A critical analysis of the South African turnover tax system
- Authors: Chiromo, Samuel John
- Date: 2020
- Subjects: Small business -- Taxation -- South Africa , Small business -- South Africa -- Finance , Turnover tax -- South Africa , Government aid to small business -- South Africa , Tax incentives -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/166103 , vital:41329
- Description: The objective of the turnover tax system is to reduce the administrative burden on micro businesses and to contribute positively to boosting these businesses and the economic growth of South Africa. The over-arching goal of this research was to analyse the South African turnover tax to investigate to what extent the turnover tax system complies with generally accepted principles of a good tax system. The research was conducted within an interpretative post-positivism paradigm, applied a qualitative research methodology, and a doctrinal research method. A detailed review of the literature was conducted to establish the nature of South African turnover tax system and the extent of its compliance with generally accepted principles of a good tax system. The literature review included an in-depth analysis of the South African turnover tax system, an in-depth analysis of generally accepted principles of a good tax system, and an investigation of the extent to which turnover tax system complies with various elements of the principles of a good tax system. It was found in this study that the turnover tax system does not comply with certain of the elements of generally accepted principles of a good tax system and the study proposed several recommendations for the improvement of the turnover tax system. These recommendations include the establishment of training initiatives for micro business owners, reviewing the regulations pertaining to turnover tax and providing digital administration of turnover tax.
- Full Text:
- Date Issued: 2020
- Authors: Chiromo, Samuel John
- Date: 2020
- Subjects: Small business -- Taxation -- South Africa , Small business -- South Africa -- Finance , Turnover tax -- South Africa , Government aid to small business -- South Africa , Tax incentives -- South Africa
- Language: English
- Type: text , Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10962/166103 , vital:41329
- Description: The objective of the turnover tax system is to reduce the administrative burden on micro businesses and to contribute positively to boosting these businesses and the economic growth of South Africa. The over-arching goal of this research was to analyse the South African turnover tax to investigate to what extent the turnover tax system complies with generally accepted principles of a good tax system. The research was conducted within an interpretative post-positivism paradigm, applied a qualitative research methodology, and a doctrinal research method. A detailed review of the literature was conducted to establish the nature of South African turnover tax system and the extent of its compliance with generally accepted principles of a good tax system. The literature review included an in-depth analysis of the South African turnover tax system, an in-depth analysis of generally accepted principles of a good tax system, and an investigation of the extent to which turnover tax system complies with various elements of the principles of a good tax system. It was found in this study that the turnover tax system does not comply with certain of the elements of generally accepted principles of a good tax system and the study proposed several recommendations for the improvement of the turnover tax system. These recommendations include the establishment of training initiatives for micro business owners, reviewing the regulations pertaining to turnover tax and providing digital administration of turnover tax.
- Full Text:
- Date Issued: 2020
A critical appraisal of Saule’s portrayal of women as Amadelakufa (resilient)
- Authors: Molubo, Rendani
- Date: 2020
- Subjects: Women in literature , Feminism -- Africa , Saule, N -- Vuleka Mhlaba , Saule, N -- Inkululeko Isentabeni , Saule, N -- Libambe Lingatshoni , Xhosa fiction -- History and criticism
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/143982 , vital:38300
- Description: This study seeks to explore how Professor Ncedile Saule’s works Vuleka Mhlaba (2006), Inkululeko Isentabeni (2010) and Libambe Lingatshoni (2017), depict female characters to reveal the inner resilience women embody. It is important to portray females as bold, intelligent and courageous beings as African women are subjected to major patriarchal myths. South Africa prides itself with a progressive Constitution and Bill of Rights that speaks of gender equality and the liberation of all persons. However, in practice women still live under patriarchal bondages and their efforts are side-lined, thus, the essentiality of writings that contributes towards the empowerment of women through displaying their resilience. Women in literature are mostly depicted as subordinate, submissive and emotional. At times they are portrayed as victims. They are very seldom portrayed as heroes or independent beings. They are constantly placed behind a man instead of in front of a man. This research aims to display women as heroes in their own capacity, without having to be dimmed by a man. The researcher decided to utilise writings of a male author so as to provide a different perspective from the norm that most male authors are known to write about in issues pertaining female characters. This is also deliberately done to encourage more male writers to change the mythical narration about women and start admiring their contributions without having them shadow any man. The projection of female resilience through the gaze of a male author gives hope that there are men who see and admire women’s efforts. It also indicates that men realise now that African feminisms are not against men and instead advocate for equality between men and women and recognise the greatness that could come out of a partnership between the two genders. Women’s behaviour and characteristics are mostly socially constructed, hence the need to exhibit the boldness that black women possess, instead of them only being utilised as nurturing sources and household caretakers. One of the purposes of this research study is to illustrate the resilience that women possess and analyse the forms of torment that women in Saule’s chosen novels have experienced and how their experience engenders resilience and a determination to succeed. The women in Saule’s three novels selected for this study break the traditional status quo. The approach that this paper will utilize is that of African Feminisms, focusing on Walker’s Womanism, Ogunyemi’s Africana Womanism, and Stiwanism as the theoretical approaches. This is because African Feminisms concentrates on the issues related to gender, race and class that African women across spectrums face.
- Full Text:
- Date Issued: 2020
- Authors: Molubo, Rendani
- Date: 2020
- Subjects: Women in literature , Feminism -- Africa , Saule, N -- Vuleka Mhlaba , Saule, N -- Inkululeko Isentabeni , Saule, N -- Libambe Lingatshoni , Xhosa fiction -- History and criticism
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/143982 , vital:38300
- Description: This study seeks to explore how Professor Ncedile Saule’s works Vuleka Mhlaba (2006), Inkululeko Isentabeni (2010) and Libambe Lingatshoni (2017), depict female characters to reveal the inner resilience women embody. It is important to portray females as bold, intelligent and courageous beings as African women are subjected to major patriarchal myths. South Africa prides itself with a progressive Constitution and Bill of Rights that speaks of gender equality and the liberation of all persons. However, in practice women still live under patriarchal bondages and their efforts are side-lined, thus, the essentiality of writings that contributes towards the empowerment of women through displaying their resilience. Women in literature are mostly depicted as subordinate, submissive and emotional. At times they are portrayed as victims. They are very seldom portrayed as heroes or independent beings. They are constantly placed behind a man instead of in front of a man. This research aims to display women as heroes in their own capacity, without having to be dimmed by a man. The researcher decided to utilise writings of a male author so as to provide a different perspective from the norm that most male authors are known to write about in issues pertaining female characters. This is also deliberately done to encourage more male writers to change the mythical narration about women and start admiring their contributions without having them shadow any man. The projection of female resilience through the gaze of a male author gives hope that there are men who see and admire women’s efforts. It also indicates that men realise now that African feminisms are not against men and instead advocate for equality between men and women and recognise the greatness that could come out of a partnership between the two genders. Women’s behaviour and characteristics are mostly socially constructed, hence the need to exhibit the boldness that black women possess, instead of them only being utilised as nurturing sources and household caretakers. One of the purposes of this research study is to illustrate the resilience that women possess and analyse the forms of torment that women in Saule’s chosen novels have experienced and how their experience engenders resilience and a determination to succeed. The women in Saule’s three novels selected for this study break the traditional status quo. The approach that this paper will utilize is that of African Feminisms, focusing on Walker’s Womanism, Ogunyemi’s Africana Womanism, and Stiwanism as the theoretical approaches. This is because African Feminisms concentrates on the issues related to gender, race and class that African women across spectrums face.
- Full Text:
- Date Issued: 2020
A critical investigation of leadership in a Technical, Vocational Education and Training college in the Eastern Cape
- Authors: Chagi, Nonkonzo
- Date: 2020
- Subjects: Technical education -- South Africa , Vocational education -- South Africa , Educational leadership -- South Africa , Postsecondary education -- South Africa -- Administration
- Language: English
- Type: text , Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/140045 , vital:37827
- Description: Far-reaching reforms of the TVET college system – including a merger and frequent revisioning of the colleges’ role in the educational landscape of South Africa – have focused renewed attention on this sector. The fact that the sector has been plagued by poor performance – even to the extent that several colleges have been placed under administration – suggests problems at the level of leadership. This study sought to explore key role-players’ understanding of the leadership and management challenges faced by a TVET college and, by examining responses to these challenges, develop a sense of what leadership means in the sector. The study drew on three leadership theories – distributed leadership, transactional leadership as depicted in political models of management, and critical leadership – to help make sense of the findings. A qualitative case study design was used to explore key respondents’ views and lived experiences. The respondents were the principal, two deputy principals, a council member, three campus managers and a programme head. Interviews, questionnaires and document analysis were the chief data collection tools. The study found that critical leadership was the dominant approach at the college. This was revealed in the college leadership’s awareness of broader societal needs and its own role in operating in a socially just manner. College leadership also revealed signs of rejecting the status quo and opposing state control and bureaucracy, in favour of reactionary initiatives. There was limited evidence of distributed and transactional leadership. In fact, ‘leadership’ as such, seemed not to be part of the college discourse, suggesting that the concept and habit of leadership was not broadly discussed, shared and promoted. This sense was strengthened by the fact that at the time of the study, the college was headed by a charismatic and visionary leader. Indeed, the problem at the college seemed to be the Department of Higher Education and Training, which has failed the college in a number of ways.
