contain commonalities that an integration approach can be based on. A detailed investigation of these commonalities is done in order to present the final proposal of the IMSQS, the Integrated Management System for Quality and Information Security in healthcare.
- Full Text:
- Date Issued: 2012
Budgeting, forecasting and financial planning as a strategic tool in the Eastern Cape's manufacturing industry
- Authors: Abrahams, Shaheed
- Date: 2012
- Subjects: Budget process -- South Africa -- Eastern Cape , Business forecasting -- South Africa -- Eastern Cape , Business planning -- South Africa -- Eastern Cape , Manufacturing industries -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8940 , http://hdl.handle.net/10948/d1008408 , Budget process -- South Africa -- Eastern Cape , Business forecasting -- South Africa -- Eastern Cape , Business planning -- South Africa -- Eastern Cape , Manufacturing industries -- South Africa -- Eastern Cape
- Description: The primary objective of the study is to assess whether organisations are using their budgeting, forecasting and financial planning information as a strategic tool in the decision-making process. The research aims to investigate the various factors that hinder the success of the finance department in delivering a quality financial plan, budget or forecast to top management and the rest of the organisation.
- Full Text:
- Date Issued: 2012
- Authors: Abrahams, Shaheed
- Date: 2012
- Subjects: Budget process -- South Africa -- Eastern Cape , Business forecasting -- South Africa -- Eastern Cape , Business planning -- South Africa -- Eastern Cape , Manufacturing industries -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8940 , http://hdl.handle.net/10948/d1008408 , Budget process -- South Africa -- Eastern Cape , Business forecasting -- South Africa -- Eastern Cape , Business planning -- South Africa -- Eastern Cape , Manufacturing industries -- South Africa -- Eastern Cape
- Description: The primary objective of the study is to assess whether organisations are using their budgeting, forecasting and financial planning information as a strategic tool in the decision-making process. The research aims to investigate the various factors that hinder the success of the finance department in delivering a quality financial plan, budget or forecast to top management and the rest of the organisation.
- Full Text:
- Date Issued: 2012
Characterising the stress-life response of mechanical and laser formed titanium components
- Authors: Fidder, Herman
- Date: 2012
- Subjects: Titanium alloys -- Fatigue , Titanium --- Fatigue , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9634 , http://hdl.handle.net/10948/d1018462
- Description: This dissertation involves the experimental investigation of commercially pure titanium (CP Ti) which was subjected to laser forming and mechanical forming processes. Commercially pure titanium grade 2 was formed to a radius of curvature of approximately 120 mm using three forming procedures, i.e. i) laser forming; ii) mechanical forming (stretched forming) and iii) a combined forming process (laser-mechanical forming). Fatigue testing revealed, for all the forming processes, that samples produced by laser forming performed the best at high load settings. However, mechanically formed specimens performed the best at low load settings, whereas the laser-mechanical process resulted in midway performance between laser and mechanical processing. Considering microstructure vs fatigue; impact vs fatigue; and residual stress vs fatigue; at high load settings it is evident that the microstructure is the dominant contributor to crack initiation and growth. Crack morphology of fatigue samples revealed that secondary cracks (parallel to main crack front) followed the grain boundaries of the Widmanstätten microstructure, whereas irregular secondary cracks grew parallel and through the twinning planes and along the grain boundaries of the equiaxed microstructure. Laser forming resulted in microstructural changes from equiaxed grains to a Widmanstätten structure due to fast cooling rates. Excessive twinning is developed within the equiaxed microstructure after the mechanical forming procedure. This is due to cold working / strain hardening. The combined process shows a combination of equiaxed grains and Widmanstätten microstructure. Residual stress relieved for all forming processes revealed an increase in the magnitude of the residual stress compared to the parent plate and that the maximum values were obtained at the inner radius of curvature (i.e. 118.4 mm). Laser forming revealed the highest values in residual stress whereas the other two processes i.e. mechanical and laser-mechanical forming exhibited an increase midway between the parent plate and laser forming. The second most influential factor with regards to fatigue was the magnitude of the residual stress, especially at medium to low load settings. When considering theoretical models to predict fatigue life it was found that the Goodman model showed the closest relation to the actual fatigue data when considering the entire theoretical curve. Vickers microhardness profiling was applied to the thickness of the samples for the parent plate and all forming processes. No significant hardening occurred due to the forming processes and differences in hardness were considered negligible. Charpy impact testing revealed that the laser formed specimens exhibited the most brittle behaviour when compared to the parent plate results. Mechanical formed specimens showed a slight increase in brittleness compared to parent plate whereas the combined process yielded results midway between the laser and mechanically formed specimens. Mathematical equations are formulated and presented for predicting the fatigue life of CP Ti grade 2 for the parent plate and the three forming processes. This study proved that the laser forming process can be successfully used as a production stage in the forming of CP Ti grade 2.
