A framework for the development of a personal information security agent
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
- Authors: Stieger, Ewald Andreas
- Date: 2011
- Subjects: Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9803 , http://hdl.handle.net/10948/d1012326 , Computer networks -- Security measures , Information storage and retrieval systems , Artificial intelligence
- Description: Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
- Full Text:
- Date Issued: 2011
A model for assessing the anticipated relative financial impact of implementing the tools of lean manufacturing on a manufacturing concern
- Authors: Francis, Merwin
- Date: 2011
- Subjects: Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8972 , http://hdl.handle.net/10948/1326 , Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Description: Lean manufacturing has seen its creators, Toyota, rise from insignificance in the middle of the previous century, to the biggest selling car manufacturer in the world today. Another Japanese car manufacturer, Honda, which has also been practising the principles of lean avidly during the last few decades, has also made huge strides towards becoming a dominant force in the car market. These Japanese companies‟ adoption of lean has seen many of their mass producing United States (US) and European counterparts struggle for survival. Maynard (2003:10) predicted that by the end of the decade, at least one of the „Big Three‟ auto makers in the US – Chrysler, Ford, and General Motors (GM) – would be forced to undertake significant restructuring to continue in operation. At the time of this writing all indications are that this prediction will come true. GM is in the process of major shareholding restructuring in an attempt to keep the company afloat, having run up insurmountable debts in the face of the current global economic downturn. Adopting the lean methodology has become a matter of necessity. The continued use of mass production methods alone is no longer viable; companies need to also employ lean methods intelligently in order to remain competitive. This study is regarded as a crucial endeavour to assist operations managers of manufacturing concerns in developing lean implementation strategies which will maximise the benefits to the organization.
- Full Text:
- Date Issued: 2011
- Authors: Francis, Merwin
- Date: 2011
- Subjects: Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8972 , http://hdl.handle.net/10948/1326 , Production management , Manufacturing processes , Production planning , Industrial efficiency , Total productive maintenance
- Description: Lean manufacturing has seen its creators, Toyota, rise from insignificance in the middle of the previous century, to the biggest selling car manufacturer in the world today. Another Japanese car manufacturer, Honda, which has also been practising the principles of lean avidly during the last few decades, has also made huge strides towards becoming a dominant force in the car market. These Japanese companies‟ adoption of lean has seen many of their mass producing United States (US) and European counterparts struggle for survival. Maynard (2003:10) predicted that by the end of the decade, at least one of the „Big Three‟ auto makers in the US – Chrysler, Ford, and General Motors (GM) – would be forced to undertake significant restructuring to continue in operation. At the time of this writing all indications are that this prediction will come true. GM is in the process of major shareholding restructuring in an attempt to keep the company afloat, having run up insurmountable debts in the face of the current global economic downturn. Adopting the lean methodology has become a matter of necessity. The continued use of mass production methods alone is no longer viable; companies need to also employ lean methods intelligently in order to remain competitive. This study is regarded as a crucial endeavour to assist operations managers of manufacturing concerns in developing lean implementation strategies which will maximise the benefits to the organization.
- Full Text:
- Date Issued: 2011
A model for cultivating resistance to social engineering attacks
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
- Authors: Jansson, Kenny
- Date: 2011
- Subjects: Computer security , Data protection , Human-computer interaction
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9744 , http://hdl.handle.net/10948/1588 , Computer security , Data protection , Human-computer interaction
- Description: The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
- Full Text:
- Date Issued: 2011
An analysis of selected cartoons published during Zimbabwe's 2008 elections
- Authors: Mushohwe, Knowledge
- Date: 2011
- Subjects: Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8493 , http://hdl.handle.net/10948/1609 , Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Description: During Zimbabwe’s 2008 harmonised elections the country’s media laws had a direct impact on the way editorial cartoonists expressed themselves. Although the online newspapers were unregulated and the print media published under Zimbabwe’s media laws, Public Order and Security Act and Access to Information and Protection of Privacy act - the editorial cartoons from both sources show deliberate bias towards one candidate and contempt towards the main rival. The study contextualises the understanding of the editorial cartoon, as practised in an environment of freedom of speech and defined by the four categories identified by Press (1981) and Manning and Phiddian (2004), and delineates the effect of media laws on the newspaper industry in Zimbabwe. The four categories of editorial cartoons identified are descriptive editorial cartoons, laughing satirical editorial cartoons, destructive satirical editorial cartoons, and savage indignation editorial cartoons. The study reviews eight editorial cartoons, read using a semiotic framework investigating non-verbal communication, as defined and suggested by Du Plooy (1996), and a text and language grid, as suggested by Leech (1974), according to the criteria of symbols/metaphors, exaggeration/distortion, stereotypes, caricature, irony, captions, and background knowledge, as developed by Fetsko (2001). A comparative analysis of the cartoons reveals that objectives and functions of the unregulated zimonline.co.za and the regulated the Herald newspapers are the same. They constitute propagandistic representations of Zimbabwean politics that are more an extension of political ideology than they are a reflection of the country’s sociopolitical landscape.
- Full Text:
- Date Issued: 2011
- Authors: Mushohwe, Knowledge
- Date: 2011
- Subjects: Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8493 , http://hdl.handle.net/10948/1609 , Zimbabwe. Parliament -- Elections, 2008 , World politics Caricatures and cartoons , Editorial cartoons -- Zimbabwe , Zimbabwe -- Politics and government -- 20th century , Mass media -- Law and legislation -- Zimbabwe , Freedom of speech -- Zimbabwe
- Description: During Zimbabwe’s 2008 harmonised elections the country’s media laws had a direct impact on the way editorial cartoonists expressed themselves. Although the online newspapers were unregulated and the print media published under Zimbabwe’s media laws, Public Order and Security Act and Access to Information and Protection of Privacy act - the editorial cartoons from both sources show deliberate bias towards one candidate and contempt towards the main rival. The study contextualises the understanding of the editorial cartoon, as practised in an environment of freedom of speech and defined by the four categories identified by Press (1981) and Manning and Phiddian (2004), and delineates the effect of media laws on the newspaper industry in Zimbabwe. The four categories of editorial cartoons identified are descriptive editorial cartoons, laughing satirical editorial cartoons, destructive satirical editorial cartoons, and savage indignation editorial cartoons. The study reviews eight editorial cartoons, read using a semiotic framework investigating non-verbal communication, as defined and suggested by Du Plooy (1996), and a text and language grid, as suggested by Leech (1974), according to the criteria of symbols/metaphors, exaggeration/distortion, stereotypes, caricature, irony, captions, and background knowledge, as developed by Fetsko (2001). A comparative analysis of the cartoons reveals that objectives and functions of the unregulated zimonline.co.za and the regulated the Herald newspapers are the same. They constitute propagandistic representations of Zimbabwean politics that are more an extension of political ideology than they are a reflection of the country’s sociopolitical landscape.
- Full Text:
- Date Issued: 2011
An analysis of the reliability of the 22kV distribution network of the Nelson Mandela Bay Municipality
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
- Authors: Lamour, Bernhardt Gustave
- Date: 2011
- Subjects: Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9596 , http://hdl.handle.net/10948/1537 , Electrical power distribution -- Reliability -- Nelson Mandela Bay Municipality , Electric power system -- Quality control , Electrical apparatus and appliances -- Maintenance and repair
- Description: This dissertation is a systematic study of the 22kV Nelson Mandela Bay Municipality (NMBM) electricity power distribution network reliability evaluation and improvements to be applied. Reliability evaluation of electric power systems has traditionally been an integral part of planning and operation. Changes in the electricity utility, coupled with aging electrical apparatus, create a need for more realistic techniques for power system reliability modelling. This work presents a reliability evaluation technique that combines set literature and evaluation criteria. In analysing system reliability, this research takes into account the reasons for many outages and voltage dips and seeks to find mitigating approaches that are financially justified. The study analyses the power system in terms of the methodology developed, using power system reliability techniques, power quality evaluation, protection analyses and evaluating the network against maintenance interventions and programs, manpower availability and weather conditions contributing to the outages. In evaluating the power system various techniques are used to determine if the power network operates within the NRS standards, namely, reliability calculations, testing of protection equipment, interrogation of power quality instruments and modeling the network on Digsilent. This study will look at all the important factors influencing power system reliability, analysing the network in terms of the methodology and recommend improvements.