- Full Text:
- Date Issued: 2020
- Authors: Chagi, Nonkonzo
- Date: 2020
- Subjects: Technical education -- South Africa , Vocational education -- South Africa , Educational leadership -- South Africa , Postsecondary education -- South Africa -- Administration
- Language: English
- Type: text , Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/140045 , vital:37827
- Description: Far-reaching reforms of the TVET college system – including a merger and frequent revisioning of the colleges’ role in the educational landscape of South Africa – have focused renewed attention on this sector. The fact that the sector has been plagued by poor performance – even to the extent that several colleges have been placed under administration – suggests problems at the level of leadership. This study sought to explore key role-players’ understanding of the leadership and management challenges faced by a TVET college and, by examining responses to these challenges, develop a sense of what leadership means in the sector. The study drew on three leadership theories – distributed leadership, transactional leadership as depicted in political models of management, and critical leadership – to help make sense of the findings. A qualitative case study design was used to explore key respondents’ views and lived experiences. The respondents were the principal, two deputy principals, a council member, three campus managers and a programme head. Interviews, questionnaires and document analysis were the chief data collection tools. The study found that critical leadership was the dominant approach at the college. This was revealed in the college leadership’s awareness of broader societal needs and its own role in operating in a socially just manner. College leadership also revealed signs of rejecting the status quo and opposing state control and bureaucracy, in favour of reactionary initiatives. There was limited evidence of distributed and transactional leadership. In fact, ‘leadership’ as such, seemed not to be part of the college discourse, suggesting that the concept and habit of leadership was not broadly discussed, shared and promoted. This sense was strengthened by the fact that at the time of the study, the college was headed by a charismatic and visionary leader. Indeed, the problem at the college seemed to be the Department of Higher Education and Training, which has failed the college in a number of ways.
- Full Text:
- Date Issued: 2020
A critique of translated (isiXhosa to English) sworn statements by the South African Police Service
- Authors: Mvabaza, Aviwe
- Date: 2020
- Subjects: Forensic linguistics , Translators -- South Africa , Xhosa language -- Translating , Police administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/122869 , vital:35361
- Description: The thesis provides a critique of sworn statement translations in the South African Police Service. The study is a mixed method study, which is rooted in Translation and Forensic Linguistics. It focuses on translations of two languages, IsiXhosa and English, an activity that was observed by the researcher at the Ndevana Police Station under the Buffalo City Municipality near King William’s Town in the Eastern Cape Province. In addition to the data collection strategies, among others, the study also collected data through the use of questionnaires responded to by the Ndevana Location’s community members. Furthermore, it used a method of consented interviews with the police officers. The main aim of these interviews was to unearth the police officers’ views on whether they require Translators and Forensic Linguists to assist them. Moreover, the other data collection strategy used was the consented recordings of verbal statements made by complainants, facilitated by the capturing of translated written dockets after the reporting of an incident. The police officers involved and who were available in the precinct were Constables, Sergeants, Detectives, Warrant officers and the Captain. The study period was 90 days, and the data presented in the form of graphs is contained in the relevant upcoming chapters. The findings of the study were that there was indeed a need for Translators and/or Forensic Linguists in the precinct, as the statistics revealed, by both the police officers and the community members. An analysis of the transcribed material, the interviews with the police and the verbal statements made by the complainants written by the police were evidence of the need for Translators and Forensic Linguists by the South African Police Services.
- Full Text:
- Date Issued: 2020
- Authors: Mvabaza, Aviwe
- Date: 2020
- Subjects: Forensic linguistics , Translators -- South Africa , Xhosa language -- Translating , Police administration -- South Africa
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/122869 , vital:35361
- Description: The thesis provides a critique of sworn statement translations in the South African Police Service. The study is a mixed method study, which is rooted in Translation and Forensic Linguistics. It focuses on translations of two languages, IsiXhosa and English, an activity that was observed by the researcher at the Ndevana Police Station under the Buffalo City Municipality near King William’s Town in the Eastern Cape Province. In addition to the data collection strategies, among others, the study also collected data through the use of questionnaires responded to by the Ndevana Location’s community members. Furthermore, it used a method of consented interviews with the police officers. The main aim of these interviews was to unearth the police officers’ views on whether they require Translators and Forensic Linguists to assist them. Moreover, the other data collection strategy used was the consented recordings of verbal statements made by complainants, facilitated by the capturing of translated written dockets after the reporting of an incident. The police officers involved and who were available in the precinct were Constables, Sergeants, Detectives, Warrant officers and the Captain. The study period was 90 days, and the data presented in the form of graphs is contained in the relevant upcoming chapters. The findings of the study were that there was indeed a need for Translators and/or Forensic Linguists in the precinct, as the statistics revealed, by both the police officers and the community members. An analysis of the transcribed material, the interviews with the police and the verbal statements made by the complainants written by the police were evidence of the need for Translators and Forensic Linguists by the South African Police Services.
- Full Text:
- Date Issued: 2020
A cybersafety educational framework for primary school learners in South Africa
- Authors: Kucherera, Lean
- Date: 2020
- Subjects: Computer crimes -- Security measures -- South Africa School children -- Crimes against -- South Africa
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49452 , vital:41722
- Description: Information and communication technologies (ICTs) have made life much easier for many people but have also brought many dangers to the world. School learners are amongst the users of ICT who are becoming cyber citizens. This age is good at exploring new things, with a growing number of school learners having access to ICT devices, such as mobile phones, tablets and desktop computers. This is due to the affordability of mobile phones, which they normally receive as gifts from their parents. Due to easy access of ICT, school learners can now access cyberspace which offers them many advantages and benefits. Such advantages and benefits include having a platform to socialise, improved and ease of access to information as well as improving their learning. Despite these benefits, school learners (primary school learners in particular) are prone to falling victim to a range of cyber risks and attacks since cyberspace is an unregulated platform that poses many potential dangers Common cybersafety threats associated with school learners include cyberbullying, sexting/“sextortion”, engaging with strangers, accessing inappropriate content and being exposed to a breach of privacy. Because the cybersafety of children, especially primary school learners, is often compromised, there is a need to protect them from the threats associated with ICT. However, protecting children from the aforementioned cybersafety threats is complicated because access to cyberspace is no longer confined to the home computer, but has extended to mobile phones, which are even more pervasive. Therefore, it is essential for school learners to be educated on how to protect themselves and their information in the virtual computer world. A number of developed countries like Australia, New Zealand, Canada, United States of America (USA) and United Kingdom (UK) have included cybersafety education in their school curricula. Similarly, the rapid growth of the Internet around the world, allowed some countries in Africa to take the initiative to start implementing cybersafety education in schools including Mauritius, Tunisia, Kenya, Ghana, Mozambique, Cameroon, Egypt and Rwanda. Countries like Uganda, Sudan, Morocco and South Africa are still facing challenges in this aspect. This study is focused on the cybersafety of primary school learners in the South African context.
- Full Text:
- Date Issued: 2020
- Authors: Kucherera, Lean
- Date: 2020
- Subjects: Computer crimes -- Security measures -- South Africa School children -- Crimes against -- South Africa
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49452 , vital:41722
- Description: Information and communication technologies (ICTs) have made life much easier for many people but have also brought many dangers to the world. School learners are amongst the users of ICT who are becoming cyber citizens. This age is good at exploring new things, with a growing number of school learners having access to ICT devices, such as mobile phones, tablets and desktop computers. This is due to the affordability of mobile phones, which they normally receive as gifts from their parents. Due to easy access of ICT, school learners can now access cyberspace which offers them many advantages and benefits. Such advantages and benefits include having a platform to socialise, improved and ease of access to information as well as improving their learning. Despite these benefits, school learners (primary school learners in particular) are prone to falling victim to a range of cyber risks and attacks since cyberspace is an unregulated platform that poses many potential dangers Common cybersafety threats associated with school learners include cyberbullying, sexting/“sextortion”, engaging with strangers, accessing inappropriate content and being exposed to a breach of privacy. Because the cybersafety of children, especially primary school learners, is often compromised, there is a need to protect them from the threats associated with ICT. However, protecting children from the aforementioned cybersafety threats is complicated because access to cyberspace is no longer confined to the home computer, but has extended to mobile phones, which are even more pervasive. Therefore, it is essential for school learners to be educated on how to protect themselves and their information in the virtual computer world. A number of developed countries like Australia, New Zealand, Canada, United States of America (USA) and United Kingdom (UK) have included cybersafety education in their school curricula. Similarly, the rapid growth of the Internet around the world, allowed some countries in Africa to take the initiative to start implementing cybersafety education in schools including Mauritius, Tunisia, Kenya, Ghana, Mozambique, Cameroon, Egypt and Rwanda. Countries like Uganda, Sudan, Morocco and South Africa are still facing challenges in this aspect. This study is focused on the cybersafety of primary school learners in the South African context.
- Full Text:
- Date Issued: 2020
A cybersecurity curricular framework for IT undergraduates in South Africa
- Authors: Mbuqe, Apelele Alungile
- Date: 2020
- Subjects: LCSH
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49595 , vital:41739
- Description: Abstract ending in a full stop.