- Full Text:
- Date Issued: 2012
- Authors: Fidder, Herman
- Date: 2012
- Subjects: Titanium alloys -- Fatigue , Titanium --- Fatigue , Materials -- Mechanical properties
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9634 , http://hdl.handle.net/10948/d1018462
- Description: This dissertation involves the experimental investigation of commercially pure titanium (CP Ti) which was subjected to laser forming and mechanical forming processes. Commercially pure titanium grade 2 was formed to a radius of curvature of approximately 120 mm using three forming procedures, i.e. i) laser forming; ii) mechanical forming (stretched forming) and iii) a combined forming process (laser-mechanical forming). Fatigue testing revealed, for all the forming processes, that samples produced by laser forming performed the best at high load settings. However, mechanically formed specimens performed the best at low load settings, whereas the laser-mechanical process resulted in midway performance between laser and mechanical processing. Considering microstructure vs fatigue; impact vs fatigue; and residual stress vs fatigue; at high load settings it is evident that the microstructure is the dominant contributor to crack initiation and growth. Crack morphology of fatigue samples revealed that secondary cracks (parallel to main crack front) followed the grain boundaries of the Widmanstätten microstructure, whereas irregular secondary cracks grew parallel and through the twinning planes and along the grain boundaries of the equiaxed microstructure. Laser forming resulted in microstructural changes from equiaxed grains to a Widmanstätten structure due to fast cooling rates. Excessive twinning is developed within the equiaxed microstructure after the mechanical forming procedure. This is due to cold working / strain hardening. The combined process shows a combination of equiaxed grains and Widmanstätten microstructure. Residual stress relieved for all forming processes revealed an increase in the magnitude of the residual stress compared to the parent plate and that the maximum values were obtained at the inner radius of curvature (i.e. 118.4 mm). Laser forming revealed the highest values in residual stress whereas the other two processes i.e. mechanical and laser-mechanical forming exhibited an increase midway between the parent plate and laser forming. The second most influential factor with regards to fatigue was the magnitude of the residual stress, especially at medium to low load settings. When considering theoretical models to predict fatigue life it was found that the Goodman model showed the closest relation to the actual fatigue data when considering the entire theoretical curve. Vickers microhardness profiling was applied to the thickness of the samples for the parent plate and all forming processes. No significant hardening occurred due to the forming processes and differences in hardness were considered negligible. Charpy impact testing revealed that the laser formed specimens exhibited the most brittle behaviour when compared to the parent plate results. Mechanical formed specimens showed a slight increase in brittleness compared to parent plate whereas the combined process yielded results midway between the laser and mechanically formed specimens. Mathematical equations are formulated and presented for predicting the fatigue life of CP Ti grade 2 for the parent plate and the three forming processes. This study proved that the laser forming process can be successfully used as a production stage in the forming of CP Ti grade 2.