- Full Text:
- Date Issued: 2011
An evaluation of UPLC technology for the simultaneous analysis of actives in a multi-active drug
- Authors: Bawjee, Janita
- Date: 2011
- Subjects: High performance liquid chromatography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10384 , http://hdl.handle.net/10948/d1008407 , High performance liquid chromatography
- Description: The evaluation of the potential to use Ultra Performance Liquid Chromatography (UPLC) for the simultaneous quantification of all the actives in a multi-active tablet is described in this work. Part of the evaluation was to ensure that the necessary regulatory requirements were adhered to by ascertaining that an analytical method is suitable for a specific purpose through analytical method validation for the specific multi-active tablet. The UPLC method was also tested for the analysis of similar products, namely tablet formulations that contain similar active ingredients in the same proportions but with an additional active ingredient. A method for the simultaneous determination of paracetamol, caffeine and codeine phosphate was developed using UPLC technology. The UPLC developed method was more efficient than the existing in-house HPLC method. The UPLC method was then validated in accordance to ICH and USP guidelines. The application of this UPLC method for the analysis of similar products containing paracetamol, caffeine, codeine phosphate and one extra active ingredient was very challenging. The low concentration of the additional component, differences in sample matrix and differences in formulations added to the challenges. The direct application for the analysis of products Y and Z was not successful; however the method could be used as a platform for further research. A cost comparison between the UPLC and HPLC methods showed the UPLC method to be more cost effective. Thus, while maintenance costs are higher for the UPLC instrument, column costs are comparable to HPLC columns, but solvent and waste disposal charges decrease considerably due to lower solvent use. The reduction in instrument time dramatically improves the cost effectiveness of UPLC over HPLC due to a concurrent reduction in analyst time requirement. The results of this study show that the analytical costs associated with the analysis of multi-active drugs using HPLC procedures can be reduced substantially by the CONFIDENTIAL INTELLECTUAL PROPERTY OF ASPEN PHARMACARE implementation of UPLC technology. The hypothesis that the enhanced chromatographic power of UPLC can be leveraged to provide faster analysis times hence increased product throughput rates, and lower operating costs for the analysis of multi-active drugs was accepted. These advantages were achieved whilst meeting all regulatory requirements for analytical methods as required by regulatory bodies.
- Full Text:
- Date Issued: 2011
- Authors: Bawjee, Janita
- Date: 2011
- Subjects: High performance liquid chromatography
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10384 , http://hdl.handle.net/10948/d1008407 , High performance liquid chromatography
- Description: The evaluation of the potential to use Ultra Performance Liquid Chromatography (UPLC) for the simultaneous quantification of all the actives in a multi-active tablet is described in this work. Part of the evaluation was to ensure that the necessary regulatory requirements were adhered to by ascertaining that an analytical method is suitable for a specific purpose through analytical method validation for the specific multi-active tablet. The UPLC method was also tested for the analysis of similar products, namely tablet formulations that contain similar active ingredients in the same proportions but with an additional active ingredient. A method for the simultaneous determination of paracetamol, caffeine and codeine phosphate was developed using UPLC technology. The UPLC developed method was more efficient than the existing in-house HPLC method. The UPLC method was then validated in accordance to ICH and USP guidelines. The application of this UPLC method for the analysis of similar products containing paracetamol, caffeine, codeine phosphate and one extra active ingredient was very challenging. The low concentration of the additional component, differences in sample matrix and differences in formulations added to the challenges. The direct application for the analysis of products Y and Z was not successful; however the method could be used as a platform for further research. A cost comparison between the UPLC and HPLC methods showed the UPLC method to be more cost effective. Thus, while maintenance costs are higher for the UPLC instrument, column costs are comparable to HPLC columns, but solvent and waste disposal charges decrease considerably due to lower solvent use. The reduction in instrument time dramatically improves the cost effectiveness of UPLC over HPLC due to a concurrent reduction in analyst time requirement. The results of this study show that the analytical costs associated with the analysis of multi-active drugs using HPLC procedures can be reduced substantially by the CONFIDENTIAL INTELLECTUAL PROPERTY OF ASPEN PHARMACARE implementation of UPLC technology. The hypothesis that the enhanced chromatographic power of UPLC can be leveraged to provide faster analysis times hence increased product throughput rates, and lower operating costs for the analysis of multi-active drugs was accepted. These advantages were achieved whilst meeting all regulatory requirements for analytical methods as required by regulatory bodies.
- Full Text:
- Date Issued: 2011
Analysis of a human capital plan for the southern region of Eskom distribution
- Moonsamy, Sivabakiam Maduray
- Authors: Moonsamy, Sivabakiam Maduray
- Date: 2011
- Subjects: Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9386 , http://hdl.handle.net/10948/d1010996 , Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Description: We are living in an era of inconceivable knowledge, skills and talent paucity as technology continue to revolutionise the world, creating new and diverse economic opportunities and changing the perception of work, its environments and the skills and knowledge demanded in organisations. This phenomenon has resulted in global competition for skilled and knowledge workers as the new world of work morphs enigmatically, leaving organisations vulnerable, and unable to deal with this complex issue. Organisational leaders are cognisant of the changes, but are grappling with the problems of managing, retaining, and creating a resilient workforce. If talent is put onto the back burner and left unattended, it has the potential to create overwhelming turmoil in the South African economy and the economies throughout the world. The global changes will impact directly on how we approach workforce challenges in the future. Today, human capital is regarded as the distinct wealth contributor and creator for economic and organisational prosperity (Meyer, 2004). Hence, Human Capital Planning is crucial for every organisation, including Eskom, to ensure that its strategic objectives are met through the effective management and utilisation of its human resources in order to maintain its competitive advantage and ensure its sustainability into the future. Globally, as well as in South Africa, various contributing factors have resulted in skills shortages throughout the energy industry. Eskom has embarked on several growth initiatives requiring additional manpower, diverse specialist knowledge and skills-sets, and a more robust pipeline of technically qualified employees across all levels in the organisation firstly, to sustain itself, and secondly to embed the transition of a high performing organisation by attracting and acquiring the right skills and talent in the right jobs (Eskom Business Plan, 2010). Human Capital Planning is therefore crucial especially for Eskom Distribution, Southern Region to ensure that its strategic objectives are met through the effective management and optimisation of its human resources, whilst simultaneously cognisant of the changing landscape both internally, viz. within the region and the broader Eskom, and externally in South Africa and the global markets.
- Full Text:
- Date Issued: 2011
- Authors: Moonsamy, Sivabakiam Maduray
- Date: 2011
- Subjects: Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9386 , http://hdl.handle.net/10948/d1010996 , Eskom (Firm) , Human capital -- Planning , Strategic Planning
- Description: We are living in an era of inconceivable knowledge, skills and talent paucity as technology continue to revolutionise the world, creating new and diverse economic opportunities and changing the perception of work, its environments and the skills and knowledge demanded in organisations. This phenomenon has resulted in global competition for skilled and knowledge workers as the new world of work morphs enigmatically, leaving organisations vulnerable, and unable to deal with this complex issue. Organisational leaders are cognisant of the changes, but are grappling with the problems of managing, retaining, and creating a resilient workforce. If talent is put onto the back burner and left unattended, it has the potential to create overwhelming turmoil in the South African economy and the economies throughout the world. The global changes will impact directly on how we approach workforce challenges in the future. Today, human capital is regarded as the distinct wealth contributor and creator for economic and organisational prosperity (Meyer, 2004). Hence, Human Capital Planning is crucial for every organisation, including Eskom, to ensure that its strategic objectives are met through the effective management and utilisation of its human resources in order to maintain its competitive advantage and ensure its sustainability into the future. Globally, as well as in South Africa, various contributing factors have resulted in skills shortages throughout the energy industry. Eskom has embarked on several growth initiatives requiring additional manpower, diverse specialist knowledge and skills-sets, and a more robust pipeline of technically qualified employees across all levels in the organisation firstly, to sustain itself, and secondly to embed the transition of a high performing organisation by attracting and acquiring the right skills and talent in the right jobs (Eskom Business Plan, 2010). Human Capital Planning is therefore crucial especially for Eskom Distribution, Southern Region to ensure that its strategic objectives are met through the effective management and optimisation of its human resources, whilst simultaneously cognisant of the changing landscape both internally, viz. within the region and the broader Eskom, and externally in South Africa and the global markets.