- Full Text:
- Authors: Mbuqe, Apelele Alungile
- Date: 2020
- Subjects: LCSH
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49595 , vital:41739
- Description: Abstract ending in a full stop.
- Full Text:
A five year comparative analysis of annual baseline neurocognitive test scores for South African high school athletes
- Reichling, Marcelle Antoinette
- Authors: Reichling, Marcelle Antoinette
- Date: 2020
- Subjects: High school athletes -- Intelligence testing , Sports -- Psychological aspects , Neuropsychological tests , Brain -- Wounds and injuries -- Psychology , Sports injuries -- Psychological aspects , Brain -- Concussion , Head -- Wounds and injuries
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/145863 , vital:38473
- Description: The primary objective of this study was to assess the pattern of change in neurocognitive performance for adolescent athletes on baseline measures of the Immediate Post Concussion Assessment and Cognitive Testing (ImPACT) test, over five consecutive years, with a view to providing an indication of the optimal interval for repeat baseline testing of high school athletes. Participants were non-clinical, predominantly South African high school athletes in the overall age range 13 to 18 years (N = 108), divided into five groups (Grades 8,9, 10, 11 and 12), and tested at five test intervals. Repeated-measures ANOVA analyses examined differences in score performance across the test intervals for each of the five composite scores of the ImPACT test (Verbal Memory, Visual Memory, Visual Motor Speed, Reaction Time, Impulse Control). For the Verbal Memory, Visual Memory, Visual Motor Speed and Reaction Time composites there were significant neurocognitive score changes between several test intervals. Taking these results into account, in conjunction with substantial variability in performance, it is concluded that there is a need for annual baseline testing throughout the high school years. The secondary objective was to generate normative tables (Means and Standard Deviations) on the ImPACT test for the five participant groups at each of the five test intervals, including data for: the five composite scores (Verbal Memory, Visual Memory, Visual Motor Speed, Reaction Time, Impulse Control); for the twelve subtest scores test that go to make up the composite scores; and for four additional memory subcomponent scores (Word Memory immediate recall, Word Memory delayed recall, Design Memory immediate recall, Design Memory delayed recall). The results provide a clinical and heuristic normative platform for future use with brain injured individuals, which can be used to facilitate clinical interpretations of postconcussion assessments.
- Full Text:
- Date Issued: 2020
- Authors: Reichling, Marcelle Antoinette
- Date: 2020
- Subjects: High school athletes -- Intelligence testing , Sports -- Psychological aspects , Neuropsychological tests , Brain -- Wounds and injuries -- Psychology , Sports injuries -- Psychological aspects , Brain -- Concussion , Head -- Wounds and injuries
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/145863 , vital:38473
- Description: The primary objective of this study was to assess the pattern of change in neurocognitive performance for adolescent athletes on baseline measures of the Immediate Post Concussion Assessment and Cognitive Testing (ImPACT) test, over five consecutive years, with a view to providing an indication of the optimal interval for repeat baseline testing of high school athletes. Participants were non-clinical, predominantly South African high school athletes in the overall age range 13 to 18 years (N = 108), divided into five groups (Grades 8,9, 10, 11 and 12), and tested at five test intervals. Repeated-measures ANOVA analyses examined differences in score performance across the test intervals for each of the five composite scores of the ImPACT test (Verbal Memory, Visual Memory, Visual Motor Speed, Reaction Time, Impulse Control). For the Verbal Memory, Visual Memory, Visual Motor Speed and Reaction Time composites there were significant neurocognitive score changes between several test intervals. Taking these results into account, in conjunction with substantial variability in performance, it is concluded that there is a need for annual baseline testing throughout the high school years. The secondary objective was to generate normative tables (Means and Standard Deviations) on the ImPACT test for the five participant groups at each of the five test intervals, including data for: the five composite scores (Verbal Memory, Visual Memory, Visual Motor Speed, Reaction Time, Impulse Control); for the twelve subtest scores test that go to make up the composite scores; and for four additional memory subcomponent scores (Word Memory immediate recall, Word Memory delayed recall, Design Memory immediate recall, Design Memory delayed recall). The results provide a clinical and heuristic normative platform for future use with brain injured individuals, which can be used to facilitate clinical interpretations of postconcussion assessments.
- Full Text:
- Date Issued: 2020
A formative intervention study of how learner voice and leadership can be developed within a Learner Representative Council (LRC) in an urban combined school, Namibia
- Authors: Shipopyeni, Salomo S M
- Date: 2020
- Subjects: Education, Secondary -- Namibia , Student government -- Namibia -- Case studies , Student participation in administration -- Namibia -- Case studies
- Language: English
- Type: text , Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/144934 , vital:38393
- Description: The Namibian Education system, after the country gained independence, introduced various reforms to ensure the attainment of the educational goals of access, quality, equity and democracy in schools. One of the policies introduced to promote democracy in our schools was The Educational Act 16 of 2001, which gave birth to the establishment of Learners Representatives Councils (LRC) in schools. The LRC body is the legal learner leadership body established to ensure learners are represented in school leadership. However, various studies have revealed that this legal body of learners in many schools has been merely ‘rubber-stamping’ decisions made by teachers; learners have had very little input in decisions that affect them as learners. Thus, I was prompted to conduct this formative intervention study on learner leadership at an urban combined school in Namibia. Informed by distributed and transformative leadership theories, the study aimed to develop leadership within the LRC members and the needed expansive transformation regarding leadership practices in school. The intention was for learners to be enabled to practice their democratic right in decision-making processes in matters that concerned their schooling and learning. This study was theoretically and analytically framed by second generation CulturalHistorical Activity Theory. The participants included 12 LRC members, the LRC liaison teacher, the class register teacher, three school management team members and the principal. The research method was a case study, underpinned by the critical paradigm to bring about the fundamental expansive transformation in learner leadership practices at the case study school. This qualitative study was divided into two phases, a contextual profiling phase and an intervention phase. Data were generated through document analysis, observation, questionnaires, focus group interviews and Change Laboratory Workshops. The data were generated to answer the over-arching question: How learner voice and leadership can be developed within a Learner Representative Council (LRC) in an urban combined school, Namibia. The data were analysed inductively and abductively. The key findings were: first, there were a variety of understandings of the concept learner leadership; second, the involvement of LRC members in decision-making processes was limited to involvement in organising extracurricular activities and controlling of other learners at school; third, leadership development opportunities for learners at the case study school were only provided through training at the beginning of the year and the LRC carrying out various activities and roles at the case study school. Several challenges that constrained the LRC voice and leadership development were surfaced and, through Change Laboratory Workshops, the participants of the activity system together with me (the researcher-interventionist), identified the expansive learning opportunities to develop leadership amongst Learner Representative Council (LRC) members. In the final analysis, this study will contribute to the production of knowledge on the concept of learner leadership in the context of Namibia. Fellow scholars, professionals, colleagues and policy makers in education are requested to engage with this thesis to contribute to our understanding of this important aspect of our field and speak back to policy.
- Full Text:
- Date Issued: 2020
- Authors: Shipopyeni, Salomo S M
- Date: 2020
- Subjects: Education, Secondary -- Namibia , Student government -- Namibia -- Case studies , Student participation in administration -- Namibia -- Case studies
- Language: English
- Type: text , Thesis , Masters , MEd
- Identifier: http://hdl.handle.net/10962/144934 , vital:38393
- Description: The Namibian Education system, after the country gained independence, introduced various reforms to ensure the attainment of the educational goals of access, quality, equity and democracy in schools. One of the policies introduced to promote democracy in our schools was The Educational Act 16 of 2001, which gave birth to the establishment of Learners Representatives Councils (LRC) in schools. The LRC body is the legal learner leadership body established to ensure learners are represented in school leadership. However, various studies have revealed that this legal body of learners in many schools has been merely ‘rubber-stamping’ decisions made by teachers; learners have had very little input in decisions that affect them as learners. Thus, I was prompted to conduct this formative intervention study on learner leadership at an urban combined school in Namibia. Informed by distributed and transformative leadership theories, the study aimed to develop leadership within the LRC members and the needed expansive transformation regarding leadership practices in school. The intention was for learners to be enabled to practice their democratic right in decision-making processes in matters that concerned their schooling and learning. This study was theoretically and analytically framed by second generation CulturalHistorical Activity Theory. The participants included 12 LRC members, the LRC liaison teacher, the class register teacher, three school management team members and the principal. The research method was a case study, underpinned by the critical paradigm to bring about the fundamental expansive transformation in learner leadership practices at the case study school. This qualitative study was divided into two phases, a contextual profiling phase and an intervention phase. Data were generated through document analysis, observation, questionnaires, focus group interviews and Change Laboratory Workshops. The data were generated to answer the over-arching question: How learner voice and leadership can be developed within a Learner Representative Council (LRC) in an urban combined school, Namibia. The data were analysed inductively and abductively. The key findings were: first, there were a variety of understandings of the concept learner leadership; second, the involvement of LRC members in decision-making processes was limited to involvement in organising extracurricular activities and controlling of other learners at school; third, leadership development opportunities for learners at the case study school were only provided through training at the beginning of the year and the LRC carrying out various activities and roles at the case study school. Several challenges that constrained the LRC voice and leadership development were surfaced and, through Change Laboratory Workshops, the participants of the activity system together with me (the researcher-interventionist), identified the expansive learning opportunities to develop leadership amongst Learner Representative Council (LRC) members. In the final analysis, this study will contribute to the production of knowledge on the concept of learner leadership in the context of Namibia. Fellow scholars, professionals, colleagues and policy makers in education are requested to engage with this thesis to contribute to our understanding of this important aspect of our field and speak back to policy.