- Full Text:
- Date Issued: 2012
Characterising the stress-life response of mechanical formed AISI-1008 steel plate components
- Authors: Müller, Ruan
- Date: 2012
- Subjects: Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9616 , http://hdl.handle.net/10948/d1008102 , Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Description: The main purpose of this research project was to determine the fatigue-life behaviour of AISI 1008 sheet steel which has been mechanically formed to a radius of curvature of 120mm and then to correlate the fatigue-life behaviour to that of the parent or “as manufactured” material. During the forming process it was felt important to induce plastic strain through stretch-bending by clamping the sides of a plate sample’s (width) edges in the bending fixture before being bent by a single acting mechanical press. It was determined through actual testing that there was a decrease in fatigue-life when the mechanical formed data was compared to fatigue data of the parent material. Standard fatigue mathematical models were used to relate the actual fatigue data. Due to the material being cold formed to a radius of curvature of 120mm, residual stresses induced during the forming process played an essential role during the fatigue-life prediction calculations. The maximum relieved stress in the parent material was compressive in nature having a magnitude of 11percent of the “as manufactured” yield strength (265 MPa). For the mechanical formed material compressive residual stresses were measured on the outer surface while tensile stresses were measured on the inner surface. The difference between actual number of cycles to failure to that calculated using the standard mathematical models for the parent material, ranged between 48 percent and 18 percent and for the mechanical formed samples between 35 percent and 1percent, depending on the strain amplitude used. An important aspect of this study was to determine the criteria required for mathematical modelling of the parent material as testing occurred between the limit of proportionality and yield point. Although this aspect requires further investigation the mathematical results obtained during this study were considered to be acceptable.
- Full Text:
- Date Issued: 2012
- Authors: Müller, Ruan
- Date: 2012
- Subjects: Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9616 , http://hdl.handle.net/10948/d1008102 , Materials -- Fatigue -- Testing , Metals -- Fatigue , Mechanical wear -- Measurement , Mechanical engineering
- Description: The main purpose of this research project was to determine the fatigue-life behaviour of AISI 1008 sheet steel which has been mechanically formed to a radius of curvature of 120mm and then to correlate the fatigue-life behaviour to that of the parent or “as manufactured” material. During the forming process it was felt important to induce plastic strain through stretch-bending by clamping the sides of a plate sample’s (width) edges in the bending fixture before being bent by a single acting mechanical press. It was determined through actual testing that there was a decrease in fatigue-life when the mechanical formed data was compared to fatigue data of the parent material. Standard fatigue mathematical models were used to relate the actual fatigue data. Due to the material being cold formed to a radius of curvature of 120mm, residual stresses induced during the forming process played an essential role during the fatigue-life prediction calculations. The maximum relieved stress in the parent material was compressive in nature having a magnitude of 11percent of the “as manufactured” yield strength (265 MPa). For the mechanical formed material compressive residual stresses were measured on the outer surface while tensile stresses were measured on the inner surface. The difference between actual number of cycles to failure to that calculated using the standard mathematical models for the parent material, ranged between 48 percent and 18 percent and for the mechanical formed samples between 35 percent and 1percent, depending on the strain amplitude used. An important aspect of this study was to determine the criteria required for mathematical modelling of the parent material as testing occurred between the limit of proportionality and yield point. Although this aspect requires further investigation the mathematical results obtained during this study were considered to be acceptable.