- Full Text:
- Date Issued: 2011
Customer relationship management practiced by KOSAB
- Authors: Felix, Amoah
- Date: 2011
- Subjects: Customer relations , Customer services , Consumer satisfaction , Customer loyalty
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8635 , http://hdl.handle.net/10948/d1008046 , Customer relations , Customer services , Consumer satisfaction , Customer loyalty
- Description: Customer relationship management (CRM) presents a new paradigm shift to the old traditional marketing strategies that are known and practiced by many organisations in South Africa and across the globe. Competition is not an excuse for failure anymore. Organisations that do not have any concrete strategies in dealing with the customer will not survive in the market. The ultimate goal of CRM is to enable organisations to forge closer ties with the customer so that a solid bond can be created to enhance loyalty and satisfaction. The goal for this research was to identify the CRM strategies used by a single organisation and thereafter suggest improvements to enhance customer loyalty. The results of the study could assist the management of the organisation to improve the CRM strategies which will hopefully enhance retention and prevent customer attrition. A literature review was conducted to unveil various elements of CRM, and strategies that can attract and retain customers. It helped in identifying themes for the empirical study. An in-depth interview was conducted with the general manager of the organisation to gauge his perception, and CRM practices in the organisation. An interview guide was used during the interview process. Four main topics namely: implementation of CRM, customer loyalty, customer complaints and conflict, and employees training and motivation were utilised for the interview guide and followed by further probing. Based on the responses obtained, analyses were made by comparing the responses to what literature revealed so that shortcomings could easily be identified.The study revealed that there were several inconsistencies with what was practised by the organisation and what the literature study revealed. Bearing in mind the shortcomings identified in the empirical study, the researcher made the following recommendations. The CRM implementation approach needs to be carefully planned with a clear defined vision and mission statement that focus on customer centredness. The organisation needs to invest in modern and innovative channels of communication and strategic partnership to reach the right customer. The organisation has to develop effective market segmentation and targeting to know the customer well. Consistent and highly relevant customer experiences should be drawn-on to fulfill the organisation’s promise of trust and reliability. The organisation should adopt competitive pricing strategy to limit customer sensitivity on price. The organisation should invest in employees’ development and welfare. Further research can be conducted to investigate the perception of other food retailers on the CRM strategies practiced. Further research can also be conducted in the organisation to investigate the perception of employees and customers on the CRM strategies practised.
- Full Text:
- Date Issued: 2011
- Authors: Felix, Amoah
- Date: 2011
- Subjects: Customer relations , Customer services , Consumer satisfaction , Customer loyalty
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8635 , http://hdl.handle.net/10948/d1008046 , Customer relations , Customer services , Consumer satisfaction , Customer loyalty
- Description: Customer relationship management (CRM) presents a new paradigm shift to the old traditional marketing strategies that are known and practiced by many organisations in South Africa and across the globe. Competition is not an excuse for failure anymore. Organisations that do not have any concrete strategies in dealing with the customer will not survive in the market. The ultimate goal of CRM is to enable organisations to forge closer ties with the customer so that a solid bond can be created to enhance loyalty and satisfaction. The goal for this research was to identify the CRM strategies used by a single organisation and thereafter suggest improvements to enhance customer loyalty. The results of the study could assist the management of the organisation to improve the CRM strategies which will hopefully enhance retention and prevent customer attrition. A literature review was conducted to unveil various elements of CRM, and strategies that can attract and retain customers. It helped in identifying themes for the empirical study. An in-depth interview was conducted with the general manager of the organisation to gauge his perception, and CRM practices in the organisation. An interview guide was used during the interview process. Four main topics namely: implementation of CRM, customer loyalty, customer complaints and conflict, and employees training and motivation were utilised for the interview guide and followed by further probing. Based on the responses obtained, analyses were made by comparing the responses to what literature revealed so that shortcomings could easily be identified.The study revealed that there were several inconsistencies with what was practised by the organisation and what the literature study revealed. Bearing in mind the shortcomings identified in the empirical study, the researcher made the following recommendations. The CRM implementation approach needs to be carefully planned with a clear defined vision and mission statement that focus on customer centredness. The organisation needs to invest in modern and innovative channels of communication and strategic partnership to reach the right customer. The organisation has to develop effective market segmentation and targeting to know the customer well. Consistent and highly relevant customer experiences should be drawn-on to fulfill the organisation’s promise of trust and reliability. The organisation should adopt competitive pricing strategy to limit customer sensitivity on price. The organisation should invest in employees’ development and welfare. Further research can be conducted to investigate the perception of other food retailers on the CRM strategies practiced. Further research can also be conducted in the organisation to investigate the perception of employees and customers on the CRM strategies practised.
- Full Text:
- Date Issued: 2011
Detection and identification of plasmodium species causing malaria in Malawi using rapid diagnostic tests
- Authors: Tegha, Gerald Loiswayo
- Date: 2011
- Subjects: Malaria -- Diagnosis -- Malawi , Plasmodium
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10127 , http://hdl.handle.net/10948/d1021240
- Description: Malaria represents one of the oldest documented diseases among humans and even today organisms in the genus Plasmodium kill more people than any other infectious disease, especially in tropical and subtropical areas. The four most common species which infect humans are Plasmodium falciparum, Plasmodium vivax, Plasmodium ovale and Plasmodium malaria. Of these four species, Plasmodium falciparum and Plasmodium vivax account for 95 percent of infections globally. Microscopy has been used since early days for the diagnosis of malaria because this method is simple, does not require highly equipped facilities, and in most cases enables differentiation among the species causing malaria in humans when performed by skilled microscopy readers. However, this method has been misleading in identifying parasite species, especially in the case of low level parasitemia, a mixed parasite infection, or modification by drug treatment as well as in placental malaria. Malaria rapid diagnostic tests (RDT) have played a major role in malaria management; particularly in providing blood based diagnosis in remote locations where microscopy based diagnosis is unavailable. These diagnostic tests are fast and easy to perform and do not require electricity or specific equipment. As part of strengthening malaria diagnostics in Malawi, the Ministry of Health and Population strongly recommends the use of malaria RDT’s at all levels of the health care delivery system. However, malaria microscopy remains a gold standard test for malaria. All patients (regardless of age) with suspected uncomplicated malaria should have a confirmed diagnosis with malaria RDT before anti-malaria treatment is administered. Based on field performance evaluations that assessed performance, quality control and production capacities of the manufacturing companies of malaria RDT’s, the Ministry of Health and Population recommended two brands of Histidine Rich Protein 2 (HRP-2), RDT’s for use in Malawi. These are SD Bioline malaria Ag Pf and the New Paracheck malaria Ag Pf. All these RDT’s are able to detect only P. falciparum. However, other species have been reported to exist in the country and there is a need to find proper RDT’s which will be able to detect all other species including P. falciparum. The main aim of this study was to evaluate Paramax-3 Pf/Pv/Pan RDT (Zephyr Biomedicals, India), if used in Malawi, could be able to detect and identify the different species of Plasmodium causing malaria in Malawi. The study recruited a total of 250 adult and infants at Bwaila Hospital in Lilongwe, Malawi. Study results showed that the overall sensitivity and specificity of the Paramax-3 RDT used in the study were 100 percent and 83 percent respectively. However, it was observed that the RDT test was not able to identify the P. ovale, and in some cases, the RDT test was positive for P. falciparum when the PCR identified the species as P. ovale. No P. vivax was detected both by RDT and PCR. This study was able to detect and identify the presence of P. malaria and P. ovale in Malawi apart from the P. falciparum. There were no significant differences between microscopy results compared to both the RDT and the PCR, with 94 percent and 98 percent sensitivities of R1 and R2 compared to RDT, as well as 94 percent and 96 percent sensitivities for R1 and R2 compared to PCR respectively. Both R1 and R2 had low specificities for example, R1 had 72 percent and R2 had 80 percent compared to RDT. Comparing R1 and R2 to PCR, the sensitivities were 64.9 percent and 67.2 percent respectively. However, the readers had difficulties differentiating the different species microscopically. The history of anti-malaria treatment had no significant effect on the outcome of the results in both the RDT and PCR.