- Full Text:
- Date Issued: 2020
A Framework for Broadband Adoption in Buffalo City Metropolitan Municipality to Enable Citizen Access to e-Government
- Twetwa-Dube, Sithandile Pornelia
- Authors: Twetwa-Dube, Sithandile Pornelia
- Date: 2020
- Subjects: Electronic government information
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/18963 , vital:43003
- Description: E-government has been adopted as one of the cornerstones of the government‘s strategy for making services accessible to its citizens. The aim of this broadband adoption is to provide high quality public sector services via digital channels to improve cost-efficiency and generate benefits to municipality employees and citizen. A major challenge that municipalities face is the lack of public participation which restricts levels of communication between governments and municipalities and the citizen where public misses out on information and services available online, which results in further inequality. This has a devastating impact on service delivery because participatory democracy would be non-existent. Limited IT infrastructure, resistance to change, cultural barriers and exposure of malpractice are main themes related to IT usage or facilitating IT access for the wider public. Furthermore, lack of meaningful participation and freedom of association emerged as themes related to governance effectiveness. A mixed approach within a case study was considered, and data was collected through an online questionnaire and review of current literature. The study collected primary data by conducting web based questionnaires comprising sixty respondent’s citizens and fifteen municipal employees, including Information and Communication Technology (ICT) employees and broadband task team members. Statistical Package for the Social Science (SPSS) to analyse data from questionnaires. The selected BCMM employees of the population were known to have the relevant knowledge, time and experience to participate. Responses to each question developed the framework further based on the findings. Respondents were selected based on their appropriate knowledge and experience of the problem domain. Six experts were selected for final evaluation of the research findings. Firstly, the findings provided on barriers impact on the adoption of e-government. Secondly, on the techniques available to ensure access to e-government within BCMM. Thirdly, on the availability of technologies currently in the Buffalo City Metropolitan Municipality. Finally, on the elements of a Buffalo City Metropolitan Municipality broadband adoption strategy. This study evaluates barriers of e-government adoption, assessing strategies and techniques for accessing e-government services, examines current technologies to support e-government service within municipalities and analyses elements of Buffalo City Metropolitan Municipality broadband adoption strategy. A broadband adoption model was proposed based on empirical findings. Key adoption factors include adoption benefits and drivers, concerns and barriers and adoption interventions. These factors provide an essential foundation for the development of the proposed broadband adoption framework. The contribution of this study is a framework based on the Unified Theory of Acceptance and Use of Technology (UTAUT) and Technology Organisation Environment (TOE) framework to determine factors that influence or restrict a citizen’s intention to use and adopt technology, specifically broadband, in e-government services as a tool for citizen engagement. The proposed framework aims to overcome barriers to broadband adoption 4 Final Submission of Thesis, Dissertation or Research Report/Project, Conference or Exam Paper in municipalities, specifically Buffalo City Metropolitan Municipality (BCMM) to enable citizens’ access to e-government services.
- Full Text:
- Date Issued: 2020
- Authors: Twetwa-Dube, Sithandile Pornelia
- Date: 2020
- Subjects: Electronic government information
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: http://hdl.handle.net/10353/18963 , vital:43003
- Description: E-government has been adopted as one of the cornerstones of the government‘s strategy for making services accessible to its citizens. The aim of this broadband adoption is to provide high quality public sector services via digital channels to improve cost-efficiency and generate benefits to municipality employees and citizen. A major challenge that municipalities face is the lack of public participation which restricts levels of communication between governments and municipalities and the citizen where public misses out on information and services available online, which results in further inequality. This has a devastating impact on service delivery because participatory democracy would be non-existent. Limited IT infrastructure, resistance to change, cultural barriers and exposure of malpractice are main themes related to IT usage or facilitating IT access for the wider public. Furthermore, lack of meaningful participation and freedom of association emerged as themes related to governance effectiveness. A mixed approach within a case study was considered, and data was collected through an online questionnaire and review of current literature. The study collected primary data by conducting web based questionnaires comprising sixty respondent’s citizens and fifteen municipal employees, including Information and Communication Technology (ICT) employees and broadband task team members. Statistical Package for the Social Science (SPSS) to analyse data from questionnaires. The selected BCMM employees of the population were known to have the relevant knowledge, time and experience to participate. Responses to each question developed the framework further based on the findings. Respondents were selected based on their appropriate knowledge and experience of the problem domain. Six experts were selected for final evaluation of the research findings. Firstly, the findings provided on barriers impact on the adoption of e-government. Secondly, on the techniques available to ensure access to e-government within BCMM. Thirdly, on the availability of technologies currently in the Buffalo City Metropolitan Municipality. Finally, on the elements of a Buffalo City Metropolitan Municipality broadband adoption strategy. This study evaluates barriers of e-government adoption, assessing strategies and techniques for accessing e-government services, examines current technologies to support e-government service within municipalities and analyses elements of Buffalo City Metropolitan Municipality broadband adoption strategy. A broadband adoption model was proposed based on empirical findings. Key adoption factors include adoption benefits and drivers, concerns and barriers and adoption interventions. These factors provide an essential foundation for the development of the proposed broadband adoption framework. The contribution of this study is a framework based on the Unified Theory of Acceptance and Use of Technology (UTAUT) and Technology Organisation Environment (TOE) framework to determine factors that influence or restrict a citizen’s intention to use and adopt technology, specifically broadband, in e-government services as a tool for citizen engagement. The proposed framework aims to overcome barriers to broadband adoption 4 Final Submission of Thesis, Dissertation or Research Report/Project, Conference or Exam Paper in municipalities, specifically Buffalo City Metropolitan Municipality (BCMM) to enable citizens’ access to e-government services.
- Full Text:
- Date Issued: 2020
A framework for digital signature implementations for e-government services
- Authors: Kumalo, Mmaphefo Octavia
- Date: 2020
- Subjects: Electronic government information , Internet in public administration Municipal government -- Data processing
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/46086 , vital:39490
- Description: The advent of the Internet has brought with it new innovations, new ways of doing business, new ways of working, new ways of engaging, and new forms of business models. It has ultimately disrupted the traditional ways in which we communicate, socialise, and live life in general. This era has heralded the requirement for digitization and has brought about the digital economy and the Fourth Industrial Revolution. The fundamental ways in which companies and governments do business are changing due to the increased innovation, and the cost efficiencies that this era has brought with it. Like most governments worldwide, the South African government has responded to the Internet revolution and is taking advantage of it through e-government initiatives. The direct effects of e-government include cost savings, efficiencies, improved and continuous interactions and communications with citizens, better public procurement, and improved tax collection. The area of digitization has the potential to improve how the South African government delivers services to citizens and those that reside within the borders of the country. Amongst the five elements of successful e-government transformation, process reform is at the top of the list. e-Government is not just about the automation of existing processes and inefficiencies. It is also about the creation of new processes and new relationships between all the stakeholders involved. In the South African context, the lack of optimised, automated, and digitalised processes within various government departments has impeded crossfunctional processes’ effectiveness and efficiencies. Manual interventions in processing and transactions occur to comply with the legal requirement to manually sign documents. This poses difficulties in integrating processes within government departments to achieve a seamless experience for the citizen. As a result, this treatise sets out to answer the question of what needs to be in place to allow for the utilisation of digital signatures in automating the processing of e-government services for a seamless experience for citizens and businesses. The resulting Digital Signature Framework can be used by government departments to implement digital signatures and provides providing guidance, facilitating understanding, and providing ease of use, scalability, and agility.
- Full Text:
- Date Issued: 2020
- Authors: Kumalo, Mmaphefo Octavia
- Date: 2020
- Subjects: Electronic government information , Internet in public administration Municipal government -- Data processing
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/46086 , vital:39490
- Description: The advent of the Internet has brought with it new innovations, new ways of doing business, new ways of working, new ways of engaging, and new forms of business models. It has ultimately disrupted the traditional ways in which we communicate, socialise, and live life in general. This era has heralded the requirement for digitization and has brought about the digital economy and the Fourth Industrial Revolution. The fundamental ways in which companies and governments do business are changing due to the increased innovation, and the cost efficiencies that this era has brought with it. Like most governments worldwide, the South African government has responded to the Internet revolution and is taking advantage of it through e-government initiatives. The direct effects of e-government include cost savings, efficiencies, improved and continuous interactions and communications with citizens, better public procurement, and improved tax collection. The area of digitization has the potential to improve how the South African government delivers services to citizens and those that reside within the borders of the country. Amongst the five elements of successful e-government transformation, process reform is at the top of the list. e-Government is not just about the automation of existing processes and inefficiencies. It is also about the creation of new processes and new relationships between all the stakeholders involved. In the South African context, the lack of optimised, automated, and digitalised processes within various government departments has impeded crossfunctional processes’ effectiveness and efficiencies. Manual interventions in processing and transactions occur to comply with the legal requirement to manually sign documents. This poses difficulties in integrating processes within government departments to achieve a seamless experience for the citizen. As a result, this treatise sets out to answer the question of what needs to be in place to allow for the utilisation of digital signatures in automating the processing of e-government services for a seamless experience for citizens and businesses. The resulting Digital Signature Framework can be used by government departments to implement digital signatures and provides providing guidance, facilitating understanding, and providing ease of use, scalability, and agility.