- Full Text:
- Date Issued: 2012
Characterising the structural integrity of mechanical formed low carbon steel
- Authors: Victor, Ngea Njoume
- Date: 2012
- Subjects: Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9627 , http://hdl.handle.net/10948/d1012089 , Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Description: The contribution of the clamping force in the technique used in this study to stretch-bend low carbon steel samples was investigated to support the subsequent changes in the microstructure and properties of the formed material with regard to parent material. Although plastic deformation by cold working is known to induce texture or preferred orientation to the grains of a formed material while decreasing its ductility and increasing the strength, as well as inducing residual stress, it is not known how the different directions (rolling, transverse and oblique/45°) of the sheet steel will respond to this stretch bending technique. The first part of the research work involved a thorough literature review on sheet metal forming processes and their effect on the formed material with interest on the above mentioned directions of the sheet. It became clear from the literature overview that cold working of a material will induce strain-hardening which varies with the magnitude of cold work, resulting in changes in the strength and ductility of the material. Besides, when plastic deformation is not uniform (e.g., tensile and compressive) throughout the entire cross section of the formed part, residual stresses remain in the material with the grains been elongated along the direction of the maximum strain. The main parameters that were considered and controlled in this study are as follows: strain experienced / stress induced into the form sample, the sample direction, the stroke length and the clamping torque, the generated radius of curvature. The chapters that follow the literature review, deal with the set-up of the different equipment used in this study, the specimen preparation as well as the recording, the calculation and interpretation of the results. It was found that the stress magnitude that generated the different radii of curvature (120 mm, 150 mm and 185 mm) was between 1 percent & 13 percent higher than the parent material’s yield strength with the lower stress been associated to the smaller radius of curvature and the higher stress to the higher radius. The stress induced into the sample during forming was not only proportional to the stroke length but also to the distance between the punch’s tip and the sample and the sample to the die’s nadir. The clamping torque adopted was restricted to the manual capacity of the operator who used a preset torque wrench to fasten the plate sample into the jig. Plate samples of low carbon steel were cut to angles of 0°, 45°, and 90° to the rolling direction of the sheet material and stretch-bent on a single-action mechanical press to 120 mm, 150 mm, and 185 mm radii of curvature. The preliminary results indicate that stretch-bent samples had increased hardness to the parent plate, in particular below the surface layers up to around 1.1 mm depth. Since there is a well established relationship between hardness, yield and tensile strengths for steel, the yield and tensile strengths of the formed material were estimated using the Nobre et al [34] incremental relation, which relates the linearity between relative increments of hardness and yield strength. Changes were not noticeable at the microstructural level of the formed samples. Meanwhile, samples from which higher plastic deformation stress values were calculated were not those absorbing higher impact energy when Charpy specimen cut from plate and stretch-bent samples were tested. The maximum relieved residual stress in the parent material was predominantly compressive and represents in magnitude approximately 12 percent (average for the three directions) of its original yield strength. In the stretch-bent samples, the relieved residual stress was compressive in the outer curved section with a magnitude about 50 percent of the parent material yield strength and tensile in the inner curved section with a magnitude approximately 25 percent of the parent material yield strength.
- Full Text:
- Date Issued: 2012
- Authors: Victor, Ngea Njoume
- Date: 2012
- Subjects: Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9627 , http://hdl.handle.net/10948/d1012089 , Carbon steel , Structural analysis (Engineering) , Steel, Structural
- Description: The contribution of the clamping force in the technique used in this study to stretch-bend low carbon steel samples was investigated to support the subsequent changes in the microstructure and properties of the formed material with regard to parent material. Although plastic deformation by cold working is known to induce texture or preferred orientation to the grains of a formed material while decreasing its ductility and increasing the strength, as well as inducing residual stress, it is not known how the different directions (rolling, transverse and oblique/45°) of the sheet steel will respond to this stretch bending technique. The first part of the research work involved a thorough literature review on sheet metal forming processes and their effect on the formed material with interest on the above mentioned directions of the sheet. It became clear from the literature overview that cold working of a material will induce strain-hardening which varies with the magnitude of cold work, resulting in changes in the strength and ductility of the material. Besides, when plastic deformation is not uniform (e.g., tensile and compressive) throughout the entire cross section of the formed part, residual stresses remain in the material with the grains been elongated along the direction of the maximum strain. The main parameters that were considered and controlled in this study are as follows: strain experienced / stress induced into the form sample, the sample direction, the stroke length and the clamping torque, the generated radius of curvature. The chapters that follow the literature review, deal with the set-up of the different equipment used in this study, the specimen preparation as well as the recording, the calculation and interpretation of the results. It was found that the stress magnitude that generated the different radii of curvature (120 mm, 150 mm and 185 mm) was between 1 percent & 13 percent higher than the parent material’s yield strength with the lower stress been associated to the smaller radius of curvature and the higher stress to the higher radius. The stress induced into the sample during forming was not only proportional to the stroke length but also to the distance between the punch’s tip and the sample and the sample to the die’s nadir. The clamping torque adopted was restricted to the manual capacity of the operator who used a preset torque wrench to fasten the plate sample into the jig. Plate samples of low carbon steel were cut to angles of 0°, 45°, and 90° to the rolling direction of the sheet material and stretch-bent on a single-action mechanical press to 120 mm, 150 mm, and 185 mm radii of curvature. The preliminary results indicate that stretch-bent samples had increased hardness to the parent plate, in particular below the surface layers up to around 1.1 mm depth. Since there is a well established relationship between hardness, yield and tensile strengths for steel, the yield and tensile strengths of the formed material were estimated using the Nobre et al [34] incremental relation, which relates the linearity between relative increments of hardness and yield strength. Changes were not noticeable at the microstructural level of the formed samples. Meanwhile, samples from which higher plastic deformation stress values were calculated were not those absorbing higher impact energy when Charpy specimen cut from plate and stretch-bent samples were tested. The maximum relieved residual stress in the parent material was predominantly compressive and represents in magnitude approximately 12 percent (average for the three directions) of its original yield strength. In the stretch-bent samples, the relieved residual stress was compressive in the outer curved section with a magnitude about 50 percent of the parent material yield strength and tensile in the inner curved section with a magnitude approximately 25 percent of the parent material yield strength.