- Full Text:
- Date Issued: 2011
- Authors: Tegha, Gerald Loiswayo
- Date: 2011
- Subjects: Malaria -- Diagnosis -- Malawi , Plasmodium
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10127 , http://hdl.handle.net/10948/d1021240
- Description: Malaria represents one of the oldest documented diseases among humans and even today organisms in the genus Plasmodium kill more people than any other infectious disease, especially in tropical and subtropical areas. The four most common species which infect humans are Plasmodium falciparum, Plasmodium vivax, Plasmodium ovale and Plasmodium malaria. Of these four species, Plasmodium falciparum and Plasmodium vivax account for 95 percent of infections globally. Microscopy has been used since early days for the diagnosis of malaria because this method is simple, does not require highly equipped facilities, and in most cases enables differentiation among the species causing malaria in humans when performed by skilled microscopy readers. However, this method has been misleading in identifying parasite species, especially in the case of low level parasitemia, a mixed parasite infection, or modification by drug treatment as well as in placental malaria. Malaria rapid diagnostic tests (RDT) have played a major role in malaria management; particularly in providing blood based diagnosis in remote locations where microscopy based diagnosis is unavailable. These diagnostic tests are fast and easy to perform and do not require electricity or specific equipment. As part of strengthening malaria diagnostics in Malawi, the Ministry of Health and Population strongly recommends the use of malaria RDT’s at all levels of the health care delivery system. However, malaria microscopy remains a gold standard test for malaria. All patients (regardless of age) with suspected uncomplicated malaria should have a confirmed diagnosis with malaria RDT before anti-malaria treatment is administered. Based on field performance evaluations that assessed performance, quality control and production capacities of the manufacturing companies of malaria RDT’s, the Ministry of Health and Population recommended two brands of Histidine Rich Protein 2 (HRP-2), RDT’s for use in Malawi. These are SD Bioline malaria Ag Pf and the New Paracheck malaria Ag Pf. All these RDT’s are able to detect only P. falciparum. However, other species have been reported to exist in the country and there is a need to find proper RDT’s which will be able to detect all other species including P. falciparum. The main aim of this study was to evaluate Paramax-3 Pf/Pv/Pan RDT (Zephyr Biomedicals, India), if used in Malawi, could be able to detect and identify the different species of Plasmodium causing malaria in Malawi. The study recruited a total of 250 adult and infants at Bwaila Hospital in Lilongwe, Malawi. Study results showed that the overall sensitivity and specificity of the Paramax-3 RDT used in the study were 100 percent and 83 percent respectively. However, it was observed that the RDT test was not able to identify the P. ovale, and in some cases, the RDT test was positive for P. falciparum when the PCR identified the species as P. ovale. No P. vivax was detected both by RDT and PCR. This study was able to detect and identify the presence of P. malaria and P. ovale in Malawi apart from the P. falciparum. There were no significant differences between microscopy results compared to both the RDT and the PCR, with 94 percent and 98 percent sensitivities of R1 and R2 compared to RDT, as well as 94 percent and 96 percent sensitivities for R1 and R2 compared to PCR respectively. Both R1 and R2 had low specificities for example, R1 had 72 percent and R2 had 80 percent compared to RDT. Comparing R1 and R2 to PCR, the sensitivities were 64.9 percent and 67.2 percent respectively. However, the readers had difficulties differentiating the different species microscopically. The history of anti-malaria treatment had no significant effect on the outcome of the results in both the RDT and PCR.
- Full Text:
- Date Issued: 2011
Distributing intelligence in the wireless control of a mobile robot using a personal digital assistant
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
- Authors: Ophoff, Madri
- Date: 2011
- Subjects: Mobile robots , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9598 , http://hdl.handle.net/10948/1355 , Mobile robots , User interfaces (Computer systems)
- Description: Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
- Full Text:
- Date Issued: 2011
Educating users about information security by means of game play
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
- Authors: Monk, Thomas Philippus
- Date: 2011
- Subjects: Computer security , Educational games -- Design , Computer networks -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9748 , http://hdl.handle.net/10948/1493 , Computer security , Educational games -- Design , Computer networks -- Security measures
- Description: Information is necessary for any business to function. However, if one does not manage one’s information assets properly then one’s business is likely to be at risk. By implementing Information Security controls, procedures, and/or safeguards one can secure information assets against risks. The risks of an organisation can be mitigated if employees implement safety measures. However, employees are often unable to work securely due to a lack of knowledge. This dissertation evaluates the premise that a computer game could be used to educate employees about Information Security. A game was developed with the aim of educating employees in this regard. If people were motivated to play the game, without external motivation from an organisation, then people would also, indirectly, be motivated to learn about Information Security. Therefore, a secondary aim of this game was to be self-motivating. An experiment was conducted in order to test whether or not these aims were met. The experiment was conducted on a play test group and a control group. The play test group played the game before completing a questionnaire that tested the information security knowledge of participants, while the control group simply completed the questionnaire. The two groups’ answers were compared in order to obtain results. This dissertation discusses the research design of the experiment and also provides an analysis of the results. The game design will be discussed which provides guidelines for future game designers to follow. The experiment indicated that the game is motivational, but perhaps not educational enough. However, the results suggest that a computer game can still be used to teach users about Information Security. Factors that involved consequence and repetition contributed towards the educational value of the game, whilst competitiveness and rewards contributed to the motivational aspect of the game.
- Full Text:
- Date Issued: 2011
From desktop to mobile : a framework for function and content transformation
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
Guidelines for the successful integration of ICT in schools in Cameroon
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
- Authors: Nangue, Calvain Raoul
- Date: 2011
- Subjects: Education -- Data processing , Computers and children -- Cameroon
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9756 , http://hdl.handle.net/10948/1311 , Education -- Data processing , Computers and children -- Cameroon
- Description: ICT integration in secondary schools in Sub-Saharan Africa is still at an early stage and already faces several setbacks that may undermine the various initiatives undertaken by governments and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no guidelines for proper ICT adoption in secondary schools exist; and furthermore, most integration cases were done haphazardly with no systematic approach based on the existing frameworks or tailored towards the real context in the schools concerned. The present study aimed to provide guidelines for the successful integration of ICT into schools in Cameroon. A review of some existing frameworks for ICT integrations in schools, as well as the innovative pathways that some developing countries have taken to ensure the successful integration of ICT into schools were explored through a literature review, revealing the trends and challenges of ICT integration in schools in Sub-Saharan Africa. The current status of ICT in schools in Cameroon being at an introductory stage was established from the available literature. This led to the use of a single case study from the Western Region of Cameroon, where four secondary schools were selected from the most advanced schools in terms of ICT integration. Participants consisting of principals, ICT co-ordinators, teachers, and students were interviewed, in order to establish the current status of ICT in each school, as well as those factors affecting or promoting the adoption of ICT. Teachers’ and students’ surveys, as well as existing documentation were used to triangulate the data gathered from interviews with school principals and ICT co-ordinators. Data were descriptively analysed – and the findings revealed that ICT is at the introductory stage of integration in the Fluck’s Model of ICT development in schools. At school level, the lack of infrastructure and an ICT adoption plan were found to be the key opposing factors to ICT integration, whereas several enablers were identified, such as the positive attitude of teachers towards ICT, the existence of a minimum recurring budget for ICT adoption through parents’ funding, as well as the continually decreasing cost of ICT infrastructure in the market. Based on the findings and experiences from successfully proven projects, a set of guidelines were derived for schools’ decision-makers. It is critical to put in place a well-structured policy for ICT in the school and to recognise all the ICT-related costs.