- Full Text:
- Date Issued: 2020
A framework for enhancing compliance with Employee Performance Management and Development Systems(EPMDS) among public sector doctors in BCMM health facilities
- Bayeni, Luvuyo Lonwabo Precious
- Authors: Bayeni, Luvuyo Lonwabo Precious
- Date: 2020
- Subjects: Performance -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/47520 , vital:40116
- Description: This research explored an employee performance management and development system in the context of the public health centres in the Eastern Cape Province of South Africa. The study reviewed the literature on EPMDS in the public health sector of South Africa, noting the shortfalls, challenges, and ways in which it could be improved. The major findings from the study include the need to review the entire policy, revise the pay-scales, and co-create a new EPMDS policy creating space for the representation of the views of the employees. Without completing the development and performance evaluation, grade progression cannot be implemented despite years of service; hence the problem doctors face with their salary levels. The current EPMDS was found to be ineffective due to the wide discrepancy that exists between doctors and other health professionals in public health institutions. Among the commitment motivators highlighted by the respondents, was the need to develop an organisational culture that permits employees to recognise that they are appreciated. Future research must consider using mixed research methods, in the context of other South African Provinces and include a larger sample of research participants.
- Full Text:
- Date Issued: 2020
- Authors: Bayeni, Luvuyo Lonwabo Precious
- Date: 2020
- Subjects: Performance -- Management
- Language: English
- Type: Thesis , Masters , MBA
- Identifier: http://hdl.handle.net/10948/47520 , vital:40116
- Description: This research explored an employee performance management and development system in the context of the public health centres in the Eastern Cape Province of South Africa. The study reviewed the literature on EPMDS in the public health sector of South Africa, noting the shortfalls, challenges, and ways in which it could be improved. The major findings from the study include the need to review the entire policy, revise the pay-scales, and co-create a new EPMDS policy creating space for the representation of the views of the employees. Without completing the development and performance evaluation, grade progression cannot be implemented despite years of service; hence the problem doctors face with their salary levels. The current EPMDS was found to be ineffective due to the wide discrepancy that exists between doctors and other health professionals in public health institutions. Among the commitment motivators highlighted by the respondents, was the need to develop an organisational culture that permits employees to recognise that they are appreciated. Future research must consider using mixed research methods, in the context of other South African Provinces and include a larger sample of research participants.
- Full Text:
- Date Issued: 2020
A framework for supplier selection in the Nelson Mandela Bay retail industry
- Authors: Mavela, A
- Date: 2020
- Subjects: Business logistics -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/48905 , vital:41169
- Description: The success of business firms operating in the retail industry is largely dependent on the performance rendered by their supply base. Choosing the incorrect supplier could have dire consequences for the retailer’s performance, as suppliers are generally considered an extension of the retailer. Organisations base their operational expertise on the key performance objectives of cost, service, quality, speed, dependability and flexibility, which becomes the basis of their selection criteria when evaluating suppliers. The primary objective of this study was to develop a framework that guides retailers in their supplier selection process with the ultimate goal of formulating strategies to improve Nelson Mandela Bay’s (NMB’s) retail performance. In support of the primary objective, it was necessary to identify the current supplier selection criteria used in the NMB retail industry and the challenges that retailers face when selecting suppliers. The study set out to assess the effects of utilising established supplier selection criteria on retailers’ performance, as well as to identify strategies that retailers should employ to improve their performance. A quantitative research approach was utilised to collect data from a sample of 248 retailers and procurement and logistics managers. The empirical findings of the study identified flexibility, timeous delivery and reliability as the most important supplier selection criteria identified by retailers in NMB. The findings also revealed that utilising established supplier selection criteria has a significantly positive effect on retailers’ performance. Lack of collaboration between suppliers and retailers, lack of transparency between suppliers and retailers and suppliers’ limited knowledge of the criteria by which they are judged were identified as the most significant challenges facing retailers in NMB. The empirical findings also identified an increase in a retailer’s competitive advantage and revenue as the benefits of utilising supplier selection criteria to improve a retailer’s performance. The conclusions and implications of the empirical findings are provided and recommendations made. The study advances a framework to assist in guiding the retailers and procurement and logistics managers, retail researchers and policy makers when selecting suppliers. The study suggests that retailers should identify the most important supplier selection criteria, inform potential suppliers of the importance v of those criteria, select suppliers based on those criteria and utilise those criteria to evaluate the suppliers’ performance.
- Full Text:
- Date Issued: 2020
- Authors: Mavela, A
- Date: 2020
- Subjects: Business logistics -- South Africa -- Nelson Mandela Bay Municipality
- Language: English
- Type: Thesis , Masters , MCom
- Identifier: http://hdl.handle.net/10948/48905 , vital:41169
- Description: The success of business firms operating in the retail industry is largely dependent on the performance rendered by their supply base. Choosing the incorrect supplier could have dire consequences for the retailer’s performance, as suppliers are generally considered an extension of the retailer. Organisations base their operational expertise on the key performance objectives of cost, service, quality, speed, dependability and flexibility, which becomes the basis of their selection criteria when evaluating suppliers. The primary objective of this study was to develop a framework that guides retailers in their supplier selection process with the ultimate goal of formulating strategies to improve Nelson Mandela Bay’s (NMB’s) retail performance. In support of the primary objective, it was necessary to identify the current supplier selection criteria used in the NMB retail industry and the challenges that retailers face when selecting suppliers. The study set out to assess the effects of utilising established supplier selection criteria on retailers’ performance, as well as to identify strategies that retailers should employ to improve their performance. A quantitative research approach was utilised to collect data from a sample of 248 retailers and procurement and logistics managers. The empirical findings of the study identified flexibility, timeous delivery and reliability as the most important supplier selection criteria identified by retailers in NMB. The findings also revealed that utilising established supplier selection criteria has a significantly positive effect on retailers’ performance. Lack of collaboration between suppliers and retailers, lack of transparency between suppliers and retailers and suppliers’ limited knowledge of the criteria by which they are judged were identified as the most significant challenges facing retailers in NMB. The empirical findings also identified an increase in a retailer’s competitive advantage and revenue as the benefits of utilising supplier selection criteria to improve a retailer’s performance. The conclusions and implications of the empirical findings are provided and recommendations made. The study advances a framework to assist in guiding the retailers and procurement and logistics managers, retail researchers and policy makers when selecting suppliers. The study suggests that retailers should identify the most important supplier selection criteria, inform potential suppliers of the importance v of those criteria, select suppliers based on those criteria and utilise those criteria to evaluate the suppliers’ performance.
- Full Text:
- Date Issued: 2020
A framework for teaching secure coding practices through a blended learning approach
- Mdunyelwa, Vuyolwethu Sizoli
- Authors: Mdunyelwa, Vuyolwethu Sizoli
- Date: 2020
- Subjects: Blended learning , Blended learning -- Case studies Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49940 , vital:41890
- Description: With the recent increase in cyber-related attacks, cybersecurity is becoming a key area of concern for many organisations. Cybersecurity vulnerabilities are typically addressed through the implementation of various cybersecurity controls. These controls can be operational, technical or physical in nature. The focus of this research, however, is on technical controls with a specific focus on securing web applications. This research investigated whether third year software development students at the Nelson Mandela University adhered to secure coding practices in their capstone projects. In order to determine adherence, secure coding practices were identified from OWASP for the data access layer in web applications developed in the .NET environment. This was addressed by Secondary Objective, which was To determine what secure coding practices a web application developer should adhere to in the .NET environment. These secure coding practices were used to conduct a code review on 2015 third year capstone projects, and addressed Secondary Objective, To determine the adherence of third year software development capstone projects to the identified secure coding practices. The results for the code review were analysed and indicated low levels of adherence which led to the Problem Statement of this research, namely: Undergraduate software development students do not consistently adhere to secure coding practices when developing their third-year capstone projects, thereby leading to vulnerabilities in their web applications. In order to address this Problem Statement, the Primary Objective was identified, To develop a framework for teaching secure coding practices through a blended learning approach. Secondary Objective, To determine whether third year software development students have the requisite knowledge relating to secure coding, took the form of a questionnaire to assess students' knowledge relating to secure coding practices. This required the achievement of further sub-objectives which addressed both the knowledge and behaviour of software development students. The results of this questionnaire indicated that many of the third-year software development students lacked the requisite knowledge. This lack of knowledge and adherence was addressed through an educational intervention, meeting Secondary Objective, To design and implement an educational intervention to support software development students in the development of secure web applications. In terms of knowledge, online lessons were developed addressing each of the secure coding practices identified. In order to address adherence, students were given a checklist to monitor their adherence to the identified secure coding practices. Secondary Objective, To determine the exact of the educational intervention on both student adherence and their requisite knowledge regarding secure coding practices, involved the varication of the educational intervention, and comprised of two components, knowledge and behaviour. Knowledge varication took the form of an online questionnaire given to 2017 third year project students. To address behavioural adherence, the researcher conducted a code review on the 2017 capstone projects. The results from the varication showed a general improvement in students' knowledge and high levels of adherence to secure coding practices. Finally, a framework was developed that encompassed the key elements of this research, thereby providing guidance to support the development of se cure web applications in higher education institutions and meeting the primary objective of this study.