- Full Text:
- Date Issued: 2012
Characteristics of the modern toursist in the Nelson Mandela Metropolitan area
- Authors: Shrosbree, Laura Tania
- Date: 2012
- Subjects: Sustainable tourism -- South Africa -- Nelson Mandela Bay , Tourism -- South Africa -- Nelson Mandela Bay , Tourism -- Social aspects , Civilization, Modern
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9369 , http://hdl.handle.net/10948/d1012110 , Sustainable tourism -- South Africa -- Nelson Mandela Bay , Tourism -- South Africa -- Nelson Mandela Bay , Tourism -- Social aspects , Civilization, Modern
- Description: Until the nineteenth century, travel was undertaken only by the elite. With the introduction of rail, mass travel was available for the first time, and new faraway destinations became accessible to all. During the 20th century travel became more destination-orientated. And now, in the 21st century, travel is a new economy, resulting in the tourism industry. The focus of the tourism industry has shifted from air travel, weekend getaways and day trips, to a total experience of the destination. A new era in tourism has arrived with a new kind of tourism experience, one that is sustainable, socially responsible and flexible. At the forefront of this industry is a tourist who is more educated, experienced, knowledgeable, independent and demanding. This tourist demands new or different products/services, is harder to please than the traditional tourist, is well-informed and knows what he/she wants and where he/she wants to go. This is the modern tourist. The objectives of the study were to identify the typical characteristics of the so-called modern consumer, determine which of these characteristics were prevalent among consumers living in the Nelson Mandela Metropolitan Area and whether these characteristics could be used to cluster respondents into segments. The results of the study will assist organisations, within the tourism industry, in dealing with the changing demands of the modern tourist. The literature study contextualised the modern tourist within the tourism industry and provides an overview of the demographic and behavioural factors, which form the basis of the modern tourist‟s development. The demographic factors discussed were age, education, income, gender and household size. The non demographic factors identified and explained were variety seeking, quest for self-identity, quest for authenticity, knowledgeable, experience sharing and time poor. The empirical information was obtained via self-administered questionnaires. Two hundred useable questionnaires were completed by respondents in the Nelson Mandela Metropolitan Area. Statistica version 10 was used to analyse the data received. The principal component factor analysis yielded six behavioural factors, namely meaningful experiences, time poor, knowledge, authenticity and experience sharing. Until the nineteenth century, travel was undertaken only by the elite. With the introduction of rail, mass travel was available for the first time, and new faraway destinations became accessible to all. During the 20th century travel became more destination-orientated. And now, in the 21st century, travel is a new economy, resulting in the tourism industry. The focus of the tourism industry has shifted from air travel, weekend getaways and day trips, to a total experience of the destination. A new era in tourism has arrived with a new kind of tourism experience, one that is sustainable, socially responsible and flexible. At the forefront of this industry is a tourist who is more educated, experienced, knowledgeable, independent and demanding. This tourist demands new or different products/services, is harder to please than the traditional tourist, is well-informed and knows what he/she wants and where he/she wants to go. This is the modern tourist. The objectives of the study were to identify the typical characteristics of the so-called modern consumer, determine which of these characteristics were prevalent among consumers living in the Nelson Mandela Metropolitan Area and whether these characteristics could be used to cluster respondents into segments. The results of the study will assist organisations, within the tourism industry, in dealing with the changing demands of the modern tourist. The literature study contextualised the modern tourist within the tourism industry and provides an overview of the demographic and behavioural factors, which form the basis of the modern tourist‟s development. The demographic factors discussed were age, education, income, gender and household size. The non demographic factors identified and explained were variety seeking, quest for self-identity, quest for authenticity, knowledgeable, experience sharing and time poor. The empirical information was obtained via self-administered questionnaires. Two