- Full Text:
- Date Issued: 2011
Hydrogen economy : MEA manufacturing for PEM electrolysers
- Authors: Gojela, Ntombekaya
- Date: 2011
- Subjects: Water -- Electrolysis , Hydrogen
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10380 , http://hdl.handle.net/10948/1483 , Water -- Electrolysis , Hydrogen
- Description: The electrolysis of water was evaluated as a potentially efficient, as a low cost means of hydrogen production. The theoretical energy, voltage, current, and energy efficiencies of water electrolysis were considered by using various catalyst materials used in the fabrication of membrane electrode assemblies used in low temperature water electrolysis systems. Traditionally, iridium based catalysts have shown to be the most suitable material for its use on electrocatalysis of water to form hydrogen. This study showed that a combination of various elements as a binary and or ternary mixture in the base catalyst that was applied to the anode and cathode by using the Adam’s method had shown to give comparatively good results to that of using iridium oxide on its own. These catalysts were characterized by cyclic voltammetry, at different temperatures (30oC-80oC) with a range of catalyst loading of 0.2-0.5 mg.cm-2 noble metals. The study showed that the Ir40Co40 mixture as an anode catalyst was found to show highest hydrogen efficiency of 73 percent with a relatively low over potential of 0.925V at higher temperature of 80oC. The mixture also showed to give the best electrocatalytic activity with a low Tafel slope of 30.1mV.dec-1. Whereas the Ir50Pt50 showed a comparatively lower hydrogen efficiency of 65 percent with a lower over potential of 0.6V at 50oC. Ternary mixed oxide of Ir20Ru40Co40 showed an even lower over potential of 0.5- 0.6V over a large range of temperatures with a low hydrogen efficiency of 44 percent but gave good electrocatalytic activity in terms of the Tafel slope analysis. On the other hand, mixtures with relatively cheaper material such as Nickel in binary mixture systems such as Pt50Ni50 as cathode catalyst was found to show promising performance of a relatively low over potential that was less than 1.4 V with a low hydrogen efficiency of 62.1 percent Ternary cathode catalyst materials such as Pt33Ni33Co33 exhibited good performance with higher hydrogen efficiency of 65.2 percent at lower over potential of 1.2 V and a higher Tafel slope of 133.9 mV.dec-1 at 80 0C.
- Full Text:
- Date Issued: 2011
- Authors: Gojela, Ntombekaya
- Date: 2011
- Subjects: Water -- Electrolysis , Hydrogen
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:10380 , http://hdl.handle.net/10948/1483 , Water -- Electrolysis , Hydrogen
- Description: The electrolysis of water was evaluated as a potentially efficient, as a low cost means of hydrogen production. The theoretical energy, voltage, current, and energy efficiencies of water electrolysis were considered by using various catalyst materials used in the fabrication of membrane electrode assemblies used in low temperature water electrolysis systems. Traditionally, iridium based catalysts have shown to be the most suitable material for its use on electrocatalysis of water to form hydrogen. This study showed that a combination of various elements as a binary and or ternary mixture in the base catalyst that was applied to the anode and cathode by using the Adam’s method had shown to give comparatively good results to that of using iridium oxide on its own. These catalysts were characterized by cyclic voltammetry, at different temperatures (30oC-80oC) with a range of catalyst loading of 0.2-0.5 mg.cm-2 noble metals. The study showed that the Ir40Co40 mixture as an anode catalyst was found to show highest hydrogen efficiency of 73 percent with a relatively low over potential of 0.925V at higher temperature of 80oC. The mixture also showed to give the best electrocatalytic activity with a low Tafel slope of 30.1mV.dec-1. Whereas the Ir50Pt50 showed a comparatively lower hydrogen efficiency of 65 percent with a lower over potential of 0.6V at 50oC. Ternary mixed oxide of Ir20Ru40Co40 showed an even lower over potential of 0.5- 0.6V over a large range of temperatures with a low hydrogen efficiency of 44 percent but gave good electrocatalytic activity in terms of the Tafel slope analysis. On the other hand, mixtures with relatively cheaper material such as Nickel in binary mixture systems such as Pt50Ni50 as cathode catalyst was found to show promising performance of a relatively low over potential that was less than 1.4 V with a low hydrogen efficiency of 62.1 percent Ternary cathode catalyst materials such as Pt33Ni33Co33 exhibited good performance with higher hydrogen efficiency of 65.2 percent at lower over potential of 1.2 V and a higher Tafel slope of 133.9 mV.dec-1 at 80 0C.
- Full Text:
- Date Issued: 2011
Internal auditors perceptions of the impact of control elements on internal control systems
- Authors: Ackerman, Christo
- Date: 2011
- Subjects: Auditing, Internal , Financial statements , Controllership
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8952 , http://hdl.handle.net/10948/d1008158 , Auditing, Internal , Financial statements , Controllership
- Description: The objective of this research report was to determine which internal controls are perceived, by internal auditors, to be contributing to the effectiveness of an internal control structure. The Committee for Sponsoring Organisations (COSO) integrated internal control framework was used as a basis for the questionnaire construction and respondents were asked to rate the perceived control effectiveness of each of the components of internal control. Descriptive statistics were used to analyse the basic meaning of the data. The questionnaire was completed by following a Uniform Resource Locator (URL) which was sent to two internal auditors in audit firms. Thirty one responses were obtained; all the respondents have experience in the evaluation and assessment of internal control systems. This research showed that control elements as outlined in COSOs integrated internal control framework, if implemented, could contribute to the effectiveness of the internal control system.
- Full Text:
- Date Issued: 2011
- Authors: Ackerman, Christo
- Date: 2011
- Subjects: Auditing, Internal , Financial statements , Controllership
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8952 , http://hdl.handle.net/10948/d1008158 , Auditing, Internal , Financial statements , Controllership
- Description: The objective of this research report was to determine which internal controls are perceived, by internal auditors, to be contributing to the effectiveness of an internal control structure. The Committee for Sponsoring Organisations (COSO) integrated internal control framework was used as a basis for the questionnaire construction and respondents were asked to rate the perceived control effectiveness of each of the components of internal control. Descriptive statistics were used to analyse the basic meaning of the data. The questionnaire was completed by following a Uniform Resource Locator (URL) which was sent to two internal auditors in audit firms. Thirty one responses were obtained; all the respondents have experience in the evaluation and assessment of internal control systems. This research showed that control elements as outlined in COSOs integrated internal control framework, if implemented, could contribute to the effectiveness of the internal control system.
- Full Text:
- Date Issued: 2011
Motivations of international trophy hunters choosing to hunt in South Africa
- Authors: Mulder, Attilia Cesira
- Date: 2011
- Subjects: Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9360 , http://hdl.handle.net/10948/1328 , Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Description: In travel research, it is generally accepted that push factors are the motivations that prompt an individual to travel, and pull factors are those by which the individual is enticed by the attractiveness of the destination, once the decision to travel has been made. Having this been said, this research examined the motivations of international trophy hunters and why they chose to hunt in South Africa. The empirical data were collected by means of a postal survey. Two thousand self-administered questionnaires were distributed to overseas hunters who had previously visited South Africa to participate in a hunting safari. One hundred and ninety one questionnaires were suitable for the data analysis. Results of the principal component factor analysis yielded six push motivational dimensions that influenced an individual to participate in trophy hunting, and three pull motivational dimensions that encouraged hunters to hunt in South Africa. Multivariate analyses (MANOVA) were conducted to examine differences between the push and pull factors across various socio-demographic characteristics. Where differences in the MANOVA were found, additional analyses were conducted to examine differences between push and pull factors on the socio-demographic subgroups. Pearson's correlation coefficient was used to measure the degree of interrelationships among push and pull factors for socio-demographic factors. To address the objectives of the current study, five postulations were formulated. The first postulation revealed that personal, psychological needs and values, such as status, family, social interaction, exercise and challenge, were the main factors that push individuals to participate in trophy hunting. Postulation 2 indicated that a number of factors pull overseas hunters to hunt in South Africa namely, nature/scenery, fantasy and information sources - particularly recommendations by other hunters. The third postulation was confirmed namely that country of residence, age, gender, occupation and income have an influence on push and pull factors of motivation. Postulation 4 partly confirmed that a positive relationship exists between a number of push and pull factors of motivation. Lastly, postulation 5 verified that socio-demographics do have an influence on the relationship between push and pull factors of motivation. Results of the study thus provide destination/tourism/marketing managers and/or professionals within the hunting industry with a better understanding of hunters' travel motivation and behavior.