- Full Text:
- Date Issued: 2020
- Authors: Mdunyelwa, Vuyolwethu Sizoli
- Date: 2020
- Subjects: Blended learning , Blended learning -- Case studies Computer security
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/49940 , vital:41890
- Description: With the recent increase in cyber-related attacks, cybersecurity is becoming a key area of concern for many organisations. Cybersecurity vulnerabilities are typically addressed through the implementation of various cybersecurity controls. These controls can be operational, technical or physical in nature. The focus of this research, however, is on technical controls with a specific focus on securing web applications. This research investigated whether third year software development students at the Nelson Mandela University adhered to secure coding practices in their capstone projects. In order to determine adherence, secure coding practices were identified from OWASP for the data access layer in web applications developed in the .NET environment. This was addressed by Secondary Objective, which was To determine what secure coding practices a web application developer should adhere to in the .NET environment. These secure coding practices were used to conduct a code review on 2015 third year capstone projects, and addressed Secondary Objective, To determine the adherence of third year software development capstone projects to the identified secure coding practices. The results for the code review were analysed and indicated low levels of adherence which led to the Problem Statement of this research, namely: Undergraduate software development students do not consistently adhere to secure coding practices when developing their third-year capstone projects, thereby leading to vulnerabilities in their web applications. In order to address this Problem Statement, the Primary Objective was identified, To develop a framework for teaching secure coding practices through a blended learning approach. Secondary Objective, To determine whether third year software development students have the requisite knowledge relating to secure coding, took the form of a questionnaire to assess students' knowledge relating to secure coding practices. This required the achievement of further sub-objectives which addressed both the knowledge and behaviour of software development students. The results of this questionnaire indicated that many of the third-year software development students lacked the requisite knowledge. This lack of knowledge and adherence was addressed through an educational intervention, meeting Secondary Objective, To design and implement an educational intervention to support software development students in the development of secure web applications. In terms of knowledge, online lessons were developed addressing each of the secure coding practices identified. In order to address adherence, students were given a checklist to monitor their adherence to the identified secure coding practices. Secondary Objective, To determine the exact of the educational intervention on both student adherence and their requisite knowledge regarding secure coding practices, involved the varication of the educational intervention, and comprised of two components, knowledge and behaviour. Knowledge varication took the form of an online questionnaire given to 2017 third year project students. To address behavioural adherence, the researcher conducted a code review on the 2017 capstone projects. The results from the varication showed a general improvement in students' knowledge and high levels of adherence to secure coding practices. Finally, a framework was developed that encompassed the key elements of this research, thereby providing guidance to support the development of se cure web applications in higher education institutions and meeting the primary objective of this study.
- Full Text:
- Date Issued: 2020
A framework to enhance Information and Communication Technology (ICT) readiness for business continuity at the South African Revenue Services (SARS)
- Authors: Mathase, Euphodia
- Date: 2020
- Subjects: Internet in public administration -- Taxation -- South Africa Electronic commerce -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49496 , vital:41726
- Description: Many organisations, especially public sector organisations, are required to ensure that they are able to continue with their operation in cases of major disasters that affect the organisations. In the same light, the South African Revenue Services (SARS), being a quasi-government organisation, faces a similar phenomenon. The main purpose of conducting this research was to explore a problem in depth that was identified at the SARS. SARS does not have a comprehensive business continuity plan. The study therefore examined possible techniques or actions for ensuring information and communication technology (ICT) readiness and business continuity, explored various frameworks and policy documents which will assist public entities with readiness for business continuity, and identified frameworks that will assist SARS in implementing an effective ICT readiness for business continuity. The study adopted the design science research approach and aspects of design science research in information systems. Data gathered through the questionnaire instrument was used to design a framework that can be adopted at SARS to enhance ICT readiness for business continuity. The research findings show the importance of effective business continuity management (BCM) and a framework that can be used to implement an effective BCM.
- Full Text:
- Date Issued: 2020
- Authors: Mathase, Euphodia
- Date: 2020
- Subjects: Internet in public administration -- Taxation -- South Africa Electronic commerce -- Government policy -- South Africa
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/49496 , vital:41726
- Description: Many organisations, especially public sector organisations, are required to ensure that they are able to continue with their operation in cases of major disasters that affect the organisations. In the same light, the South African Revenue Services (SARS), being a quasi-government organisation, faces a similar phenomenon. The main purpose of conducting this research was to explore a problem in depth that was identified at the SARS. SARS does not have a comprehensive business continuity plan. The study therefore examined possible techniques or actions for ensuring information and communication technology (ICT) readiness and business continuity, explored various frameworks and policy documents which will assist public entities with readiness for business continuity, and identified frameworks that will assist SARS in implementing an effective ICT readiness for business continuity. The study adopted the design science research approach and aspects of design science research in information systems. Data gathered through the questionnaire instrument was used to design a framework that can be adopted at SARS to enhance ICT readiness for business continuity. The research findings show the importance of effective business continuity management (BCM) and a framework that can be used to implement an effective BCM.
- Full Text:
- Date Issued: 2020
A framework to integrate secure programming principles into undergraduate computing curricula
- Authors: Bangani, Sifiso Matthews
- Date: 2020
- Subjects: Information technology -- Study and teaching (Higher) , Electronic data processing personnel -- Training of Computer software -- Development
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46019 , vital:39409
- Description: Many graduate software developers are not competent in secure programming, resulting in risks that are caused by vulnerabilities in the application code of software applications. These graduate software developers are equipped with programming knowledge and skills from universities, however, these software developers are rarely equipped with secure programming knowledge and skills from the undergraduate level. Although there are various techniques for writing secure code in the current body of knowledge, these techniques are rarely fundamental components of a computing curriculum, resulting in incompetent graduate software developers. The security aspect of software applications, is considered as an important aspect that can reflect the ability of a system to prevent data exposures and loss of information. For businesses that rely on software applications to keep operations running, a failure of a software application can stop production, interrupt processes, and may lead to data breaches and financial losses. This research argued that secure programming education needs to be included across computing curricula, and thus, the primary objective of this dissertation was: To develop a framework for integrating secure programming principles into undergraduate computing curricula. It proposes a framework for the incorporation of secure programming principles into undergraduate computing curricula, through a step-by-step approach. This framework includes the identification of application risks and secure programming practices as they relate to each other, and to the basic programming concepts taught to undergraduate students. It specifically aims to improve the security of software applications developed in the .Net framework environment. The main research methods used in this study included a literature view, thematic content analysis, argumentation, and modelling.
- Full Text:
- Date Issued: 2020
- Authors: Bangani, Sifiso Matthews
- Date: 2020
- Subjects: Information technology -- Study and teaching (Higher) , Electronic data processing personnel -- Training of Computer software -- Development
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/46019 , vital:39409
- Description: Many graduate software developers are not competent in secure programming, resulting in risks that are caused by vulnerabilities in the application code of software applications. These graduate software developers are equipped with programming knowledge and skills from universities, however, these software developers are rarely equipped with secure programming knowledge and skills from the undergraduate level. Although there are various techniques for writing secure code in the current body of knowledge, these techniques are rarely fundamental components of a computing curriculum, resulting in incompetent graduate software developers. The security aspect of software applications, is considered as an important aspect that can reflect the ability of a system to prevent data exposures and loss of information. For businesses that rely on software applications to keep operations running, a failure of a software application can stop production, interrupt processes, and may lead to data breaches and financial losses. This research argued that secure programming education needs to be included across computing curricula, and thus, the primary objective of this dissertation was: To develop a framework for integrating secure programming principles into undergraduate computing curricula. It proposes a framework for the incorporation of secure programming principles into undergraduate computing curricula, through a step-by-step approach. This framework includes the identification of application risks and secure programming practices as they relate to each other, and to the basic programming concepts taught to undergraduate students. It specifically aims to improve the security of software applications developed in the .Net framework environment. The main research methods used in this study included a literature view, thematic content analysis, argumentation, and modelling.
- Full Text:
- Date Issued: 2020
A framework to measure the degree of alignment between corporate and IT/IS objectives at Randwater
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Business enterprises -- Computer networks -- Security measures , Data protection Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47156 , vital:39818
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature
- Full Text:
- Date Issued: 2020
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Business enterprises -- Computer networks -- Security measures , Data protection Information technology -- Security measures
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/47156 , vital:39818
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature
- Full Text:
- Date Issued: 2020
A framework to measure the degree of alignment between corporate and IT/IS objectives at Randwater
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Information technology -- Management , Business enterprises -- Computer networks
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/48841 , vital:41145
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. v The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature available on business strategic alignment with ICT goals.