hundred useable questionnaires were completed by respondents in the Nelson Mandela Metropolitan Area. Statistica version 10 was used to analyse the data received. The principal component factor analysis yielded six behavioural factors, namely meaningful experiences, time poor, knowledge, authenticity and experience sharing. The data analysis revealed three distinct clusters, namely Postmodernists, Traditionalists and Modernists. Each cluster had unique demographic and behavioural characteristics with the result that modern tourists could be grouped into distinct clusters according to their demographic and behavioural characteristics. This will enable the tourism industry to tailor-make their marketing strategies according to these clusters.he data analysis revealed three distinct clusters, namely Postmodernists, Traditionalists and Modernists. Each cluster had unique demographic and behavioural characteristics with the result that modern tourists could be grouped into distinct clusters according to their demographic and behavioural characteristics. This will enable the tourism industry to tailor-make their marketing strategies according to these clusters.
- Full Text:
- Date Issued: 2012
- Authors: Shrosbree, Laura Tania
- Date: 2012
- Subjects: Sustainable tourism -- South Africa -- Nelson Mandela Bay , Tourism -- South Africa -- Nelson Mandela Bay , Tourism -- Social aspects , Civilization, Modern
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9369 , http://hdl.handle.net/10948/d1012110 , Sustainable tourism -- South Africa -- Nelson Mandela Bay , Tourism -- South Africa -- Nelson Mandela Bay , Tourism -- Social aspects , Civilization, Modern
- Description: Until the nineteenth century, travel was undertaken only by the elite. With the introduction of rail, mass travel was available for the first time, and new faraway destinations became accessible to all. During the 20th century travel became more destination-orientated. And now, in the 21st century, travel is a new economy, resulting in the tourism industry. The focus of the tourism industry has shifted from air travel, weekend getaways and day trips, to a total experience of the destination. A new era in tourism has arrived with a new kind of tourism experience, one that is sustainable, socially responsible and flexible. At the forefront of this industry is a tourist who is more educated, experienced, knowledgeable, independent and demanding. This tourist demands new or different products/services, is harder to please than the traditional tourist, is well-informed and knows what he/she wants and where he/she wants to go. This is the modern tourist. The objectives of the study were to identify the typical characteristics of the so-called modern consumer, determine which of these characteristics were prevalent among consumers living in the Nelson Mandela Metropolitan Area and whether these characteristics could be used to cluster respondents into segments. The results of the study will assist organisations, within the tourism industry, in dealing with the changing demands of the modern tourist. The literature study contextualised the modern tourist within the tourism industry and provides an overview of the demographic and behavioural factors, which form the basis of the modern tourist‟s development. The demographic factors discussed were age, education, income, gender and household size. The non demographic factors identified and explained were variety seeking, quest for self-identity, quest for authenticity, knowledgeable, experience sharing and time poor. The empirical information was obtained via self-administered questionnaires. Two hundred useable questionnaires were completed by respondents in the Nelson Mandela Metropolitan Area. Statistica version 10 was used to analyse the data received. The principal component factor analysis yielded six behavioural factors, namely meaningful experiences, time poor, knowledge, authenticity and experience sharing. Until the nineteenth century, travel was undertaken only by the elite. With the introduction of rail, mass travel was available for the first time, and new faraway destinations became accessible to all. During the 20th century travel became more destination-orientated. And now, in the 21st century, travel is a new economy, resulting in the tourism industry. The focus of the tourism industry has shifted from air travel, weekend getaways and day trips, to a total experience of the destination. A new era in tourism has arrived with a new kind of tourism experience, one that is sustainable, socially responsible and flexible. At the forefront of this industry is a tourist who is more educated, experienced, knowledgeable, independent and demanding. This tourist demands new or different products/services, is harder to please than the traditional tourist, is