- Full Text:
- Date Issued: 2011
- Authors: Mulder, Attilia Cesira
- Date: 2011
- Subjects: Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9360 , http://hdl.handle.net/10948/1328 , Hunting trophies -- South Africa , Hunting -- South Africa , Travelers
- Description: In travel research, it is generally accepted that push factors are the motivations that prompt an individual to travel, and pull factors are those by which the individual is enticed by the attractiveness of the destination, once the decision to travel has been made. Having this been said, this research examined the motivations of international trophy hunters and why they chose to hunt in South Africa. The empirical data were collected by means of a postal survey. Two thousand self-administered questionnaires were distributed to overseas hunters who had previously visited South Africa to participate in a hunting safari. One hundred and ninety one questionnaires were suitable for the data analysis. Results of the principal component factor analysis yielded six push motivational dimensions that influenced an individual to participate in trophy hunting, and three pull motivational dimensions that encouraged hunters to hunt in South Africa. Multivariate analyses (MANOVA) were conducted to examine differences between the push and pull factors across various socio-demographic characteristics. Where differences in the MANOVA were found, additional analyses were conducted to examine differences between push and pull factors on the socio-demographic subgroups. Pearson's correlation coefficient was used to measure the degree of interrelationships among push and pull factors for socio-demographic factors. To address the objectives of the current study, five postulations were formulated. The first postulation revealed that personal, psychological needs and values, such as status, family, social interaction, exercise and challenge, were the main factors that push individuals to participate in trophy hunting. Postulation 2 indicated that a number of factors pull overseas hunters to hunt in South Africa namely, nature/scenery, fantasy and information sources - particularly recommendations by other hunters. The third postulation was confirmed namely that country of residence, age, gender, occupation and income have an influence on push and pull factors of motivation. Postulation 4 partly confirmed that a positive relationship exists between a number of push and pull factors of motivation. Lastly, postulation 5 verified that socio-demographics do have an influence on the relationship between push and pull factors of motivation. Results of the study thus provide destination/tourism/marketing managers and/or professionals within the hunting industry with a better understanding of hunters' travel motivation and behavior.
- Full Text:
- Date Issued: 2011
Oorsaaipraktyke en vestiging van eenjarige raaigras in lusernweiding
- Authors: Badenhorst, Daniël
- Date: 2011
- Subjects: Alfalfa Alfalfa -- Irrigation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/11792 , vital:26969
- Description: Die Eden- en Overbergdistrik in die Suid-Kaap vorm die mees suidelike substreke van die winterreëngebied. Dit is geleë tussen 33° 45‟ en 34° 50‟ suiderbreedte en tussen 19° 0‟ en 23° 45‟ oosterlengte. Die westelike grens van die substreek word gevorm deur die Villiersdorp-Botrivier-gebied. Aan die noordekant word die substreek begrens deur die Sonderend-, Lange- en Outeniquabergreekse. Die oostelike grens word gevorm deur die Bloukransrivier. Die Indiese Oseaankuslyn vanaf Nature‟s Valley in die ooste tot by Kleinmond in die weste vorm die suidelike grens. In die Suidkusstreek word 54.5% van die Wes-Kaapse melkproduksie en 24% van Suid-Afrika se melkproduksie deur 1900 melkprodusente geproduseer (Dowrey 2005). Ses en dertig persent van die bruto jaarlikse veeproduk is afkomstig vanaf suiwelprodukte wat hoofsaaklik vanaf aangeplante weiding geproduseer word. Aangeplante weiding beslaan 37.7% van die totale oppervlakte van die vee- en saaigebiede van die Suidkusstreek (Botha 2003). Weens beperkte, skaars besproeiingswater in groot dele van die Suid-Kaap, word heelwat weiding slegs aanvullend besproei (Protopapas 2004). Voervloeiprogramme vir melkproduksie onder aanvullende besproeiing bestaan hoofsaaklik uit kikoejoe (Pennisetum clandestinum) en lusern (Medicago sativa) (Botha 2003). Die droëmateriaalproduksie en weikapasiteit van lusern volg, soos kikoejoe, „n baie sterk seisoenale tendens met „n piek in die somer / herfs en „n laagtepunt in die winter (Durand 1993; Botha 1998; Botha 2003). Voervloeiprogramme met lusern of kikoejoe as hoofkomponente het gewoonlik voertekorte gedurende die winter tot gevolg. Hoofsaaklik om dié rede het boere uit die lusernproduserende gebiede van Heidelberg, Riversdal, Herbertsdale en Mosselbaai, deur hul onderskeie boereverenigings, „n versoek aan Outeniqua Navorsingsplaas gerig om ondersoek in te stel na moontlike oorsaaipraktyke wat die droëmateriaalproduksie van lusernstelsels gedurende die winter kan verhoog. Kikoejoeweiding word reeds die afgelope aantal jare suksesvol met Westerworldsraaigrasse oorgesaai vir beter herfs-, winter- en lenteproduksie. Anders as by kikoejoeweidings bestaan daar huidiglik geen beproefde oorsaaipraktyke wat die produksiepotensiaal van lusern in die winter en vroeë lente kan verhoog nie (Anoniem 2002).
- Full Text:
- Date Issued: 2011
- Authors: Badenhorst, Daniël
- Date: 2011
- Subjects: Alfalfa Alfalfa -- Irrigation
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/11792 , vital:26969
- Description: Die Eden- en Overbergdistrik in die Suid-Kaap vorm die mees suidelike substreke van die winterreëngebied. Dit is geleë tussen 33° 45‟ en 34° 50‟ suiderbreedte en tussen 19° 0‟ en 23° 45‟ oosterlengte. Die westelike grens van die substreek word gevorm deur die Villiersdorp-Botrivier-gebied. Aan die noordekant word die substreek begrens deur die Sonderend-, Lange- en Outeniquabergreekse. Die oostelike grens word gevorm deur die Bloukransrivier. Die Indiese Oseaankuslyn vanaf Nature‟s Valley in die ooste tot by Kleinmond in die weste vorm die suidelike grens. In die Suidkusstreek word 54.5% van die Wes-Kaapse melkproduksie en 24% van Suid-Afrika se melkproduksie deur 1900 melkprodusente geproduseer (Dowrey 2005). Ses en dertig persent van die bruto jaarlikse veeproduk is afkomstig vanaf suiwelprodukte wat hoofsaaklik vanaf aangeplante weiding geproduseer word. Aangeplante weiding beslaan 37.7% van die totale oppervlakte van die vee- en saaigebiede van die Suidkusstreek (Botha 2003). Weens beperkte, skaars besproeiingswater in groot dele van die Suid-Kaap, word heelwat weiding slegs aanvullend besproei (Protopapas 2004). Voervloeiprogramme vir melkproduksie onder aanvullende besproeiing bestaan hoofsaaklik uit kikoejoe (Pennisetum clandestinum) en lusern (Medicago sativa) (Botha 2003). Die droëmateriaalproduksie en weikapasiteit van lusern volg, soos kikoejoe, „n baie sterk seisoenale tendens met „n piek in die somer / herfs en „n laagtepunt in die winter (Durand 1993; Botha 1998; Botha 2003). Voervloeiprogramme met lusern of kikoejoe as hoofkomponente het gewoonlik voertekorte gedurende die winter tot gevolg. Hoofsaaklik om dié rede het boere uit die lusernproduserende gebiede van Heidelberg, Riversdal, Herbertsdale en Mosselbaai, deur hul onderskeie boereverenigings, „n versoek aan Outeniqua Navorsingsplaas gerig om ondersoek in te stel na moontlike oorsaaipraktyke wat die droëmateriaalproduksie van lusernstelsels gedurende die winter kan verhoog. Kikoejoeweiding word reeds die afgelope aantal jare suksesvol met Westerworldsraaigrasse oorgesaai vir beter herfs-, winter- en lenteproduksie. Anders as by kikoejoeweidings bestaan daar huidiglik geen beproefde oorsaaipraktyke wat die produksiepotensiaal van lusern in die winter en vroeë lente kan verhoog nie (Anoniem 2002).