- Full Text:
- Date Issued: 2020
- Authors: Sigasa, Moshane Lydia
- Date: 2020
- Subjects: Information technology -- Management , Business enterprises -- Computer networks
- Language: English
- Type: Thesis , Masters , MPhil
- Identifier: http://hdl.handle.net/10948/48841 , vital:41145
- Description: The South African Government has institutionalised a Corporate Governance of ICT Policy Framework which was developed by Department of Public Service and Administration (DPSA). The framework has adopted some elements of KING III, ISO 38500 and COBIT. Consequently, it is now a requirement by the South African Government that all its entities must adopt this framework. Nevertheless, it is not clear how government has emphasised this alignment in such entities. The problem statement in this study was that Randwater is unable to realise full value of the investment in IT/IS because there is misalignment between IT objectives or deliverables and the corporate objectives. This study sought to identify a suitable framework which meets the ICT policy criteria as set out by the DPSA, which will facilitate the alignment between corporate objectives and IT/IS objectives at Randwater. This was achieved through the development and refinement of the artefact through the various iteration phases. Additionally, an online survey was used to collect data from a focus group comprising IT experts and senior management at Randwater. The Information Technology Governance Institute Framework was employed to assist in the development of the questions. The survey results were utilised during the validation of the artefact produced by this research study in a workshop. The findings were then linked with the related literature which either supported or rejected the findings through discussions on the literature and thereafter conclusions were made based on these findings. Furthermore, a literature review was conducted to gain a better understanding of what has been done in the field of research in order to assist in defining the problem that this research seeks to solve so as to inform the development of design characteristics. The research process employed the Nelson Mandela University – Design Science Strategy Methodology referred to as (NMU – DSSM) with the goal of developing an artefact in the form of a framework. The research process entailed studying the existing literature and analysing the aspects relating to corporate governance, IT governance, frameworks, and strategies to be able to measure the degree of alignment. The phases of designing the artefact were analysis, design, evaluate, validate and diffuse phases. The final artefact developed was a framework that incorporated the principles of King IV and ISO 38500 in corporate governance and ICT goals alignment. The final artefact also embedded transparency, accountability and security as important elements in the implementation of the artefact. v The survey findings were instrumental in the development of the artefact that brings alignment between business strategy and IT objectives at Randwater. From the findings, in terms of IT flexibility, it was revealed that the interrelated parts of the system at Randwater were modular. It was also concluded that there is lack of communication about the manner in which the components of the information systems are organised and integrated in order to allow for rapid changes and that the organisational IT infrastructure and applications were loosely coupled. The findings further revealed that the business had established corporate rules and standards for hardware and operating systems to ensure platform compatibility. It was also revealed that organisational IT applications were developed based on compliance guidelines. In terms of IT-enabled dynamic capabilities, it was revealed that IT systems at Randwater are not capable of scanning the environment and identifying new business opportunities and are not capable of anticipating discontinuities arising in the business domain by developing greater reactive and proactive strength. It was also revealed that it was concluded that IT systems were capable of achieving strategic alignment between IT flexibility and dynamic capabilities. Therefore, design science was the ideal research paradigm towards addressing the research problem and the artefact designed was a viable research contribution. The significance of the study was that it contributed to the development of technology-based solutions to an important and relevant business problem of alignment of business strategy to IT goals. The design evaluation, the utility, quality, and efficacy of the final design artefact was rigorously demonstrated via well-executed evaluation methods. The study also contributed to the literature available on business strategic alignment with ICT goals.
- Full Text:
- Date Issued: 2020
A genetic analysis of the species and intraspecific lineages of Dactylopius Costa (Hemiptera: Dactylopiidae)
- Van Steenderen, Clarke Julian Mignon
- Authors: Van Steenderen, Clarke Julian Mignon
- Date: 2020
- Subjects: Dactylopius
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/151491 , vital:39135
- Description: The Cactaceae family comprises 15 genera and nearly 2000 species. With one exception, these are all native to the Americas. Numerous cactaceous species are invasive in other parts of the world, resulting in considerable damage to ecosystem functioning and agricultural practices. The most successful biological control agents used to combat invasive Cactaceae belong to the Dactylopius genus (Hemiptera: Dactylopiidae), comprising eleven species. The Dactylopiidae are exclusively cactophagous and are usually host-specific. Some intraspecific lineages of dactylopiids, often referred to as `biotypes', also display host-specificity, and are used to control particular species of invasive Cactaceae. To date, two lineages within Dactylopius opuntiae (`ficus' and `stricta'), and two within D. tomentosus (`cholla' and `imbricata') have been released in South Africa to control Opuntia ficus-indica and O. stricta, and Cylindropuntia fulgida and C. imbricata, respectively. The `californica var. parkeri' lineage is currently under consideration for release in South Africa for the control of C. pallida. Australia has already released these five lineages, and approved the release of an additional three in 2017; namely D. tomentosus `bigelovii', `cylindropuntia sp.', and `acanthocarpa x echinocarpa'. Many of the Dactylopius species are so morphologically similar, and in the case of lineages, identical, that numerous misidentifications have been made in the past. These errors have had serious implications, such as failed attempts at the biological control of cactus weeds. This thesis aimed to generate a multi-locus genetic database to enable the identification of the species and lineages in the Dactylopiidae family, and to test its accuracy. Seven species were included in the analysis, including two lineages within D. opuntiae and six within D. tomentosus. Genetic characterisation was achieved through the DNA sequencing of three gene regions; namely mitochondrial 12S rRNA and cytochrome c oxidase I (COI), nuclear 18S rRNA, and fragment analysis using two inter-simple sequence repeats (ISSRs). Nucleotide sequences were very effective for species-level identification, where the 12S, 18S, and COI regions showed 100%, 94.59%, and 100% identification accuracy rates, respectively. Additionally, the 12S and COI markers distinguished between half of the D. tomentosus lineages (`californica', `cholla', and `imbricata'), with identification accuracies of 100%. The `echinocarpa x acanthocarpa', `bigelovii', and `cylindropuntia sp.' lineages formed one clade. None of the DNA genetic markers showed a separation between the `ficus' and `stricta' lineages within D. opuntiae. Fragment analysis through the use of ISSRs provided higher-resolution results, and addressed this gap by showing a well-supported separation between the two lineages, and between wild populations collected in the Eastern Cape Province in South Africa. The identification accuracy of the `ficus' and `stricta' lineages was 81.82%. This is the first time that a method has been developed that can distinguish between these lineages. An additional component of this thesis was the creation of three user-friendly R-based programs to assist with: 1. ISSR data processing. 2. The identification of query Dactylopius nucleotide sequences relative to the gene databases created here. 3. A graphical user interface (GUI) version of the R package `SPIDER', which is useful for the assessment of the accuracy of genetic barcode data. A successful biological control programme relies on the correct identification of the agent in question, and so it is imperative that cactus biological control practitioners are able to distinguish between Dactylopius species and lineages in order to release the most effective ones onto target Cactaceae. The laboratory protocols reported, and data processing tools created here, have largely addressed this need and offer valuable practical applications. These include: 1. The flagging of potential new species, cryptic species, and lineages of dactylopiid species released as new biocontrol agents. 2. Validating the identifications made by taxonomists based on morphology. 3. Confirming to which species, and, where applicable, to which lineage, a field-collected sample belongs. 4. Identifying hybrids resulting from lineage crosses. Ensuring that the correct Dactylopius species are utilised for biological control will improve the control of invasive Cactaceae and protect biodiversity and agricultural productivity.
- Full Text:
- Date Issued: 2020
- Authors: Van Steenderen, Clarke Julian Mignon
- Date: 2020
- Subjects: Dactylopius
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/151491 , vital:39135
- Description: The Cactaceae family comprises 15 genera and nearly 2000 species. With one exception, these are all native to the Americas. Numerous cactaceous species are invasive in other parts of the world, resulting in considerable damage to ecosystem functioning and agricultural practices. The most successful biological control agents used to combat invasive Cactaceae belong to the Dactylopius genus (Hemiptera: Dactylopiidae), comprising eleven species. The Dactylopiidae are exclusively cactophagous and are usually host-specific. Some intraspecific lineages of dactylopiids, often referred to as `biotypes', also display host-specificity, and are used to control particular species of invasive Cactaceae. To date, two lineages within Dactylopius opuntiae (`ficus' and `stricta'), and two within D. tomentosus (`cholla' and `imbricata') have been released in South Africa to control Opuntia ficus-indica and O. stricta, and Cylindropuntia fulgida and C. imbricata, respectively. The `californica var. parkeri' lineage is currently under consideration for release in South Africa for the control of C. pallida. Australia has already released these five lineages, and approved the release of an additional three in 2017; namely D. tomentosus `bigelovii', `cylindropuntia sp.', and `acanthocarpa x echinocarpa'. Many of the Dactylopius species are so morphologically similar, and in the case of lineages, identical, that numerous misidentifications have been made in the past. These errors have had serious implications, such as failed attempts at the biological control of cactus weeds. This thesis aimed to generate a multi-locus genetic database to enable the identification of the species and lineages in the Dactylopiidae family, and to test its accuracy. Seven species were included in the analysis, including two lineages within D. opuntiae and six within D. tomentosus. Genetic characterisation was achieved through the DNA sequencing of three gene regions; namely mitochondrial 12S rRNA and cytochrome c oxidase I (COI), nuclear 18S rRNA, and fragment analysis using two inter-simple sequence repeats (ISSRs). Nucleotide sequences were very effective for species-level identification, where the 12S, 18S, and COI regions showed 100%, 94.59%, and 100% identification accuracy rates, respectively. Additionally, the 12S and COI markers distinguished between half of the D. tomentosus lineages (`californica', `cholla', and `imbricata'), with identification accuracies of 100%. The `echinocarpa x acanthocarpa', `bigelovii', and `cylindropuntia sp.' lineages formed one clade. None of the DNA genetic markers showed a separation between the `ficus' and `stricta' lineages within D. opuntiae. Fragment analysis through the use of ISSRs provided higher-resolution results, and addressed this gap by showing a well-supported separation between the two lineages, and between wild populations collected in the Eastern Cape Province in South Africa. The identification accuracy of the `ficus' and `stricta' lineages was 81.82%. This is the first time that a method has been developed that can distinguish between these lineages. An additional component of this thesis was the creation of three user-friendly R-based programs to assist with: 1. ISSR data processing. 2. The identification of query Dactylopius nucleotide sequences relative to the gene databases created here. 3. A graphical user interface (GUI) version of the R package `SPIDER', which is useful for the assessment of the accuracy of genetic barcode data. A successful biological control programme relies on the correct identification of the agent in question, and so it is imperative that cactus biological control practitioners are able to distinguish between Dactylopius species and lineages in order to release the most effective ones onto target Cactaceae. The laboratory protocols reported, and data processing tools created here, have largely addressed this need and offer valuable practical applications. These include: 1. The flagging of potential new species, cryptic species, and lineages of dactylopiid species released as new biocontrol agents. 2. Validating the identifications made by taxonomists based on morphology. 3. Confirming to which species, and, where applicable, to which lineage, a field-collected sample belongs. 4. Identifying hybrids resulting from lineage crosses. Ensuring that the correct Dactylopius species are utilised for biological control will improve the control of invasive Cactaceae and protect biodiversity and agricultural productivity.