well-informed and knows what he/she wants and where he/she wants to go. This is the modern tourist. The objectives of the study were to identify the typical characteristics of the so-called modern consumer, determine which of these characteristics were prevalent among consumers living in the Nelson Mandela Metropolitan Area and whether these characteristics could be used to cluster respondents into segments. The results of the study will assist organisations, within the tourism industry, in dealing with the changing demands of the modern tourist. The literature study contextualised the modern tourist within the tourism industry and provides an overview of the demographic and behavioural factors, which form the basis of the modern tourist‟s development. The demographic factors discussed were age, education, income, gender and household size. The non demographic factors identified and explained were variety seeking, quest for self-identity, quest for authenticity, knowledgeable, experience sharing and time poor. The empirical information was obtained via self-administered questionnaires. Two hundred useable questionnaires were completed by respondents in the Nelson Mandela Metropolitan Area. Statistica version 10 was used to analyse the data received. The principal component factor analysis yielded six behavioural factors, namely meaningful experiences, time poor, knowledge, authenticity and experience sharing. The data analysis revealed three distinct clusters, namely Postmodernists, Traditionalists and Modernists. Each cluster had unique demographic and behavioural characteristics with the result that modern tourists could be grouped into distinct clusters according to their demographic and behavioural characteristics. This will enable the tourism industry to tailor-make their marketing strategies according to these clusters.he data analysis revealed three distinct clusters, namely Postmodernists, Traditionalists and Modernists. Each cluster had unique demographic and behavioural characteristics with the result that modern tourists could be grouped into distinct clusters according to their demographic and behavioural characteristics. This will enable the tourism industry to tailor-make their marketing strategies according to these clusters.
- Full Text:
- Date Issued: 2012
Constraints to students' participation in sport on a formalised level: implications for marketers
- Authors: Halforty, Gail Avril
- Date: 2012
- Subjects: Sports -- Physiological aspects , Marketing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9370 , http://hdl.handle.net/10948/d1012120 , Sports -- Physiological aspects , Marketing
- Description: The rate of obesity has risen dramatically over recent years and is an epidemic in many countries. School pupils and university students are no exception to this. The negative effects physically, mentally and emotionally of being overweight are detrimental to one’s quality of life. It is therefore critical to encourage pupils and students to participate in physical activity. Formalised sport is a key component of encouraging physical activity. The habits learnt in childhood and early adulthood are often carried through for the rest of one’s life. The benefits of participating in sport need to be promoted extensively to the students, as research has shown students that participate in sport are not only healthier but achieve better academic results. This study examined the constraints to students’ participation in formalised sport. The empirical data was collected by means of a survey, using self-administered questionnaires distributed to students on the three Summerstrand campuses at the Nelson Mandela Metropolitan University in Port Elizabeth. Two hundred and eighty three usable questionnaires were received. Time and scheduling was found to be the most constraining factor to participation in sport. I am too busy with my university studies attracted the highest mean score of all the items on the questionnaire. It is recommended that: • sport organisers at NMMU emphasise to the students the benefits of regular participation in physical activity; • the effectiveness of the current NMMU sport programmes and accessibility be further investigated as only 18 per cent of the students in 2011 were participating in sport programmes at NMMU; • time management skills be taught to the NMMU students as the Time and scheduling constraint was the most profound constraint to participation in formalised sport; • NMMU academic staff work more closely with the staff at the University Sport Bureau to promote regular sport participation and to disseminate sport related information that could promote being more actively involved in sport; and • relevant introductory sport programmes and more internal leagues be offered, that gently introduce various sport codes to the students.