- Full Text:
- Date Issued: 2011
Retention and dropout rates for a sample of national higher certificate students in the school of accounting
- Authors: Beck, Richard Alan
- Date: 2011
- Subjects: College dropouts -- South Africa , Learning ability , Education, Higher -- South Africa , Accounting -- Study and teaching
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8971 , http://hdl.handle.net/10948/1408 , College dropouts -- South Africa , Learning ability , Education, Higher -- South Africa , Accounting -- Study and teaching
- Description: Higher Education retention rates in South Africa are among the lowest in the world. At the Nelson Mandela Metropolitan University, a trend has been noted for National Higher Certificate (NHC) students within the Faculty of Business and Economic Science’s School of Accounting. Dropout rates have increased and graduation rates have declined for students studying NHC programmes. Retention and dropout studies have rarely been undertaken for accounting students in higher certificate or diploma programmes, which provided the motivation for this study. The study aimed to determine the dropout and retention rates of NHC students and to identify the demographic and other characteristics of dropout students relative to those who persist with their studies. Furthermore, the study identified potential barriers to academic success in the sample. An exploratory descriptive research approach was adopted to achieve the general and specific aims of the study. Data were obtained from Management Information Services about NHC dropout students and students continuing with their studies for the period 2005 to 2009. Furthermore, information was gathered for separate samples from a Language Questionnaire and the Learning Enhancement Checklist (LEC) regarding barriers to student success. High dropout rates were found in that more than half of the students dropped out. Correspondingly, the retention rates were low. The findings for the gender, cultural and language groups were interesting but no definitive conclusions could be reached regarding trends related to student dropout and retention in relation to these biographical variables. Performance in Financial Accounting I and II yielded interesting trends. Students at risk for dropping out obtained a mark of 50 percent or less on average for Financial Accounting I and 40 percent or less for Financial Accounting II. The analysis conducted to determine barriers to student success revealed that students did not prepare adequately for lectures; experienced certain difficulties in lectures, tests and VIII exams; found it difficult to manage their studies and time; and experienced financial and psychological problems. The findings of the study can be used to identify students who might drop out at an early stage. Furthermore, the findings can guide the nature of the development and support that NHC students need to succeed. The limitations of the study are noted and suggestions are made for further research into the factors related to student dropout and retention in the field of accounting.
- Full Text:
- Date Issued: 2011
- Authors: Beck, Richard Alan
- Date: 2011
- Subjects: College dropouts -- South Africa , Learning ability , Education, Higher -- South Africa , Accounting -- Study and teaching
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8971 , http://hdl.handle.net/10948/1408 , College dropouts -- South Africa , Learning ability , Education, Higher -- South Africa , Accounting -- Study and teaching
- Description: Higher Education retention rates in South Africa are among the lowest in the world. At the Nelson Mandela Metropolitan University, a trend has been noted for National Higher Certificate (NHC) students within the Faculty of Business and Economic Science’s School of Accounting. Dropout rates have increased and graduation rates have declined for students studying NHC programmes. Retention and dropout studies have rarely been undertaken for accounting students in higher certificate or diploma programmes, which provided the motivation for this study. The study aimed to determine the dropout and retention rates of NHC students and to identify the demographic and other characteristics of dropout students relative to those who persist with their studies. Furthermore, the study identified potential barriers to academic success in the sample. An exploratory descriptive research approach was adopted to achieve the general and specific aims of the study. Data were obtained from Management Information Services about NHC dropout students and students continuing with their studies for the period 2005 to 2009. Furthermore, information was gathered for separate samples from a Language Questionnaire and the Learning Enhancement Checklist (LEC) regarding barriers to student success. High dropout rates were found in that more than half of the students dropped out. Correspondingly, the retention rates were low. The findings for the gender, cultural and language groups were interesting but no definitive conclusions could be reached regarding trends related to student dropout and retention in relation to these biographical variables. Performance in Financial Accounting I and II yielded interesting trends. Students at risk for dropping out obtained a mark of 50 percent or less on average for Financial Accounting I and 40 percent or less for Financial Accounting II. The analysis conducted to determine barriers to student success revealed that students did not prepare adequately for lectures; experienced certain difficulties in lectures, tests and VIII exams; found it difficult to manage their studies and time; and experienced financial and psychological problems. The findings of the study can be used to identify students who might drop out at an early stage. Furthermore, the findings can guide the nature of the development and support that NHC students need to succeed. The limitations of the study are noted and suggestions are made for further research into the factors related to student dropout and retention in the field of accounting.
- Full Text:
- Date Issued: 2011
Reviewing medium: paint as flesh
- Authors: Fuller, Michele
- Date: 2011
- Subjects: Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8532 , http://hdl.handle.net/10948/d1008590 , Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Description: The research question explored in this exhibition and dissertation was to review the conventional notions of craftsmanship and the use of the specific medium of oil paint with reference to the art of Rembrandt and Damien Hirst. The subject matter is flesh. This study foregrounds the involvement and acknowledgment of the corporeal body, the hand of the artist, and of the organic material reality of our existence and the objects that surround us. The paintings reflect a series of interventions that resulted in abstracted images based on photographs of meat. Once a detail had emerged that emphasised the fleshiness of the selected image, it was printed by a professional printing company. These details were then translated into oil paintings. What is explored is the specific material qualities of the binding mediums traditionally associated with the use of oil painting to create expressive paintings. In the creation of the series of paintings, I prepared binding mediums consisting of wax, stand oil, damar varnish, zel-ken liquin and acrylic paste medium mixed with manufactured readymade oil paints. Consequently the choice and exploration of the material possibilities of a specific medium becomes content, using art to explore the idea of art. Paint becomes flesh-like, having congealed over the surface of the technical support. These paintings propose an internal and an external reality simultaneously referenced through the flesh-like surface, pierced and cut to reveal multiple layers created on the supporting structure (wood and canvas) with the use of a specific medium, oil paint, combined with a variety of other binding mediums. The edges of the unframed paintings play an important role assuming a specific physical presence, enabling them to define themselves as boundaries, both of the paintings particular field of forces and of the viewer’s aesthetic experience. They are no longer edges or frames in the conventional sense, but become other surfaces that are of equal significance in the reading or viewing of the work. Finally, the notion of an exhibition site being neutral or given is contested and, as a result, the contemporary artist needs to be mindful of site specificity in relation to the exhibition of the artworks. This series of paintings is intended to communicate as a body of work, reflecting an individual vision: a recurring, introspective process that is always unfolding. The body is constantly recreated by each individual viewer, and the context or site of display. The artist’s intention is to activate the viewer’s heightened awareness and response to the conscious arrangement of the collection of canvases, as each one represents a fragment or detail of a flayed carcass.