- Full Text:
- Date Issued: 2020
A Geochemical Comparison of Southern African Stromatolites and Stromatolite Pools
- Authors: Dodd, Carla
- Date: 2020
- Subjects: Stromatolites
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48235 , vital:40527
- Description: Microbialite accretion takes place via either mineral precipitation, the trapping and binding of mineral and sediment grains, or a combination of the two. Recently, the geochemistry of carbonate deposits, including microbialites, has been used to reconstruct palaeoenvironments and infer biogenicity. Numerous modern stromatolite (layered microbialites) systems are located on the southern African coastline and are formed predominantly by mineral precipitation with minor detrital input. In order to better understand the environmental and biological processes influencing the formation of microbialites, the geochemistry of southern African coastalstromatolites is examined. This is done by a spatial comparison of the hydrochemistry as well as the major and trace element geochemistry of various coastal stromatolite systems. The influence of the underlying geology on the composition of the stromatolites forms a particular focus of the study. In addition, the effect of metazoans on the micro-fabrics and sediment incorporation into the stromatolite matrix is assessed. Finally, the trace element geochemistry of active, inactive, and ancient stromatolites is compared with a speleothem sample in order to test the validity of using trace elements as a means to determine biogenicity of deposition. Results show that the bulk geochemistry of the South African stromatolites is not a simple function of the associated bedrock lithologies, although certain parallels do exist. It was found that metazoans indirectly influence sediment incorporation by increasing porosity and thereby accommodation space for detrital input. Furthermore, trace element signatures could not be directly attributed to microbial influence in the deposition of the carbonates. Ultimately, this study provides valuable insights into the formation processes of the active South African stromatolites and the use of trace elements as a geochemical tool to investigate the evolution of life and determine past environmental conditions.
- Full Text:
- Date Issued: 2020
- Authors: Dodd, Carla
- Date: 2020
- Subjects: Stromatolites
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10948/48235 , vital:40527
- Description: Microbialite accretion takes place via either mineral precipitation, the trapping and binding of mineral and sediment grains, or a combination of the two. Recently, the geochemistry of carbonate deposits, including microbialites, has been used to reconstruct palaeoenvironments and infer biogenicity. Numerous modern stromatolite (layered microbialites) systems are located on the southern African coastline and are formed predominantly by mineral precipitation with minor detrital input. In order to better understand the environmental and biological processes influencing the formation of microbialites, the geochemistry of southern African coastalstromatolites is examined. This is done by a spatial comparison of the hydrochemistry as well as the major and trace element geochemistry of various coastal stromatolite systems. The influence of the underlying geology on the composition of the stromatolites forms a particular focus of the study. In addition, the effect of metazoans on the micro-fabrics and sediment incorporation into the stromatolite matrix is assessed. Finally, the trace element geochemistry of active, inactive, and ancient stromatolites is compared with a speleothem sample in order to test the validity of using trace elements as a means to determine biogenicity of deposition. Results show that the bulk geochemistry of the South African stromatolites is not a simple function of the associated bedrock lithologies, although certain parallels do exist. It was found that metazoans indirectly influence sediment incorporation by increasing porosity and thereby accommodation space for detrital input. Furthermore, trace element signatures could not be directly attributed to microbial influence in the deposition of the carbonates. Ultimately, this study provides valuable insights into the formation processes of the active South African stromatolites and the use of trace elements as a geochemical tool to investigate the evolution of life and determine past environmental conditions.
- Full Text:
- Date Issued: 2020
A mixed methods investigation of students’ attitudes towards statistics and quantitative research methods: a focus on postgraduate psychology students at a South African university
- Authors: Ngantweni, Xolelwa
- Date: 2020
- Subjects: Fetal alcohol spectrum disorders -- South Africa , Statistics , Psychology -- Research , College students -- South Africa -- Attitudes , Psychology -- Research -- South Africa
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/140490 , vital:37894
- Description: Many University programs offer a course in either basic or intermediate statistics as part of the degree requirements prior to graduation (McGrath, Ferns, Greiner, Wanamaker and Brown, 2015). These statistics or quantitative research methods courses are integral in helping students gain vital skills in analysing quantitative data. Research (Schau, Stevens, Dauphinee, and Del Vecchio, 1995) does however indicate that most students have a perfunctory disposition towards these courses. My study sought to particularly investigate attitudes towards statistics and quantitative research methods amongst a sample of 61 postgraduate Psychology students at Rhodes University undertaking a ‘Quantitative Research Methods’ course as part of their degree offering. A mixed methods approach was used to investigate students’ attitudes towards statistics and quantitative research methods. The Survey of Attitudes Toward Statistics (SATS-36) (Schau, 2003) captured student’s attitudes towards statistics using a Likert Scale instrument; whereas detailed qualitative interviews accentuated findings from the SATS-36. Key quantitative findings from the SATS-36 including students’ perceptions of statistics being a difficult course as well as students having a low affect towards statistics are detailed. Key qualitative findings related to why students experience statistics anxiety such as students’ (1) fear of failing statistics, (2) The late introduction of statistics in the Psychology curriculum, and (3) The role of educator/s in alleviating or promoting feelings of statistics anxiety are noted. The significance of these findings as well as the contributions of the study to the teaching and learning of statistics and quantitative research methods courses at Rhodes University are explored, in light of other studies on the topic of statistics anxiety and attitudes towards statistics/ quantitative research methods.
- Full Text:
- Date Issued: 2020
- Authors: Ngantweni, Xolelwa
- Date: 2020
- Subjects: Fetal alcohol spectrum disorders -- South Africa , Statistics , Psychology -- Research , College students -- South Africa -- Attitudes , Psychology -- Research -- South Africa
- Language: English
- Type: text , Thesis , Masters , MA
- Identifier: http://hdl.handle.net/10962/140490 , vital:37894
- Description: Many University programs offer a course in either basic or intermediate statistics as part of the degree requirements prior to graduation (McGrath, Ferns, Greiner, Wanamaker and Brown, 2015). These statistics or quantitative research methods courses are integral in helping students gain vital skills in analysing quantitative data. Research (Schau, Stevens, Dauphinee, and Del Vecchio, 1995) does however indicate that most students have a perfunctory disposition towards these courses. My study sought to particularly investigate attitudes towards statistics and quantitative research methods amongst a sample of 61 postgraduate Psychology students at Rhodes University undertaking a ‘Quantitative Research Methods’ course as part of their degree offering. A mixed methods approach was used to investigate students’ attitudes towards statistics and quantitative research methods. The Survey of Attitudes Toward Statistics (SATS-36) (Schau, 2003) captured student’s attitudes towards statistics using a Likert Scale instrument; whereas detailed qualitative interviews accentuated findings from the SATS-36. Key quantitative findings from the SATS-36 including students’ perceptions of statistics being a difficult course as well as students having a low affect towards statistics are detailed. Key qualitative findings related to why students experience statistics anxiety such as students’ (1) fear of failing statistics, (2) The late introduction of statistics in the Psychology curriculum, and (3) The role of educator/s in alleviating or promoting feelings of statistics anxiety are noted. The significance of these findings as well as the contributions of the study to the teaching and learning of statistics and quantitative research methods courses at Rhodes University are explored, in light of other studies on the topic of statistics anxiety and attitudes towards statistics/ quantitative research methods.
- Full Text:
- Date Issued: 2020