- Full Text:
- Date Issued: 2012
- Authors: Halforty, Gail Avril
- Date: 2012
- Subjects: Sports -- Physiological aspects , Marketing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9370 , http://hdl.handle.net/10948/d1012120 , Sports -- Physiological aspects , Marketing
- Description: The rate of obesity has risen dramatically over recent years and is an epidemic in many countries. School pupils and university students are no exception to this. The negative effects physically, mentally and emotionally of being overweight are detrimental to one’s quality of life. It is therefore critical to encourage pupils and students to participate in physical activity. Formalised sport is a key component of encouraging physical activity. The habits learnt in childhood and early adulthood are often carried through for the rest of one’s life. The benefits of participating in sport need to be promoted extensively to the students, as research has shown students that participate in sport are not only healthier but achieve better academic results. This study examined the constraints to students’ participation in formalised sport. The empirical data was collected by means of a survey, using self-administered questionnaires distributed to students on the three Summerstrand campuses at the Nelson Mandela Metropolitan University in Port Elizabeth. Two hundred and eighty three usable questionnaires were received. Time and scheduling was found to be the most constraining factor to participation in sport. I am too busy with my university studies attracted the highest mean score of all the items on the questionnaire. It is recommended that: • sport organisers at NMMU emphasise to the students the benefits of regular participation in physical activity; • the effectiveness of the current NMMU sport programmes and accessibility be further investigated as only 18 per cent of the students in 2011 were participating in sport programmes at NMMU; • time management skills be taught to the NMMU students as the Time and scheduling constraint was the most profound constraint to participation in formalised sport; • NMMU academic staff work more closely with the staff at the University Sport Bureau to promote regular sport participation and to disseminate sport related information that could promote being more actively involved in sport; and • relevant introductory sport programmes and more internal leagues be offered, that gently introduce various sport codes to the students.
- Full Text:
- Date Issued: 2012
Critical design within the practice of graphic design
- Authors: Kuhn, Simon
- Date: 2012
- Subjects: Graphic arts , Product design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8494 , http://hdl.handle.net/10948/d1007843 , Graphic arts , Product design
- Description: Critical Design is a specific type of design activity that has emerged from within the field of product design. Based on the supposition that design is an ideological activity, it can either be critical or affirmative of the status quo and categorised as Critical Design or Affirmative Design. The intention of this study is to create Critical Design within the practice of graphic design. Critical Design was defined by identifying its key characteristics and then visualised into a diagram that maps the pathways, processes and consequences which distinguish Critical Design from Affirmative Design. The characteristics were used to generate criteria of Critical Design, which were then used to analyse case studies. The findings from this analysis suggested that both case study projects could be defined as Critical Design and served as a way of testing the appropriateness of the criteria. The practical component of this study used the characteristics of Critical Design to create a range of graphic design artefacts and then analysed them in relation to the criteria of Critical Design. The findings from this analysis determined the practical component as Critical [Graphic] Design and suggested that graphic design can be an appropriate medium for critique of its own role within society.
- Full Text:
- Date Issued: 2012
- Authors: Kuhn, Simon
- Date: 2012
- Subjects: Graphic arts , Product design
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8494 , http://hdl.handle.net/10948/d1007843 , Graphic arts , Product design
- Description: Critical Design is a specific type of design activity that has emerged from within the field of product design. Based on the supposition that design is an ideological activity, it can either be critical or affirmative of the status quo and categorised as Critical Design or Affirmative Design. The intention of this study is to create Critical Design within the practice of graphic design. Critical Design was defined by identifying its key characteristics and then visualised into a diagram that maps the pathways, processes and consequences which distinguish Critical Design from Affirmative Design. The characteristics were used to generate criteria of Critical Design, which were then used to analyse case studies. The findings from this analysis suggested that both case study projects could be defined as Critical Design and served as a way of testing the appropriateness of the criteria. The practical component of this study used the characteristics of Critical Design to create a range of graphic design artefacts and then analysed them in relation to the criteria of Critical Design. The findings from this analysis determined the practical component as Critical [Graphic] Design and suggested that graphic design can be an appropriate medium for critique of its own role within society.
- Full Text:
- Date Issued: 2012