- Full Text:
- Date Issued: 2011
- Authors: Fuller, Michele
- Date: 2011
- Subjects: Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:8532 , http://hdl.handle.net/10948/d1008590 , Figure painting -- Exhibitions , Human figure in art -- Exhibitions , Anatomy, Artistic -- Exhibitions , Cadaver in art -- Exhibitions
- Description: The research question explored in this exhibition and dissertation was to review the conventional notions of craftsmanship and the use of the specific medium of oil paint with reference to the art of Rembrandt and Damien Hirst. The subject matter is flesh. This study foregrounds the involvement and acknowledgment of the corporeal body, the hand of the artist, and of the organic material reality of our existence and the objects that surround us. The paintings reflect a series of interventions that resulted in abstracted images based on photographs of meat. Once a detail had emerged that emphasised the fleshiness of the selected image, it was printed by a professional printing company. These details were then translated into oil paintings. What is explored is the specific material qualities of the binding mediums traditionally associated with the use of oil painting to create expressive paintings. In the creation of the series of paintings, I prepared binding mediums consisting of wax, stand oil, damar varnish, zel-ken liquin and acrylic paste medium mixed with manufactured readymade oil paints. Consequently the choice and exploration of the material possibilities of a specific medium becomes content, using art to explore the idea of art. Paint becomes flesh-like, having congealed over the surface of the technical support. These paintings propose an internal and an external reality simultaneously referenced through the flesh-like surface, pierced and cut to reveal multiple layers created on the supporting structure (wood and canvas) with the use of a specific medium, oil paint, combined with a variety of other binding mediums. The edges of the unframed paintings play an important role assuming a specific physical presence, enabling them to define themselves as boundaries, both of the paintings particular field of forces and of the viewer’s aesthetic experience. They are no longer edges or frames in the conventional sense, but become other surfaces that are of equal significance in the reading or viewing of the work. Finally, the notion of an exhibition site being neutral or given is contested and, as a result, the contemporary artist needs to be mindful of site specificity in relation to the exhibition of the artworks. This series of paintings is intended to communicate as a body of work, reflecting an individual vision: a recurring, introspective process that is always unfolding. The body is constantly recreated by each individual viewer, and the context or site of display. The artist’s intention is to activate the viewer’s heightened awareness and response to the conscious arrangement of the collection of canvases, as each one represents a fragment or detail of a flayed carcass.
- Full Text:
- Date Issued: 2011
Social media use among NMMU students
- Authors: Mohamed, Hassan
- Date: 2011
- Subjects: Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9274 , http://hdl.handle.net/10948/1636 , Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Description: This research provides insight into the use of social networks and social media by students at the Nelson Mandela Metropolitan University. The primary purpose of this research is to investigate student social media practices at NMMU to establish the reasons for students engaging in social media. A growing number of educators acknowledge the potential of social networking to (re)engage learners with their studies, while others fear that such practices compromise and disrupt student engagement with traditional education provision (Selwyn, 2009). This study, therefore, aims to identify how and for what reasons students use social networks and social media. This study attempts to provide answers to the following research questions: For which social networking sites do students register and actively engage in? What is the most popular social networking site for students? How often do students engage in social media practices? What is the main purpose for students engaging in social media practices? How do students gain access to social media? For what educational purposes can social media be used? For which business purposes can social media be used? Do students use social media to collaborate with peers and lecturers? Do students use social media to make buying decisions? The literature overview was conducted on social media and social networks from journals and books published between the periods 2003 to 2011 as the popularity of social media came to the forefront during this period. Topics researched included social networks and libraries, educational and business uses of social networking and social media. A quantitative study was considered to be most appropriate to conduct the research for this study; and non-probability sampling was the most appropriate given the size of the population and the nature of this research. xiv Students were invited to participate in the research by completing and submitting a survey questionnaire at the conclusion of their lectures in the second semester during the month of September. The data collected was then analysed using descriptive and inferential statistics to provide insight into student use of social media. The results would determine if relationships exist between the independent variables from the questionnaire, namely, age, gender, campus and course enrolment and the dependent factors, namely, usage, information exchange and security. This relationship would be determined for both the perceptions of social networking in general and the perceptions of NMMU social networking. These results are then used to identify further areas of research in the future. The majority of the population sample was between the ages of 17 and 21 and primarily females. The sample typically became aware of social media by means of word-of-mouth and accesses their social networking site/s more than five times a day. The main reason for registering and joining social networking sites was for social purposes. Furthermore, the sample used social networking sites for entertainment, social involvement, meeting new friends and maintaining relationships. The sample agreed that social networking makes information searching easier. The majority of the sample indicated that they were not registered on any NMMU Social Networking sites of the university or any faculty, department or unit social networking sites at the NMMU. However, it was clear that the majority of students was registered on social networking sites of some sort and would continue to use social networking and social media. The results from the study indicated that the mean value for the perceptions of social media in general were greater than that of the perceptions of NMMU social media in terms of usage. Likewise, the mean value for the perceptions of social networking in general was also greater than that of the perceptions of NMMU Social Networking for information exchange but the difference were very small. However, the mean value for the perceptions of NMMU Social Networking showed a greater mean value than that of the perceptions of social networking in general in terms of security. This means that respondents used social networking in general more than NMMU Social Networking. xv However, the respondents perceived NMMU Social Networking sites to be more secure than social networking sites in general. The results of this study could provide Higher Education Institutions in South Africa with the impetus to use social networks and social media to enhance students‟ learning experiences.
- Full Text:
- Date Issued: 2011
- Authors: Mohamed, Hassan
- Date: 2011
- Subjects: Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9274 , http://hdl.handle.net/10948/1636 , Nelson Mandela Metropolitan University , Social media -- South Africa -- Port Elizabeth , Online social networks -- South Africa -- Port Elizabeth , Social networks -- Computer network resources , College students -- Social networks -- South Africa -- Port Elizabeth , Universities and colleges -- South Africa -- Port Elizabeth
- Description: This research provides insight into the use of social networks and social media by students at the Nelson Mandela Metropolitan University. The primary purpose of this research is to investigate student social media practices at NMMU to establish the reasons for students engaging in social media. A growing number of educators acknowledge the potential of social networking to (re)engage learners with their studies, while others fear that such practices compromise and disrupt student engagement with traditional education provision (Selwyn, 2009). This study, therefore, aims to identify how and for what reasons students use social networks and social media. This study attempts to provide answers to the following research questions: For which social networking sites do students register and actively engage in? What is the most popular social networking site for students? How often do students engage in social media practices? What is the main purpose for students engaging in social media practices? How do students gain access to social media? For what educational purposes can social media be used? For which business purposes can social media be used? Do students use social media to collaborate with peers and lecturers? Do students use social media to make buying decisions? The literature overview was conducted on social media and social networks from journals and books published between the periods 2003 to 2011 as the popularity of social media came to the forefront during this period. Topics researched included social networks and libraries, educational and business uses of social networking and social media. A quantitative study was considered to be most appropriate to conduct the research for this study; and non-probability sampling was the most appropriate given the size of the population and the nature of this research. xiv Students were invited to participate in the research by completing and submitting a survey questionnaire at the conclusion of their lectures in the second semester during the month of September. The data collected was then analysed using descriptive and inferential statistics to provide insight into student use of social media. The results would determine if relationships exist between the independent variables from the questionnaire, namely, age, gender, campus and course enrolment and the dependent factors, namely, usage, information exchange and security. This relationship would be determined for both the perceptions of social networking in general and the perceptions of NMMU social networking. These results are then used to identify further areas of research in the future. The majority of the population sample was between the ages of 17 and 21 and primarily females. The sample typically became aware of social media by means of word-of-mouth and accesses their social networking site/s more than five times a day. The main reason for registering and joining social networking sites was for social purposes. Furthermore, the sample used social networking sites for entertainment, social involvement, meeting new friends and maintaining relationships. The sample agreed that social networking makes information searching easier. The majority of the sample indicated that they were not registered on any NMMU Social Networking sites of the university or any faculty, department or unit social networking sites at the NMMU. However, it was clear that the majority of students was registered on social networking sites of some sort and would continue to use social networking and social media. The results from the study indicated that the mean value for the perceptions of social media in general were greater than that of the perceptions of NMMU social media in terms of usage. Likewise, the mean value for the perceptions of social networking in general was also greater than that of the perceptions of NMMU Social Networking for information exchange but the difference were very small. However, the mean value for the perceptions of NMMU Social Networking showed a greater mean value than that of the perceptions of social networking in general in terms of security. This means that respondents used social networking in general more than NMMU Social Networking. xv However, the respondents perceived NMMU Social Networking sites to be more secure than social networking sites in general. The results of this study could provide Higher Education Institutions in South Africa with the impetus to use social networks and social media to enhance students‟ learning experiences.
- Full Text:
- Date Issued: 2011